CompTIA Network+ 6 Certification Practice Exams - 2019 Set 12

Which of the following technologies could be implemented to improve call clarity when using VoIP technology?


Options are :

  • Static IP addressing
  • QoS (Correct)
  • Caching engines
  • Port forwarding

Answer : QoS

An administrator is troubleshooting analog telephony issues on the punch down block. Which of the following tools would be MOST useful in this scenario?


Options are :

  • T1 loopback
  • Protocol analyzer
  • Multimeter
  • Butt set (Correct)

Answer : Butt set

An administrator is receiving reports from an executive that the executive's wireless access point loses the signal frequently, even though the WAP is on theexecutive's desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive'soffice?


Options are :

  • Turn off SSID broadcasting for the executive's access point
  • Replace the 802.11n access point in the office with an 802.11a access point.
  • Turn off as many lights in the executive's office as possible to reduce interference.
  • Change the channel on the access point to channel 11. (Correct)

Answer : Change the channel on the access point to channel 11.

A technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?


Options are :

  • The route table of the next-hop router.
  • The route table of the new customer's router. (Correct)
  • The arp table of the new customer's router.
  • The arp table of a network user.

Answer : The route table of the new customer's router.

Which of the following tools can the technician use to analyze TCP/IP packets when trying to determine a connection problem within a subnet?


Options are :

  • Cable tester
  • Protocol analyzer (Correct)
  • SYSLOG server
  • Wire mapper

Answer : Protocol analyzer

Lisa, a network technician, needs to introduce a few more cables to the existing patch panel.Which of the following tools would she use?


Options are :

  • Multimeter
  • Punch down tool (Correct)
  • OTDR
  • Temperature monitor

Answer : Punch down tool

A company only wants preapproved laptops to be able to connect to a wireless access point.Which of the following should be configured?


Options are :

  • SSID disable
  • WPA encryption
  • ACL rules
  • MAC filtering (Correct)

Answer : MAC filtering

A customer has not been using security on a wireless network and has recently received many attacks through this vector.Which of the following would be the MOST secure way to harden this wireless network?


Options are :

  • VLAN implementation
  • WEP encryption
  • Disable the SSID
  • WPA encryption (Correct)

Answer : WPA encryption

Which of the following solutions will detect and disable a rogue access point?


Options are :

  • IDS
  • Port scan
  • IPS (Correct)
  • Packet sniffer

Answer : IPS

Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).


Options are :

  • 53
  • 67
  • 21
  • 22 (Correct)
  • 23 (Correct)

Answer : 22 23

company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which ofthe following firewall rules would BEST accomplish this?


Options are :

  • Allow traffic from the wireless access point
  • Block traffic from the wireless access point (Correct)
  • Content filtering on the wireless access point
  • Packet filtering on the wireless access point

Answer : Block traffic from the wireless access point

Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines thatusers max out at 802.11g speeds. Which of the following would MOST likely fix this issue?


Options are :

  • Enable wireless multimedia (WMM) for QoS (Correct)
  • Limit the clients to 802.11g compatible laptops
  • Enable access point antenna isolation
  • Use the 40MHz channels in the 2.4GHz band

Answer : Enable wireless multimedia (WMM) for QoS

Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make surethese WAPs will be able to communicate?


Options are :

  • Enable `n' only mode
  • Enable mixed mode (Correct)
  • Disable encryption
  • Disable SSID

Answer : Enable mixed mode

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the followingcommands would MOST likely be used on that workstation to verify its current network settings?


Options are :

  • hostname
  • ipconfig (Correct)
  • net share
  • tracert

Answer : ipconfig

Which of the following occurs when antenna gain is increased on an access point?


Options are :

  • Throughput decreases
  • Cell size increases (Correct)
  • Connection speeds decrease
  • Attenuation increases

Answer : Cell size increases

Which of the following problems is MOST likely to arise when configuring an IPv6 over IPv4 tunnel?


Options are :

  • Framing errors
  • MTU black hole (Correct)
  • SYN flood
  • Routing loop

Answer : MTU black hole

Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabledon the firewall? (Select TWO).


Options are :

  • 53
  • 25
  • 443 (Correct)
  • 80 (Correct)
  • 23

Answer : 443 80

A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowedopen ports on the firewall to accomplish this? (Select TWO).


Options are :

  • 8080
  • 443 (Correct)
  • 20
  • 80 (Correct)
  • 143

Answer : 443 80

Which of the following layers of the OSI model is between the Data Link and Transport layers?


Options are :

  • Application
  • Session
  • Network (Correct)
  • Physical

Answer : Network

Which of the following could be used to estimate RTT across a router?


Options are :

  • Traceroute (Correct)
  • Uptime
  • Arp
  • Dig

Answer : Traceroute

A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxyserver to accomplish this?


Options are :

  • 143
  • 443
  • 20
  • 80 (Correct)

Answer : 80

Which of the following uses port 53 by default?


Options are :

  • DNS (Correct)
  • QoS
  • DHCP
  • RDP

Answer : DNS

Which of the following needs to be configured on a switch to use a packet sniffer?


Options are :

  • Tagged VLAN
  • Port trunking
  • Untagged VLAN
  • Port mirroring (Correct)

Answer : Port mirroring

A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by themicrowave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity?


Options are :

  • Disable SSID broadcast
  • Change the broadcast channel
  • Move the access point (Correct)
  • Increase the signal strength

Answer : Move the access point

When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?


Options are :

  • SSID enable
  • Encryption
  • Signal strength (Correct)
  • Password hardening

Answer : Signal strength

Which of the following communication modes has the LOWEST overhead necessary to support streaming protocols such as RTP?


Options are :

  • Stateful
  • Quality of Service
  • Full Duplex
  • Connectionless (Correct)

Answer : Connectionless

Which of the following methods limits access to a network based on characteristics of the network card?


Options are :

  • IP filtering
  • Port filtering
  • Encryption
  • MAC filtering (Correct)

Answer : MAC filtering

Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve thisissue?


Options are :

  • Change the SSID
  • Reduce the transmission power (Correct)
  • Change the security method
  • Change the frequency

Answer : Reduce the transmission power

Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number ofwireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limitthe access to the wireless network? (Select TWO).


Options are :

  • MAC filtering (Correct)
  • Changing wireless channels
  • Changing wireless speed standards
  • WPA encryption (Correct)
  • SSID disable

Answer : MAC filtering WPA encryption

An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations.Which of the following actions should be taken on the new firewall? (Select TWO).


Options are :

  • Allow TCP port 22 outbound (Correct)
  • Allow UDP port 21 outbound
  • Allow TCP port 80 outbound (Correct)
  • Allow UDP port 22 outbound
  • Allow UDP port 80 outbound
  • Allow TCP port 21 outbound

Answer : Allow TCP port 22 outbound Allow TCP port 80 outbound

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions