Test 4 Flashcards
- Which of the following allow for higher fault tolerance, availability, and performance across multiple systems? (Choose two.)
A. Load balancer B. Jumbo frames C. Clustering D. Round robin E. TCP offloading
A. Load balancer
C. Clustering
- A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP
- 254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue?
A. Change the IP scope on the DHCP server to a public IP address range.
B. Perform a traceroute command to identify the router that is not functioning.
C. Verify the host has physical connectivity and is on the correct VLAN.
D. Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address.
C. Verify the host has physical connectivity and is on the correct VLAN.
APPIPA doesn’t require physical connectivity. It is a locally created address for when Windows can’t reach a DHCP server for whatever reason.
- A network administrator wants to reduce the amount of time each user takes to log in to different systems in the network. Which of the following would reduce the time spent authenticating?
A. Kerberos B. RADIUS C. Certificate D. SSO E. MFA F. NAC
D. SSO
- A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered?
A. Evil twin
B. ARP poisoning
C. DHCP exhaustion
D. Social engineering
A. Evil twin
The main reason why I was able to get A as the answer is because it doesn’t mention that an APIPA address is assigned, and says the address it has isn’t in the scope provided by their servers.
- Which of the following is an object held within an MIB?
A. OUI B. OTDR C. OID D. SNMP host E. SNMP agent F. SNMP trap
C. OID
Everything on a device that can be monitored by SNMP is assigned an object identifier. a management information base translates OID into readable text.
- Which of the following storage network technologies has the HIGHEST throughput?
A. FCoE
B. InfiniBand
C. iSCSI
D. OC3
B. InfiniBand
- The corporate head office has assigned the subnet of 10.1.100.0/24 to a network technician. The technician wants to create subnets for the finance department, human resources, and IT. Given the following device counts:
Finance: 70 devices -
Human resources: 38 devices -
IT: 16 devices -
Which of the following outlines how the technician should allocate the address space given?
A. Finance: 10.1.100.0/21 Human resources: 10.1.100.128/22 IT: 10.1.100.192/23
B. Finance: 10.1.100.0/23 Human resources: 10.1.100.128/22 IT: 10.1.100.192/21
C. Finance: 10.1.100.0/25 Human resources: 10.1.100.128/26 IT: 10.1.100.192/27
D. Finance: 10.1.100.0/26 Human resources: 10.1.100.128/27 IT: 10.1.100.192/28
C. Finance: 10.1.100.0/25 Human resources: 10.1.100.128/26 IT: 10.1.100.192/27
- A network administrator is configuring the 172.16.40.0/22 network for a new building. Which of the following is the number of hosts that will be supported on this network?
A. 510 B. 512 C. 1022 D. 1024 E. 2046 F. 2048
C. 1022
/22 = 11111111.11111111.11111100.00000000 = 1024 host - 2 network ID and broadcast = 1022 available host
- At which of the following layers of the OSI model does compression occur?
A. Session
B. Transport
C. Data link
D. Presentation
D. Presentation
Com-PRES-sion. PRESentation
- Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains?
A. Layer 2 switch B. Layer 3 switch C. Signal repeater D. Bridge E. Domain server
B. Layer 3 switch
Routers separate broadcast domains. Next best thing is a Layer 3 switch. Which operates like a router.
Layer 2 for collision, Layer 3 for Broadcast
- Ann, a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?
A. Transceiver mismatch B. Crosstalk C. Jitter D. Open/short on the cable
A. Transceiver mismatch
PoE = VoIP, but without PoE the laptop works. This is due to transceiver mismatch. Crosstalk and Jitter would not give this symptom. Bad cable would not let the laptop connect.
- A network technician has been asked to create secure private networks between a companys headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this?
A. Site-to-site B. Client-to-site C. Point-to-point D. Point-to-multipoint
A. Site-to-site
- A department is reporting network issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following is MOST likely the issue?
A. EMI B. TX/RX reverse C. Open/short D. Attenuation
A. EMI
CompTIA questions and answer aren’t always going to make sense. The key is to eliminate all the they answers provided. The question says, “Which of the following is (MOST) likely the issue”. By reading the question, we can eliminate attenuation and short off top. The question also states, “users can ping each other and the switch”, meaning all cable connections are good. TX/RX reverse can’t possibly be the issue, leaving answer A, EMI. I honest don’t think its fair how they design their questions. We all are familiar with each answer and know exactly what they are but the way the questions are set up is deceitful and a lot times they can be vague.
- A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will BEST ensure unauthorized devices cannot consume the shop owners limited Internet bandwidth?
A. Disable the SSID broadcast. B. Implement WEP authentication. C. Change the WiFi password. D. Activate MAC address filtering.
D. Activate MAC address filtering.
- A large company uses an AAA server to manage network device access. The engineers can use their domain credentials to access all other servers. Currently, the network engineers cannot access the AAA server using domain credentials, but they can access it using a local account. Which of the following should the engineers update?
A. Host-based firewall settings B. TACAS+ server time C. Server IP address D. DNS SRV record
B. TACAS+ server time
- A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed?
A. 1000BaseLX SFP B. Duplex GBIC C. Duplex SFP+ D. Bidirectional SFP
D. Bidirectional SFP
It’s a Bi-Directional (BiDi) transceiver. Traffic in both directions on a single fiber using two different wavelengths. Reduce the number of fiber runs in half.
- A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?
A. Intrusion detection B. Proxy service C. Dynamic DNS D. Content filtering
D. Content filtering
This questions is looking for a feature that “abides by the AUP” (Acceptable Use Policy) which is pertaining to employees of a company. In addition, content filtering can stop malicious traffic.
- A network technician has purchased a 10GBase-T switch and wishes to connect it to 30 computers with 10GB network cards. The computers are 225ft (69m) away, and all need to establish a 10 Gbps connection to meet business requirements. To minimize costs while still meeting these requirements, which of the following cable types should the technician choose?
A. Cat 5e B. Cat 6 C. Cat 6a D. Cat 7
C. Cat 6a
Cat6 only supports 10 Gbp/s to 165 feet (55 meters).
Cat6A supports 10 Gbp/s (Gigabits per second) up to 328 feet (100 meters).
- A technician is configuring a new email server and needs to modify DNS records. Which of the following records should the technician update to ensure email functions as expected?
A. MX B. CNAME C. AAAA D. SRV
A. MX
- Which of the following BEST describes the functionality of the root guard feature on a switch?
A. BPDUs entering the root bridge are ignored. B. The STP root bridge cannot be changed. C. Broadcast storms entering from a root port are blocked. D. Loop protection is enabled on the root port of a switch.
B. The STP root bridge cannot be changed.
“Unlike the BPDU Guard which will disable a port upon receipt of a BPDU, the Spanning Tree Root Guard feature will allow BPDU’s through a port to maintain the spanning tree topology, however if it receives a superior BPDU, which indicates that another switch is trying to become the root bridge it will err-disable the port.
This feature is used to protect your root bridges from misconfiguration or a layer 2 man in the middle attack.”
- A network administrator is adding a new WAN circuit from the ISP to a new building. In which of the following locations would the network administrator find the utility entry point?
A. DMZ B. Data tier C. IDF D. Demarc
D. Demarc
- The help desk is receiving reports of intermittent connections to a server. A help desk technician suspects the server is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technicianג€™s claim?
A. nmap B. arp C. tcpdump D. dig
C. tcpdump
- A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat.
Which of the following policies did the technician violate?
A. Data loss prevention B. Incident response C. Asset disposal D. Acceptable use
A. Data loss prevention
- A company hires another firm to test the integrity of its information security controls. This is an example of:
A. role separation B. device hardening C. risk assessment D. penetration testing
D. penetration testing
- A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring?
A. Layer 1 Physical B. Layer 3 Network C. Layer 4 Transport D. Layer 7 Application
C. Layer 4 Transport
TCP and UDP works at Layer 4 of OSI Model, the transport layer
- A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the celling grid near air conditioning ducts and sprinkler pipes.
Which of the following cable types is required for this installation?
A. Plenum B. PVC C. Single-mode D. Cat 7
A. Plenum
- A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on site. Which of the following solutions should the technician implement?
A. SaaS B. SAN C. NAS D. IaaS
B. SAN
SAN is block based while NAS is file based.
I think the key here is ‘several thousand users’ which indicates the need for enterprise-grade/level deployment capabilities which includes availability & redundancy
- Which of the following can be used to prevent unauthorized employees from entering restricted areas?
A. Sign-in sheets B. Video cameras C. Motion sensors D. Swipe badges
D. Swipe badges
- A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organizations certificate authority. Which of the following authentication methods would meet this requirement?
A. PEAP B. WP2-PSK C. Captive portal D. EAP-TLS
D. EAP-TLS
- A bookstore uses a Faraday cage to comply with credit card regulations. Customers report that their cellular phones have no signal when they are in the bookstore. Which of the following is the MOST likely cause?
A. The Faraday cage is creating interference within the bookstore. B. The Faraday cage prevents access by redirecting signals. C. The Faraday cage is creating latency on the cellular network. D. The Faraday cage is creating attenuation of the cellular network.
B. The Faraday cage prevents access by redirecting signals.
The reception or transmission of radio waves, a form of electromagnetic radiation, to or from an antenna within a Faraday cage is heavily attenuated or blocked by the cage
- An administrator is redesigning a companys network and wants to reduce the amount of hardware needed. Currently, all VLAN routing goes out a single switch interface to a router.
Which of the following would reduce the number of devices in this configuration?
A. Bridge B. Multilayer switch C. Switch D. Next-generation firewall
B. Multilayer switch
- A network technician needs to distribute an updated OS for all network switches at company locations throughout the world. The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet.
Which of the following methods should be used to distribute the images while ensuring integrity?
A. Use a TFTP server and UDP protocol. B. Use an FTP server and provide the file hash. C. Use an HTTP server to share the file. D. Use a modem and dial-up connection.
B. Use an FTP server and provide the file hash.
- Which of the following OSI layers do TCP and UDP operate within?
A. Data link B. Network C. Session D. Transport E. Presentation F. Application
D. Transport
- A company has decided to allow certain users to work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and to specific areas on the network. Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users mobile devices to allow these VPN connections?
A. VNC application B. Kerberos C. Geotagging application D. Credentials
D. Credentials
- Which of the following OSI layers do TCP and UDP operate within?
A. Data link B. Network C. Session D. Transport E. Presentation F. Application
D. Transport
- A network engineer is working on a network connectivity problem between a site in California and a site in New York. The connection went down overnight, and the engineer is unsure where the connection failed. The technician is logged into the primary switch in the customers network, which is also the companys connection to the WAN.
Which of the following tools should the technician use to determine the last available network hop?
A. netstat
B. Nmap
C. traceroute
D. pathping
C. traceroute
Traceroute gives more information that pathping does
Pathping and Tracert are similar, both are used to test connectivity and latency. … Pathping does a traceroute to the destination, and then uses ICMP to ping each hop in the path 100 times. This means pathping will give more accurate latency information. But it is still subject to the same issues as traceroute.
- A network manager is concerned about visitors taking advantage of open cubicies at a company’s facilities. Which of the following would mitigate this issue?
A. Create a VLAN for all unused switchports.
B. Implement a DMZ for all external services.
C. Implement root guard on all switches.
D. Create a honeypot to attract attackers.
A. Create a VLAN for all unused switchports.
or
B. Implement a DMZ for all external services.
- oe, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message:
The security certificate presented by this website was not trusted by a trusted certificate authority.
Joe has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworkers desktop, but it still presented with this error. Which of the following is the MOST likely cause of this error?
A. The web server is missing an intermediate certificate.
B. The website is missing an HTTPS certificate.
C. TLS is not enabled in the browser.
D. The SSL certificate has expired.
A. The web server is missing an intermediate certificate.
The question does not state that the user is attempting to connect to web pages that require encryption, i.e. SSL/TLS (Secure Sockets Layer/Transport Layer Security); instead, we can only assume that “certain web pages” are merely regular web pages that do not entail the transmission of encrypted data. Hence, an SSL certificate is surely not required in this instance since not all websites utilise SSL/TLS. For that reason, (A) seems like the most credible answer
- Which of the following is used to define the duration during which a client can use an IP address?
A. MAC reservation
B. IP helper
C. Pool
D. Lease time
D. Lease time
- A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.
Which of the following should the vendors recommend in response to the quote request?
A. The use of lightweight APs with a load balancer
B. The use of autonomous APs with a wireless controller
C. The use of autonomous APs with a load balancer
D. The use of lightweight APs with a wireless controller
D. The use of lightweight APs with a wireless controller
lightweight is easier to manage because it is controlled through a centralized wireless controller