Test 5 Flashcards

1
Q
A network technology in which the bandwidth dependency is distributed evenly amongst a large number of inter-connected clients is know as a: 
A. peer-to-peer
B. bus
C. star
D. client/server
A

A. peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Jeff, an admin, wishes to add a third network segment to the firewall where the company's public web servers will be placed. Which of the following BEST describes this new segment?
A. PKI
B. VPN
C. IPS
D. DMZ
A

D. DMZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following would the telecommunications carrier use to segregate  customer traffic over long fiber links?
A. VLAN
B. MPLS
C. VPN
D. PSTN
A

B. MPLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following network technologies would be separated into two networks if a client in the middle is removed or the cable is cut?
A. Mesh
B. Ring
C. Bus
D. Star
A

C. Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage? 
A. netsh lan
B. netsh interface
C. netsh wlan
D. netsh winsock
A

D. netsh winsock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following devices exists as either hardware or software to assist in routing traffic? (Select TWO)
A. Cable modem
B. Layer 2 switch
C. Router
D. NIDS
E. Layer 3 switch
A

C. Router

E. Layer 3 switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following operates at OSI Layer 2  to forward traffic based on the MAC address?
A. Switch
B. Proxy server
C. Router
D. VPN Concentrator
A

A. Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Please be aware that if you do not accept these terms you will be allowed to take this CompTIA exam and you will forfeit the fee paid.

A

A RETURN TO EXAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
The transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?
A. 1
B. 3
C. 4
D. 5
A

C. 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following is used to provide hot standby capabilities using paired routers? 
A. CARP
B. L2TP
C. PPTP
D. ISAKMP
A

A. CARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is used to assign an IP address to a device?
A. DHCP
B. NTP
C. DNS
D. RADIUS
A

A. DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following protocols is used to transmit outgoing email?
A. RDP
B. NTP
C. POP3
D. SMTP
A

D. SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?
A. Channel
B. SSID
C. Firewall rule
D. Encryption
A

A. Channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A user is unable to print to a network printer. Which of the following is the FIRST step that a technician should take a to troubleshoot the issue?
A. Identify the problem
B. Establish a plan of action to resolve the problems
C. Establish a theory of probable cause
D. Implement preventative measures

A

A. Identify the problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is a purpose of VLAN?
A. Decreases bandwidth on network.
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router.

A

B. Segments broadcast traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
Which of the following would Sandy, a technician, find in a network map?
A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules
A

B. MDF/IDFs

17
Q
Which of the following protocols would be used to sen email to an email server?
A. NTP
B. FTP
C. SNMP
D. SMTP
A

D. SMTP

18
Q
Which of the following default ports would need to be open on a firewall to allow remote desktop access?
A. 143
B. 443
C. 3389
D. 8080
A

C. 3389

19
Q
After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?
A. Punch down tool
B. Cable certifier
C. Loopback certifier
D. Toner probe
A

B. Cable certifier

20
Q
Which of the following DNS records would allow for a website to have more than one FQDN?
A. TXT
B. PTR
C. MX
D. CNAME
A

D. CNAME

21
Q
A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?
A. PoE
B. Layer 3 switching
C. STP
D. VLAN
A

A. PoE

22
Q

Tenants access multiple wireless networks in a building. Users report intermittent connectivity. Which of the following is the MOST likely cause of the problem?
A. The channels are over lapping with other wireless networks and should be changed
B. The SSIDs are incompatible and should be renamed
C. The users have incompatible wireless network cards and should upgrade
D. The default idle period for logoff is short and should be changed to a longer limit

A

A. The channels are over lapping with other wireless networks and should be changed

23
Q
Karen a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
A. Change management
B. System logs
C.Asset management
D. Baselining
A

A. Change management

24
Q
Which of the following wireless standards is capable of ONLY operating on 5.8GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A

A. 802.11a

25
Q
Which of the following protocols are used to connect devices in a secure manner> (Select TWO)
A. TELNET
B. SSH
C. RDP
D. HTTP
E. DNS
F. FTP
A

B. SSH

C. RDP