Exam 10: CompTIA Network+

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following is an object held within an MIB?

(Multiple Choice)
4.9/5
(32)

A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

(Multiple Choice)
4.9/5
(33)

A flood disables the equipment in a company's server room. When implementing the disaster recovery plan, all operations are immediately transitioned to another location with momentary downtime. This is an example of a:

(Multiple Choice)
4.8/5
(33)

Which of the following DNS record types allows IPv6 records to be resolved to DNS names?

(Multiple Choice)
4.8/5
(36)

A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?

(Multiple Choice)
4.8/5
(33)

A technician arrives at a new building to find cabling has been run and terminated, but only the wall ports have been labeled. Which of the following tools should be utilized to BEST facilitate labeling the patch panel?

(Multiple Choice)
4.8/5
(31)

A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)

(Multiple Choice)
4.9/5
(34)

Which of the following default ports should be opened on a firewall to allow for SSH and Telnet? (Choose two.)

(Multiple Choice)
4.8/5
(38)

A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform NEXT?

(Multiple Choice)
4.8/5
(28)

A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

(Multiple Choice)
4.9/5
(30)

A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will BEST ensure unauthorized devices cannot consume the shop owner's limited Internet bandwidth?

(Multiple Choice)
4.7/5
(34)

A network technician has been asked to create secure private networks between a company's headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this?

(Multiple Choice)
4.8/5
(28)

An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is "Incomplete". Which of the following could cause this condition?

(Multiple Choice)
4.8/5
(33)

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee's computer. This type of attack is an example of:

(Multiple Choice)
4.8/5
(40)

A network technician receives a switch that is configured to support VLANs on its ports. At which of the following layers is this switch operating?

(Multiple Choice)
4.8/5
(35)

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

(Multiple Choice)
4.9/5
(32)

Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to occur most often around midday. Which of the following is the MOST likely cause?

(Multiple Choice)
4.8/5
(37)

Which of the following components should be used to provide interconnectivity between virtual machines in distinct broadcast domains inside the hypervisor's environment?

(Multiple Choice)
4.8/5
(30)

A technician has been alerted of incoming HTTP traffic on the LAN segment that should not contain any web servers. The technician has the IP address of the destination host and wants to determine if the socket for HTTP is open. Which of the following should the technician perform?

(Multiple Choice)
4.8/5
(28)

Which of the following components acts as an intermediary device between the internal user's PC and external web servers to provide caching services that save on Internet bandwidth resources?

(Multiple Choice)
4.9/5
(36)
Showing 721 - 740 of 829
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)