Appendix D CompTIA Network+ Practice Exam The following exam contains questions that are similar in content and format to the multiple-choice questions you will encounter on CompTIA’s Network+ N10-007 certification exam, released in 2018. This practice exam consists of 100 questions, all of which are multiple choice. Some questions have more than one correct answer. The number of questions from each domain reflects the weighting that CompTIA assigned to these domains in its exam objectives. To simulate taking the CompTIA Network+ certification exam, allow yourself 90 minutes to answer all the questions. 1. To ensure that your private network is always protected, you decide to install three redundant firewalls. Which of the following would allow you to assign the same IP address to all three? a. SMTP b. CARP c. SNMPv3 d. IMAP e. NTP Answer: b. CARP 2. What type of network could use the type of connector shown here? [[Insert Figure D-Q2 here]] a. 1000Base-LX b. 10GBase-T c. 100Base-T d. 1000Base-T e. 5GBase-T Answer: a. 1000Base-LX 3. While troubleshooting a workstation connectivity problem, you enter the following command: ping 127.0.0.1. The response indicates the test failed. What can you determine about that workstation? a. Its network cable is faulty or not connected to the wall jack. b. Its TCP/IP stack is not installed properly. c. It has been prevented from transmitting data past the default gateway. d. Its DHCP settings are incorrect. e. Its DNS name server specification is incorrect. Answer: b. Its TCP/IP stack is not installed properly. 4. You have been asked to help improve network performance on a store’s small office network. The network relies on two switches, two access points, and a router to connect its 18 employees to the Internet and other store locations. You decide to determine what type of traffic the network currently handles. In particular, you’re interested in the volume of unnecessary broadcast traffic that might be bogging down shared segments. Which of the following tools will help you identify the percentage of traffic made up of broadcasts? a. Port scanner b. OTDR c. Protocol analyzer d. Multimeter e. Cable tester Answer: c. Protocol analyzer 5. Which of the following standards describes a security technique, often used on wireless networks, in which a port is prevented from receiving traffic until the transmitter’s credentials are verified by an authentication server? a. EAPoL b. SSH c. RADIUS d. Kerberos e. CCMP Answer: a. EAPoL 6. Which of the following ports would be used during a domain name lookup? a. 22 b. 23 c. 53 d. 110 e. 443 Answer: c. 53 7. You are configuring a connection between two backbone switches, and you want to make sure the connection doesn’t fail or become overwhelmed by heavy traffic. Which of the following techniques would help you achieve both aims? a. Round-robin DNS b. CARP c. Clustering d. Trunking e. NIC teaming Answer: e. NIC teaming 8. As a network admin, you have decided to install additional physical security to the main office’s data room. Due to the sensitivity of the data held in this room, you decide it’s critical to ensure two-factor authentication before granting anyone access to the room. You already have a lock on the door. Which of the following physical security measures would provide 2FA? a. Smart badge b. Fingerprint scanner c. Key fob d. Video surveillance e. Proximity card Answer: b. Fingerprint scanner 9. You have installed and configured two virtual web servers and a virtual mail server on a physical server. What networking mode will you assign to each server’s vNIC to ensure that the virtual machines’ clients on the Internet can access the virtual machines? a. NAT b. Bridged c. Host-only d. Internal e. Grouped Answer: b. Bridged 10. At the beginning of the school year, students at your school must configure their computers and other devices to obtain trusted access to the student portion of the school’s network. What is this process called? a. Authenticating b. Remote wiping c. Associating d. Onboarding e. Social engineering Answer: d. Onboarding 11. When using NAT, how does an IP gateway ensure that outgoing traffic can traverse public networks? a. It modifies each outgoing frame’s Type field to indicate that the transmission is destined for a public network. b. It assigns each outgoing packet a masked ID via the Options field. c. It replaces each outgoing packet’s Source address field with a public IP address. d. It interprets the contents of outgoing packets to ensure that they contain no client-identifying information. e. It modifies the frame length to create uniformly sized frames, called cells, which are required for public network transmission. Answer: c. It replaces each outgoing packet’s Source address field with a public IP address. 12. Which of these authentication techniques only encrypts the password when transmitting sign-in credentials? a. RADIUS b. TACACS+ c. Kerberos d. Single sign-on e. Local authentication Answer: a. RADIUS 13. You are a networking technician in a radiology clinic, where physicians use the network to transmit and store patients’ diagnostic results. Shortly after a new wing, which contains X-ray and MRI (magnetic resonance imaging) machines, is added to the building, computers in that area begin having intermittent problems saving data to the file server. After you have gathered information, identified the symptoms, questioned users, and determined what has changed, what is your next step in troubleshooting this problem? a. Establish a plan of action to resolve the problem. b. Escalate the problem. c. Document findings, actions, and outcomes. d. Establish a theory of probable cause. e. Implement the solution. Answer: d. Establish a theory of probable cause. 14. The software on a firewall you recently installed on your network examines each incoming packet. It blocks or allows traffic based on a set of criteria, including source IP address, source and destination ports, and protocols. What type of system is this? Choose all that apply. a. Content-filtering firewall b. Stateful firewall c. Stateless firewall d. Packet-filtering firewall e. Application layer firewall Answer: c. Stateless firewall d. Packet-filtering firewall 15. Suppose you have created six subnets on a network that leases a group of Class C IPv4 addresses. What subnet mask must you specify in your clients’ configurations to adhere to your subnetting scheme? a. 255.255.255.6 b. 255.255.255.128 c. 255.255.255.192 d. 255.255.255.224 e. 255.255.255.0 Answer: d. 255.255.255.224 16. What would the command route del default gw 192.168.5.1 eth1 accomplish on your Linux workstation? a. Delete the default gateway’s route to the host whose IP address is 192.168.5.1 b. Remove the assignment of IP address 192.168.5.1 from the eth1 interface c. Remove the workstation’s route to the default gateway whose IP address is 192.168.5.1 d. Add a route from the workstation to the default gateway whose IP address is 192.168.5.1 e. Remove the designation of default gateway, but keep the route for the host whose IP address is 192.168.5.1 Answer: c. Remove the workstation’s route to the default gateway whose IP address is 192.168.5.1 17. From your laptop, you need to remote into a switch to make some configuration changes. Which Transport-layer protocol and TCP/IP port should you open in Windows Firewall to make this work using Telnet? a. UDP, port 23 b. TCP, port 23 c. UDP, port 22 d. TCP, port 22 e. UDP, port 21 Answer: b. TCP, port 23 18. Recently, your company’s WAN experienced a disabling DDoS attack. Which of the following devices could detect such an attack and prevent it from affecting your network in the future? a. A honeypot b. SIEM c. HIPS d. HIDS e. NIPS Answer: e. NIPS 19. Which of the following routing protocols offer fast convergence times and can be used on both core and edge routers? Choose two. a. RIPv2 b. IS-IS c. OSPF d. BGP e. EIGRP Answer: c. OSPF; e. EIGRP 20. A friend calls you for help with his home office Internet connection. He is using an 802.11n wireless router connected to a DSL modem. The router’s private IP address is 192.168.1.1 and it has been assigned an Internet routable IP address of 76.83.124.35. Your friend cannot connect to any resources on the Internet using his new Windows workstation. You ask him to run the ipconfig command and read the results to you. He says his workstation’s IP address is 192.168.1.3, the subnet mask is 255.255.255.0, and the default gateway address is 192.168.1.10. What do you advise him to do next? a. Display his DNS information. b. Change his gateway address. c. Change his subnet mask. d. Try pinging the loopback address. e. Use the tracert command to contact the access point/router. Answer: b. Change his gateway address. 21. Your organization contracts with a cloud computing company to store some backup data. The company promises 99.999% uptime. If it lives up to its claims, what is the maximum number of minutes each year you can expect your data to be unavailable? a. Approximately 448 minutes b. Approximately 199 minutes c. Approximately 52 minutes d. Approximately 14 minutes e. Approximately 5 minutes Answer: e. Approximately 5 minutes 22. Ethernet and ATM both specify Data Link layer framing techniques. How do they differ? a. Ethernet uses CRC fields to confirm the validity of the frame, whereas ATM uses no error detection. b. Ethernet uses variably sized packets, whereas ATM uses fixed-sized cells. c. Ethernet uses synchronous transmission, whereas ATM uses asynchronous transmission. d. Ethernet uses frame headers, whereas ATM does not. e. Ethernet offers no guarantee of timely delivery, whereas ATM ensures that packets are delivered within 10 ms. Answer: b. Ethernet uses variably sized packets, whereas ATM uses fixed-sized cells. 23. What STP configuration ensures that a laptop connected to a switch cannot alter the STP paths on the network? a. BPDU filter b. BPDU guard c. Root bridge d. BID e. Designated port Answer: b. BPDU guard 24. What is the default subnet mask for the IP address 154.13.44.87? a. 255.255.255.255 b. 255.255.255.0 c. 255.255.0.0 d. 255.0.0.0 e. 0.0.0.0 Answer: c. 255.255.0.0 25. Your CFO has approved installing new backbone cabling on your school’s campus. One of the buildings is particularly far away from the others, nearly a kilometer. Which Ethernet standard will reach the distant building without the use of a repeater? a. 10GBase-T b. 1000Base-LX c. 1000Base-SX d. 10GBase-SR e. 1000Base-T Answer: b. 1000Base-LX 26. Which of the following is often used to secure data traveling over VPNs that use L2TP? a. PPTP b. PPPoE c. Kerberos d. SSH e. IPsec Answer: e. IPsec 27. You are a support technician working in a data closet in a remote office. You suspect that a connectivity problem is related to a broken RJ-45 plug on a patch cable that connects a switch to a patch panel. You need to replace that connector, but you forgot to bring an extra patch cable. You decide to install a new RJ-45 connector to replace the broken connector. Which tools must you have in order to successfully accomplish this task? Choose two. a. Punchdown tool b. Crimper c. Wire stripper d. Cable tester e. Multimeter Answer: b. Crimper; c. Wire stripper 28. You have purchased an outdoor access point capable of exchanging data via the 802.11n or 802.11ac wireless standard. According to these standards, what is the maximum distance, in meters, from the access point that wireless clients can travel and still reliably exchange data with the access point? a. 20 b. 75 c. 100 d. 250 e. 450 Answer: d. 250 29. Which of the following is a single sign-on authentication method? a. IPsec b. EAPoL c. SSL d. Kerberos e. CHAP Answer: d. Kerberos 30. Your organization has just ordered its first T1 connection to the Internet. Prior to that, your organization relied on a DSL connection. Which of the following devices must you now have that your DSL connection didn’t require? a. Modem b. CSU/DSU c. Switch d. Hub e. Router Answer: b. CSU/DSU 31. Your friend’s printer isn’t printing the document she just sent it. In what order should you perform the listed steps? a. Follow the OSI model from bottom to top to check possible causes, send a new document to the printer, determine if anything has changed on her network. b. Send a new document to the printer, follow the OSI model from bottom to top to check possible causes, ask your friend when the problem started. c. Take notes on the outcome, send a new document to the printer, determine if anything has changed on her network. d. Determine if anything has changed on her network, follow the OSI model from bottom to top to check possible causes, send a new document to the printer. e. Determine if anything has changed on her network, take notes on the outcome, send a new document to the printer. Answer: d. Determine if anything has changed on her network, follow the OSI model from bottom to top to check possible causes, send a new document to the printer. 32. A CEO fires her administrative assistant after the assistant was caught stealing company funds. Over the weekend, the administrative assistant hacks into the CEO’s private email account and steals some personal data. What type of attack did the former employee most likely use to accomplish this exploit? a. Brute force attack b. War driving c. Logic bomb d. Deauthentication e. Man-in-the-middle Answer: a. Brute force attack 33. What is the network ID for a class C network that contains the group of IP addresses from 194.73.44.10 through 194.73.44.254? a. 194.73.44.0 b. 194.73.44.1 c. 194.73.0.0 d. 194.73.44.255 e. 194.1.1.1 Answer: a. 194.73.44.0 34. Your organization is reassessing its WAN connections to determine how much more bandwidth it will need to purchase in the next two years. As a network administrator, which of the following data can you share that will help management make the right decision? a. Wiring schematic b. Performance baselines c. Logical network diagram d. Syslogs e. Change management documentation Answer: b. Performance baselines 35. You are creating a new Linux server as a virtual machine on your Windows workstation. Which of the following commands will tell you the IP address that is assigned to your virtual server? a. ipconfig /all at the Windows workstation’s command prompt b. ifconfig –a at the Linux server’s shell prompt c. iptables at the Linux server’s shell prompt d. ping at the Windows workstation’s command prompt e. ipconfig /all at the Linux server’s shell prompt Answer: b. ifconfig –a at the Linux server’s shell prompt 36. Which of the following requirements provide multifactor authentication? Choose two. a. Iris pattern and typing pattern. b. Password and name of first elementary school c. Location in a secured closet d. Smart card and key fob e. Fingerprint and name of first elementary school Answer: a. Iris pattern and typing pattern. e. Fingerprint and name of first elementary school 37. You are rearranging nodes on your Gigabit Ethernet network. Due to a necessarily hasty expansion, you have decided to supply power to a wireless router in a makeshift data room using PoE. What is the minimum cabling standard you must use to connect this wireless router to the network’s backbone? a. RG-6 b. RG-59 c. Cat 5e d. SMF e. Cat 6 Answer: c. Cat 5e 38. As you’re setting up APs in your client’s office space, you want to ensure that all work areas and the meeting room have adequate access to the network. What tool will give you the information you need? a. Geofencing b. Packet sniffer c. Bandwidth speed tester d. Wi-Fi analyzer e. Toner probe Answer: d. Wi-Fi analyzer 39. Which of the following protocols encapsulates data for transmission over VPNs? a. SFTP b. L2TP c. VNC d. TCP e. TACACS+ Answer: b. L2TP 40. Which of the following is a valid MAC address? a. C3:00:50:00:FF:FF b. 153.101.24.3 c. ::9F53 d. FE80::32:1CA3:B0E2 e. D0:00:00:00 Answer: a. C3:00:50:00:FF:FF 41. Which of the following services would be most important to disable on a Windows workstation? a. SSH b. DHCP c. Telnet d. FTP e. RDP Answer: c. Telnet 42. It’s Friday night, and you have just settled in with some hot cocoa and popcorn to watch one of your favorite movies on Netflix. Five minutes into the movie, you realize you’re getting more stressed than relaxed, and then you realize the problem is that the movie keeps lagging, buffering, and skipping. What transmission flaw is probably the source of the problem? a. Crosstalk b. Jitter c. EMI d. Latency e. Attenuation Answer: b. Jitter 43. A SIP trunk would most likely work in conjunction with which device? a. Wireless controller b. VoIP gateway c. NGFW d. VPN concentrator e. Satellite dish Answer: b. VoIP gateway 44. Which technology can SIP trunking most adequately replace? a. DMVPN b. IDS c. T1 d. PRI e. DSL Answer: d. PRI 45. Your network manager has purchased a dozen new, dual-band access points and all are configured to use the new 802.11ac standard on the 5-GHz band. These access points will be backward-compatible with older access points that run which of the following standards? Choose all that apply. a. 802.11g b. 802.11n c. 802.11b d. Bluetooth e. None of the above. Answer: a. 802.11g; b. 802.11n; c. 802.11b 46. You suspect that a machine on your network with the host name PRTSRV is issuing excessive broadcast traffic on your network. What command can you use to determine this host’s IP address? a. netstat PRTSRV b. ipconfig PRTSRV c. nslookup PRTSRV d. ifconfig PRTSRV e. iptables PRTSRV Answer: c. nslookup PRTSRV 47. You’re installing a network management system on your network and need to install software on various devices. What software must be installed on a managed device, such as a router? a. SIEM b. OID c. NMS d. Agent e. Syslog Answer: d. Agent 48. You work for a small ISP. Several of your customers have called to complain about slow responses from a popular website. You suspect that network congestion is at fault. Which TCP/IP utility would help you determine where the congestion is occurring? a. FTP b. Nslookup c. Arp d. Tracert e. Telnet Answer: d. Tracert 49. You are a network administrator for a WAN that connects two regional insurance company offices—the main office and a satellite office—to each other by a T3. The main office is also connected to the Internet using a T3. This T3 provides Internet access for both offices. To ensure that your private network is not compromised by unauthorized access through the Internet connection, you install a firewall between the main office and the Internet. Shortly thereafter, users in your satellite office complain that they cannot access the file server in the main office, but users in the main office can still access the Internet. What configurations should you check? Choose two. a. Whether the firewall has been configured to run in promiscuous mode b. Whether the firewall is placed in the appropriate location on the network c. Whether the firewall has been configured to allow access from IP addresses in the satellite office d. Whether the firewall has been configured to receive and transmit UDP-based packets e. Whether the firewall has been configured to allow Internet access over the main office’s T3 Answer: b. Whether the firewall is placed in the appropriate location on the network c. Whether the firewall has been configured to allow access from IP addresses in the satellite office 50. In IPv6, which of the following is the loopback address? a. 1.0.0.1 b. 127::1 c. FE80::1 d. ::1 e. 127.0.0.1 Answer: d. ::1 51. In the process of troubleshooting an intermittent performance problem with your network’s Internet connection, you attempt to run a tracert test to microsoft.com. The tracert response displays the first 12 hops in the route, but then presents several “Request timed out” messages in a row. What is the most likely reason for this? a. Your network’s ISP is experiencing connectivity problems. b. Microsoft’s network is bounded by firewalls that do not accept incoming ICMP traffic. c. The Internet backbone is experiencing traffic congestion. d. Your client’s TCP/IP service limits the tracert command to a maximum of 12 hops. e. Your IP gateway failed while you were attempting the tracert test. Answer: b. Microsoft’s network is bounded by firewalls that do not accept incoming ICMP traffic. 52. You are setting up a new Windows 10 client to connect with your LAN, which relies on DHCP. Which of the following must you do to ensure that the client obtains correct TCP/IP information via DHCP? a. Make certain the client’s computer name and host name are identical. b. Enter the client’s MAC address in the DHCP server’s ARP table. c. Enter the DHCP server address in the Windows TCP/IP configuration. d. Nothing; in Windows 10, the DHCP option is selected by default. e. Enter a default gateway address in the Windows TCP/IP configuration. Answer: d. Nothing; in Windows 10, the DHCP option is selected by default. 53. Due to popular demand from employees who need to roam from one floor of your office building to another, you are expanding your wireless network. You want to ensure that mobile users enjoy uninterrupted network connectivity without having to reconfigure their workstations’ wireless network connection settings as they travel throughout the office space. Which of the following variables must you configure on your new access points to match the settings on existing access points? a. Administrator password b. Scanning rate c. SSID d. IP address e. Signal strength Answer: c. SSID 54. You have installed a protocol analyzer on your laptop and connected the laptop to a switch on your network’s backbone. You want to monitor all traffic on a specific VLAN. Which feature must you configure on the switch to make this work? a. Trunking b. Port mirroring c. Looping d. Spanning Tree Protocol e. Caching Answer: b. Port mirroring 55. Which of the following does not accurately describe TACACS+ in comparison to RADIUS? a. TACACS+ relies on TCP, not UDP, at the Transport layer. b. TACACS+ is typically installed on a router or switch, rather than on a server. c. TACACS+ encrypts all information transmitted for AAA rather than just the password. d. TACACS+ was developed for proprietary use on Cisco products. e. TACACS+ operates as a software application on a remote access server. Answer: e. TACACS+ operates as a software application on a remote access server. 56. You are part of a team participating in a posture assessment of your company’s LAN. Which of the following tools or strategies will help you gain a broad understanding of your network’s security vulnerabilities? a. MIB b. War driving c. Nmap d. DHCP snooping e. CCMP Answer: c. Nmap 57. Which of the following devices separates broadcast domains? a. Router b. Switch c. Bridge d. Repeater e. Hub Answer: a. Router 58. About a year ago, you purchased and installed a new router at one of your company’s satellite offices, and you have had nothing but problems with the router since. Today you called the vendor for the third time to have them send a technician to repair the router. They estimate the repair will be completed by the end of business tomorrow. In the meantime, you have decided that you would prefer to replace the router the next time it fails. What factor should you carefully investigate when shopping for a replacement so you won’t face this same scenario with the next router? a. MTTR b. UPS c. MTBF d. SLA e. MIB Answer: c. MTBF 59. You have just returned from a business conference and you’re anxious to catch up on some projects. First thing in the morning, you unpack your laptop and get to work. Thirty minutes later, your boss calls and asks why you’re late to the morning’s staff meeting. You know the weekly meeting was scheduled into your calendar on your computer and the reminder has worked consistently for months. What is the most likely reason your computer did not remind you of your meeting? a. Windows was unable to connect to the network. b. Windows has registered the wrong time zone. c. Windows is configured with an IP address that is the same as another host on the network. d. Windows is configured with the wrong default gateway. e. Windows Firewall blocked the calendar app from communicating with the network. Answer: b. Windows has registered the wrong time zone. 60. Which of the following figures reflects the type of physical topology most likely to be used on a 1000Base-T network? a. [[Insert Figure D-Q60A here]] b. [[Insert Figure D-Q60B here]] c. [[Insert Figure D-Q60C here]] d. [[Insert Figure D-Q60D here]] e. [[Insert Figure D-Q60E here]] Answer: e. 61. Your study partner is trying to access the Internet on her laptop and it’s not working. In the browser, you try to go to google.com, and it doesn’t work. In a Command Prompt window, you ping google.com, and it doesn’t work. You then ping 8.8.8.8, and it still doesn’t work. You try to ping the network’s gateway, and it fails. You ping your own computer, which is logged onto the same network, and it works. What is the most likely diagnosis of this problem? a. Exhausted DHCP scope b. Incorrect DNS server c. Incorrect gateway d. Duplicate IP address e. Incorrect netmask Answer: c. Incorrect gateway 62. You work for a small fashion design firm. Because of a video that recently went viral, your company has received national recognition. Within a few days, your web server crashes. What kind of attack most likely caused the crash? a. Phishing b. Friendly DoS c. Spoofing d. Ransomware e. Logic bomb Answer: b. Friendly DoS 63. You have just installed Linux on an old laptop to bring it new life. Which of the following applications will provide the most protection for the computer when you connect it to the Internet? a. Defender b. ufw c. tcpdump d. iptables e. Wireshark Answer: d. iptables 64. You are the network administrator for a large university whose network currently contains nearly 10,000 workstations, over 80 routers, 250 switches, and 500 printers. You are researching a proposal to upgrade the routers and switches on your network to primarily use multi-layer switches instead. At the same time, you want to improve the management of your network devices. Which of the following protocols will help automate network management across all the new devices? a. TFTP b. SMTP c. NTP d. ICMP e. SNMP Answer: e. SNMP 65. Which of the following devices operate only at the Physical layer of the OSI model? Choose two. a. Hub b. Switch c. Router d. Bridge e. Repeater Answer: a. Hub; e. Repeater 66. While making some configuration changes to a client’s network, you need to connect your laptop to a router’s console port. Which of the following connector types might be used for this purpose, depending on the age of the router? Choose two. a. RJ-11 b. DB-9 c. MTRJ d. RJ-45 e. F-type Answer: b. DB-9; d. RJ-45 67. You have connected to your bank’s home page. Its URL begins with https://. Based on this information, what type of security can you assume the bank employs for clients receiving and transmitting data to and from its web server? a. Kerberos b. TLS c. IPsec d. L2TP e. Packet-filtering firewall Answer: b. TLS 68. Which of the following routing protocols has the poorest convergence time? a. EIGRP b. RIP c. BGP d. OSPF e. IS-IS Answer: b. RIP 69. You need to gather some information about the traffic being broadcast and received on a Linux workstation. Unfortunately, you don’t have time to install Wireshark. Which command can you use instead? a. tcpdump b. pathping c. traceroute d. dig e. nslookup Answer: a. tcpdump 70. To provide redundancy, you have set up three links from a critical server to two redundant switches, both of which operate on the same subnet. Two connections from the server go to one switch, and the third link connects the other switch to the server. The server is running Windows Server 2016. What feature should you configure on the server to make these redundant links work together for load balancing and failover protection? a. Port aggregation b. NIC teaming c. Bottleneck d. Server cluster e. Virtual IP address Answer: b. NIC teaming 71. A Windows workstation is configured to use DHCP, but cannot find a DHCP server. You run ipconfig at the Command Prompt. Which of the following IP addresses is most likely reported by Windows? a. 129.0.0.1 b. 255.255.255.0 c. 192.168.0.1 d. 169.254.1.120 e. 172.16.2.18 Answer: d. 169.254.1.120 72. Used side-by-side with Kerberos, what service does LDAP provide Active Directory? a. Accounting b. Encryption c. Auditing d. Authorization e. Authentication Answer: d. Authorization 73. In the following figure, if switch A suffers a failure, how will this failure affect nodes 1 through 3? [[Insert Figure D-Q73 here]] a. They will be unable to access the Internet or nodes 7 through 9. b. They will be unable to access the Internet or any other nodes on the LAN. c. They will only be unable to access the Internet. d. They will be unable to access nodes 4 through 9. e. Their connectivity will not be affected. Answer: b. They will be unable to access the Internet or any other nodes on the LAN. 74. A file server on your network is running Ubuntu Server. You need to remote into it to make some configuration changes so that a new employee can access a group of files. The files are stored on an encrypted hard drive. Which of the following utilities will give you secure access to the server to make your reconfigurations? a. RDP b. SSH c. SSL d. SFTP e. Telnet Answer: b. SSH 75. You want to add the five virtual machines that exist on your host machine to the Staff VLAN at your office. Which of the following must your host machine’s NIC support? a. CSMA/CD b. Channel bonding c. MIMO d. Trunking e. OSPF Answer: d. Trunking 76. A regional bank manager asks you to help with an urgent network problem. Because of a sudden and severe network performance decline, the manager worries that the bank’s network might be suffering a DoS attack. Viewing which of the following types of network documentation would probably give you the quickest insight into what’s causing this problem? a. Wiring schematic b. Firewall log c. Logical network diagram d. The main file server’s system log e. Physical network diagram Answer: b. Firewall log 77. While troubleshooting a computer’s connection to the network, you enter a command at the Command Prompt and see the following output. Which command did you enter? [[Insert Figure D-Q77 here]] a. nslookup b. netstat c. arp -a d. tracert google.com e. ping 8.8.8.8 Answer: a. nslookup 78. Which of the following commands lists active TCP/IP connections on both Windows and Linux computers? a. nslookup b. netstat c. pathping d. ipconfig e. iwconfig Answer: b. netstat 79. On which of the following devices should you change the default administrative username and password when adding each device to your network? Choose all that apply. a. IP security camera b. Router c. Programmable thermostat d. Unmanaged switch e. Printer Answer: a. IP security camera; b. Router; c. Programmable thermostat; e. Printer 80. Which of the following transmission media is most resistant to interference? a. Z-wave transmissions b. Fiber-optic cable c. STP cable d. 802.11ac transmissions e. Coaxial cable Answer: b. Fiber-optic cable 81. Which of the following cellular technologies uses time division to separate phone calls and Internet connections on a single channel? a. HSPA+ b. GSM c. LTE d. CDMA e. LTE-Advanced Answer: b. GSM 82. While troubleshooting a printer problem, you figured out the printer’s static IP address had not been reserved on the DHCP server and so was mistakenly issued to a workstation. This caused a conflict, and prevented users from accessing the printer. You have now configured the reservation in DHCP. What should you do next? a. Document the problem and your solution in your company’s knowledge base. b. Close the service ticket. c. Report your findings to the network admin. d. Check that the printer is plugged into the wall outlet. e. Confirm that users can now print successfully. Answer: e. Confirm that users can now print successfully. 83. How does STP prevent or stop broadcast storms? a. It examines the source IP address field in each broadcast packet and temporarily blocks traffic from that address. b. It enables routers to choose one set of best paths and ensures that alternate paths are used only when the best paths are obstructed. c. It enables switches to calculate paths that avoid potential loops and artificially blocks the links that would complete a loop. d. It enables firewalls to keep access lists that name hosts known for high-volume broadcast traffic and block those hosts from transmitting to the network. e. It helps routers define the boundaries of a broadcast domain. Answer: c. It enables switches to calculate paths that avoid potential loops and artificially blocks the links that would complete a loop. 84. What is the function of protocols and services at the Network layer of the OSI model? a. To manage the flow of communications over a channel b. To add segmentation and assembly information c. To encode and encrypt data d. To add logical addresses and properly route data e. To apply electrical pulses to the wire Answer: d. To add logical addresses and properly route data 85. You have created a new web server on a computer running the Linux operating system. Some of the modules aren’t loading correctly, and services are encountering errors. Which of the following applications should you check for information on these errors? a. Event Viewer b. IDS c. Packet sniffer d. Network Monitor e. Syslog Answer: e. Syslog 86. Your 1000Base-T network is wired following the TIA/EIA 568b standard. As you make your own patch cable, which wires do you crimp into pins 1 and 2 of the RJ-45 connector? a. White with green stripe and green b. White with brown stripe and brown c. White with blue stripe and blue d. White with red stripe and red e. White with orange stripe and orange Answer: e. White with orange stripe and orange 87. Which authentication technology issues tickets to give users access to network services? a. Kerberos b. TACACS+ c. RADIUS d. Multifactor authentication e. Diameter Answer: a. Kerberos 88. Suppose your Windows laptop’s wireless network adapter is configured to use the 802.11n wireless networking standard. Also, suppose a café you visit has a popular model of an 802.11ac access point. Assuming you have the correct SSID and logon credentials, what will most likely happen when you attempt to associate with the café’s wireless network? a. Your wireless networking client will be able to see the access point, but will be unable to associate with it. b. Your wireless networking client will not be able to see the access point. c. Your wireless networking client will be able to see the access point and attempt to associate with it, but the incompatible frequencies will prevent successful association. d. Your wireless networking client will be able to see the access point and attempt to associate with it, but the incompatible security techniques will prevent successful association. e. Your wireless networking client will be able to see the access point and successfully associate with it. Answer: e. Your wireless networking client will be able to see the access point and successfully associate with it. 89. You have just rearranged the access points on your small office network. Now a group of employees complains that they cannot reliably get their workstations to connect with a new 802.11ac access point. You have confirmed that the workstations are using the correct SSID, security type, and passphrase. You have also confirmed that the access point is turned on and functioning properly because when you stand in the computer room where it’s located, you can connect to the access point from your smartphone. Which of the following is likely preventing the other users’ workstations from associating with the new access point? a. The users are attempting to log on using incorrect user IDs. b. The workstations are located beyond the access point’s range. c. The workstations are set to use 802.11g. d. The users have turned off their wireless antennas. e. The workstations’ wired NICs are causing addressing conflicts with their wireless NICs. Answer: b. The workstations are located beyond the access point’s range. 90. With which of these utilities can you require a Windows 10 Professional user to create a password of at least 8 characters? a. Cmd b. Devmgmt.msc c. Virtmgmt.msc d. Gpedit.msc e. Netplwiz Answer: d. Gpedit.msc 91. Which WAN technology uses a fixed message size but does not rely on a specific timing scheme? a. Ethernet b. ATM c. Frame relay d. SONET e. MPLS Answer: b. ATM 92. Which of the following is a likely reason for using subnetting? a. To facilitate easier migration from IPv4 to IPv6 addressing b. To enable DHCP on a network c. To limit broadcast domains d. To reduce the likelihood for user error when modifying TCP/IP properties e. To reduce the number of routing table entries Answer: c. To limit broadcast domains 93. Which of the following wireless security techniques uses both RADIUS and AES? a. WPA2-Enterprise b. WPA c. WEP d. WPA-Enterprise e. WPA2 Answer: a. WPA2-Enterprise 94. Your company is experiencing a growth spurt and is ready to invest in a more sophisticated disaster recovery plan. Currently the backup plan consists of a few spare computers in a storage closet, and data on the servers is duplicated weekly to an off-site backup service. The company owners have committed to acquiring additional servers to duplicate critical servers in their current network, and they want the servers to be configured identically to the servers now in use. The new servers will be stored at an off-site data center, and updated every time the on-site servers are updated. What type of disaster recovery site is your company creating? a. Hot site b. Ambient site c. Site survey d. Warm site e. Differential site Answer: d. Warm site 95. A virtual switch includes several virtual ports, each of which can be considered a: a. Virtual bridge b. Virtual router c. Virtual gateway d. Virtual hub e. Virtual repeater Answer: a. Virtual bridge 96. Which OSI layer(s) operate differently in wired versus wireless network connections? a. Layers 5, 6, and 7 b. Layers 1, 2, and 3 c. Layer 1 d. Layer 2 e. Layers 1 and 2 Answer: e. Layers 1 and 2 97. As a networking professional, you might use a multimeter to do which of the following? Choose all that apply. a. Determine where the patch cable for a specific server terminates on the patch panel b. Verify that the amount of resistance presented by terminators on coaxial cable networks is appropriate c. Check for the presence of noise on a wire (by detecting extraneous voltage) d. Confirm that a fiber-optic cable can transmit signals from one node to another e. Validate the processing capabilities of a new router Answer: b. Verify that the amount of resistance presented by terminators on coaxial cable networks is appropriate c. Check for the presence of noise on a wire (by detecting extraneous voltage) 98. You’re setting up a wireless network for a coffee shop and want to provide some liability protection for the shop owners when customers use their Wi-Fi Internet access. Which of the following tools will provide this protection while still allowing customers convenient access to the Internet? a. ACL b. WPA2 c. MAC filter d. EAPoL e. Captive portal Answer: e. Captive portal 99. What type of device does this icon represent on a network diagram? [[Insert Figure D-Q99 here]] a. Router b. Multilayer switch c. VoIP gateway d. vSwitch e. IDS/IPS Answer: b. Multilayer switch 100. While configuring your new SOHO router, you’re given several security options. Which one would provide the most secure encryption of your transmissions? a. PSK b. AES c. WEP d. TKIP e. RC4 Answer: b. AES Solution Manual for Network+ Guide to Networks Jill West, Tamara Dean, Jean Andrews 9781337569330, 9781133608196
Close