Test 7 Flashcards
- A NGFW is continuously sending alerts regarding traffic from an internal database server. An old DHCP service, which was used before a dedicated server was installed, is still running on the server. Which of the following practices could have prevented this incident?
A. Preventing UDP on the host firewall
B. Enabling DHCP relay
C. Disabling unused services
D. Disabling DHCP spoofing
C. Disabling unused services
- A user is connected to the guest wireless network for a video conference with colleagues. The users computer shows a strong wireless signal, and websites seem to load without issue, but the voice and video have periods of choppiness. Which of the following would BEST identify the issue?
A. Verify the wireless capacity is not exceeded.
B. Check the signal attenuation.
C. Increase the power transmission level.
D. Adjust the antenna placement.
A. Verify the wireless capacity is not exceeded.
- An ISP technician frequently needs to administer a router remotely in the event of a configuration error or WAN outage. Which of the following technologies would facilitate the required connectivity?
A. Remote access VPN
B. Remote file access
C. Out-of-band
D. Secure Shell
D. Secure Shell
I believe the answer should be C Out of Band,
however, since it is a remote connection, CompTIA wants secure remote connection therefore SSH into the router to manage it
The answer IS SSH because the ISP technician is remotely configuring the device and needs secure connection to the device, the connection would already be an OOB connection, but SSH specifies that connection will be a secure one.
- Employees at a company report that they are unable to access the Internet. A network technician notices the workstations are receiving IP addresses that do not follow the IP addressing scheme of the corporate network. Upon further inspection, the technician finds an employee has plugged a rogue wireless router into the corporate network. Which of the following settings would have prevented this situation?
A. DHCP snooping
B. DHCP relay
C. DHCP leasing
D. DHCP options
A. DHCP snooping
In computer networking, DHCP snooping is a series of techniques applied to improve the security of a DHCP infrastructure. DHCP servers allocate IP addresses to clients on a LAN. DHCP snooping can be configured on LAN switches to exclude rogue DHCP servers and remove malicious or malformed DHCP traffic.
- Which of the following protocols operates at the data link layer of the OSI model?
A. IGRP
B. BGP
C. PPP
D. FTP
C. PPP
Examples of data link protocols are Ethernet, Point-to-Point Protocol (PPP), HDLC and ADCCP. In the Internet Protocol Suite (TCP/IP), the data link layer functionality is contained within the link layer, the lowest layer of the descriptive model, which is assumed to be independent of physical infrastructure.
- Several open conference rooms have active wired network connections. To discourage unauthorized users, a network technician wants to require users in the conference rooms to authenticate to the network before gaining access. Which of the following would be the BEST network technology to use?
A. WPA
B. MAC filtering
C. ACLs
D. 802.1X
D. 802.1X
keyword: authenticate
- Which of the following describes the function of Layer 3 of the OSI model?
A. It provides sequencing and acknowledgments for connection-oriented communication.
B. It provides connectionless communication using logical addressing.
C. It provides error detection through the FCS for frames transmitted.
D. It provides encryption and compression for data received.
B. It provides connectionless communication using logical addressing.
- Which of the following ports should be open on a host-based firewall for a user who needs email and file-sharing capabilities? (Choose two.)
A. 21 B. 88 C. 389 D. 445 E. 587 F. 3389
A. 21
E. 587
Answers A and E are the most correct for this scenario. Port 21 is used for file-sharing and Port 587 (SMTP over SSL) is used for email client to email server communicatio
- Which of the following steps follows an implemented solution?
A. Document the findings and actions.
B. Identify potential effects of the solution.
C. Verify full system functionality.
D. Implement preventative measures.
C. Verify full system functionality.
- A network technician receives an update in an RSS feed that a new exploit was released for specific hardware used on the network. After verifying the vulnerability with the vendor, the network technician discovers the vulnerability was patched almost two years ago. Which of the following techniques should be implemented to discover out-of-date firmware in the future?
A. Application fuzzing
B. Malware signature management
C. Network traffic analysis with tcpdump
D. Vulnerability scanning
D. Vulnerability scanning
- A network technician needs a secure way to access a router in another country. Which of the following methods would meet this requirement?
A. SSH connection
B. Device HTTP URL
C. TFTP upload
D. GRE tunnel
A. SSH connection
- A technician needs to connect several computers in close proximity to control manufacturing equipment in a factory. The medium to connect the computers must be cost effective and suitable for short distances. Which of the following mediums should the technician use?
A. RJ11 connector and Cat6 cable
B. ST connector and UTP cable
C. DB-9 connector and plenum cable
D. BNC connector and RG-59 cable
D. BNC connector and RG-59 cable
Process of the elimination: A = telephone connector with a ethernet cable WRONG, B= Fiber connector with ethernet cable WRONG C= coaxial cable connector with a type of fire proof cable WRONG, D was the most logical answer left
- A network technician is troubleshooting a laptop that does not have wireless connectivity. The technician determines the wireless network is functioning as expected. The laptop does not show any SSIDs or allow the technician to modify network settings. Which of the following should the technician check FIRST?
A. Check for overcapacity of the network.
B. Ensure wireless is enabled on the laptop.
C. Confirm the power levels of the WAP.
D. Assess the antenna placement.
E. Verify network drivers are up-to-date.
B. Ensure wireless is enabled on the laptop.
- A network technician is implementing a new IPv6 addressing scheme at a local office. This is a large office, and the network manager would like a solution that saves time and allows for automatic addressing of nodes. Which of the following would BEST accomplish this?
A. APIPA
B. 6to4 tunnel
C. NAT64
D. EUI-64
D. EUI-64
The answer is EUI-64. Explanation:
EUI-64 (Extended Unique Identifier) is a method we can use to automatically configure IPv6 host addresses. An IPv6 device will use the MAC address of its interface to generate a unique 64-bit interface ID. However, a MAC address is 48 bit and the interface ID is 64 bit.
- A network administrator notices that network utilization is extremely high around midnight and wonders if this is normal or if there might be a security issue. Which of the following types of documentation should the administrator consult FIRST?
A. Change management documentation
B. Standard operating procedures
C. Network performance baseline
D. Firewall configuration documentation
A. Change management documentation
A is correct, Network Troubleshooting Methodology.
1. Identify the problem:
• Gather information.
•Duplicate the problem, if possible.
•Question users.
•Identify symptoms.
•Determine if anything has changed. (review change management documents)
•Approach multiple problems individually.
- A network technician needs to dedicate a range of addresses in DHCP for statically assigned servers and network devices. Which of the following should be configured to BEST accomplish this?
A. Static addressing
B. Subnetting
C. Advertisements
D. Exclusions
D. Exclusions
- A network administrator needs to create a network for 4,000 devices while conserving address space. Which of the following subnet masks should be used on this network?
A. 255.254.0.0 B. 255.255.224.0 C. 255.255.240.0 D. 255.255.248.0 E. 255.255.255.240
C. 255.255.240.0
on your subnetting chart, this would be a /20, in your 3rd octet obviously
- A network technician needs to administer the desktop of a Linux-based workstation remotely on the local network. Which of the following remote access methods should the network technician use?
A. VNC
B. RDP
C. SSH
D. VPN
C. SSH
SSH is the correct answer since it asked “to administer” and you’ll likely have putty installed on the Windows pc and you know the Linux IP address.
- A network technician is upgrading the software on a switch, but the switch will no longer boot after the upgrade. Which of the following should the network technician have verified before the upgrade?
A. Unnecessary services disabled
B. Secure protocols in use
C. Firmware file hash
D. Network ports disabled
C. Firmware file hash
- Devices on a network will need to obtain DHCP leases from a server on a different network. Which of the following must the engineer implement for DHCP to forward requests to the designated server?
A. Trunking
B. A forward lookup zone
C. A proxy server
D. An IP helper
D. An IP helper
- A network administrator it concerned about the management traffic between a machine and the corporate router. Which of the following protocols should the administrator use to prevent a security breach?
A. VNC
B. SSH
C. RDP
D. SFTP
B. SSH
- Which of the following BEST describes a VLAN hopping attack?
A. An attacker gains unauthorized access to a network by overflowing the CAM table.
B. An attacker gains unauthorized access to a network by placing a rogue AP on the network.
C. An attacker gains unauthorized access to a network by using double-tagged packets.
D. An attacker gains unauthorized access to a network by scanning and mapping it.
C. An attacker gains unauthorized access to a network by using double-tagged packets.
- A vendor has installed new wireless access points in an office. After completing the installation, users in one area of the office report they cannot connect to the wireless network. A network technician confirms the users in that area cannot see the wireless SSID. Which of the following MOST likely explains the issue?
A. The AP power levels are too low.
B. The wireless network is over capacity.
C. A directional antenna was installed incorrectly.
D. The channels are overlapping.
C. A directional antenna was installed incorrectly.
- A switch at a remote site suddenly appears to be inaccessible. No configuration changes were made. An engineer confirms with the office attendant that the switch is powered on, and there are LEDs showing green and amber colors. However, the SFP for the fiber connection from the switch to the router shows no lighted LED. After replacing the cable and SFP with new ones, the LED still does not light up, and no connection is made. Which of the following is the MOST likely issue?
A. Disabled port B. Electromagnetic interference C. Incorrect gateway D. Hardware failure E. Wrong cable type F. Unresponsive service
D. Hardware failure
- A wireless administrator has configured a secure wireless network that can only be associated to specific domain accounts. This was done to help mitigate any ricks associated with the wireless signal propagating outside of the facility. Which of the following has no administrator implemented?
A. NAC
B. Implicit deny
C. WPA2
D. Geofencing
A. NAC
or
C. WPA2
NAC is the answer here, since the wireless signal isn’t contained to the interior of the building, it isn’t geofencing, and since the question made sure to state the network access is tied to domain accounts, NAC would be the only plausible option here.
Remember: NAC is Network Access Control, or Network Administrator Control, and is primarily used in Enterprise networks.
- A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
A. Insider threat
B. War driving
C. Evil twin
D. Honeypot
D. Honeypot
- A network administrator is setting up several IoT devices on a new VLAN and wants to accomplish the following:
- Reduce manual configuration on each system.
- Assign a specific IP address to each system.
- Allow devices to move to different switchports on the same VLAN.
Which of the following should the network administrator do to accomplish these requirements?
A. Set up a reservation for each device.
B. Configure a static IP on each device.
C. Implement private VLANs for each device.
D. Use DHCP exclusions to address each device.
A. Set up a reservation for each device.
DHCP exclusions is when you have a specific set of IP addresses that will not be handed out by the DHCP, whereas DHCP reservations are a specific set of chosen IP addresses which are handed out by the DHCP. Meaning, you’d choose exactly what IP addresses you want in your IoT configuration.
- A company needs to create a new website for the delivery of secure content to and from specific customers. The Chief Information Officer (CIO) states as a requirement the creation of a secure connection between the client’s machine and the website every time the content is accessed. This should be accomplished without requiring the installation of any client software. Which of the following should be used in this scenario?
A. Site-to-site VPN
B. GRE
C. MPLS
D. SSL
D. SSL
web aka http and https. which use ssl and tls, ssl is the answer here
- Joe, an ex-employee from accounting, changed the configurations on several network devices on his last day of work. Which of the following is the MOST likely reason a non-IT employee was able to gain access to network devices?
A. Left virtual ports open
B. Allowed unsecure protocols
C. Left default passwords
D. Allowed unnecessary services
C. Left default passwords
- Which of the following protocols is used during web browsing to resolve website names?
A. HTTP
B. LDAP
C. SNMP
D. DNS
D. DNS
- A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?
A. IDF
B. WAN
C. LAN
D. DMZ
D. DMZ
- A site was hit with ransomware on two occasions in the past month. Which of the following would be the BEST solution for a technician who wants to reduce this frequency?
A. Proxy server
B. UTM appliance
C. RADIUS server
D. Content filter
B. UTM appliance
Unified threat management is an approach to information security where a single hardware or software installation provides multiple security functions.
- Which of the following components should be used to provide interconnectivity between virtual machines in distinct broadcast domains inside the hypervisors environment?
A. Virtual router
B. Virtual switch
C. Virtual NIC
D. Virtual SAN
A. Virtual router
- A network technician is connecting medical-monitoring devices on a personal area network for patients’ phones. Which of the following technologies should be used?
A. Bluetooth
B. RFID
C. NFC
D. IR
A. Bluetooth
- A network engineer needs to connect two network switches with a gigabit link. The proposed route to run the 164ft (50m) cable is directly underneath a large electrical generator. Which of the following cable types would BEST fit the needs of the network engineer?
A. UTP
B. Cat 5 plenum
C. Coaxial
D. STP
D. STP
“STP Cabling is twisted-pair cabling with additional shielding to reduce crosstalk and other forms of electromagnetic interference (EMI). Shielded Twisted-pair Cable. The outer insulating jacket contains an inner braided copper mesh to shield the pairs of twisted cables, which themselves are wrapped in foil.”
STP is the answer.
- Which of the following BEST explains why a firewall would be subject to international export controls?
A. Protected industry
B. IP version incompatibility
C. Differing power standards
D. Encryption technology
D. Encryption technology
- Two buildings are connected with 802.11a wireless bridges using omnidirectional antennas. However, the connection between the two bridges often drops. Which of the following would be the BEST solution?
A. Change the antennas to unidirectional.
B. Conduct a site survey to identify sources of noise.
C. Add a second wireless bridge at each building.
D. Change the bridges to use 802.11g.
A. Change the antennas to unidirectional.
- A network technician is installing a wireless network for a small medical office. The doctors need to download high resolution x-rays quickly with minimal latency.
Which of the following technologies should be utilized?
A. RFID
B. MIMO
C. CDMA
D. 802.11g
B. MIMO
multiple-input and multiple-output, or MIMO is a method for multiplying the capacity using multiple transmission and receiving antennas to exploit multipath propagation.
- A network technician is troubleshooting a PC that cannot access the Internet. However, the PC responds to ICMP echo requests from the same subset. Which of the following is the MOST likely reason the PC cannot communicate externally?
A. The loopback address is being used.
B. The default gateway is incorrect.
C. The PC does not have an IP reservation.
D. The virtual IP has not been configured.
B. The default gateway is incorrect.
PC responds to ICMP echo requests from the same subset but if gateway is incorrect won’t communicte externally.
- A technician is dispatched to replace an access point that has failed. The device is preconfigured with the correct SSID and passphrase. When the user tries to connect to the SSID, the connection fails. Which of the following is the MOST likely cause of the issue?
A. Interference
B. Channel overlap
C. Distance limitations
c
D. Security type mismatch