N10-007 : CompTIA Network+ : Part 36

NS – Modules 20 – 22

  1. A NGFW is continuously sending alerts regarding traffic from an internal database server. An old DHCP service, which was used before a dedicated server was installed, is still running on the server. Which of the following practices could have prevented this incident?

    • Preventing UDP on the host firewall
    • Enabling DHCP relay
    • Disabling unused services
    • Disabling DHCP spoofing
  2. A user is connected to the guest wireless network for a video conference with colleagues. The user’s computer shows a strong wireless signal, and websites seem to load without issue, but the voice and video have periods of choppiness. Which of the following would BEST identify the issue?

    • Verify the wireless capacity is not exceeded.
    • Check the signal attenuation.
    • Increase the power transmission level.
    • Adjust the antenna placement.
  3. An ISP technician frequently needs to administer a router remotely in the event of a configuration error or WAN outage. Which of the following technologies would facilitate the required connectivity?

    • Remote access VPN
    • Remote file access
    • Out-of-band
    • Secure Shell
  4. Employees at a company report that they are unable to access the Internet. A network technician notices the workstations are receiving IP addresses that do not follow the IP addressing scheme of the corporate network. Upon further inspection, the technician finds an employee has plugged a rogue wireless router into the corporate network. Which of the following settings would have prevented this situation?

    • DHCP snooping
    • DHCP relay
    • DHCP leasing
    • DHCP options
  5. Which of the following protocols operates at the data link layer of the OSI model?

    • IGRP
    • BGP
    • PPP
    • FTP
  6. Several open conference rooms have active wired network connections. To discourage unauthorized users, a network technician wants to require users in the conference rooms to authenticate to the network before gaining access. Which of the following would be the BEST network technology to use?

    • WPA
    • MAC filtering
    • ACLs
    • 802.1X
  7. Which of the following describes the function of Layer 3 of the OSI model?

    • It provides sequencing and acknowledgments for connection-oriented communication.
    • It provides connectionless communication using logical addressing.
    • It provides error detection through the FCS for frames transmitted.
    • It provides encryption and compression for data received.
  8. Which of the following ports should be open on a host-based firewall for a user who needs email and file-sharing capabilities? (Choose two.)

    • 21
    • 88
    • 389
    • 445
    • 587
    • 3389
  9. Which of the following steps follows an implemented solution?

    • Document the findings and actions.
    • Identify potential effects of the solution.
    • Verify full system functionality.
    • Implement preventative measures.
  10. A network technician receives an update in an RSS feed that a new exploit was released for specific hardware used on the network. After verifying the vulnerability with the vendor, the network technician discovers the vulnerability was patched almost two years ago. Which of the following techniques should be implemented to discover out-of-date firmware in the future?

    • Application fuzzing
    • Malware signature management
    • Network traffic analysis with tcpdump
    • Vulnerability scanning
  11. A network technician needs a secure way to access a router in another country. Which of the following methods would meet this requirement?

    • SSH connection
    • Device HTTP URL
    • TFTP upload
    • GRE tunnel
  12. A technician needs to connect several computers in close proximity to control manufacturing equipment in a factory. The medium to connect the computers must be cost effective and suitable for short distances. Which of the following mediums should the technician use?

    • RJ11 connector and Cat6 cable
    • ST connector and UTP cable
    • DB-9 connector and plenum cable
    • BNC connector and RG-59 cable
  13. A network technician is troubleshooting a laptop that does not have wireless connectivity. The technician determines the wireless network is functioning as expected. The laptop does not show any SSIDs or allow the technician to modify network settings. Which of the following should the technician check FIRST?

    • Check for overcapacity of the network.
    • Ensure wireless is enabled on the laptop.
    • Confirm the power levels of the WAP.
    • Assess the antenna placement.
    • Verify network drivers are up-to-date.
  14. A network technician is implementing a new IPv6 addressing scheme at a local office. This is a large office, and the network manager would like a solution that saves time and allows for automatic addressing of nodes. Which of the following would BEST accomplish this?

    • APIPA
    • 6to4 tunnel
    • NAT64
    • EUI-64
  15. A network administrator notices that network utilization is extremely high around midnight and wonders if this is normal or if there might be a security issue. Which of the following types of documentation should the administrator consult FIRST?

    • Change management documentation 
    • Standard operating procedures
    • Network performance baseline
    • Firewall configuration documentation
  16. A network technician needs to dedicate a range of addresses in DHCP for statically assigned servers and network devices. Which of the following should be configured to BEST accomplish this?

    • Static addressing
    • Subnetting
    • Advertisements
    • Exclusions
  17. A network administrator needs to create a network for 4,000 devices while conserving address space. Which of the following subnet masks should be used on this network?

    • 255.254.0.0
    • 255.255.224.0
    • 255.255.240.0 
    • 255.255.248.0
    • 255.255.255.240
  18. A network technician needs to administer the desktop of a Linux-based workstation remotely on the local network. Which of the following remote access methods should the network technician use?

    • VNC
    • RDP
    • SSH
    • VPN
  19. A network technician is upgrading the software on a switch, but the switch will no longer boot after the upgrade. Which of the following should the network technician have verified before the upgrade?

    • Unnecessary services disabled
    • Secure protocols in use
    • Firmware file hash 
    • Network ports disabled
  20. Devices on a network will need to obtain DHCP leases from a server on a different network. Which of the following must the engineer implement for DHCP to forward requests to the designated server?

    • Trunking
    • A forward lookup zone
    • A proxy server
    • An IP helper

NS – Modules 20 – 22