Jason Dion - CompTIA Network+ N10-008 Exam Prep #2 Flashcards
(90 cards)
What port number does LDAP utilize?
A.3389
B.1433
C.389
D.636
C.389
OBJ-1.5: The Lightweight Directory Access Protocol (LDAP) uses port 389 and is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network. The Lightweight Directory Access Protocol Secure (LDAPS) uses port 636 and is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network that is encrypted using an SSL connection. Microsoft SQL uses ports 1433 and is a proprietary relational database management system developed by Microsoft that is fully compatible with the structured query language (SQL). Remote Desktop Protocol (RDP) uses port 3389 and is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
A network engineer is conducting an assessment for a customer who wants to implement an 802.11ac wireless network. What should the engineer reference before estimating the number of WAPs (Wireless Access Point) required?
A.Site survey
B.PoE requirements
C.Network topology
D.Network diagram
A.Site survey
OBJ-3.2: Since it is a wireless network, a review of a site survey is necessary to determine any physical advantages and disadvantages. Network topology and network diagrams can be created once the site survey is complete, and the location of the access points is determined based on distance and expected coverage requirements. The purpose of a wireless site survey is to look at the feasibility of each individual wireless link to provide seamless connectivity for a wireless network.
You typed IPCONFIG at the command prompt and find out your IP is 192.168.1.24. You then go to Google.com and search for “what is my IP,” and it returns a value of 35.25.52.11. How do you explain why your computer has two different IP addresses?
A.This is caused by how a switch handles IP (Internet Procol) addresses
B.This is caused because your gateway is conducting NAT (Network Address Translation) or PAT (Port Address Translation)
C.This is caused by the way traffic is routed over the Internet
D.This is caused because of the way routers handle IP addresses
B.This is caused because your gateway is conducting NAT (Network Address Translation) or PAT (Port Address Translation)
OBJ-1.4: Your computer network uses a private IP address for machines within the network and assigns a public IP address for traffic being routed over the network using either NAT or PAT. Most small office home office (SOHO) networks utilize a single public IP for all of their devices and use a technique known as PAT to associate the public IP with each internal client’s private IP when needed. Network Address Translation (NAT) and Port Address Translation (PAT) allow multiple devices on a LAN to be mapped to a single public IP address to conserve IP address. In NAT, private IP addresses are translated into public IP addresses. In PAT, private IP addresses are translated into a single public IP address and their traffic is segregated by port numbers.
Dion Training has created a guest wireless network for students to use during class. This guest network is separated from the corporate network for security. Which of the following should be implemented to require the least amount of configuration for a student to access the Internet over the guest network?
A.Configure the access point to 802.1x for authentication
B.Enable two-factor authentication on the student’s device
C.Enable SSID (Secure Set IDentifier) broadcast for the guest wireless network
D.Configure WEP (Wired Equivalent Privacy) with a pre-shared key
C.Enable SSID (Secure Set IDentifier) broadcast for the guest wireless network
OBJ-2.4: Since security was not listed as a requirement for the guest wireless network, it would be easiest not to set up any encryption, passwords, or authentication mechanisms on the network. Instead, you should enable the SSID broadcast for the guest network so students can easily find and connect to it. Using two-factor authentication, 802.1x, or WEP would require the students to complete additional configurations prior to connecting to the guest network.
A network administrator recently set up a network computer lab and discovered some connectivity issues. The administrator can ping the fiber uplink interface, but none of the new workstations plugged into the switch are responding to the technician’s ICMP requests. Which of the following actions should the technician perform next?
A.Verify the ports on the switch are full-duplex
B.Determine if the link lights are lit for the ports
C.Determine if port security is enabled on the ports
D.Verify that the uplink interface is configured correctly
C.Determine if port security is enabled on the ports
OBJ-5.2: A technician can use the LEDs on the switchports to quickly monitor activity and performance for the interfaces. By determining if the link lights are lit for the ports, the administrator can verify if there is any activity on the network, if the ports are enabled, and if the Layer 1 components are working properly. Additionally, some switches have LEDs to indicate if the switchport is operating in half-duplex or full-duplex, and the speed of the link.
A network engineer is designing an 802.11g wireless network that uses three wireless access points for complete coverage. Which of the following channel selections would result in the LEAST amount of interference between each access point?
A.Adjacent access points should be assigned channels 4,8, and 12 with a 40 MHz channel width
B.Adjacent access points should be assigned channels 2,6, and 10 with a 20 MHz channel width
C.Adjacent access points should be assigned channels 7,9, and 11 with a 40 MHz channel width
D.Adjacent access points should be assigned channels 1,6, and 11 with a 20 MHz channel width
D.Adjacent access points should be assigned channels 1,6, and 11 with a 20 MHz channel width
OBJ-5.4: Because the overlapping signals are from access points from unrelated non-overlapping channels, the access points are least likely to interfere with each other. For Wireless B and G networks, you should always use channels 1, 6, and 11 to ensure you are using non-overlapping frequencies.
Your network relies on the use of ATM (Asynchronous Transfer Mode) cells. At which layer of the OSI (Open Systems Interconnect) model do ATM cells operate?
A.Data link
B.Transport
C.Session
D.Network
A.Data link
OBJ-1.1: In the data link layer (layer 2) of the OSI model, the basic unit of transfer is called a frame. In an ATM network, though, these frames are called cells and are of a fixed (53 octets or bytes) length that allows for faster switching of the cells across the network.
Your company has just finished replacing all of its computers with brand new workstations. Colleen, one of your coworkers, has asked the company’s owner if she can have the old computers that are about to be thrown away. Colleen would like to refurbish the old computers by reinstalling a new operating system and donating them to a local community center for disadvantaged children in the neighborhood. The owner thinks this is a great idea but is concerned that the private and sensitive corporate data on the old computer’s hard drives might be placed at risk of exposure. You have been asked to choose the best solution to sanitize or destroy the data while ensuring the computers will still be usable by the community center. What type of data destruction or sanitization method do you recommend?
A.Shredding
B.Wiping
C.Degaussing
D.Purging
B.Wiping
OBJ-4.5: Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse. Degaussing a hard drive involves demagnetizing a hard drive to erase its stored data. You cannot reuse a hard drive once it has been degaussed. Therefore, it is a bad solution for this scenario. Purging involves removing sensitive data from a hard drive using the device’s internal electronics or an outside source such as a degausser, or by using a cryptographic erase function if the drive supports one. Shredding involves the physical destruction of the hard drive. This is a secure method of destruction but doesn’t allow for device reuse.
Which of the following authentication protocols was developed by Cisco to provide authentication, authorization, and accounting services?
A.TACACS+ (Terminal Access Controller Access Control System)
B.RADIUS (Remote Authentication Dial-In User Service)
C.Kerberos
D. CHAP (Challenge-Handshake Authentication Protocol)
A.TACACS+ (Terminal Access Controller Access Control System)
OBJ-4.1: TACACS+ is an extension to TACACS (Terminal Access Controller Access Control System) and was developed as a proprietary protocol by Cisco. The Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that operates on port 1812 and provides centralized Authentication, Authorization, and Accounting management for users who connect and use a network service, but Cisco did not develop it. Kerberos is a network authentication protocol designed to provide strong mutual authentication for client/server applications using secret-key cryptography developed by MIT. Challenge-Handshake Authentication Protocol (CHAP) is used to authenticate a user or network host to an authenticating entity. CHAP is an authentication protocol but does not provide authorization or accounting services.
Jason has just connected his new AirPods to his iPhone to listen to his music wirelessly. Which of the following types of networks is he using?
A.(Campus Area Network; CAN-2)
B.WAN (Wide Area Network)
C.LAN (Local Area Network)
D.PAN (Personal Area Network)
D.PAN (Personal Area Network)
OBJ-1.2: A personal area network (PAN) is centered around a short distance, usually around a person or up to a few meters. PANs are heavily used with Bluetooth and NFC. A local area network (LAN) connects computers within a small and specific area geographically. A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. A wide area network (WAN) will typically cover a larger area geographically, such as a continent, a state, or a country.
IPv4 addresses are written using Base 10 numbers, while IPv6 addresses are written in Base 16 numbers. What type of notation does Base16 utilize?
A.Decimal
B.Hexadecimal
C.Binary
D.Octet
B.Hexadecimal
OBJ-1.4: Hexadecimal (or Hex for short) is the system of numbering that uses Base16. This includes the numbers 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. All IPv6 addresses and MAC addresses are written in hexadecimal format.
Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as challenge/response and password encryption?
A.TACACS+ (Terminal Access Controller Access Control System)
B.Multi-factor authentication
C.Network access control
D.ISAKMP (Internet Security Association and Key Management Protocol)
A.TACACS+ (Terminal Access Controller Access Control System)
OBJ-4.1: TACACS+ is a AAA (accounting, authorization, and authentication) protocol to provide AAA services for access to routers, network access points, and other networking devices. TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server. Multifactor authentication is an authentication scheme that works based on something you know, something you have, something you are, something you do, or somewhere you are. These schemes can be made stronger by combining them (for example, protecting the use of a smart card certification [something you have] with a PIN [something you know]). Network Access Control (NAC) is a means of ensuring endpoint security by ensuring that all devices connecting to the network conform to a health policy such as its patch level, antivirus/firewall configuration, and other factors. Internet Security Association and Key Management Protocol (ISAKMP) is used for negotiating, establishing, modification, and deletion of SAs and related parameters in the IPSec protocol.
Your company has several small branch offices around the country, but you work as a network administrator at the centralized headquarters building. You need the capability of being able to remotely access any of the remote site’s routers to configure them without having to fly to each location in person. Your company’s CIO (Chief Information Officer) is worried that allowing remote access could allow an attacker to gain administrative access to the company’s network devices. Which of the following is the MOST secure way to prevent this from occurring while still allowing you to access the devices remotely?
A.Install an out-of-band modem
B.Create an out-of-band management network
C.Configure the remote router’s ACL (Access Control List) to only permit Telnet traffic
D.Configure the remote router’s ACL to only permit HTTP (HyperText Transfer Protocol) traffic
B.Create an out-of-band management network
OBJ-4.4: You should create an out-of-band management network and use an SSH (console) connection to reach the routers. Out-of-band (OOB) management is a method of remotely controlling and managing critical IT assets and network equipment using a secure connection through a secondary interface that is physically separate from the primary network connection. Telnet and HTTP are not encrypted channels and should not be used for remote connections. Using a modem is also a bad security practice since these are subject to war dialing and provide slow connectivity speeds.
(This is a simulated Performance-Based Question.)
Which of the following is the correct order of the following Fiber Connectors shown?
A.ST, SC, LC (single), LC (duplex), FC
B.SC, ST, FC, LC (single), LC (duplex)
C.LC (single), LC (duplex), FC, ST, SC
D.FC, LC (single), LC (duplex), SC, ST
A.ST, SC, LC (single), LC (duplex), FC
OBJ-1.3: The correct order of the Fiber connections shown is ST, SC, LC (single), LC (duplex), and FC. If this were a real question on the exam, you would have the words provided in a list, and you would drag them below the appropriate fiber connector’s drawing.
Which of the following is a connectionless protocol?
A.SSH (Secure SHell)
B.ICMP (Internet Control Message Protocol)
C.SSL (Secure Sockets Layer)
D.TCP (Transmission Control Protocol)
B.ICMP (Internet Control Message Protocol)
OBJ-1.5: A connectionless protocol is a form of data transmission in which data is transmitted automatically without determining whether the receiver is ready or even whether a receiver exists. ICMP, UDP, IP, and IPX are well-known examples of connectionless protocols. TCP, SSH, and SSL are all examples of connection-oriented protocols.
Which of the following would require the network administrator to schedule a maintenance window?
A.A minor release upgrade of a production router
B.Rebooting the network administrator’s laptop
C.A company-wide email notification must be sent out
D.A major release upgrade of a core switch in a test lab
A.A minor release upgrade of a production router
OBJ-3.2: During an update of a production router, the router would not route packets, and the network traffic would be affected. Therefore, it would be necessary to announce a maintenance window. A maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could disrupt service is allowed to be performed.
Your company has two office buildings which are connected via a copper network cable that is buried underground. There is some construction being performed near the buildings. Now, the second building discovers they have suffered a network outage that doesn’t appear to be temporary. What is the MOST likely cause of the outage?
A.Signal attenuation on the cable
B.Electromagnetic interference on the cable
C.Cross-talk on the cable
D.An open circuit has been created
D.An open circuit has been created
OBJ-5.2: Since the issue started after construction began, it is most likely that the construction crew broke the cable during digging operations. This can cause an open circuit or short circuit, depending on how the cable was cut or broken by the construction workers. This can be verified using a Time-Domain Reflectometer to determine exactly where in the cable the break has occurred. Once the location is identified, the cable can be repaired or spliced to return it to normal operations.
Your router has been turning itself off and on again for a few weeks. You begin to think back to when these issues began to occur and remember that each time it happened the lights also dimmed momentarily. You hook up a device to monitor the power being supplied to the router and identify that brownouts are frequently occurring, resulting in the router’s power cycling. What should you (a network technician) do to solve this problem?
A.Install a UPS (Uninterruptable Power Supply)
B.Install a surge protector
C.Install a new electrical outlet
D.Install an upgraded router
A.Install a UPS (Uninterruptable Power Supply)
OBJ-3.3: The best solution would be to install a UPS. Since you are a network technician and not an electrician, you should not install a new electrical circuit. The primary function of UPS is to provide battery backup when the electrical power fails or drops to an unacceptable voltage level. It ensures that your electrical equipment gets a consistent current so damage and device power cycling do not occur. A surge protector defends against possible voltage spikes that could damage your electronics, appliances, or equipment. A network technician is not qualified to install a new electrical outlet since that is a job for an electrician. The scenario presents issues that focus on the power levels, therefore installing an upgraded router would not solve these issues.
You have been asked by your supervisor, Tamera, to ensure that you enable 802.3af on a managed switch. Which of the following features does she want you to enable?
A.VLAN (Virtual Local Area Network)
B.Trunking
C.PoE (Power over Ethernet)
D.Port bonding
C.PoE (Power over Ethernet)
15.4W of DC power to each device. The IEEE 802.3at standard defines PoE+ and supports 25.5W of DC power to each device. Power over Ethernet or PoE technology describes a system to safely transfer electrical power, along with data, to remote devices over standard data cables in an Ethernet network. Port bonding, or link aggregation, is part of the 802.3ad standard. Port bonding is the combining of multiple network connections in parallel by any of several methods, in order to increase throughput beyond what a single connection could sustain, to provide redundancy in case one of the links should fail, or both. VLANs are part of the 802.1q standard. A virtual LAN (VLAN) is any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2). Trunking is also covered by the 802.1q protocol and supports VLANs.
Which of the following layers within software-defined networking focuses on resource requests or information about the network?
A.Infrastructure layer
B.Application layer
C.Management plane
D.Control layer
B.Application layer
OBJ-1.7: The application layer focuses on the communication resource requests or information about the network. The control layer uses the information from applications to decide how to route a data packet on the network and to make decisions about how traffic should be prioritized, how it should be secured, and where it should be forwarded to. The infrastructure layer contains the physical networking devices that receive information from the control layer about where to move the data and then perform those movements. The management plane is used to monitor traffic conditions, the status of the network, and allows network administrators to oversee the network and gain insight into its operations.
You have just received an email regarding a security issue detected on the company’s standard web browser. Which of the following should you do to fix the issue?
A.Firmware update
B.Vulnerability patch
C.OS update (Operating System)
D.Driver update
B.Vulnerability patch
OBJ-4.3: Since there is a security issue with the current web browser, it most likely needs to be updated with a manufacturer’s vulnerability patch. A vulnerability patch is a piece of software that fixes security issues.
A customer is trying to configure an 802.11b wireless card in an old laptop to connect to an 802.11g wireless router. When the customer scans for the wireless network’s SSID (Secure Set IDentifier) (Dion-Corp), it is not displayed within Windows. What is the MOST likely reason that the SSID is not being displayed?
A.The broadcast is disabled on the wireless router
B.The wireless router is not configured for DHCP (Dynamic Host Configuration Protocol) support
C.802.11g and 802.11b use different frequencies
D.The wireless router is configured with WPA2 (Wi-Fi Protected Access 2) encryption
A.The broadcast is disabled on the wireless router
OBJ-5.4: If the SSID (Secure Set Identifier) is disabled, then the wireless network name will not be broadcast to any available devices within range. Both Wireless B and G use the same frequency band (2.4 GHz) and would not cause this issue. Similarly, encryption that is enabled or disabled would not affect the SSID broadcast since the SSID is sent out in cleartext. DHCP support is used once a device connects to the network. Therefore it would not affect the SSID broadcast.
A network administrator needs to allow employees to upload files to a remote server securely. What port must be allowed through the firewall?
A.25
B.21
C.22
D.161
C.22
OBJ-1.5: To securely upload a file, the employees could use SFTP (Secure FTP) or SCP (Secure Copy). Both SFTP and SCP operate over port 22, therefore port 22 must be opened by the firewall so that the employees can reach the file servers. Port 21 is used by the File Transfer Protocol, but it is not a secure method of sending files. There is a more secure version of FTP known as FTPS, but that uses port 990. Port 25 is reserved for the simple mail transfer protocol (SMTP), which is an internet standard communication protocol for electronic mail transmission. Port 161 is reserved for simple network management protocol (SNMP), which is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks.
What remediation strategies are the MOST effective in reducing the risk to an embedded ICS (Internet Connection Sharing) from a network-based compromise? (Select TWO)
A.Patching
B.Segmentation
C.NIDS (Network-based Intrusion Detection System)
D.Disabling unused services
B.Segmentation
D.Disabling unused services
OBJ-2.1: Segmentation is the best method to reduce the risk to an embedded ICS system from a network-based compromise. Additionally, you could disable unused services to reduce the footprint of the embedded ICS. Many of these embedded ICS systems have a large number of default services running. So, by disabling the unused services, we can better secure these devices. By segmenting the devices off the main portion of the network, we can also better protect them. A NIDS might detect an attack or compromise, but it would not reduce the risk of the attack succeeding since it can only detect it. Patching is difficult for embedded ICS devices since they usually rely on customized software applications that rarely provide updates.