CompTIA Network+ Practice Exam

Your page rank:

Total word count: 1914
Pages: 7

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

You have a Web site that customers use to view product information and place orders. You would like to identify the maximum number of simultaneous sessions that this server can maintain before the performance is negatively impacted.
Which tool should you use?

Load tester

You are concerned about attacks directed against your firewall on your network. You would like to examine the content of individual frames sent to the network.
Which tool should you use?

Packet sniffer.

You have installed a new application on a network device. During testing, it appears as if the software is causing other services running on the device to stop responding.
Which tool should you consult to identify the problem?

Application log.

You manage a firewall that connects your private network to the Internet. You would like to see a record of every packet that has been rejected by the firewall in the past month.
Which tool should you use?

Event log.

You connect a packet sniffer to a switch to monitor frames on your local area network. However, the packet sniffer is only able to see broadcast frames and frames addressed specifically to the host device.
Which feature should you enable on the switch so you can see frames from all devices connected to the switch?

Mirroring.

You want to be able to identify traffic that is being generated and sent through the network by a specific application running on a device.
Which tool should you use?

Protocol analyzer.

You decide to use a packet sniffer to identify the type of traffic sent to the router. You run the packet sniffing software on a device which is connected to a hub with three other computers. The hub is connected to the same switch that is connected to the router.
When you run the software, you only see frames addressed to the four workstations but not to the router.
Which feature should you configure?

Mirroring.

You have a small network of devices connected together using a switch. You want to capture the traffic that is sent from Host A to Host B.
On Host C, you install a packet sniffer that captures network traffic. After running the packet sniffer, you cannot find any captured packets between Host A and Host B.
What should you do?

Run the packet sniffer application on Host B.

You have a WAN link that connects two sites. The WAN link is supposed to provide 1.5 Mbps of bandwidth. You want to perform a test to see the actual bandwidth of the link.
Which tool should you use?

Throughput tester.

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffer software on a device which is connected to the same hub that is connected to the router.
When you run the software, you only see frames addressed to the workstation and not other devices.
Which feature should you configure?

Promiscuous mode.

You want to know what protocols are being used on your network. You’d like to monitor network traffic and sort traffic based on protocol.
Which tool should you use?

Packet sniffer.

You are a network administrator for your company. A user calls and tells you that after stepping on the network cable in her office, that she can no longer access the network.
You go to the office and see that one of the user’s stiletto heels has broken and exposed some of the wiring in the Cat 5 network cable. You make another cable and attach it from the wall plate to the user’s computer.
What should you do next in your troubleshooting strategy?

Test the solution.

Users report that the network is down. After some investigation, you determine that a specific router is configured such that a routing loop exists.
What should you do next?

Determine if escalation is needed.

A user reports that he can’t connect to a specific Web site. You go to the user’s computer and reproduce the problem.
What should you do next?

Identify the affected areas of the network.

You are a network administrator for your computer. A frantic user calls you one morning exclaiming that "nothing is working." What should you do next in your troubleshooting strategy?

Establish the symptoms.

A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online.
After doing some research, you find that the most likely cause of the problem is a bug in the router’s software. A new patch is available from the manufacturer that is supposed to eliminate the problem.
What should you do next?

Identify possible effects of the solution.

A user is unable to connect to the network. You investigate the problem and determine that the network adapter is defective. You replace the network adapter and verify that it works.
What should you do next?

Identify the results and effects of the solution

A user reports that she can’t connect to a server on your network. You check the problem and find out that all users are having the same problem.
What should you do next?

Determine what has changed.

A user reports that she can’t connect to the internet. After some investigation, you find the wireless router has been misconfigured. You are responsible for managing and maintaining the wireless access point.
What should you do next?

Create an action plan.

While working on a Linux server, you are unable to connect to Windows Server 2003 system across the Internet. You are able to ping the default gateway on your own network, so you suspect the problem lies outside the local network.
Which utility would you use to trace the route a packet takes as it crosses the network?

traceroute.

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54Mbps. In addition, the client already has a wirelesss telephone system installed that operates 2.4GHz. Which 802.11 standard will work best in this situation?

802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 150 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11n

Which of the following is a firewall function?

Packet filtering

You have a network connected using a physical bus topology. One of the cables connecting a workstation to the bus breaks.
Which of the following best describes what happens to network communications?

No device will be able to communicate

You have a network with 50 workstations. You want to automatically configure workstations with the IP address, subnet mask, and default gateway values.

DHCP server

You have discovered a computer that is connected to your network that was used for an attack. You have disconnected the computer from the network to isolate it from the network and stop the attack. What should you do next?

Perform a memory dump

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You watn wireless users to be able to connect to either access point, and to be able to raom between the two access points.

How should you configure the access points?

Same SSID, different channel

While viewing the status of the interfaces on a Cisco switch, you see an abnormally large
number of CRC errors on one interface. This interface is connected to a user’s workstation
located in a cubicle on the 2nd floor.
What could be causing this to happen?

A strong EMI emitter near the cable run connected to that interface.

You manage a network with multiple subnets connected to the Internet.

A user reports that she can’t access the new server used in the accounting department. You check the problem and find out that her computer cannot access any server on the subnet, however the computer does access other computers on other subnets as well as the Internet.

Which of the following is most likely the cause of the problem?

Missing route on the default gateway router.

What is the primary goal of business continuity planning?

Maintaining business operations with reduced or restricted infrastructure capabilities or resources.

You are the network administrator for a growing business. When you were initially hired, the organization was small and only a single switch and router were required to support your users. During this time, you monitored log messages from your router and switch directly from each device’s console.

However, the organization has grown considerably in recent months. You now must manage 8 individual switches and three routers. It’s becoming more and more difficult to monitor these devices and stay on top of issues in a timely manner.

What should you do?

Use syslog to implement centralized logging.

Which of the following describes the point where the service provider’s responsibility ends and the customer’s
responsibility begins for installing and maintaining wiring and equipment?
A Smart jack
B tor
C Punchdown block
D Vertical cross connect
E Demarc

Demarc

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer.While talk to her, you discover that she is trying to work from the coffee room two floors above the floor where she normally works.

What is the most likely cause of her connectivity problem?

The user is out of the effective range of the wireless access point on her floor.

Which of the following terms describes a Windows operating system patch that corrects a specific problem and is release on a short-term, periodic basis (typically monthly)?

A. Targeted software patch
B. Hotfix
C. Kernel fix kit
D. Service pack

Hotfix Explanation: A hotfix is an operating system patch that corrects a specific known problem. Microsoft typically releases hotfixes monthly. Service packs include a collection of hotfixes and other system updates. Service packs are not released as Often, but contain all hotfixes released to that time.

Which of the following are differences between RADIUS and TACACS+?

RADIUS combines authentication and authorization into a single function; TACACS+ allows these services to be split between different servers.

A user from the Sales department calls to report that he is experiencing problems connecting to the Sales file server. All users in the Sales department connect to the Sales server through a single Ethernet switch. No other users have reported problems connecting to the Sales server.
Which of the following troubleshooting actions are you most likely to perform first?

Replace the network card in the user’s computer.

You are creating an Ethernet network for your company. The shipping department is located in a different building that is located 150 meters from the main wiring closet. You connect a single Cat6e cable to connect the wiring closet to the shipping building.
Which of the following are you most likely to experience?

Attenuation.

Which of the following can be used to stop piggybacking that has been occurring at the front entrance where employees should swipe their smart cards to gain entry?

Deploy a mantrap

Which of the following protocols includes extensive error checking to ensure that a transmission is sent and received without mistakes?

TCP

What are the most common network traffic packets captured and used in a replay attack?

DNS query
File transfer
Authentication
Session termination

Authentication

Which of the following devices is used on a WAN to convert synchronous serial signals into digital signals?

CSU/DSU

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending