Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA JK0-023 CompTIA Network+ certification Exam Practice Test

Demo: 140 questions
Total 1112 questions

CompTIA Network+ certification Questions and Answers

Question 1

Logically separating the ports on a switch without physically separating them can be done using which of the following?

Options:

A.

Routing tables

B.

Hub logic

C.

Spanning tree protocol

D.

VLANs

Question 2

Which of the following TCP/IP model layers combines four OSI model layers?

Options:

A.

Application Layer

B.

Internet Layer

C.

Transport Layer

D.

Network Interface Layer

Question 3

Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?

Options:

A.

Wide Area Network

B.

NAT

C.

Virtual PBX

D.

Virtual LAN

Question 4

Which of the following DNS records would be queried to locate a company’s mail server?

Options:

A.

A

B.

MX

C.

AAAA

D.

CNAME

Question 5

A network technician has determined a managed network switch has failed. The technician knows how to install a new switch, but not how to properly configure it. Which of the following troubleshooting steps should the technician take NEXT?

Options:

A.

Escalate the problem

B.

Identify potential effects

C.

Test the theory to determine cause

D.

Establish a plan of action to resolve the problem

Question 6

Which of the following is considered a routing metric?

Options:

A.

Hop count

B.

QoS

C.

Subnet size

D.

IP address

Question 7

An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?

Options:

A.

25

B.

53

C.

110

D.

443

Question 8

Frame relay occurs at which of the following layers of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 4

D.

Layer 6

Question 9

Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?

Options:

A.

RTP

B.

NTP

C.

TFTP

D.

ARP

Question 10

Which of the following routing protocols utilizes the DUAL algorithm for determining best path?

Options:

A.

EIGRP

B.

RIPv2

C.

OSPF

D.

RIP

Question 11

Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?

Options:

A.

IS-IS

B.

OSPF

C.

BGP

D.

RIP

Question 12

At which of the following layers of the OSI model do packets exist?

Options:

A.

Network

B.

Session

C.

Data Link

D.

Transport

Question 13

Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO).

Options:

A.

Physical

B.

Session

C.

Data Link

D.

Network

E.

Transport

Question 14

At which of the following layers do IP addresses exist?

Options:

A.

TCP/IP model Internet layer

B.

OSI model Data Link layer

C.

TCP/IP model Transport layer

D.

OSI model Physical layer

Question 15

Which IEEE protocol is used with VLAN technology?

Options:

A.

802.11a

B.

802.11b

C.

802.1m

D.

802.1q

Question 16

Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

Options:

A.

Switch

B.

Proxy Server

C.

Router

D.

VPN Concentrator

Question 17

IP address based routing occurs on which of the following layers of the OSI model?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Question 18

Which of the following is used to describe trunking VLANs on a network?

Options:

A.

802.11a

B.

802.11i

C.

802.1q

D.

802.1x

Question 19

Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of the following would be the NEXT step in the troubleshooting process?

Options:

A.

Implement the solution

B.

Establish a plan

C.

Document findings

D.

Escalate the issue

Question 20

Which of the following ports would have to be allowed through a firewall for NTP to pass on its default port?

Options:

A.

123

B.

143

C.

153

D.

163

Question 21

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

Options:

A.

Application

B.

Physical

C.

Presentation

D.

Transport

E.

Data Link

F.

Network

Question 22

Which of the following protocols is MOST commonly associated with VoIP?

Options:

A.

LDAP

B.

HTTPS

C.

SIP

D.

SCP

Question 23

Which of the following is the usual number of bits for the host identifier part of an IPv6 address?

Options:

A.

16

B.

32

C.

48

D.

64

Question 24

Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?

Options:

A.

Verify full system functionality and if applicable implement preventative measures.

B.

Implement the solution or escalate as necessary.

C.

Document findings, actions, and outcomes.

D.

Establish a theory of probable cause (e.g. question the obvious).

Question 25

At which of the following layers of the OSI model does ASCII work?

Options:

A.

Session

B.

Transport

C.

Presentation

D.

Application

Question 26

Frames are the Protocol Data Unit for which of the following layers of the OSI model?

Options:

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Question 27

Which of the following protocols is Kim, a user, utilizing if no handshake or data reliability are required?

Options:

A.

TCP

B.

FTP

C.

TFTP

D.

UDP

Question 28

Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?

Options:

A.

The transport OSI model layer and the transport TCP/IP model layer.

B.

The transport OSI model layer and the Internet TCP/IP model layer.

C.

The network OSI model layer and the transport TCP/IP model layer.

D.

The network OSI model layer and the Internet TCP/IP model layer.

Question 29

A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

Options:

A.

WINS

B.

QoS

C.

NAT

D.

DHCP

Question 30

Companies trying to cut down on constant documentation of IP addresses could use which of the following?

Options:

A.

Longer lease times

B.

More reservations

C.

Larger scopes

D.

Dynamic IP addressing

Question 31

Drag and drop each networking tool to the MOST appropriate descriptor. Each tool may only be used once.

Options:

Question 32

A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).

Options:

A.

Preventing dictionary attacks on user passwords

B.

Reducing spam from outside email sources

C.

Shielding servers from attacks on internal services

D.

Blocking external probes for vulnerabilities

E.

Directing DNS queries to the primary server

Question 33

A user wants to send information and ensure that it was not modified during transmission. Which of the following should be implemented?

Options:

A.

MAC filtering

B.

Digital signatures

C.

MS-CHAP

D.

CHAP

Question 34

Which of the following network protocols is used to transport email across the Internet?

Options:

A.

NTP

B.

SSH

C.

SMTP

D.

SNMP

Question 35

Which of the following is a square shaped fiber connector that is slightly smaller than a standard copper network cable connector?

Options:

A.

BNC

B.

FSMA

C.

MT-RJ

D.

ST

Question 36

In a SOHO environment, placing a VoIP unit on the outside edge of a LAN router enhances which of the following network optimization methods?

Options:

A.

Load balancing

B.

Quality of service

C.

Fault tolerance

D.

Traffic shaping

Question 37

Which of the following cable types is unshielded?

Options:

A.

STP

B.

Twinax

C.

UTP

D.

Coax

Question 38

A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?

Options:

A.

Fiber optic

B.

Wireless

C.

CAT5e

D.

CAT3

Question 39

Which of the following is used to allow multiple sources on a single optical cable?

Options:

A.

HSPA+

B.

MIMO

C.

DWDM

D.

SONET

Question 40

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

Options:

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Question 41

Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass on its default port?

Options:

A.

110

B.

123

C.

143

D.

443

Question 42

A DSL modem connects to the provider’s network using which of the following authentication techniques?

Options:

A.

PoE

B.

MS-CHAP

C.

PPPoE

D.

EAP

Question 43

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?

Options:

A.

OTDR

B.

Multimeter

C.

Punch down tool

D.

Temperature monitor

Question 44

Which of the following firewall rules will block destination telnet traffic to any host with the source IP address 1.1.1.2/24?

Options:

A.

Deny any source host on source port 23 to destination any

B.

Deny any source network 1.1.1.0/24 to destination any on port 23

C.

Deny source host 1.1.12 on source port 23 to destination any

D.

Deny any source network 1.1.1.0/24 with source port 23 to destination any

Question 45

A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?

Options:

A.

PoE

B.

Layer 3 switching

C.

STP

D.

VLAN

Question 46

Several users from the same building are reporting connectivity issues. The SFP at that building’s IDF switch is showing a link light, but there is no link light to the corresponding switch’s SFP at the MDF. Which of the following is the MOST likely cause?

Options:

A.

A crossover cable is being used.

B.

DB loss is too high on all strands.

C.

Only TX or RX strand is working.

D.

TX and RX are reversed.

Question 47

A technician replaces a customer’s router, and is now unable to ping the ISP’s gateway. Which of the following should the technician check?

Options:

A.

The arp table of the new customer’s router.

B.

The route table of the next-hop router.

C.

The route table of the new customer’s router.

D.

The arp table of a network user.

Question 48

A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue?

Options:

A.

Identify the problem.

B.

Establish a plan of action to resolve the problem.

C.

Establish a theory of probable cause.

D.

Implement preventative measures.

Question 49

Which of the following is a Class A IP address?

Options:

A.

10.4.0.1

B.

169.254.0.1

C.

192.168.0.1

D.

254.200.0.1

Question 50

A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?

Options:

A.

Check for switching loops between core and distribution switches.

B.

Check whether an incorrect VLAN has been assigned to the new distribution switch.

C.

Check for inconsistent or missing routes between the core and distribution switches.

D.

Check whether the GBIC was set to multi-mode instead of single-mode SFP.

Question 51

Several users are reporting that they are unable to connect to the network. After further investigation, the network administrator notices that a newly configured Layer 2 device lost its configuration. Which of the following MOST likely caused the issue?

Options:

A.

Wrong default gateway

B.

Wrong DNS

C.

Switching loop

D.

Power failure

Question 52

A network administrator suspects an employee of using the company’s Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?

Options:

A.

Syslog server

B.

Toner probe

C.

OTDR

D.

Packet sniffer

Question 53

Which of the following protocols are used to connect devices in a secure manner? (Select TWO).

Options:

A.

TELNET

B.

SSH

C.

RDP

D.

HTTP

E.

DNS

F.

FTP

Question 54

In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

Options:

A.

NMAP

B.

ping

C.

nslookup

D.

tracert

Question 55

A network administrator is configuring PXE boot to reimage a computer lab. Which of the following must be configured on the existing DHCP server to specify the IP address of the imaging server from which the clients must boot?

Options:

A.

Scope

B.

Reservation

C.

Option

D.

Lease

Question 56

In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).

Options:

A.

VLAN configuration error

B.

Cables too short

C.

Cable crosstalk

D.

Incorrect channel

E.

EMI

F.

Wrong subnet mask

Question 57

A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?

Options:

A.

arp

B.

ipconfig

C.

tracert

D.

route

Question 58

Kim, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?

Options:

A.

MS-CHAP

B.

Kerberos

C.

TACACS+

D.

PKI

Question 59

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion:

msgUsername:

msgAuthenticationParameters:

msgPrivacyParameters:

msgData:

data: get-request

request-id:

error-status: noError (0)

error-index: 0

variable-bindings: 0 items

Options:

A.

SNMPv3

B.

SSH

C.

HTTP

D.

SNMPv1

Question 60

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

Options:

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

Question 61

Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based on each device’s MIB. Which of the following should she use?

Options:

A.

SNMP

B.

Traffic analysis

C.

Syslog

D.

Asset management

Question 62

Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?

Options:

A.

Cable tester

B.

Toner probe

C.

Cable crimper

D.

Punch down tool

Question 63

Which of the following network optimization methods would be BEST to implement to increase bandwidth for an internal streaming video server?

Options:

A.

ISDN

B.

QoS

C.

Upgrade to 10baseT

D.

Buffer overflow

Question 64

Kurt, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this?

Options:

A.

History logs

B.

Event logs

C.

Syslog server

D.

Traffic analyzer

Question 65

A technician is unable to easily trace physical connections within a network rack. Which of the following practices would save time in the future?

Options:

A.

Change management

B.

Cable management

C.

Asset management

D.

Setting baselines

Question 66

Which of the following network performance methods would Lisa, a technician, use with SIP phones?

Options:

A.

CARP

B.

Load balancing

C.

QoS

D.

Caching engines

Question 67

An administrator is attempting to troubleshoot a program that is unable to resolve IP addresses from FQDNs. Which of the following commands is used to check reverse DNS settings?

Options:

A.

dig

B.

ifconfig

C.

nbtstat

D.

route

Question 68

Karen, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads. Which of the following protocols will the tool use to show the necessary information?

Options:

A.

SNMP

B.

NTP

C.

SIP

D.

PPTP

Question 69

Which of the following is used to restrict access according to user policies?

Options:

A.

Content filter

B.

DHCP server

C.

DNS server

D.

VPN concentrator

Question 70

Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).

Options:

A.

Proxy server

B.

Traffic shaping

C.

Caching engines

D.

Load balancing

E.

Quality of service

Question 71

An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed?

Options:

A.

Load balancing

B.

VPN concentrator

C.

Caching server

D.

Fault tolerance

Question 72

An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed?

Options:

A.

Proxy Server

B.

Load Balancer

C.

VPN Concentrator

D.

Web-Application Firewall

Question 73

Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use?

Options:

A.

Intrusion detection software

B.

PoE

C.

Packet sniffer

D.

Intrusion prevention software

Question 74

Sandy, a network technician, is troubleshooting connectivity to a server at a remote office. Which of the following utilities should be used to locate the network issue?

Options:

A.

ipconfig

B.

arp

C.

tracert

D.

netstat

Question 75

Which of the following would be used on a network to ensure access to resources if a critical host becomes unavailable?

Options:

A.

QoS

B.

CARP

C.

VLAN

D.

DHCP server

Question 76

Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?

Options:

A.

Syslog files

B.

Honeypot

C.

Network sniffer

D.

tracert

Question 77

A content filter is MOST likely installed on which of the following servers?

Options:

A.

Proxy server

B.

TACACS+ server

C.

DNS server

D.

DHCP server

Question 78

Which of the following network performance optimization methods allows for frequently accessed sites to be housed locally, thereby reducing bandwidth requirements?

Options:

A.

Load balancing

B.

Traffic policing

C.

Caching engines

D.

Traffic shaping

Question 79

A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Lisa, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement?

Options:

A.

Syslog

B.

RADIUS

C.

IPSec

D.

Network sniffer

Question 80

Karen, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable?

Options:

A.

Protocol analyzer

B.

Toner probe

C.

Cable certifier

D.

Cable stripper

Question 81

A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?

Options:

A.

Router firewall

B.

Ping and traceroute

C.

Throughput tester

D.

Protocol analyzer

Question 82

A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO).

Options:

A.

Loopback plug

B.

Multimeter

C.

OTDR

D.

Crimper

E.

Cable tester

F.

TDR

Question 83

Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?

Options:

A.

VLAN tags

B.

SNMP

C.

Packet sniffer

D.

Syslog

Question 84

A technician wants to send management information from devices on the network to a central server and have it encrypted in the process. Which of the following protocols can be used?

Options:

A.

SNMPv3

B.

FTP

C.

TFTP

D.

Telnet

Question 85

The network technician is troubleshooting a connectivity issue on a CAT5 cable with a wire map and notices that only pins 1, 3, and 6 are mapping correctly. Which of the following pins are open and keeping traffic from flowing correctly?

Options:

A.

2

B.

4

C.

5

D.

8

Question 86

In the 2.4GHz range, which of the following channel combinations are non-overlapping?

Options:

A.

1, 6, 11

B.

2, 7, 10

C.

2, 8, 13

D.

3, 6, 9

Question 87

Which of the following 802.11 standards transmits the signals the GREATEST distance?

Options:

A.

a

B.

b

C.

g

D.

n

Question 88

Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover?

Options:

A.

100 kilometers (62 miles)

B.

10 kilometers (6 miles)

C.

1000 meters (3281 feet)

D.

100 meters (328 feet)

Question 89

Which of the following cable types is employed to protect against interference in the physical environment or when security is a concern?

Options:

A.

STP

B.

RG-6

C.

Fiber

D.

RG-59

Question 90

The network technician needs to install fiber cabling to connect two buildings less than 984 feet (300 meters) apart. Which of the following fiber types should be installed?

Options:

A.

Singlemode

B.

Multimode

C.

Crossover

D.

F-Connector

Question 91

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?

Options:

A.

T1 crossover

B.

Singlemode fiber

C.

CAT6a

D.

Coaxial

Question 92

Which of the following components of wiring distribution is referred to as the core communications closet for an organization?

Options:

A.

MDF

B.

Smart jack

C.

IDF

D.

Demarc extension

Question 93

Joe, a technician, is troubleshooting connectivity issues with a new data circuit. Joe verifies that the ST fiber jumper is good. Which of the following is the problem?

Options:

A.

TX/RX reversed

B.

Interference

C.

Cable length

D.

Bad connectors

Question 94

Which of the following has a DB-9 connector?

Options:

A.

SC

B.

RS-232

C.

LC

D.

RJ-45

Question 95

Which wireless standard works at a MAXIMUM data rate of up to 11Mbps?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.1q

Question 96

A user’s network connection is slow. After testing the cabling, the cable tester shows that only pins 1, 2, 3 and 6 are being used. After accurately terminating both ends, the tester displays the same results. Which of the following is the MOST likely cause?

Options:

A.

DB loss on the cable

B.

Interference

C.

Split cable

D.

Distance limitations

Question 97

A small office needs to connect one new system to their network in a distant office, but does not have the resources to install a new Ethernet wall jack, and does not want to use wireless. Which of the following is a simple, cost effective option for providing connectivity?

Options:

A.

SONET

B.

Multimode fiber

C.

802.11n

D.

Broadband over Power Line

Question 98

Which of the following defines the pinout of an 8P8C eight pin modular jack for a CAT6a cable?

Options:

A.

568B

B.

RJ-11

C.

RJ-45

D.

RS-232

Question 99

A large corporate office is looking to place smaller network closets around campus to handle switching for remote workstations. To which of the following is this referring?

Options:

A.

MDF

B.

VPN

C.

RDP

D.

IDF

Question 100

Which of the following technologies allows more than two transceivers with an access point?

Options:

A.

MIMO

B.

FIFO

C.

802.1x

D.

WPA

Question 101

Which of the following connector types would require a punch down tool to attach a network cable to it?

Options:

A.

F-connector

B.

ST

C.

110 block

D.

RJ-45

Question 102

A user’s new computer is not able to connect to the network at all. Upon further investigation, Karen, the administrator, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable in the IDF, which of the following is the MOST likely cause of the problem?

Options:

A.

Other end of the cable is terminated with a 568B configuration

B.

Trunk port on the switch is disabled

C.

Other end of the cable is terminated with a 568A configuration

D.

Wall jack needs to be replaced with a smart jack

Question 103

Which of the following cables covers the LONGEST distance?

Options:

A.

10GBaseT

B.

10GBaseFR

C.

100BaseTX

D.

1000BaseX

Question 104

Users notice a problem with their network connectivity when additional lights are turned on. Which of the following would be the cause for this problem?

Options:

A.

DDOS

B.

Cross talk

C.

Open short

D.

EMI

Question 105

The wireless network inside a large training room has been saturated with client requests. Most of the client requests are coming from smartphones and laptops. The network technician has been tasked with increasing the performance of the wireless access point. Which of the following would BEST accomplish this?

Options:

A.

Switch the channel

B.

Change frequencies

C.

Channel bonding

D.

Increase the signal

Question 106

Which of the following has the HIGHEST data rate speed?

Options:

A.

T1

B.

ADSL

C.

SDSL

D.

OC-3

Question 107

Which of the following WAN technologies has a MAXIMUM speed of 155.52Mbps?

Options:

A.

OC-3

B.

T3

C.

OC-12

D.

E1

Question 108

The phone company has provided a channelized T1 line. Which of the following should this line be connected to?

Options:

A.

Switch

B.

CSU/DSU

C.

IDF

D.

MDF

Question 109

Zach, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?

Options:

A.

CAT3

B.

STP

C.

Coaxial

D.

Fiber

Question 110

After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause?

Options:

A.

Cable placement

B.

Crosstalk

C.

Bad wiring

D.

Cable length

Question 111

When examining a suspected faulty copper network cable, Kim, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?

Options:

A.

DB loss

B.

Dispersion

C.

Collisions

D.

Cross-talk

Question 112

Which of the following network topologies describes a network where each node is connected to multiple devices?

Options:

A.

Mesh

B.

Bus

C.

Star

D.

Ring

Question 113

Which of the following attack types is being used if the originating IP address has been spoofed?

Options:

A.

Ping flood

B.

Trojan

C.

Smurf

D.

Worm

Question 114

Which of the following BEST describes a firewall that can be installed via Add/Remove programs on a Windows computer?

Options:

A.

Managed

B.

Software

C.

Hardware

D.

Wireless

Question 115

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

Options:

A.

Allow ANY to 192.168.0.15 port 21

B.

Allow ANY to 192.168.0.15 port 22

C.

Allow ANY to 192.168.0.15 port 80

D.

Allow ANY to ANY port ANY

Question 116

A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?

Options:

A.

Stateful inspection

B.

NAT/PAT

C.

Port security

D.

Implicit deny

Question 117

Which of the following is needed when using WPA2-Enterprise wireless encryption?

Options:

A.

TFTP

B.

RADIUS

C.

LDAP

D.

IPSec

Question 118

Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?

Options:

A.

PKI

B.

TACACS+

C.

CHAP

D.

SSH

Question 119

An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

Options:

A.

Packet sniffer

B.

Honeypot

C.

Port mirroring

D.

IPS

E.

Port scanner

F.

IDS

Question 120

A network administrator is tasked with blocking unwanted spam which is being relayed by an internal email server. Which of the following is the FIRST step in preventing spam that is originating from bots on the network?

Options:

A.

Closing off port 25 on the firewall

B.

Closing off port 53 on the firewall

C.

Turning off the SMTP service on the email server

D.

Turning off the IMAP service on the email server

Question 121

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

Options:

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

Question 122

Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective?

Options:

A.

Content filtering

B.

Port filtering

C.

MAC filtering

D.

IP filtering

Question 123

Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?

Options:

A.

Evil twin

B.

Honeypot

C.

DMZ

D.

Honeynet

Question 124

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly. Which of the following would be the NEXT step in setting up this secure wireless network?

Options:

A.

Decrease signal strength on the antenna

B.

Change the wireless channel on the WAP

C.

Change the device placement to further obfuscate the signal

D.

Set up encryption on the WAP and clients

Question 125

Which of the following would a network administrator use to scan a network for vulnerabilities?

Options:

A.

ICMP

B.

NMAP

C.

ACL

D.

TCPDUMP

Question 126

A network administrator is setting up a WAP and wants to disable the ability of gaining access from the parking garage. Which of the following should the network administrator review?

Options:

A.

Signal strength

B.

SSID name

C.

WPA2 encryption

D.

WEP encryption

Question 127

Which of the following describes blocking traffic based upon the Layer 3 sources address of the traffic?

Options:

A.

Port filtering

B.

IP filtering

C.

MAC filtering

D.

Application filtering

Question 128

Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?

Options:

A.

Device placement

B.

MAC address filtering

C.

User authentication

D.

Encryption protocols

Question 129

A network administrator wishes to limit the number of potential wireless clients to 20 on a specific AP. Which of the following settings needs to be changed?

Options:

A.

The network address translation IP range.

B.

The signal strength of the router.

C.

The DCHP lease time.

D.

The number of allowable MAC addresses.

Question 130

Which of the following wireless security measures, although widely implemented, does not provide strong security?

Options:

A.

IPSec

B.

WPA2

C.

MAC address filtering

D.

802.1x

Question 131

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

Options:

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

Question 132

A technician working for a company with a wireless network named WirelessA notices a second wireless network named WirelessB. WirelessB is MOST likely a:

Options:

A.

Man-in-the-middle attack.

B.

Rogue access point.

C.

Evil twin.

D.

Packet sniffer.

Question 133

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

Options:

A.

Evil twin

B.

War chalking

C.

Buffer overflow

D.

Virus

Question 134

Which of the following attacks would allow an intruder to do port mapping on a company’s internal server from a separate company server on the Internet?

Options:

A.

SYN flood

B.

Teardrop

C.

Smurf

D.

FTP bounce

Question 135

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on the network. Which of the following is the MOST likely cause of the problem?

Options:

A.

The network cable connecting the NAS to the network switch is bad.

B.

The network port that the appliance is connected to is assigned to the wrong VLAN.

C.

Port security on the Ethernet switch has disabled the port.

D.

Firewall needs to be updated for the new NAS device.

Question 136

A user receives a phone call at home from someone claiming to be from their company’s IT help desk. The help desk person wants to verify their username and password to ensure that the user’s account has not been compromised. Which of the following attacks has just occurred?

Options:

A.

Evil twin

B.

Phishing

C.

Man-in-the-middle

D.

Social engineering

Question 137

A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?

Options:

A.

Stateful inspection

B.

WEP

C.

WPA

D.

Open with EAP

Question 138

Joe, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server’s private IP. Which of the following can Joe implement?

Options:

A.

DNS

B.

NAT

C.

PKI

D.

RAS

Question 139

A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?

Options:

A.

Man-in-the-middle

B.

DDoS

C.

Evil twin

D.

War driving

Question 140

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

Options:

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

Demo: 140 questions
Total 1112 questions