Exam 10: CompTIA Network+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A network technician is troubleshooting a connectivity issue and determines the cause is related to the VLAN assignment on one of the access switches in the network. After resolving the issue, the network technician decides to update the documentation to refer to the correct VLAN. Which of the following should the technician update?

(Multiple Choice)
4.8/5
(32)

Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?

(Multiple Choice)
4.8/5
(35)

A technician set up a new SOHO network recently. The installed router has four Ethernet ports, however, the customer has seven devices that need wired connections. Which of the following should the technician do to BEST meet the customer's requirements?

(Multiple Choice)
4.8/5
(38)

While testing an ACL on the default gateway router to allow only web browsing, ports TCP 80 and TCP 443 were the only ports open. When tested, no websites were accessible via their URLs inside the network. Which of the following configurations should be added to the ACL?

(Multiple Choice)
4.7/5
(30)

According to the OSI model, at which of the following layers is data encapsulated into a packet?

(Multiple Choice)
4.9/5
(38)

Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use. The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST solution?

(Multiple Choice)
4.8/5
(26)

A network technician is adding a 10/100 switch with RJ45 connectors to the company network to accommodate new computers being added to a network segment. There is no auto-MDIX port on the switch that needs to be connected to the existing switch on the segment. Which of the following should the technician use to make the connection?

(Multiple Choice)
4.8/5
(30)

A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

(Multiple Choice)
4.9/5
(43)

A recently constructed building makes use of glass and natural light. Users in the building are reporting poor cellular connectivity and speeds. Which of the following is MOST likely the cause?

(Multiple Choice)
4.8/5
(40)

A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?

(Multiple Choice)
4.9/5
(32)

A large company uses an AAA server to manage network device access. The engineers can use their domain credentials to access all other servers. Currently, the network engineers cannot access the AAA server using domain credentials, but they can access it using a local account. Which of the following should the engineers update?

(Multiple Choice)
4.8/5
(28)

Management requires remote access to network devices when the ISP is down. Which of the following devices would provide the BEST solution?

(Multiple Choice)
4.8/5
(38)

A technician is performing a maintenance task on a weekly basis and wants to ensure the task is properly documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?

(Multiple Choice)
4.8/5
(37)

A technician is helping to secure a wireless network at a home office and is looking to prevent unauthorized devices from connecting to the network. Which of the following would be BEST for the technician to do? (Choose two.)

(Multiple Choice)
4.9/5
(41)

A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?

(Multiple Choice)
4.9/5
(40)

A new building needs to be joined to an existing network, but management has decided that running fiber is too expensive. Since the buildings are about 1000ft (305m) apart, the IT department has been asked to propose alternatives. Which of the following is the BEST device to add to each building to facilitate the extension of the network while meeting budgetary demands?

(Multiple Choice)
4.9/5
(31)

A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away in the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?

(Multiple Choice)
4.8/5
(31)

A company's server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?

(Multiple Choice)
4.8/5
(37)

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

(Multiple Choice)
4.8/5
(25)

A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)

(Multiple Choice)
4.8/5
(31)
Showing 301 - 320 of 829
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)