Test 3 Flashcards

1
Q
  1. A network technician is troubleshooting a problem with a users client-to-site VPN connection. The user is unable to establish a connection to the server, but the error message that appears on screen does not contain useful information. Which of the following should the technician do NEXT to troubleshoot the issue?
A. Reconfigure the users VPN connection in the router to fix profile corruption.
B. Inform the user that provisioning sometimes fails and the connection needs to be attempted again.
C. Review the logs in the VPN client to check for any informational messages.
D. Verify the system has the latest OS patches installed.
A

C. Review the logs in the VPN client to check for any informational messages.

Due to the fact the error pop-up is not stating why the error is occurring, so the next logical step is to review the logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Management requires remote access to network devices when the ISP is down. Which of the following devices would provide the BEST solution?
A. Router
B. Firewall
C. Bridge
D. Modem
A

D. Modem

Access through OOB usually goes through a parallel line instead of your normal ISP provided line, so in an event where the main connection goes down, you can still access remotely by using this parallel line which is more common in out of band management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. A network technician installed a new host on the network. The host is not connecting to the companys cloud servers. The technician attempts to ping a server using the IP address with no success. Checking the IP address using ipconfing displays:

Which of the following should the technician perform NEXT to determine where the issue is located?

A. Modify the default gateway address and ping the server to test connectivity.
B. Change the DNS servers to be on the same subnet as the host.
C. Modify the routerג€™s ACL to allow port 80 to exit the network.
D. Perform a tracert command to locate where the packet is dropped.
A

D. Perform a tracert command to locate where the packet is dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A network technician is performing a firmware upgrade on a switch. The firmware needs to be downloaded to the device. Which of the following methods should the technician use to retrieve the updated firmware?
A. RDP
B. SSH
C. TFTP
D. Telnet
A

C. TFTP

Key here is “downloaded TO the device” not “ON the device.” That takes SSH and Telnet out of the question. RDP can be used to download it ON the device, but TFTP is left as the most reasonable answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?
A. tracert
B. netstat
C. arp
D. dig
A

A. tracert

use tracert to find exactly where the connection is being droped

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following MUST be installed on an employees computer if the remote access VPN implements an SSL VPN with PKI authentication?
A. Shared secret
B. HTTPS server
C. Soft token
D. Private certificate
A

D. Private certificate

the public key can only be decrypted y the private key, so the employee PC will send the public key of which it only has the private key, and the server will encrypt the file with the same public key, and which is to later be decrypted at the employees PC with the private key it only owns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following default ports should be Which of the following default ports should be opened on a firewall to allow for SSH and Telnet? (Choose two.)
    A. 21
    B. 22
    C. 23
    D. 25
    E. 123
    F. 443
A

B. 22

C. 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likely the cause?
A. Duplex/speed mismatch
B. ACL misconfiguration
C. Bad port
D. Crosstalk
A

B. ACL misconfiguration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement?
A. CNAME record in the users dynamic DNS accounts
B. Additional lease time for the laptop computers
C. IP helper relay system for configuration hops
D. DHCP reservation for the laptops MACs
A

D. DHCP reservation for the laptops MACs

Because you’re not setting up a static IP on the host device itself. The end result is the same but it’s the DHCP server issuing the reserved address. The host is still set up for DHCP, not static, per company policy..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. A home user is unable to get to the Internet from a workstation that is connected to a wireless network. When reviewing the results of the ipconfig command, the user wants to verity the default gateway is correct. Which of the following devices should be the gateway?
A. Cable modem
B. SOHO router
C. DNS server
D. Layer 2 switch
A

A. Cable modem

The key to this is the word “home user” most homes are connected via cable using a modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss?
A. Spectrum analyzer
B. OTDR
C. Packet sniffer
D. Multimeter
A

A. Spectrum analyzer

A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. so basically the key word is “wireless” so as we all know wireless networks experience more issues with packet loss than wired networks. the main causes are Radio frequency interference, weaker signals, distance and physical barriers like walls can all cause wireless networks to drop packets. so the answer A is correct because A spectrum / signal analyzer measures the magnitude of an input signal versus frequency within the full frequency range of the instrument. i hope this is more clear why the answer is A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following should be configured to allow for IP-to-name resolutions?
A. CNAME
B. A
C. PTR
D. NS
A

C. PTR

PTR-records are primarily used as “reverse records” - to map IP addresses to domain names (reverse of A-records and AAAA-records).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. When configuring a new switch in a packet-switched network, which of the following helps protect against network loops?
A. Spanning tree
B. Flood guard
C. BPDU guard
D. DHCP snooping
A

A. Spanning tree

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. A company has just installed a new cloud VoIP solution; however, users occasionally report poor call quality or dead air being present. Which of the following describes the NEXT troubleshooting step the technician should take?
A. The technician should check the internal diagnostics on all the phones to look for a common thread.
B. The technician should reset all the phones and reprovision information from the provider
C. The technician should use a packet tracer to see if the traffic is getting out of the network
D. The technician should run ping tests on the Internet line to monitor for packet loss and latency
A

D. The technician should run ping tests on the Internet line to monitor for packet loss and latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?
A. Partial mesh
B. Ad hoc
C. Ring
D. Bus
A

B. Ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. An NGFW alerts that a web server in the DMZ is sending suspicious traffic. A network administrator finds that port 25 is open, and the traffic is originating from this port. The only purpose of this server is to deliver website traffic. Which of the following should the network administrator recommend to the systems administrator?
A. Disable Telnet service on the server.
B. Disable DHCP service on the server.
C. Disable the SMTP service on the server
D. Disable FTP service on the server.
A

C. Disable the SMTP service on the server

SMTP - Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Joe, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Joe use?
A. Telnet
B. LDAP
C. TFTP
D. Samba
A

C. TFTP

TFTP servers do exist, and can be used to send/backup switch configuration information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Choose two.)
    A. Test solutions.
    B. Duplicate the problem
    C. Establish a theory of probable cause
    D. Question users
    E. Implement preventive measures.
    F. Document findings
A

B. Duplicate the problem

D. Question users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Which of the following are MOST likely the causes of this issue? (Choose two.)
    A. Damaged cables
    B. Crosstalk
    C. Bent pins
    D. TX/RX reverse
    E. VLAN mismatch
    F. Duplex mismatch
A

C. Bent pins

E. VLAN mismatch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. While testing an ACL on the default gateway router to allow only web browsing, ports TCP 80 and TCP 443 were the only ports open. When tested, no websites were accessible via their URLs inside the network. Which of the following configurations should be added to the ACL?
    A. permit tcp any any eq 20
    B. permit udp any any eq 25
    C. permit udp any any eq 53
    D. permit udp any any eq 68
    E. permit tcp any any eq 110
    F. permit tcp any any eq 8080
A

C. permit udp any any eq 53

Answer is correct - its DNS..
no websites were accessible via their URLs inside the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a
    TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion?
A. Reviewing application logs
B. Reviewing a baseline report
C. Reviewing a vulnerability scan
D. Reviewing SLA requirements
A

A. Reviewing application logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?
A. WPA-PSK
B. EAP-TLS
C. AES-CCMP
D. WEP-TKIP
A

B. EAP-TLS

EAP-TLS deals with certificate issues. Other options are for wireless security protocols.

They are all wireless. The question is about wireless. What you should have said is that EAP-TLS gives the highest security for cilent and server. Hard to implement, but the best security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. A network administrator is installing a campus network of two routers, 24 switches, 76 APs, and 492 VoIP phone sets. Which of the following additional devices should the administrator install to help manage this network?
A. VoIP PBX
B. Content filter
C. RADIUS server
D. Wireless controller
A

D. Wireless controller

central management of all the APs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. A technician arrives at a new building to find cabling has been run and terminated, but only the wall ports have been labeled. Which of the following tools should be utilized to BEST facilitate labeling the patch panel?
A. Tone generator
B. Cable tester
C. Multimeter
D. Loopback adapter
A

A. Tone generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Which of the following policies prohibits a network administrator from using spare servers in the datacenter to mine bitcoins?
A. NDA
B. BYOD
C. AUP
D. MOU
A

C. AUP

An acceptable use policy, acceptable usage policy or fair use policy, is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance?
A. Clustering
B. Load balancing
C. Redundant circuits
D. NIC teaming
A

D. NIC teaming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the servers local firewall? (Choose two.)
    A. 20
    B. 21
    C. 53
    D. 67
    E. 68
    F. 389
A

D. 67

E. 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PCs IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?
A. 192.168.12.97 255.255.255.192
B. 192.168.12.97 255.255.255.224
C. 192.168.12.97 255.255.255.240
D. 192.168.12.97 255.255.255.248
A

A. 192.168.12.97 255.255.255.192

The questions is basically asking, “Out of the listed subnet masks, which one would result in a network range containing both IP addresses?”

The only one that can possibly hold both addresses is 255.255.255.192 (/26). This would create 4 subnets with 64 IP addresses each (62 usable addresses). The subnets would be 0-63, 64-127, 128-… … …. Both IP addresses would fall within the second subnet of 64-127.

The other subnet masks will create more subnets with fewer hosts in them, separating the IPs into different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Choose two.)
    A. RJ45
    B. DB-9
    C. LC
    D. SFP
    E. GBIC
    F. SC
A

D. SFP

E. GBIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Which of the following physical security devices is used to prevent unauthorized access into a datacenter?
A. Motion detector
B. Video camera
C. Asset tracking
D. Smart card reader
A

D. Smart card reader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?
A. Rack location
B. Room number
C. Media type
D. Hostname
A

D. Hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  1. A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?
A. Logic bomb
B. Social engineering
C. Trojan horse
D. Insider threat
A

B. Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  1. A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?
A. Modify the speed and duplex
B. Plug in to another port
C. Replace the NIC
D. Change the switch
A

B. Plug in to another port

It was verified the cable was good, that was a troubleshooting to confirm the cable was good. The step was to moved the cable to a diff port on the switch to confirm if the port was faulty.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
  1. A technician has been assigned to capture packets on a specific switchport. Which of the following switch features MUST be used to accomplish this?
A. Spanning tree
B. Trunking
C. Port aggregation
D. Port mirroring
A

D. Port mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
  1. Which of the following operate only within the UDP protocol?
A. Frames
B. Datagrams
C. Segments
D. Packets
A

B. Datagrams

UDP stands for User Datagram Protocol. TCP works with segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q
  1. An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring?
    A. Phishing
    B. DDoS
    C. Evil twin
    D. MITM
    E. OCSP stapling
A

C. Evil twin

Evil twin is the correct answer. OSCP helps in determining SSL certificata validity and the question is not saying the user is using OSCP to do this, he is simply trying to access a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. A network technician is troubleshooting a connectivity issue and determines the cause is related to the VLAN assignment on one of the access switches in the network. After resolving the issue, the network technician decides to update the documentation to refer to the correct VLAN. Which of the following should the technician update?
    A. Physical diagram
    B. Logical diagram
    C. IDF documentation
    D. Change management documentation
    E. Incident rֳeponse plan
A

B. Logical diagram

The logical diagram describes the network layout, blanks etc. Change management is more about how to implement changes. You would probably put a note in change management to say you did this work, but the primary document you need to update is the logical diagram,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q
  1. A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is MOST likely the issue?

A. One of the wireless access points is on the wrong frequency
B. The students are attempting to connect 802.11g devices
C. The students are using more than one wireless device per seat.
D. Distance limitations are preventing the students from connecting.

A

B. The students are attempting to connect 802.11g devices

using 802.11g devices require you know “g” uses 2.4 GHz and “ac” uses 5.0 GHz and the two are not compatible. Plus “several” students could have older devices, not half, not everyone, but several is reasonable. It makes the most sense if the Q is testing your knowledge of WiFi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
  1. A WAP has been dropping off the network sporadically and reconnecting shortly thereafter. The Cat 5 wire connecting the access point is a long run of 265ft (81m) and goes through the business area and the mechanical room. Which of the following should the technician do to fix the AP connectivity issue?

A. Install a repeater to boost the signal to its destination
B. Replace the UTP cable with plenum cable.
C. Upgrade the cable from Cat 5 to Cat 5e.
D. Set the AP to half duplex to compensate for signal loss.

A

C. Upgrade the cable from Cat 5 to Cat 5e.

The clue to the answer is the Cat5 wire with a long run of 81m. So Cat5e with higher capacity is required. Mechanical room is a distraction, just to divert your mind to Plenum cable. But note that mechanical rooms are not necessarily plenum spaces which are open spaces above the ceiling or below the floor for air circulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q
  1. A technician wants to configure a SOHO network to use a specific public DNS server. Which of the following network components should the technician configure to point all clients on a network to a new DNS server?

A. Router
B. Switch
C. Load balancer
D. Proxy server

A

A. Router

A, cause is a SOHO (Small Office, Home Office) network. Remember all come integrated in the router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q
  1. A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility.
    Which of the following would BEST accomplish this objective?

A. Open wireless
B. Geofencing
C. Pre-shared key
D. MAC filtering

A

C. Pre-shared key

Mac Filtering allows only people with specific IP addresses to access the network. The question states that employees upon entering the company can immediately access the wifi, so a pre-shared key has to be the answer. Open wireless is for anybody especially people who are just guests of the company to access the network. Geofencing is for location services that has nothing to do with connecting to the wifi. That is why the answer is C. Pre-Shared Key.

42
Q
  1. A network engineer for a manufacturing company is implementing a wireless network that provides reliable coverage throughout the facility. There are several large, electric, motorized machines installed on the shop floor for automating the manufacturing process. These machines are known to be significant sources of
    RF interference. Which of the following frequencies should the wireless network use to MINIMIZE this interference?

A. 2.4 GHz
B. 56MHz
C. 5GHz
D. 900MHz

A

C. 5GHz

When multiple devices operate on the same frequency, there is usually interference that can affect the signal’s characteristics at the receiving point and reduce the connection speed. … Overall, 5GHz WiFi frequency experiences fewer interferences from other devices than WiFi connections using 2.4GHz

43
Q
  1. A company has procured a new office building and started the process of assigning employees to work at that location. The company has also purchased equipment for the new location. There are 5033 laptops, 6000 monitors, and 857 printers. Which of the following steps is the technician most likely to complete
    FIRST?

A. Create a rack diagram
B. Create a network baseline
C. Create an inventory database
D. Create a port location diagram

A

C. Create an inventory database

44
Q
  1. Which of the following is created on a 48-port switch with five active VLANs?

A. 48 networks, five segments
B. 48 collision domains, five broadcast domains
C. 240 private networks
D. 240 usable IP addresses

A

B. 48 collision domains, five broadcast domains

45
Q
  1. A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing?

A. Jitter
B. Latency
C. Attenuation
D. Frequency mismatch

A

A. Jitter

“Jitter is the uneven arrival of packets. For example, imagine a VoIP conversation where packet 1 arrives at a destination router. Then, 20 ms later, packet 2 arrives. After another 70 ms, packet 3 arrives, and then packet 4 arrives 20 ms behind packet 3. This variation in arrival times (that is, variable delay) is not dropping packets, but the jitter might be interpreted by the listener as dropped packets.”

“Latency: Refers to the time lapse between sending or requesting
information and the time it takes to return. As you might expect, satellite communication experiences high latency due to the distance it has to travel.
[…]
Closely tied to latency, which was discussed earlier, jitter differs in that the length of the delay between received packets differs. While the sender continues to transmit packets in a continuous stream and space them evenly apart, the delay between packets received varies instead of remaining constant. This can be caused by network congestion, improper queuing, or configuration errors.”

46
Q
  1. Which of the following technologies is used to attach multiple guest operating systems to a single physical network port?
A. Virtual switch
B. FCoE
C. VPC
D. vSAN
E. Fibre Channel
A

A. Virtual switch

47
Q
  1. When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use.
    Which of the following documents or regulations should be consulted for confirmation?
A. Incident response policy
B. International export controls
C. Data loss prevention
D. Remote access policies
E. Licensing restrictions
A

B. International export controls

48
Q
  1. A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?

A. MT-RJ
B. BNC
C. GBIC
D. F-type

A

C. GBIC

Questions ask for a transceiver, A,B & D are connector types for Fiber and coax respectively. Only letter C is the transceiver which is GBIC or the Gigabit Interface Converter.

49
Q
  1. A network technician notices a router that repeatedly reboots. When contacting technical support, the technician discovers this is a known problem in which an attacker can craft packets and send them to the router through an obsolete protocol port, causing the router to reboot. Which of the following did the network technician fail to do? (Choose two.)
A. Generate new crypto keys.
B. Keep patches updated.
C. Disable unnecessary services.
D. Shut down unused interfaces.
E. Avoid using common passwords.
F. Implement file hashing.
A

B. Keep patches updated.

C. Disable unnecessary services.

50
Q
  1. A technician has replaced a customers desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources.
    The technician suspects the desktop has not been kept up to date with security patches. Which of the following is MOST likely in place?
A. ACL
B. NAC
C. Traffic shaping
D. SDN
E. NTP
A

B. NAC

NAC is the most logical answer. Network Access Control is a form of security.

The answer is NAC since the machine is not up to date with patches therefore its being denied access to network till its up to date. Most ACL questions for NET+ pertain to firewall traffic thats incoming so it could be ACL but we are dealing with internal issue. NAC probable choice.

51
Q
  1. A network technician wants to gain a better understanding of network trends to determine if they are over capacity. Which of the following processes should the technician use?

A. Log review
B. Port scanning
C. Vulnerability scanning
D. Traffic analysis

A

D. Traffic analysis

52
Q
  1. A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?

A. Transport
B. Network
C. Session
D. Application

A

A. Transport

The correct answer is A. Transport.
The router also can perform packet filtering at the transport layer based on
the source and destination TCP or UDP port.

53
Q
  1. An attacker has flooded the hardware tables of a switch to forward traffic to the attackerג€™s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Choose two.)
A. DNS poisoning
B. ARP poisoning
C. Man-in-the-middle
D. Ransomware
E. Evil twin
F. Reflective
A

B. ARP poisoning

C. Man-in-the-middle

54
Q
  1. A remote user is required to upload weekly reports to a server at the main office. Both the remote user and the server are using a Windows-based OS. Which of the following represents the BEST method for the remote user to connect to the server?

A. RDP
B. Telnet
C. SSH
D. VNC

A

A. RDP

Both the remote user and the server are using a Windows-based OS”
RDP is a proprietary protocol developed by Microsoft.

55
Q
  1. At which of the following layers of the OSI model would TCP/UDP operate?

A. Layer 3
B. Layer 4
C. Layer 5
D. Layer 6

A

B. Layer 4

56
Q
  1. A technician is troubleshooting a server in the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?

A. nslookup
B. iptables
C. pathping
D. netstat

A

C. pathping

pathping combines (ICMP) ping with network latency and loss over several hops, so first it does a traceroute and identifies all the hops between two points, and then it calculates the latency and loss and provides a nice report.

57
Q
  1. A technician is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

A. HTTP
B. SMTP
C. NTP
D. RDP

A

C. NTP

The technician seems to know what happened and only wants to trace it’s history. NTP is the best answer.

58
Q
  1. Which of the following is BEST for providing real-time equipment theft alerts to the security staff?

A. Biometric locks
B. Smart card reader
C. Asset tracking tags
D. Motion detection

A

B. Smart card reader
or
C. Asset tracking tags

From the official Comptia Network+ student guide: “RFID asset tracking tags allow electronic surveillance of managed assets. The tags can be detected at entry/exit points to prevent theft. “

Option B, a smart card reader can alert security staff when a smart card holder uses the entry/exit point but it doesn’t necessarily inform security of stollen equipment, nor does it imply the card holder is there to still.
Option C this will definitely inform security of any movement of the equipment beyond the set exit point.

59
Q
  1. A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)
A. Disable the HTTP port in the host firewall.
B. Upgrade the firmware on the firewall.
C. Generate new SSH host keys.
D. Remove unnecessary testing accounts.
E. Issue a new self-signed certificate.
A

C. Generate new SSH host keys.
E. Issue a new self-signed certificate.

I’m guessing because the server is cloned, you need a new certificate. Though self-signed isn’t ideal, it does not state that the production server is a public-facing server. Maybe it’s an internal webserver. For internal servers self-signed certificates are okay.

60
Q
  1. Which of the following is a network device that is responsible for separating collision domains?

A. Switch
B. Router
C. Hub
D. Modem

A

A. Switch

A is correct because Switches create separate collision domains but a single broadcast domain, routers deal only with broadcast domains.

61
Q
  1. A wireless client is having issues staying connected to the wireless network even though the client is less than 20ft (6m) from the access point. Which of the following is MOST likely the cause?

A. Distance limitations
B. Latency
C. Security type mismatch
D. Absorption

A

D. Absorption

62
Q
  1. Which of the following network topologies is primarily used to connect servers to large network disk arrays?
A. SAN
B. MAN
C. CAN
D. PAN
E. LAN
A

A. SAN

A SAN is block-based storage, leveraging a high-speed architecture that connects servers to their logical disk units A is correct

63
Q
  1. After setting up in a temporary office, Joe tries to access the companys wireless network. Following several attempts, Joe is able to get an IP, but cannot access network resources. Which of the following is the MOST likely cause of this error when trying to connect to the companys wireless network?

A. Incorrect passphrase
B. Incorrect power levels
C. Incorrect workstation certificate
D. Incorrect encryption

A

C. Incorrect workstation certificate

64
Q
  1. A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the companyג€™s firewall. Which of the following should the technician use to troubleshoot?

A. WiFi analyzer
B. Bandwidth speed tester
C. Dig
D. Packet sniffer

A

C. Dig

65
Q
  1. Which of the following protocols are used to configure an email client to receive email? (Choose two.)
A. IMAP
B. SMTP
C. POP
D. SFTP
E. TFTP
A

A. IMAP
C. POP

POP3 (110) and IMAP (143) for receive email
SMTP (25) for sending email

66
Q
  1. A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.)

A. Cat 6 with a repeater placed in the middle of the run
B. Cat 7
C. Crossover cable
D. Fiber-optic cabling
E. Cat 7 with a patch panel placed in the middle of the run

A

A. Cat 6 with a repeater placed in the middle of the run

C. Crossover cable

67
Q
  1. A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?
A. 3
B. 4
C. 5
D. 6
E. 7
A

E. 7

SSH is an application layer protocol that communicates on port 22 via TCP

68
Q
  1. A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?

A. Port enumeration
B. Baseline review
C. Vulnerability scanning
D. Packet analysis

A

C. Vulnerability scanning

69
Q
  1. A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?
A. IPS
B. Firewall
C. SIEM
D. UTM
E. Content filter
A

E. Content filter

In Mike Meyers Book:
Many multilayer switches handle load balancing by functioning at multiple
layers. An alternative is a content switch. Content switches always work at Layer
7 (Application layer). Content switches designed to work with Web servers, for
example, can read incoming HTTP and HTTPS requests. With this, you can
perform very advanced actions, such as handling SSL certificates and cookies,
on the content switch, removing the workload from the Web servers. Not only
can these devices load balance in the ways previously described, but their HTTP
savvy can actually pass a cookie to HTTP requesters—Web browsers—so the
next time that client returns, it is sent to the same server.
The CompTIA Network+ exam refers to a content switch as a content filter network appliance.

Thus answer “Content Filter” sounds fine to me.

70
Q
  1. Which of the following devices would allow a network administrator to block an application at Layer 7 on the network?

A. Firewall
B. NGFW
C. Router
D. Spam filter

A

B. NGFW

71
Q
  1. A client requests a new dynamic address and receives a response from two DHCP servers. Which of the following addressing information would the client use?

A. The IP addressing information received last
B. The IP addressing information from the highest server MAC address
C. The IP addressing information from the highest server IP address
D. The IP addressing information received first

A

D. The IP addressing information received first

72
Q
  1. A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

A. System life-cycle procedures
B. Off-boarding procedures
C. Safety procedures
D. Appropriate use policy

A

B. Off-boarding procedures

According to Mike Myers’ Net+ Book
“Off-boarding: The process of confirming that mobile devices leaving the control of the organization do not store any proprietary applications or data.”

73
Q
  1. Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a non-routed VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method?

A. Inventory management
B. Wiring and port location
C. Configuration baseline
D. Standard operating procedure

A

D. Standard operating procedure

74
Q
  1. A network technician does not have access to the GUI of a server and needs to adjust some network properties. Given the command: route add 0.0.0.0 mask 0.0.0.0 192.169.1.222 metric 1
    Which of the following is the technician attempting to alter?

A. The technician is clearing the route table.
B. The technician is adding a static IP address.
C. The technician is clearing the subnet mask setting.
D. The technician is setting the default gateway.

A

D. The technician is setting the default gateway.

75
Q
  1. A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

A. VLAN routing
B. Server-based firewall configuration issue
C. Patch cable type
D. DHCP scope availability

A

D. DHCP scope availability

76
Q
  1. A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is making to the company network?

A. Change management
B. Network diagrams
C. Inventory report
D. Labeling report

A

A. Change management

change management should be contacted and approval is required before any change is made. So all parties affected by the change must sign off on the change. So change management is totally aware of this new router. Change management records these changes so should a change go bad or bring instability to the network they can roll back to the previous settings. The next thing needing updating is the network diagram as a new physical router has been added.

77
Q
  1. A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?

A. Expired IP address
B. Exhausted dynamic scope
C. Misconfigured VLSM
D. Rogue DHCP server

A

B. Exhausted dynamic scope

APIPA
169.254.0.1 to 169.254.255.254

78
Q
  1. A customer has submitted a request for a new wireless connection in the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration?

A. The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules.
B. The LAN and WLAN should be configured in the DMZ so traffic is denied automatically.
C. The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours.
D. The LAN and WLAN should be configured in separate zones with a firewall in between.

A

D. The LAN and WLAN should be configured in separate zones with a firewall in between.

79
Q
  1. An employee, who is using a laptop connected to the wireless network, is able to connect to the Internet but not to internal company resources. A systems administrator reviews the following information from the laptop:

IP: 192.168.1.100 -
MASK: 255.255.255.0 -
ROUTER: 192.168.1.1 -

The administrator was expecting to see a network address within 10.100.0.0/23, which is consistent with the companys wireless network. The network administrator verifies the companys wireless network is configured and working properly. Which of the following is the MOST likely cause of this issue?

A. Interference
B. Security type mismatch
C. Wrong SSID
D. Channel overlap

A

C. Wrong SSID

80
Q
  1. Which of the following technologies should be used in high-throughput networks to reduce network overhead?

A. iSCSI
B. QoS tags
C. Port aggregation
D. Jumbo frames

A

D. Jumbo frames

81
Q
  1. A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access?
    (Choose two.)
A. Disabling unused ports
B. Upgrading firmware
C. Using secure protocols
D. File hashing
E. MAC filtering
F. Configuring a honeypot
A

A. Disabling unused ports

E. MAC filtering

82
Q
  1. A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem?

A. Loopback adapter
B. Tone generator
C. Multimeter
D. Punchdown tool

A

D. Punchdown tool

so the word “…that the pairs are open.” mean the cable is not terminated well?if yes, the correct answer is D

83
Q
  1. A technician needs to add ten additional Ethernet ports to a small office network. A new basic function switch is added. Hosts connected to the new switch are unable to see any computers on the network other than those connected to the new switch. Which of the following should the technician perform to ensure the hosts on the new switch can communicate with the existing network?

A. Replace the new switch with a hub to ensure Layer 1 connectivity on the new network segment.
B. Move the straight-through Ethernet cable connecting the switches to the first port on both switches.
C. Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end.
D. Add a second cable connecting the switches for redundancy and disabling STP on both switches.

A

C. Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end.

568A on one end and 568B creates a cross over cable.

The technician is tasked with setting up additional ethernet ports. In adding a new switch, i assume they are attempting to connect the new and the current switches. Crossover cables are used to connect similar devices, so in theory i believe that C is the correct answer if you are trying to pair up both switches to add the additional ethernet ports.

84
Q
  1. Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use?

A. 3DES encryption
B. SSL certificate
C. Digital signatures
D. MD5 hash

A

D. MD5 hash

85
Q
  1. Which of the following is the MOST secure type of remote administration?

A. SSH over IPsec client-to-site VPN
B. RDP over SSLv2 HTTPS terminal services gateway
C. HTTP over WPA2-TKIP WiFi
D. Telnet over PSTN

A

A. SSH over IPsec client-to-site VPN

86
Q
  1. A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue?

A. Attenuation
B. Incorrect pin-out
C. Damaged cable
D. Switch misconfiguration

A

C. Damaged cable

87
Q
  1. A network engineer is trying to determine where to place a firewall based on the flow of traffic. Which of the following types of documentation would assist the engineer in doing this?

A. Change management
B. Rack diagram
C. Network configuration
D. Network diagram

A

D. Network diagram

88
Q
  1. A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the users bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

A. Spam
B. Ransomware
C. Man-in-the-middle
D. Phishing

A

C. Man-in-the-middle

“same origin IP address as the last login to the email account.”
the fake email is showing the address of the last place the user logged in at ie internet cafe or something so the MIT was used to get the address and account information for user email and hack into it…

89
Q
  1. A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

A. Single sign-on
B. RADIUS
C. TACACS+
D. Captive portal

A

D. Captive portal

90
Q
  1. A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?

A. Because secure protocols would reject malicious packets
B. Because SCP is not a secure service
C. Because FTP is not a secure service
D. Because a secure firewall will protect the device

A

C. Because FTP is not a secure service

The mentioned zero-day is only affecting ftp on port 21. “This network device is restricted to use only secure protocols and services” which means the device will only use SECURE ftp to transfer files. And SFTP works on port 22. A bit tricky

91
Q
  1. Which of the following protocols is used by Active Directory for authentication?

A. SSH
B. SFTP
C. LDAP
D. TLS

A

C. LDAP

Lightweight Directory Access Protocol - Used for directory services authentication

92
Q
  1. When deploying UTP cables in a networking environment, which of the following are acceptable standards? (Choose two.)
A. 10Base2
B. 10Base5
C. 10GBaseT
D. 1000BaseLX
E. 1000BaseSX
F. 1000BaseT
A

C. 10GBaseT

F. 1000BaseT

93
Q
  1. Which of the following is the physical location where the customer-premise equipment comes together with the ISP or third-party telecommunications equipment?

A. Server room
B. Equipment closet
C. Demarcation point
D. Intermediate distribution frame

A

C. Demarcation point

94
Q
  1. A vulnerability that would allow an unauthenticated, remote attacker to originate a DoS attack was found in a DHCP client implementation of a switch. Which of the following would BEST resolve the issue?

A. Verify the default passwords have been changed.
B. Upgrade to the latest firmware
C. Generate new SSH keys.
D. Review and modify the firewall rules.

A

B. Upgrade to the latest firmware

Speaks of vulnerabilities so the answer is patches and upgrades

95
Q
  1. A human resources manager notifies the IT manager the night before an employee will be terminated so the employeeג€™s access rights can be removed. Which of the following policies is being exercised?

A. Privileged user agreement
B. AUP
C. Non-disclosure agreement
D. Offboarding

A

D. Offboarding

96
Q
  1. Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?

A. Disable unused ports.
B. Reset the two-factor token.
C. Disable virtual ports.
D. Upgrade the firmware.

A

A. Disable unused ports.

97
Q
  1. A network technician is setting up the wireless network for a companys new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A. Channel 6
B. Channel 7
C. Channel 9
D. Channel 10

A

A. Channel 6

98
Q
  1. A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

A. Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.
B. Connect modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.
C. Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.
D. Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.

A

C. Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.

802.11a works only with 5Ghz, so B is wrong.
A is wrong because using WPA for full compatibility is not the “MOST” secure method
D Could be right but in that way the devices would’t go thorough the process of 802.1X authorization, but would just work in a “Persona - pre shared key” mode.
That leaves only C: connect old devices in “Personal PSK” mode and get modern devices authenticate using EAP (802.1X) and encrypted with AES.

99
Q
  1. Which of the following BEST describes the characteristics of a differential backup solution?

A. Backs up files with the creation or modified date as the current date.
B. Backs up all files and sets the archive bit.
C. Backs up files with a date earlier than todays date with a clear archive bit.
D. Backs up files with the archive bit set but does not clear the bit.

A

A. Backs up files with the creation or modified date as the current date.

100
Q
  1. A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technicians machine. Which of the following should the technician use to help diagnose the problem?

A. Packet sniffer
B. netstat
C. nslookup
D. Spectrum analyzer

A

A. Packet sniffer

Technician can ping the DHCP server meaning its connected to the network, however it is not handing IP addresses as expected.

Packet sniffers work by examining streams of data packets that flow between computers on a network as well as between networked computers and the larger Internet.

From these packets the technician can better diagnose the problem.

101
Q
  1. A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is MOST likely the issue?
A. One of the wireless access points is on the wrong frequency
B. The students are attempting to connect 802.11g devices
C. The students are using more than one wireless device per seat.
D. Distance limitations are preventing the students from connecting.
A

B. The students are attempting to connect 802.11g devices

102
Q
  1. A technician wants to configure a SOHO network to use a specific public DNS server. Which of the following network components should the technician configure to point all clients on a network to a new DNS server?
A. Router
B. Switch
C. Load balancer
D. Proxy server
A

A. Router

A, cause is a SOHO (Small Office, Home Office) network. Remember all come integrated in the router.