Exam 10: CompTIA Network+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker's IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Choose two.)

(Multiple Choice)
4.9/5
(39)

During a weekend event, several people reported they were unable to get onto the wireless network. On Monday, the technician could not find a problem. Which of the following is the MOST likely cause?

(Multiple Choice)
4.8/5
(25)

A network administrator needs to access a remote site and log into the site switch using secure methods. The administrator first has to gain access to the server GUI. Which of the following access control methods will be used?

(Multiple Choice)
5.0/5
(32)

A technician discovers that multiple switches require a major update. Which of the following policies should be followed?

(Multiple Choice)
4.8/5
(39)

A user is reporting poor network performance. A network technician starts by looking at port statistics on that user's connected switchport. The technician notices there is a high level of collisions on the port. Which of the following is the MOST likely cause?

(Multiple Choice)
4.8/5
(27)

A network engineer at a large company is restricting Internet browsing on the corporate WAN to only business-related external websites. Which of the following is the BEST solution to achieve this goal while avoiding the need to configure this restriction on each PC?

(Multiple Choice)
4.9/5
(33)

A network administrator gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so the administrator can troubleshoot this issue from home? (Choose two.)

(Multiple Choice)
4.9/5
(28)

Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?

(Multiple Choice)
4.8/5
(38)

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

(Multiple Choice)
4.7/5
(30)

A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)

(Multiple Choice)
4.8/5
(33)

Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?

(Multiple Choice)
4.8/5
(29)

A network support specialist is setting up wireless networks for several small companies that are leasing adjacent spaces in an office building. The network support specialist has already configured an access point for each office with WPA2-AES encryption and minimized any overlap of the wireless channels. Several of the companies have expressed concerns about performance and security issues due to the high volume of wireless networks being installed in close proximity. Which of the following actions will BEST mitigate the companies' concerns?

(Multiple Choice)
4.9/5
(27)

A network technician is helping to install 50 Cat6a drops from users' computers into an IDF. Which of the following is the termination point at the IDF?

(Multiple Choice)
4.9/5
(42)

A network technician has established an internal HTTP connection from a browser to the web server to access an organization's intranet services. In which of the following layers of the OSI model is the HTTP protocol found?

(Multiple Choice)
4.8/5
(34)

A network administrator needs to extend an organization's network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

(Multiple Choice)
4.9/5
(34)

The process of searching for open or weakly secured wireless networks in a geographic area is known as:

(Multiple Choice)
4.9/5
(39)

Which of the following can be used to decrease latency during periods of high utilization of a firewall?

(Multiple Choice)
4.8/5
(37)

After deployment of a second network link to load balance the network traffic, the quality of voice calls degrades. The network administrator discovers the voice packets are arriving at uneven intervals that cannot be handled by the voice application buffer. Which of the following actions will improve the quality of the voice calls?

(Multiple Choice)
4.8/5
(32)

A home user is unable to get to the Internet from a workstation that is connected to a wireless network. When reviewing the results of the ipconfig command, the user wants to verity the default gateway is correct. Which of the following devices should be the gateway?

(Multiple Choice)
4.8/5
(36)

A company hires another firm to test the integrity of its information security controls. This is an example of:

(Multiple Choice)
4.8/5
(35)
Showing 541 - 560 of 829
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)