Kaplan Questions Flashcards

(99 cards)

1
Q

Your company implements a honeypot as intrusion prevention. Management is concerned that this honeypot would be considered entrapment and has asked you to ensure that entrapment does not occur. Which situation should you prevent?

A

You should prevent downloads on a honeypot. Allowing downloads on a honeypot is a possible example of entrapment if it is used to make formal trespassing charges. Entrapment occurs when a hacker is tricked into performing an illegal activity. Entrapment is illegal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the advantage of using wireless bridges over E1/T1 leased lines?

A

The advantage of wireless bridges over E1/T1 lines is that wireless bridges support higher bandwidth than E1/T1 lines, and E1/T1 lines tend to be more expensive in the long term.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following would be the best recovery solution in the event that a network segment is unavailable?

A

Redundant circuits would be the best recovery solution in the event that a network segment becomes unavailable. The redundant circuit can provide a backup route if a NIC, cable, router, or switch fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following attacks directs user traffic to a malicious web site without any outside communication from an attacker?

A

DNS poisoning, also known as DNS cache poisoning, can direct user traffic to a malicious web site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You company want to allow remote users to access their Windows network remotely if their network is not connected to the Internet. Which of the following should you implement?

A

Remote Access Service (RAS) is a service provided by Windows that allows remote access to the network via a dial-up connection. In order to obtain a remote connection, two services need to be in place: RAS and dial-up networking (DUN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A new file server is configured to allow personnel within the company to store files. Users are reporting that they cannot upload files to the file server. What might be the areas you should examine? (Choose two.)

A
  1. Incorrect ACL settings

2. Blocked TCP/UDP ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to connect wireless devices to a wired local area network. Which device should you implement?

A

An access point is either a software or hardware component that acts as a transceiver for wireless devices, connecting them to a wired local area network (LAN). It serves a similar function as a distribution center sending and receiving signals to and from computers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which four of the following statements explains why training employees about proper licensing and use of an organization’s software and hardware is important? (Choose four.)

A
  1. To practice good organizational ethics and governance
  2. To avoid liability from violating license rules or restrictions
  3. To comply with license restrictions or limitations
  4. To prevent unauthorized or improper consumption of licenses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which well-known port is used to forward e-mail on the Internet between e-mail servers?

A

Simple Mail Transfer Protocol (SMTP) uses port 25 to communicate e-mail transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

While reviewing recent performance reports from your network devices, you notice that there are a high number of corrupt packets reaching a router named Router34. What is most likely happening to them?

A

The packets are being dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You have an 802.11g wireless network that uses a single wireless access point. For security purposes, you do not broadcast the SSID. You have noticed wireless latency issues on your wireless network. What should you do to fix this issue?

A

Install another wireless access point that uses a different non-overlapping channel and the same SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

You are designing a SOHO network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable.

Which Ethernet standard should you use on the network?

A

The 1000BaseCX Ethernet standard supports a data transmission rate of 1 gigabit per second (Gbps) over 150-ohm balanced copper cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You have been hired as a network administrator. The company wants to implement a 10 Gigabit Ethernet designation for use with a SONET network. Which of the following should you implement?

A

The 10GBaseSW designation is for use with Synchronous Optical Networking (SONET) networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You administer computers on a Windows network. You suspect a problem with automatic NetBIOS name resolution on a Windows 7 computer on the network. Which command should you use to troubleshoot the name resolution problem?

A

the nbtstat -r command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You work for a company that deploys wireless networks for your customers. You have been asked to deploy wireless range extenders for several companies. For which of the following situations does deploying a wireless range extender make sense?

A

For a sprawling small office/home office layout with no more than 10 devices active at any given time, but with two dead spots in need of improved wireless network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide?

A

A baseline defines the minimum level of security and performance of a system in an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Your company wants to upgrade its twisted pair (TP) cable network to handle up to 10 GB data rates over the same distances (up to 90 meters) from switches to network nodes. Which TP category type must the company deploy to meet its requirements?

A

Cat6a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

While troubleshooting a network outage on a 10GBaseSW network, a technician finds a 500-meter fiber cable with a small service loop and suspects it might be the cause of the outage. Which of the following is MOST likely the issue?

A

The most likely cause of the issues is the maximum cable length has been exceeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The link light on the hub for the cable that connects the hub to the router is not lit. The link lights on the hub for Workstation A and the Server computer are lit. Workstation A and Server can communicate with one another, but neither of these computers can communicate with the Workstation B computer. Workstation B can connect to the Internet through the modem, but Workstation B cannot communicate with either Workstation A or Server.

Which device is most likely causing the communications problem?

A

The router is most likely causing the communications problem in this scenario.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You need to assign a virtual IP address to an Internet server. What are valid reasons for doing so? (Choose all that apply.)

A
  1. To permit multiple servers to share the same address
  2. To eliminate host dependencies on specific, individual network interfaces
  3. To permit the same address to access multiple domain names
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

You have replaced all of the routers on your network with switches. You then decide to turn off CSMA/CD. What is the BEST description of the result of your actions?

A

Network devices will now operate in full-duplex mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which media-access method does the 802.11 standard specify for wireless networks?

A

The IEEE 802.11 standard, which is the main standard for wireless LANs, specifies using Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) for its media access method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit network-based calls to access the PSTN, and for PSTN-based calls to access the network?

A

VoIP-PSTN gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of these is NOT an example of multifactor authentication?

A

Username and password is not an example of multifactor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
You are about to install several wireless access points in different areas of the building. You want maximum coverage, so you opt for the longer-range 2.4 Ghz frequency. Which item below should most likely also be of concern?
Channel overlap can cause performance issues. Even though 11 channels are available in the US, there is a high degree of overlap.
26
You are the network administrator for your company. You are in the process of verifying the configuration of the network devices to ensure smooth network connectivity. You want information on the routes taken by packets from a Cisco router so that you are able to identify the network points where packets are being dropped. Which command should you use to accomplish this task in the most efficient manner?
The traceroute command finds the path a packet takes while being transmitted to a remote destination. It is also used to track down routing loops or errors in a network.
27
You have been hired as the network administrator for your company. The departing network administrator explains that your company uses an authentication server (AS) and a ticket-granting server (TGS) to provide authentication. Which technology is the company using?
Kerberos uses ASs and TGSs to provide network authentication.
28
You are connecting a switch to a router. You just made a cable with each end configured differently, one 568A and the other 568B. When you plug in the cable, the devices cannot communicate. What is the most likely cause?
You have an incorrect cable type. You made a crossover cable when you needed a straight-through cable.
29
The activity lights on the hubs' ports connected to the router and the lights on the router's ports connected to the hubs are not lit. All other lights on both devices are lit. Which component is most likely to have failed?
router
30
Workstations A4 and A5 were recently added to the network. Since the clients have been added, the network has been running very slowly. Which two conditions could be causing this problem? (Choose two.)
1. The bus network might be missing a terminator. | 2. A connector is loose.
31
Your network contains four segments. You need to connect two or more of the LAN segments together. Which network devices can you use? (Choose four.)
1. Wireless Access Point. 2. Router 3. Switch 4. Bridge
32
You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the Web request load equally. What should you do?
You should implement an active/active cluster. This will ensure that the two Web servers share the Web request load equally. An active/active cluster is also known as a load-balancing cluster.
33
Your company owns a single physical server. You need to ensure that Web services are hosted in a Linux environment while Active Directory services are hosted in a Windows environment. In addition, you need to ensure that these services are hosted on different broadcast domains. What should you do?
You should implement virtual servers and switches. Implementing virtual servers would allow you to host a Linux environment for Web services and a Windows environment for Active Directory services on the same physical server. Implementing virtual switches will allow you to host the services on different broadcast domains.
34
Which malicious software relies on other applications to execute and infect the system?
A virus is malicious software (malware) that relies upon other application programs to execute and infect a system.
35
Which of the following types of backups would back up data that has NOT been changed since the last backup?
Full backups backup all of the files on a system, regardless of whether the data has been changed or not.
36
An eight-port hub receives a signal through port five. That signal is then sent back out through ports one, two, three, four, six, seven, and eight without any signal regeneration. Which type of hub has been described?
A passive hub sends received signals out through all of its ports except the one through which the signal was received.
37
You will have a very small wiring closet for your routers. While the company will use fiber-optic cabling, you would like to use the smallest form connector to conserve space. The connector you plan to use should be roughly half the size of the other connectors. Which fiber-optic connector should you use?
A Lucent Connector (LC) fiber-optic connector is roughly half the size of other fiber-optic connectors
38
For a new office space, you have been asked to choose a best cost solution for providing wireless network access for up to 60 employees. Your boss has informed you that there will be mix of 802.11n and 802.11ac devices in use. The maximum distance from the WAP to any user is 150 ft (~46M). Which kind of wireless access point should you buy?
You should buy a 802.11n wireless access point (WAP).
39
Which system or device detects network intrusion attempts and controls access to the network for the intruders?
An intrusion prevention system (IPS) detects network intrusion attempts and controls access to the network for the intruders.
40
You are implementing several switches on your network. The network contains client computers that run both Internet Protocol (IP) and Internetwork Packet Exchange (IPX). To increase network efficiency, you need to configure the switches so that the two different types of traffic are isolated. Which type of virtual local area network (VLAN) should you implement?
You should implement a protocol-based VLAN. This will allow you to isolate the IP and IPX traffic. With protocol-based VLANs, each VLAN is configured to support a single protocol.
41
You have recently added a new Windows 8 computer to your IPv6 network. Because your network is small, you currently use static IP addressing. You record the IPv6 address of the new Windows 8 computer. What is the shortest possible notation of it IPv6 address as shown below? 2001:0DB8:0000:0001:0000:0000:0000:F00D
2001:DB8:0:1::F00D
42
You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. Workstation A2 is experiencing delays accessing Server B. Which utility should you run from Workstation A2 to determine the source of the slowdown?
The tracert utility will provide a listing of all routers through which data from Workstation A2 must pass on its way to Server B. If there are any problems along the way, they will show up in the output from the tracert command.
43
You are setting up an 802.11a wireless network in an office environment that includes three wireless access points. The wireless access points are at least 15 meters apart and are configured for automatic channel setting. Each time you turn the wireless access points on, they all choose the same channel. You need to ensure that the access points choose separate channels to prevent interference, using the least amount of administrative effort. What should you do?
You should start each wireless access point at a separate time. This will allow each access point to select a channel.
44
You are setting up a 10-Mbps SOHO network at a residence. What is the lowest category or level of UTP cable that you should use as transmission medium for a small LAN communicating in the 10-Mbps range?
Although you could use Category 3 or Category 5 cable for the LAN, Category 3 is the lowest category cable that you could use for the LAN.
45
You manage a network for your organization. The network contains one DNS server and three routers. You are setting up a new DHCP server. You configure separate scopes for each subnet on your network. The routers are configured to forward DHCP requests. You need to ensure that DHCP clients receive the appropriate settings using the least administrative effort. What else should you do? (Choose all that apply.)
1. Configure each router as a scope option for its appropriate scope. 2. Configure the DNS server as a server option.
46
You are the network administrator for your company's network. All servers run Windows Server 2008. All workstations run Windows 7. Which command should you run from Server B to determine whether the default gateway address is properly configured?
The ipconfig /all command lists all the TCP/IP configuration parameters for the computer on which it is run.
47
Which wireless topology only requires one access point to be physically connected to the wired network, while still offering maximum flexibility and redundancy?
A mesh topology in wireless networks only requires one access point to be physically connected to the wired network.
48
After a data breach occurs at a client's site, you determine that some of the switches, routers, and servers in the network were updated with the most current security patches, and some have never been updated. When you examine the network diagram, you notice that many of the same types of devices do not look the same in the diagram. What type of documentation should you provide to the client to ensure all devices are consistently identified by their type?
Diagram symbols should be standardized throughout the network documentation.
49
You are looking at implementing several different 10GBase networks. You need to implement the one that offers the longest cable run because of the distances you must cover for your company's network. Which 10GBase specification should you select?
The 10GBaseER designation allows a maximum cable run of up to 40 kilometers (25 miles ).using single-mode fiber optic cable.
50
Which suppression methods are recommended for a fire in a facility that involves paper, laminates, and wooden furniture? (Choose two.)
1. Water | 2. Soda Acid
51
Management has stipulated that you must use unshielded twisted-pair (UTP) category consists of four twisted pairs of copper wire that is certified for transmission rates of up to 100 Mbps for the new guest network you are setting up. Which cabling category should you use?
Category 5 UTP cabling is the most widely used category of UTP cable. It enables transmission rates of up to 100 Mbps, and it is the highest category of UTP cabling.
52
You need to determine the length of a network cable. Which device should you use?
You can use a time domain reflectometer (TDR) to determine the length of a network cable. A TDR sends an electric pulse through a cable and measures the time required for the pulse to return.
53
You are hired to manage the network at a large data center. On your first day, a user reports that they have lost network connectivity. At the user's workstation, you successfully ping 127.0.0.1 and then swap out the patch cable that runs from the computer to a blank wall plate. In the network closet, you notice that all four patch panels were mounted to the rack after the punchdowns were completed, but nothing indicates port assignments or which areas the patch panels serve. You end up resolving the issue, but it takes longer than necessary. You want to speed up the resolution of future connectivity issues. What should you prepare FIRST?
Labeling is an important component of the network build and its documentation.
54
You suspect that there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI Network layer to allow this?
Although the OSI Data Link layer (Layer 2) uses MAC, or physical device, addressing, the Network layer (Layer 3) uses logical network addressing. This logical address is defined by the protocol's addressing scheme.
55
Which four of the following statements explains why training employees about proper licensing and use of an organization's software and hardware is important? (Choose four.)
1. To practice good organizational ethics and governance 2. To comply with license restrictions or limitations 3. To prevent unauthorized or improper consumption of licenses 4. To avoid liability from violating license rules or restrictions
56
The network you administer has two LANs connected by DSL routers through the Internet, as depicted in the following exhibit: Client4 cannot connect to Client5. Client3 cannot connect to Client4, but Client3 can connect to Client2. Client2 can connect to Server1, and Client1 can connect to Server2.Which device is most likely causing the connectivity problem on the network?
Hub B is most likely causing the connectivity problem.
57
A consultant recommends that your company implements an appliance firewall. To which type of firewall is this referring?
A hardware firewall is also referred to as an appliance firewall.
58
You have decided to implement a firewall between your company's network and the Internet. What does a firewall software solution typically provide? (Choose three.)
1. Packet Filtering 2. IP Proxy Services 3. HTTP Proxy Services
59
You need to collect management information on the routers and switches used on your company's network. You decide to use SNMP. What is the name of the software component that runs on a managed device when you deploy this technology?
The SNMP agent runs on a managed device, such as a router or switch.
60
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security to protect against wireless attack. However, you must provide support for older wireless clients. Which protocol should you choose?
You should implement Wi-Fi Protected Access (WPA). WPA was created to fix core problems with WEP. WPA is designed to work with older wireless clients while implementing the 802.11i standard.
61
You are setting up your company's VoIP infrastructure. One remote office location has audio problems when placing or receiving calls. At times, speech quality is poor, or there is a noticeable and distinct echo for call audio. In troubleshooting a possible system configuration issue, which of the following possibilities do you want to eliminate first?
You should first determine whether the call terminates on an analog endpoint. Dealing with audio quality issues on Voice over Internet Protocol (VoIP) is an occasional necessity.
62
A new file server is configured to allow personnel within the company to store files. Users are reporting that they cannot upload files to the file server. What might be the areas you should examine? (Choose two.)
1. Incorrect ACL settings | 2. Blocked TCP/UDP ports
63
You have reconfigured your network to change the cable type used on one of your subnets from Cat5 to Cat6. Which change configuration management documentation should you revise? (Choose all that apply.)
You should revise the physical network diagram and the network baseline.
64
You are implementing a SOHO network for a small business. The business owner has asked that you implement a 1 gigabit per second (Gbps) network. Which Ethernet standard specifies a data transfer rate of 1 Gbps?
The 1000BaseT Gigabit Ethernet standard specifies a maximum data transfer rate of 1 Gbps. Category 5 unshielded twisted-pair (CAT5 UTP) cable and RJ-45 connectors are typically used on 1000BaseT Ethernet networks.
65
Your company's security policy states that passwords should never be transmitted in plain text. You need to determine if this policy is being followed. Which tool should you use?
You should use a protocol analyzer to determine if passwords are being transmitted in plain text.
66
Your organization has implemented Kerberos 5 to authenticate its users. A member of management has asked you to explain ticket granting in Kerberos 5. You want to explain all the components of Kerberos to this member of management. Which entity is a ticket that is granted to a client after a client is authenticated?
After a client is authenticated on a network that uses Kerberos 5, the client is granted a ticket-granting ticket (TGT).
67
Which DSL technology provides the highest data rate?
Very high data rate Digital Subscriber Line (VDSL) provides the highest data rate, at 51 to 55 Megabits per second (Mbps) over cable lengths of up to 1,000 feet or 300 meters.
68
A user is complaining about wireless connectivity. Their cubicle is on a concrete wall, and the wireless access point is mounted on the other side of the wall. What describes what is happening to the wireless signal that only has to travel a few inches?
Absorption occurs when an object does not reflect or refract a wireless signal, but rather absorbs a portion of it. Different materials have different absorption rates. For example, drywall has a relatively low absorption rate, while concrete has a relatively high absorption rate.
69
You originally configured a redundant server with a static IP address, and it has been offline for some time. When you power the server up to performs some tests, what might be an unexpected consequence?
The consequence may be duplicate IP addresses. Duplicate IP addresses can occur when a DHCP server “thinks” an IP address is available.
70
You want to configure a firewall and filter packets on a Linux system. Which command would you use?
The iptables Linux command allows you to control a firewall and filter packets.
71
You are working to convert a 10BaseT network to a 1000BaseT network. This conversion includes replacing all cabling, network devices, and network interface cards (NICs). Next year, you also have a planned building renovation where departments will be relocated to different areas within the building. However, that renovation should involve minimal network hardware changes. When you start the conversion, you have a hard time determining where each wall plate terminates at the patch panels. You decide to follow better design procedures to make future upgrades or troubleshooting easier and also to ensure that next year's move goes more smoothly. However, your solutions should minimally impact the current network structure. Which best practices should you implement during the conversion? (Choose two.)
You should implement port labeling and patch panel labeling. This will ensure that you are able to locate individual cables at both ends of their connection.
72
ElliotA, KateB, and PayR are workstations. FileSrv is a file server, and WebSrv is a Web server. FRW1 and FRW2 are firewalls. WebSrv is on a demilitarized zone (DMZ) that is maintained between the two firewalls. Router1 connects the network to the Internet. Remote users on the Internet connect to WebSrv, and some remote users on the Internet are allowed to gain access to files on FileSrv. Users report a network connectivity problem, so you test network connectivity. ElliotA can connect to KateB and FileSrv. KateB can connect to WebSrv. WebSrv can connect to PayR and FileSrv. FileSrv cannot connect to Router1, but FileSrv can connect to FRW1 and FRW2. Internet users can connect to Router1, but they cannot connect to WebSrv. What is most likely causing the connectivity problem on the network?
The most likely cause of the network connectivity problem in this scenario is that the cable that connects Router1 to FRW2 is not properly connected to FRW2. If the cable is not properly connected, then users on the Internet will be able to contact Router1, but they will not be able to gain access to resources on WebSrv.
73
Users are reporting Internet connectivity issues. After researching, you discover that the routing protocols in use on your network are experiencing routing loops. You must prevent this from happening. What should you do?
You should implement split horizon to prevent routing loops. Split-horizon route advertisement prevents routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
74
You are designing a SOHO network for your company. You want to use the Ethernet standard that supports a data transmission rate of 1 Gbps over copper cable. Which Ethernet standard should you use on the network?
The 1000BaseCX Ethernet standard supports a data transmission rate of 1 gigabit per second (Gbps) over 150-ohm balanced copper cable.
75
You are working with a company that has a Fast Ethernet 100Base-TX network. You will be adding several new network segments to the current network. Which standards apply to this company's network? (Choose three.)
1, Two pairs of Category 5 UTP cabling 2. Maximum segment length of 100 meters (328 feet) 3. 100 Mbps data-transmission rate
76
The workstations on the network cannot connect to the Internet. You can ping the router from the Internet. The workstations and server can connect to each other. Where is the problem most likely to exist?
Because the workstations and the server can connect to each other, you know that all the configurations are correct within the local area network (LAN). Because you can ping the router from the Internet, you know that one side of the router is functioning properly.
77
You instruct a user to issues the ipconfig command with the /release and /renew options. In which two situations would it be appropriate to ask a user to do this? (Choose two.)
1. when the result of running the ipconfig /all command indicates a 169.254.163.6 address 2. when recent scope changes have been made on the DHCP server
78
The network you administer is a Fast Ethernet network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter cables. The network uses Category 5 unshielded twisted-pair (CAT 5 UTP) cable. You use a 15-meter patch cable to connect a server named Shipping to a wall outlet. You connect the Shipping computer to the network, start the computer, and properly configure it. However, clients cannot connect to the Shipping server. Clients can connect to other servers on the network. What will most likely solve the connection problem?
replacing the 15-meter patch cable with a 3-meter patch cable
79
You are explaining the TIA/EIA 568A and 568B wiring specifications to a new employee. Which wiring pins contain the same colors across both specifications? (Choose all that apply.)
In both the (TIA) / (EIA) 568A and 568B specifications, Pins 4, 5, 7, and 8 contain the same colors.
80
Your company has implemented a firewall that only examines the packet header information. Of which type of firewall is this an example?
packet-filtering firewall
81
To segregate employee traffic and guest traffic on your wireless network, you have decided to implement a plan whereby guest traffic is quarantined in a separate part of the network. All employees have company-issued devices. What can you implement to ensure that only employees have access to the non-quarantined areas of the wireless network?
Media Access Control (MAC) filtering allows the administrator to restrict device access to the network based on the MAC address associated with the Network Interface Card (NIC) on that device.
82
Currently, your company uses IPv4 across its enterprise. Your company is considering using IPv6 instead of IPv4. Which improvements does IPv6 provide over IPv4? (Choose two.)
1. Some header fields have been dropped or made optional. | 2. The IP header options allow more efficient forwarding and less rigid length limits.
83
You are working on the 196.11.200.71/18 client in a network. What is the base network ID for this network?
The IP address 196.11.200.71/18 is an example of a "slash x" network, also known as Classless Interdomain Routing (CIDR) notation.
84
You need to create an encrypted remote terminal connection with a UNIX computer. Which protocol should you use?
Secure Shell (SSH) is used to create an encrypted remote terminal connection with a UNIX computer.
85
You need to deploy a fiber distribution panel offer for datacenter, remote office, or local area networking use. Which of the following features are NOT important for such uses? (Choose all that apply.)
1. Support for GBIC connectors | 2. Support for SFP+
86
You use HTTPS to secure your e-commerce website. You suspect an external breach has occurred. What should you do to enhance transaction security?
You should be concerned with generating new keys. If a breach has occurred, and the attacker has managed to obtain the keys, generating new keys will keep the attacker from using the stolen keys again.
87
Which of the following would be used to help defend against a man-in-the-middle attack?
DHCP snooping prevents an unauthorized DHCP server from issuing IP addresses to clients.
88
You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment, the accounting department is flooding the network with a high volume of data, which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department?
A bridge provides a quick and low-cost solution for dividing a network into different segments for the purposes of reducing network traffic.
89
One of your branch offices is located on two non-adjacent floors in an office building. You have been given permission to route a communications link between the two floors using existing conduit in the building's elevator shaft. Your current cabling plan calls for TP wiring on each of the two floors, but the distance between them is more than 90 meters. You need to interconnect the two floors using fiber optic cable in the cheapest manner possible. Which of the following should you deploy between the wiring centers on each floor?
You should deploy media converters between the wiring centers on each floor. By definition, a media converter maintains network characteristics, but permits dissimilar media to be linked together.
90
You have reconfigured your network to change the cable type used on one of your subnets from Cat5 to Cat6. Which change configuration management documentation should you revise? (Choose all that apply.)
1. Network Baseline | 2. Physical Network Diagram.
91
Which protocol is categorized as an Exterior Gateway Protocol (EGP)?
Border Gateway Protocol (BGP) is categorized as an EGP.
92
You want to enable port authentication on your network switches. On which setting is port authentication based?
Port authentication on your network switches is based on the switch's MAC address.
93
A contractor is unable to connect to your wireless network using his 802.11g wireless adapter. What is the most likely problem?
It is most likely that you have an 802.11a network because 802.11g devices are incompatible with 802.11a networks.
94
You are creating a wireless network for your company. You need to implement a wireless protocol that provides maximum security to protect against wireless attack. However, you must provide support for older wireless clients. Which protocol should you choose?
You should implement Wi-Fi Protected Access (WPA). WPA was created to fix core problems with WEP. WPA is designed to work with older wireless clients while implementing the 802.11i standard.
95
You are nearing the completion of a project that involves implementing a new network infrastructure and upgrading the operating systems running on your network servers. Currently, static IP addresses and HOSTS files are used. The upgrade has included implementing DNS, implementing DHCP, and moving servers and other resources to a new location with new IP addresses. However, now you cannot access the resources that were moved using their host names from any of the client workstations. You can access them by their IP addresses. What should you do first?
Workstations read entries in their HOSTS files before making requests to DNS.
96
Which option is a critical metric in preventive maintenance that would allow you to schedule the replacement of a component at a convenient time, as opposed to waiting for the component to fail at an inopportune time?
Mean Time Between Failures (MTBF) is the average, or mean, time between failures on a device or system.
97
Your company's IT department needs to provide field engineers with remote GUI-based access to their in-office desktop PCs over the Internet. Engineers could use Windows, Linux, iOS, and Android on their remote devices with a mix of MacOS and Windows on the in-office desktops. Which of the following remote access tools offers the best no-cost option?
Virtual Network Computing (VNC) is correct for many reasons.
98
Which two guidelines are the best to implement for passwords according to CompTIA guidelines? (Choose two.)
1. Configure passwords to change periodically. | 2. Create passwords that contain at least one symbol.
99
What is the difference between an exploit and a vulnerability?
When comparing exploits vs. vulnerabilities, a vulnerability is a flaw or weakness, and an exploit takes advantage of that flaw.