CompTIA Network+ 6 Certification Practice Exams - 2019 Set 8

A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?


Options are :

  • Wardriving
  • Site survey (Correct)
  • Checking logical diagram
  • Bandwidth test
  • Vulnerability scanning

Answer : Site survey

A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds thatports are reported as closed. Which of the following BEST explains this response?


Options are :

  • The ports are associated with deprecated services (Correct)
  • The ports do not belong to a live system
  • The ports belong to an active system and are denying requests
  • The ports replied with a SYN/ACK response

Answer : The ports are associated with deprecated services

A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?


Options are :

  • Business continuity plan (Correct)
  • Disaster recovery plan
  • First responder training
  • Service level agreement

Answer : Business continuity plan

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which ofthe following threats is MOST likely involved?


Options are :

  • Compromised system (Correct)
  • Smurf attack
  • Unintentional DoS
  • Rogue AP

Answer : Compromised system

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network.Which of the following components should the technician check on the Windows workstations? (Choose two.)


Options are :

  • Start the Wired AutoConfig service in the Services console (Correct)
  • Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties
  • Enable IEEE 802.1x Authentication in Network Interface Card Properties (Correct)
  • Start the Wireless AutoConfig service in the Services console
  • Enable IEEE 802.1q Authentication in Network Interface Card Properties

Answer : Start the Wired AutoConfig service in the Services console Enable IEEE 802.1x Authentication in Network Interface Card Properties

A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with theapplication. Which of the following would be the MOST cost effective for the administrator to recommend?


Options are :

  • Install Fibre Channel for the server network
  • Install 10Gb Ethernet NICs in the servers (Correct)
  • Create Ethernet VLANs
  • Disable autonegotiation on the servers

Answer : Install 10Gb Ethernet NICs in the servers

A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST likely issue with the cable?


Options are :

  • The cable is rollover cable
  • The cable is a Cat 5 cable
  • The cable is a crossover cable (Correct)
  • The cable has bent pins

Answer : The cable is a crossover cable

According to the OSI model, at which of the following layers is data encapsulated into a packet?


Options are :

  • Layer 6
  • Layer 3 (Correct)
  • Layer 2
  • Layer 4
  • Layer 5

Answer : Layer 3

A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?


Options are :

  • Network wiring is run perpendicular to electrical conduit (Correct)
  • EMI from the lights is interfering with the network cables
  • Temperature changes are causing attenuation in copper cabling
  • Light sensors are interfering with the network

Answer : Network wiring is run perpendicular to electrical conduit

A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded fileis correct and complete?


Options are :

  • File size
  • File date
  • File type
  • File hash (Correct)

Answer : File hash

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician identify inthe proposal?


Options are :

  • MaaS
  • SaaS (Correct)
  • IaaS
  • PaaS

Answer : SaaS

A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?


Options are :

  • Bad port
  • VLAN mismatch
  • Corrupted operating system (Correct)
  • Damaged fiber

Answer : Corrupted operating system

A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?


Options are :

  • Question the users
  • Determine what has changed
  • Document the theory
  • Test the possible solution (Correct)

Answer : Test the possible solution

A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11ac router. The SSID, encryption and password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years ago. Which of the following is MOST likely the problem?


Options are :

  • there is a frequency mismatch. (Correct)
  • there is insufficient antenna power.
  • there is a security type mismatch.
  • the password needs to be re-entered.
  • the channel has changed.

Answer : there is a frequency mismatch.

A recently constructed building makes use of glass and natural light. Users in the building are reporting poor cellular connectivity and speeds. Which of the following is MOST likely the cause?


Options are :

  • Frequency mismatch
  • Channel overlap
  • Reflection (Correct)
  • Absorption

Answer : Reflection

A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IPaddressing scheme. Which of the following devices needs to be installed between the switches to allow communication?


Options are :

  • Bridge
  • Access point
  • Range extender
  • Router (Correct)

Answer : Router

A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using thefollowing IP addressing scheme on each interface:Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?


Options are :

  • Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server (Correct)
  • Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the web server
  • Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the web server
  • Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the web server

Answer : Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server

A company is allowing its employees to use their personal computers, tablets, and IoT devices while at work. However, there are rules and guidelines to which employees must adhere. Which of the following documents applies to these employees?


Options are :

  • SLA
  • BYOD (Correct)
  • SOP
  • NDA

Answer : BYOD

A network administrator is going to be performing a major upgrade to the network. Which of the following should the administrator use in case of a failure?


Options are :

  • Rollback plan (Correct)
  • Baseline report
  • Business continuity plan
  • Vulnerability report

Answer : Rollback plan

A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?


Options are :

  • SFTP
  • SSH in tunnel mode (Correct)
  • EAP-PEAP
  • RDP set to console connection

Answer : SSH in tunnel mode

A technician discovers that multiple switches require a major update. Which of the following policies should be followed?


Options are :

  • Acceptable use policy
  • Memorandum of understanding
  • Change management policy (Correct)
  • Remote access policy

Answer : Change management policy

A network technician receives a call from a branch office about a problem with its wireless connectivity. The user states the office is hosting a large meeting that,includes some online training with local businesses. The guest users have all brought devices to connect to the guest network at the branch office. All users areconnected to a single WAP and are reporting that connections keep dropping and network spends are unusable. Which of the following is the MOST likely cause ofthis issue?


Options are :

  • Interference
  • DHCP exhaustion
  • Overcapacity (Correct)
  • Channel overlapping

Answer : Overcapacity

A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. Which of the following should the IT staff reference to determine the location of the equipment being moved?


Options are :

  • Standard operating procedures
  • Rack diagrams (Correct)
  • Network topology
  • Wiring documentation

Answer : Rack diagrams

A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should the network administrator use to terminate this cable?


Options are :

  • DB-25
  • RJ-45 (Correct)
  • DB-9
  • RS-232

Answer : RJ-45

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?


Options are :

  • Loopback adapter (Correct)
  • Tone generator
  • Cable tester
  • Multimeter

Answer : Loopback adapter

A network administrator is redesigning network security after an attack. During the attack, an attacker used open cubicle locations to attach devices to the network. The administrator wants to be able to monitor future attacks in a safe environment and determine the method of attack. Which of the following should theadministrator do to BEST meet this requirement?


Options are :

  • Install a BPDU guard on switchports and enable STP.
  • Create a VLAN for the unused ports and create a honeyspot on the VLAN. (Correct)
  • Install antivirus software and set an ACL on the servers.
  • Create a DMZ for public servers and secure a segment for the internal network.

Answer : Create a VLAN for the unused ports and create a honeyspot on the VLAN.

A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the5GHz frequency. Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)


Options are :

  • 802.11g
  • 802.11b
  • Z-Wave
  • 802.11n (Correct)
  • 802.11ac (Correct)
  • Bluetooth

Answer : 802.11n 802.11ac

A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?


Options are :

  • Port security
  • Captive portal (Correct)
  • Network access control
  • MAC filtering

Answer : Captive portal

A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a networkadministrator use to ensure the data transferred is confidential?


Options are :

  • authpriv (Correct)
  • Authentication passphrase
  • MD5
  • SHA

Answer : authpriv

An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist?


Options are :

  • 15
  • 12
  • 14 (Correct)
  • 3
  • 13

Answer : 14

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions