Test 5 Flashcards
- Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come
Friday morning?
A. 1 B. 2 C. 3 D. 4 E. 5
C. 3
or
D. 4
Need Sunday, full back up anyway, that’s 1,
Monday then Tuesday incremental backups, that’s now 3. That’s where it stops because Wednesdays backup wouldn’t be included because Thursdays backup never ran! Remember how incremental works, Backs up data from what has changed from the previous day, so there is no backup from Wednesday as Thursday’s hasn’t run yet.
- A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?
A. 22 B. 69 C. 80 D. 389 E. 443
E. 443
E. 443 - is correct
note LDAP tcp/389 is not secure
LDAPS (LDAP Secure) - tcp/636
web server + securely authenticate….I guess they are the keywords. Therefore, 443 = HTTPS
- The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?
A. Frequency mismatch
B. Crosstalk
C. Interference
D. Channel overlap
B. Crosstalk
The answer is crosstalk. CompTIA’s questions aren’t always going to have a straightforward answer. Any question that use words like, “best”, “most”, or “most likely” you have to use the process of elimination to get the correct answer. Frequency mismatch, channel overlapping and interference aren’t going to be a issue with a “intelligent” wireless controller, leaving crosstalk. This answer is basically seeing if you know the functions of a wireless controller. Yes, crosstalk seems ridiculous but this is how CompTIA format some of their questions.
- A companys server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?
A. TXT
B. A
C. SRV
D. CNAME
D. CNAME
- A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?
A. Client-to-site VPN
B. DMVPN
C. Site-to-site VPN
D. MPLS VPN
C. Site-to-site VPN
A site-to-site virtual private network (VPN) is a connection between two or more networks, such as a corporate network and a branch office network. Many organizations use site-to-site VPNs to leverage an internet connection for private traffic as an alternative to using private MPLS circuits.
Site-to-site VPNs are frequently used by companies with multiple offices in different geographic locations that need to access and use the corporate network on an ongoing basis. With a site-to-site VPN, a company can securely connect its corporate network with its remote offices to communicate and share resources with them as a single network.
- A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?
A. 802.1X
B. Captive portal
C. Port security
D. NAC
D. NAC
Network Access Control is an approach to computer security that attempts to unify endpoint security technology, user or system authentication and network security enforcement.
- A network technician is reviewing the following output from a router:
SCR IP SCR PORT DEST IP DEST PORT
Which of the following is this an example of?
A. A vulnerability scan
B. A port scan
C. A traffic log
D. A packet capture
C. A traffic log
- A user claims to have no Internet access but can access local resources. A technician determines the issue is with a configuration because a ping to a working public website shows a response that starts with:
Ping request could not find host
Which of the following is the MOST likely misconfiguration?
A. Incorrect netmask
B. DNS
C. DHCP
D. SSL certificate
B. DNS
- A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?
A. UTM appliance
B. IDS appliance
C. Proxy server
D. RADIUS server
A. UTM appliance
Unified threat management. A UTM appliance is a hardware device that plugs in to your organization’s network at the network perimeter. It serves as a gateway onto your corporate network, providing all the security services you need to protect your network from malware, unauthorized intrusion, and other security risks.
- An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A. Brute force
B. VLAN hopping
C. Evil twin
D. DNS poisoning
B. VLAN hopping
VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN. The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.
- A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developers request?
A. Connect the five PCs to a hub that is not connected to the corporate network.
B. Connect the five PCs to a switching router and assign the PCs to a separate VLAN.
C. Connect the five PCs to a hardware firewall that is connected to the router.
D. Connect the five PCs to a switch and configure the ports with implicit deny ACLs for outbound traffic.
A. Connect the five PCs to a hub that is not connected to the corporate network.
connected via a Layer 1 device = HUB
- A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?
A. LDAP server
B. UTM appliance
C. Multilayer switch
D. AAA/RADIUS server
D. AAA/RADIUS server
- Which of the following provides information about how often some devices fail so the IT department can take proactive measures?
A. MTBF
B. MTTR
C. SLA
D. UPS
A. MTBF
MTBF -> mean time between failure
MTTR -> mean time to resolve
- Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)
A. Application control B. User identification C. Network address translation D. Virtual private networking E. High availability F. Access control rules
A. Application control
B. User identification
- First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?
A. Firewall configuration documentation
B. Change management documentation
C. Network performance baseline
D. Logical diagram
B. Change management documentation
- Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)
A. Application control B. User identification C. Network address translation D. Virtual private networking E. High availability F. Access control rules
A. Application control
B. User identification
- A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?
A. MU-MIMO B. MIMO C. Channel bonding D. TDM E. Automatic channel selection
A. MU-MIMO
- Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?
A. Check the latency by running a continuous ping to the site.
B. Perform the ipconfig/flushdns command on the affected users PCs.
C. Run a speedtest from a users PC to a site on the Internet.
D. Verify if there is MTU mismatch in the path to the site.
A. Check the latency by running a continuous ping to the site.
Using the “Ping” command via the command prompt can be used as a diagnostic tool to test the communication path between a computer and another network device. The simple “Ping” command sends out four data packets when set to default. However, running the continuous ping command (e.g., ping -t) over time, rather than the default four packets, could better troubleshoot connectivity issues.
I originally thought (C) may be the correct answer. However, upon carefully reading answer (C), it states that a speed test is executed to “a site” on the Internet, which is not necessarily the “specific site” mentioned in the question. So, (C) is not correct. Neither are (B) and (D). Therefore, using the time-honoured process of elimination, that only leaves answer (A) which I suspect is the correct answer after all.
- A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network.
The network technician connects to the wireless network in the users office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?
A. No QoS configured on the network
B. Signal-to-noise ratio
C. Interference from the microwave in the breakroom
D. Rogue AP installed in the office
B. Signal-to-noise ratio
The tech uses Ping and the packets arrive with random latency, so it is not a problem of QoS (since ICMP packets don’t get priority) that means that in general packets arrive in a random way because of an outside disturbanca that is caused by interference (SNR).
Answers are not great…if interference was there (or is it was saying low SNR ) then it would be more clear.
- Which of the following components can be used to manage network traffic to all nodes in a hypervisor?
A. Virtual switch B. Virtual NIC C. Media converter D. Load balancer E. Multilayer switch
A. Virtual switch
- A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?
A. Ping
B. Log review
C. Vulnerability scans
D. Alerts
B. Log review
- Which of the following IPv6 transition methods requires all network devices to support IPv4 and IPv6?
A. 6to4
B. Teredo
C. ISATAP
D. Dual stack
D. Dual stack
- A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the companys firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?
A. Bridge
B. Router
C. Multilayer switch
D. Media converter
D. Media converter
- A network technician is responding to a users trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?
A. The user ordered Cat5e cable instead of Cat3.
B. A crossover cable was installed.
C. The total cable run exceeds the maximum distance.
D. There is a network speed mismatch between the computer and the switch.
C. The total cable run exceeds the maximum distance.
Im guessing because the question states the connection was tested is why answer B is eliminated. The other answers don’t apply, so, assuming the “longer” cable exceed the maximum length is the correct answer.
- A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?
A. PAN
B. WLAN
C. SAN
D. MAN
D. MAN
- Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?
A. Remote access B. NDA C. SLA D. BYOD E. Incident response
D. BYOD
- A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?
A. Badge reader
B. Bluetooth reader
C. Cipher lock
D. Mantrap
D. Mantrap
- A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?
A. Logical diagram
B. Change management
C. IDF documentation
D. Configuration baseline
B. Change management
- Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?
A. Wireless controller
B. Wireless range extender
C. Wireless load balancer
D. Wireless analyzer
A. Wireless controller
- Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:
A. an incorrect DHCP gateway setting
B. a duplicate IP address
C. NTP synchronization
D. ACL configuration
D. ACL configuration
Correct is Access Control Lists (ACLs) since it Deny or permit traffic
- A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?
A. Standard operating procedures
B. Wiring diagram
C. Inventory documentation
D. Network baseline
B. Wiring diagram
because he’ll have to rewire the rack again after changing its place
- An email server, which is called Frederick, has an IPv6 address of 2001::5689:23:ABCD:6A, but most users call it Fred for short. Which of the following DNS entries is needed so the alias Fred can also be used?
A. MX B. AAAA C. SRV D. CNAME E. TXT F. NS
D. CNAME
- A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?
A. Public cloud
B. SaaS
C. PaaS
D. Hybrid cloud
C. PaaS
PaaS advantages
Other advantages include the following:
Cost Effective: No need to purchase hardware or pay expenses during downtime
Time Savings: No need to spend time setting up/maintaining the core stack
Speed to Market: Speed up the creation of apps
Future-Proof: Access to state-of-the-art data center, hardware and operating systems
Increase Security: PaaS providers invest heavily in security technology and expertise
Dynamically Scale: Rapidly add capacity in peak times and scale down as needed
Custom Solutions: Operational tools in place so developers can create custom software
Flexibility: Allows employees to log in and work on applications from anywhere.
- A user wants to secure a network closet and be able to tell if anyone makes changes in the closet. Which of the following would be the BEST detective physical security devices in this situation? (Choose two.)
A. Anti-tampering B. Badges C. Door locks D. Key fob E. Motion detection F. Video surveillance
A. Anti-tampering
F. Video surveillance
Tamper and Video seem the best answers to me based mostly on the wording of the question: “to tell if anyone makes changes in the closet”. Tamper tells you if changes were made and video tells you who/how/when.
- A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?
A. Gateway: 10.10.10.1 Netmask: 255.255.255.192
B. Gateway: 172.15.18.128 Netmask: 255.255.255.224
C. Gateway: 192.168.1.97 Netmask: 255.255.255.224
D. Gateway: 224.102.113.65 Netmask: 255.255.255.192
C. Gateway: 192.168.1.97 Netmask: 255.255.255.224
private IP address is the clue.
- A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?
A. Non-disclosure policy
B. Data loss prevention policy
C. Acceptable use policy
D. Incident response policy
D. Incident response policy
- A technician restored network connectivity on a users laptop. After validating full system functionality, which of the following steps should the technician take
NEXT?
A. Duplicate the problem, if possible
B. Determine if anything has changed
C. Test the theory to determine the cause
D. Document the findings, actions, and outcomes
D. Document the findings, actions, and outcomes
- Which of the following is an IPv6 transition mechanism in which network devices utilize IPv4 and IPv6 at the same time?
A. 6to4
B. ISATAP
C. Teredo
D. Dual stack
D. Dual stack
- Which of the following protocols operates at Layer 4 of the OSI model?
A. TCP
B. ARP
C. IMAP
D. POP3
A. TCP
- In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?
A. Shut down unused ports on switches
B. Upgrade firmware on network devices
C. Allow only secure protocols on the network
D. Disable unnecessary services
C. Allow only secure protocols on the network
A. Shut down unused ports on switches (Users can connect wirelessly and donot need a ethernet connection so this option is kind of useless)
B. Upgrade firmware on network devices (It won’t help)
C. Allow only secure protocols on the network (This is the only option left)
D. Disable unnecessary services (It won’t help)
I would go for “C” because other options will not help in this scenario.