Sandy, the network administrator, has funding to do a major upgrade of the company's LAN. This upgrade is currently in the planning stage, and Sandy still needs to determine the network requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST step in the planning process?
Conduct a vulnerability scan
Establish a network baseline
Conduct traffic analysis
Conduct a risk assessment
CompTIA Networks + Sandy, a network administrator, wants to be able to block all already known malicious activity. Which of the following would allow her to perform this activity?
Behavioral Based IDS
Signature Based IDS
Behavioral Based IPS
Signature Based IPS
CompTIA Networks + Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?
Set up an account with an Internet service provider.
Create a list of requirements and constraints.
Arrange a domain name with a suitable registrar.
Choose the correct operating system version.
CompTIA Networks + Which of the following is an example of two-factor authentication?
A username and PIN
A username and password
A username, password, finger print scan, and smart card
A username, password, and key fob number
CompTIA Networks + Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
CompTIA Networks + Which of the following would Joe, a technician, configure to modify the time a device will hold an IP address provided through DHCP?
Static IP addressing
CompTIA Networks + Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access the
Internet. Which of the following is the MOST likely cause of the problem?
The signal strength has been degraded and latency is increasing hop count.
An incorrect subnet mask has been entered in the WAP configuration.
The signal strength has been degraded and packets are being lost.
Users have specified the wrong encryption type and routes are being rejected.
CompTIA Networks + Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does not want to use an encryption method. Which of the following methods would be BEST to accomplish this?
CompTIA Networks + Which of the following network topologies, when a single machine's cable breaks, would only affect one network device and not the rest of the network?
CompTIA Networks + Joe, a network technician, is tasked with installing a router and firewall to get an office working with Internet access. Which of the following features MUST be configured to allow sharing of a single public IP address?
CompTIA Networks + Which of the following is a form of encrypting packets for safe, secure data transmission within a network?
CompTIA Networks + A company has only three laptops that connect to their wireless network. The company is currently using WEP encryption on their wireless network. They have noticed unauthorized connections on their WAP and want to secure their wireless connection to prevent this. Which of the following security measures would BEST secure their wireless network? (Select TWO).
Change the encryption method to WPA
Limit the DHCP scope to only have three addresses total
Enable the SSID broadcast
Enable and configure MAC filtering
Change the broadcast channel to a less commonly used channel
CompTIA Networks + Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO)
CompTIA Networks + The location that the local network connection ends and the ISP responsibility begins is known as the:
CompTIA Networks + Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of the following is the MOST likely problem?
Incorrect subnet mask
Missing default gateway
Incorrect IPv6 address
CompTIA Networks + Which of the following sizes is the fixed cell length in ATM?
CompTIA Networks + Which of the following network scanners detects and sends out alerts for malicious network activity?
CompTIA Networks + Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port speed to 1000 Mbps. A user's PC is no longer able to access the network. Which of the following is MOST likely the problem?
The user's NIC does not support 1Gbps
The switch is not compatible with 1000Mbps.
The user's NIC does not support 100Mbps.
Joe needs to restart the DNS server.
CompTIA Networks + Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received successfully at its destination?
The transport OSI model layer and the transport TCP/IP model layer
The transport OSI model layer and the Internet TCP/IP model layer
The network OSI model layer and the transport TCP/IP model layer
The network OSI model layer and the Internet TCP/IP model layer
CompTIA Networks + Which of the following network appliances would facilitate an even amount of traffic hitting each web server?
CompTIA Networks + For which of the following reasons could a single server's NIC transmit packets from multiple MAC address sources?
The server contains several virtual machines and the MAC addresses are from the virtual machines
The server is hosting a web server and the MAC addresses are from connected browsers.
The server is hosting a proxy server and the MAC addresses are from the connected clients.
The server NIC is starting to fail and should be replaced
CompTIA Networks + Which of the following cable types would have the LEAST amount of EMI?
CompTIA Networks + Which of the following wireless standards operates on the same frequency as 802.11a?
Compatible with 802.11b wireless networks
Compatible with 802.11g wireless networks
Compatible with 802.11i wireless networks
Compatible with 802.11n wireless networks
CompTIA Networks + Which of the following can Joe, a network technician, change to help limit war driving?
CompTIA Networks + Sandy, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
CompTIA Networks + Which of the following uses eight groups of characters for addressing?
CompTIA Networks + A packet sniffer is MOST likely used to do which of the following?
Prevent network based attacks
Capture and analyze network traffic
Route IP packets to remote destinations
Record the switch ARP table
CompTIA Networks + Which of the following could Karen, a network technician, use to find the approximate location of a break in a long network cable?
Time domain reflectometer
CompTIA Networks + Which of the following network access methods is the MOST secure?
CompTIA Networks + Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
CompTIA Networks + Which of the following ports carries IMAP traffic, by default, on modern email systems?
CompTIA Networks + Karen, a network technician, wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identity the workstation's packets Karen wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?
CompTIA Networks + Joe, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem?
CompTIA Networks + Which of the following allows for multiple backend web servers to be accessed through a single public IP address?
Port address translation
Quality of service prioritization
CompTIA Networks + Sandy, a technician, is asked to install a wireless router in a company's public cafe area. The company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
Content filtering on the wireless access point
Allow traffic from the wireless access point
Block traffic from the wireless access point
Packet filtering on the wireless access point
CompTIA Networks + Which of the following utilities would Karen, a technician, use to resolve the FQDN of a web server to its IP address?
CompTIA Networks + Sandy, an administrator, has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should Sandy use?
CompTIA Networks + Joe, the network technician, is configuring the channels being used within the WLAN, to ensure a minimal amount of interference. Which of the following channel setups would be used to avoid overlap?
2, 6, 10
1, 6, 11
1, 7, 10
1, 2, 3
CompTIA Networks + Karen, an administrator, wants to verify which protocols are in use on the network. Which of the following
Intrusion detection software
Intrusion prevention software
CompTIA Networks + Joe, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?
CompTIA Networks + Which of the following exterior routing protocols uses an algorithm to determine the quickest route to a destination?
CompTIA Networks + After installing new cabling, Karen, a technician, notices that several computers are connecting to network resources very slowly. Which of the following tools would BEST help in determining if the new cabling is the cause of the problem?
CompTIA Networks + Which of the following would be an IP address received from APIPA?
CompTIA Networks + Kurt, a technician, wants to prevent users from visiting social networking sites. Which of the following should be configured on the firewall to BEST achieve this?
CompTIA Networks + The ISP needs to terminate the WAN connection. The connection should be located in the network server room where the company LAN equipment resides. Which of the following identifies the location?
CompTIA Networks + Which of the following OSI model layers is used for logical addressing?
CompTIA Networks + Sandy, the network technician, needs to run a cable through a power distribution room that contains a high voltage transformer. Which of the following would be used to minimize EMI interference?
CompTIA Networks + Kurt, a network technician, is setting up a router and wants to ensure the fastest convergence of the routing information. Which of the following protocols would be BEST for him to use?
CompTIA Networks + Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?
CompTIA Networks + T568B wiring scheme is typically found on which of the following components?