N10-007 : CompTIA Network+ : Part 31

NS – Modules 20 – 22

  1. A web server administrator has changed the domain registrar’s A record for the company’s website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?

    • The NAT has not been configured to point to an internal resource.
    • An egress firewall rule is blocking access to the web server.
    • The IDS has determined it is a rogue web server.
    • The corporate DNS server has not been updated.
  2. Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?

    • Multicast
    • Spanning tree
    • ICMP
    • SNMP
  3. Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?

    • Switching loop
    • ARP cache poisoning
    • Improperly tagged ports
    • Wrong VLAN assignment
    • Duplicate IP addresses
  4. A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

    • Allow communication through ifconfig.
    • Use netstat to open necessary ports.
    • Add access rules in iptables.
    • Employ arp to configure a new route.
  5. A network administrator notices a wireless network with the SSID HOME-33BC-5G that has a high signal strength and open authentication. When the administrator connects to the SSID, corporate servers can be accessed. Which of the following has the network administrator discovered?

    • Evil twin
    • Man in the middle
    • Spoofing
    • Rogue AP
    • Wardriving
  6. A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?

    • International export controls policy
    • Remote access policy
    • Privileged user agreement
    • Data loss policy
    • Service-level agreement
  7. A network technician is working on a new wireless project. The network manager has a primary requirement of achieving speeds of at least 1 Gbps when connected. Which of the following standards would be appropriate for the technician to implement?

    • 802.11a
    • 802.11ac
    • 802.11b
    • 802.11n
  8. A company needs to implement a fault-tolerant server configuration after the failure of its database server. The company decides to implement load-balancing redundant servers. Which of the following should be used for file storage for the servers?

    • IDE
    • Cloud storage
    • SAN
    • iSCSI
  9. A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?

    • Diagram symbols
    • Rack diagram
    • Logical diagram
    • Port locations
  10. A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

    • Configure MIMO.
    • Remove the channel overlap.
    • Add another AP.
    • Adjust the security type.
  11. A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

    • Run a port scanner on each name server to ensure TCP port 53 is open and listening.
    • Run tracert from a desktop client to query each name server and see what answers are sent back from each server.
    • Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.
    • Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.
  12. A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?

    • Router
    • Layer 3 switch
    • Proxy server
    • Firewall
    • Intrusion detection system
  13. A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

    • Additional PIN
    • Security questions
    • RSA token
    • Access control lists
  14. When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST question to ask to determine the scope of the issue?

    • What has been changed on the web server since the previous day?
    • Is the application online for the end user to access?
    • Does the user have access to the application?
    • Is this a system-wide issue or just a certain user’s issue?
  15. A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

    • RJ11
    • LC
    • BNC
    • F-type
  16. A Chief Information Officer (CIO) wants a third party to verify the security surrounding an enterprise SQL database server. Which of the following services should the CIO implement?

    • PCI compliance
    • Database health check
    • Penetration test
    • Network baseline
  17. An end user at an Internet cafe tries to visit an online retailer’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor’s page still loads. Which of the following BEST describes what is occurring?

    • Cross-site scripting
    • Session hijacking
    • Man in the middle
    • DNS poisoning
  18. A technician is troubleshooting a host that is having intermittent issues connecting to internal network resources and the company servers. Using a packet sniffer, the technician notices there are several TCP communications that are missing packets in sequence and need to be retransmitted. The technician receives several SYN-ACK packets with incorrect addressing. Which of the following is the MOST likely cause of these issues?

    • DNS poisoning attack
    • Evil twin on the company network
    • ARP poisoning attack
    • Misconfigured VLAN on the local switch
  19. A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?

    • IDS
    • IPS
    • Layer 7 firewall
    • RADIUS server
  20. An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

    • Man in the middle
    • A brute-force attack
    • A hash comparison
    • Rainbow tables

NS – Modules 20 – 22

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments