CompTIA Network+ 6 Certification Practice Exams - 2019 Set 5

A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdeskhas received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch portduring production.Given this information, which of the following is the cause of the problem?


Options are :

  • Distance limitation
  • Electromagnetic interference (Correct)
  • Cross talk
  • Speed and duplex mismatch

Answer : Electromagnetic interference

A firewall ACL is configured as follows:10. Deny Any Trust to Any DMZ eq to TCP port 2211. Allow 10.200.0.0/16 to Any DMZ eq to Any12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 44313. Deny Any Trust to Any DMZ eq to AnyA technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use anyprotocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only.Reordering the ACL in which of the following manners would meet the company's objectives?


Options are :

  • 13, 12, 11, 10
  • 13, 10, 12, 11
  • 12, 10, 11, 13
  • 11, 10, 12, 13 (Correct)

Answer : 11, 10, 12, 13

A company is selecting a fire suppression system for their new datacenter and wants to minimize the IT system recovery period in the event of a fire.Which of the following is the best choice for the fire suppression system?


Options are :

  • Portable extinguishers
  • Clean Gas (Correct)
  • Dry Pipe
  • Wet Pipe

Answer : Clean Gas

A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened.Which of the following should be one FIRST to resolve the problem?


Options are :

  • Ensure that port 161 is open
  • Flush the DNS cache on the local workstation
  • Ensure that port 20 is open (Correct)
  • Validate the security certificate from the host

Answer : Ensure that port 20 is open

OFDM, QAM and QPSK are all examples of which of the following wireless technologies?


Options are :

  • RF interference
  • Spectrum
  • Modulation (Correct)
  • Frequency

Answer : Modulation

A malicious user floods a switch with frames hoping to redirect traffic to the user's server.Which of the following attacks is the user MOST likely using?


Options are :

  • DNS poisoning
  • SYN attack
  • ARP poisoning (Correct)
  • Reflection

Answer : ARP poisoning

A client is concerned about a hacker compromising a network in order to gain access to confidential research data.Which of the following could be implemented to redirect any attackers on the network?


Options are :

  • Content Filter
  • Honeypot (Correct)
  • Botnet
  • DMZ

Answer : Honeypot

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from theinternet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers.Which of the following is the BEST way to mitigate this risk?


Options are :

  • Use the implicit deny of the firewall
  • Change the FTP server to a more secure SFTP
  • Move the server to the DMZ of the firewall (Correct)
  • Add an outbound ACL to the firewall

Answer : Move the server to the DMZ of the firewall

A technician is concerned about security and is asked to set up a network management protocol.Which of the following is the best option?


Options are :

  • SNMPv2
  • SNMPv3 (Correct)
  • SLIP
  • TKIP

Answer : SNMPv3

A network technician has downloaded the latest vendor switch O/S, which includes new features and enhancements.Which of the following should the technician perform FIRST when updating the switches?


Options are :

  • Power cycle the company's border router
  • Test the O/S on one of the production switches
  • Install during non-business hours to test the system
  • Backup the current configuration for each switch (Correct)

Answer : Backup the current configuration for each switch

A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. Which of the following is the malicious student implementing?


Options are :

  • Removing the AP from the classroom
  • Firewall
  • ACL
  • IPS
  • Jamming (Correct)

Answer : Jamming

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers.Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?


Options are :

  • Require users to utilize two-factor authentication
  • Add an implicit deny to the core router ACL
  • Block port 80 outbound on the company firewall
  • Install host-based anti-malware software (Correct)
  • Implement MAC filtering on all wireless access points

Answer : Install host-based anti-malware software

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from awired connection shows 5 of 5 packets respond.Which of the following tools should be used to discover the cause of the poor performance?


Options are :

  • Spectrum Analyzer tool (Correct)
  • Port scanner tool
  • Packet capture tool
  • Interface monitoring tool

Answer : Spectrum Analyzer tool

A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but shouldhave visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN.Which of the following is the BEST way to configure the new wireless network in the new building?


Options are :

  • Use the same SSIDs on same channels with AP isolation
  • Use different SSIDs on different channels and VLANs
  • Use the same SSIDs on different channels and AP isolation (Correct)
  • Use different SSIDs on the same channels with VLANs

Answer : Use the same SSIDs on different channels and AP isolation

While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage.Which of the following is MOST likely the issue?


Options are :

  • Maximum cable length exceeded
  • RF interference caused by impedance mismatch
  • Bend radius exceeded (Correct)
  • Dirty connectors

Answer : Bend radius exceeded

Which of the following is a logical host on the network where unauthorized users believe they are on the production network?


Options are :

  • Virtual Terminal
  • Virtual server
  • Honeypot (Correct)
  • VLAN

Answer : Honeypot

A network manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). Thereport should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with themissing update or patch.Which of the following solutions would work BEST to present this data?


Options are :

  • Virus scan
  • Security policy
  • Vulnerability scanner (Correct)
  • Penetration scan

Answer : Vulnerability scanner

Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts onthe internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving aproper IP address.Which of the following is an addressing scheme that will work in this situation?


Options are :

  • Private (Correct)
  • Classless
  • Teredo tunneling
  • APIPA

Answer : Private

A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician atthe remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correctinterface.Which of the following would be the result of this action?


Options are :

  • The interface status will show line protocol down. (Correct)
  • The normal amount of errors and the connection problem has been resolved.
  • The interface status will indicate that the port is administratively down.
  • The traffic will flow, but with excessive errors.

Answer : The interface status will show line protocol down.

A company has a network with three switches, each one with eight ports. The switch is connected to a router that has a hub with four computers plugged into one ofits interfaces.How many broadcast domains are present in this company's network?


Options are :

  • 2 (Correct)
  • 1
  • 16
  • 5
  • 28

Answer : 2

A technician has completed a survey of a wireless network and documented signal strengths.This document is known as which of the following?


Options are :

  • Heat map (Correct)
  • LogicalNetwork map
  • Network baseline
  • Bandwidth survey

Answer : Heat map

Which of the following is a security benefit gained from setting up a guest wireless network?


Options are :

  • Reduced password resets
  • Isolated corporate resources (Correct)
  • Smaller ACL changes
  • Optimized device bandwidth

Answer : Isolated corporate resources

A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home.Which of the following servers should the technician implement?


Options are :

  • DNSSEC
  • PPP
  • RAS (Correct)
  • NAT
  • VLAN

Answer : RAS

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled asthe default setting?


Options are :

  • The VoIP phone would request a new phone number from the unified communications server.
  • The VoIP phone would request a different configuration from the unified communications server.
  • The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. (Correct)
  • The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.

Answer : The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity.Which of the following should the network technician do NEXT?


Options are :

  • Establish a theory of probable cause.
  • Determine next steps to solve the problem.
  • Determine if anything has changed. (Correct)
  • Document actions and findings.

Answer : Determine if anything has changed.

There is a network looping problem after installing some switches. The switch vendor suggested the use of 802.1d.Which of the following is the MOST probable reason the vendor made this suggestion?


Options are :

  • It is a regular version of port mirroring that uses hellow packets to detect loops
  • It is a simple version of spanning tree that uses BPDU to detect problems
  • It is a rapid version of port mirroring that uses BPDU to detect problems
  • It is a rapid version of spanning tree that uses BPDU to detect problems (Correct)

Answer : It is a rapid version of spanning tree that uses BPDU to detect problems

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network.Which of the following should the technician check FIRST?


Options are :

  • Encryption type
  • WAP SSID
  • WAP placement (Correct)
  • Bandwidth saturation

Answer : WAP placement

A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices.Which of the following would need to be configured on each network device to provide that information in a secure manner?


Options are :

  • SNMPv3 (Correct)
  • S/MIME
  • PGP
  • SYSLOG
  • RSH

Answer : SNMPv3

After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites.Which of the following should be checked?


Options are :

  • Server host file
  • Duplex settings
  • Subnet mask
  • Local hosts file (Correct)

Answer : Local hosts file

Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicioususer may have changed the switches' settings before they were installed in secure areas.Which of the following is the MOST likely way in which the malicious user gained access to the switches?


Options are :

  • Via HTTP using the default username and password (Correct)
  • Via SNMP using the default RO community
  • Via console using the administrator's password
  • Via SSH using the RADIUS shared secret

Answer : Via HTTP using the default username and password

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions