Website Design in Ireland COMPTIA A+ ESSENTIALS Quiz questions and answers.
GOODLUCK FROM Pinguis IRISH WEB DESIGN
Joe, a customer, has reported that the wireless signal from a WAP can only be found in one specific corner of a conference room. Which of the following is the MOST likely cause?
Incorrect encryption method
Incorrect antenna type
Incorrect SSID identifier
Joe, a user, accidentally unplugs a cable from the patch panel and plugs it into the switch stack. Now, all users are unable to access any network resources. Which of the following is the MOST likely cause?
Kurt and Sandy, users, are reporting that they no longer have network access. A computer icon shows that network connection is unplugged. Which of the following is the MOST likely reason for this?
NIC power failure on the server
Firewall is denying all traffic
Patch panel power failure
Switch power failure
Which of the following technologies is used on cellular networks?
Which of the following networking protocols would Kurt, a technician, use to standardize correct time on network devices?
Karen, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
Which of the following terms correctly defines the event in which multiple dynamic routers agree on the state of the network?
Which of the following would Sandy, a technician, find in a network map?
Joe, a network technician, has configured a server with the following IP settings: IP Address: 192.168.1.40/27 Default Gateway: 192.168.1.64 DNS: 192.168.1.33 The server cannot access the Internet. Which of the following settings needs to be changed?
Sandy, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?
Which of the following network performance methods would Sandy, a technician, use with SIP phones?
Which of the following BEST describes the point at which an ISP's responsibility for an Internet connection ends?
After a switch upgrade, several users report no connection to the Internet, while other users report no problems. Which of the following is the MOST likely problem?
Faulty or missing routes
VLAN port assignments
When examining a suspected faulty copper network cable. Karen, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?
Joe, a network technician, is installing multiple 802.11 g WAPs with the same SSID. Which of the following channel combinations would allow all three WAPs to operate without interfering with each other?
1, 6, 11
2, 6, 10
3, 5, 9
7, 9, 11
Which of the following capabilities of a firewall allows Kurt, an administrator, to block traffic based on keywords determined by the company?
Stateless traffic monitor
Stateful traffic monitor
Which of the following ports would Kurt, a technician, need to open on a firewall to allow SSH on the default port?
Which of the following technologies has different upload and download speeds?
Kurt, the network technician, is troubleshooting a network issue by implementing a new security device. After installing and configuring the device, which of the following steps should he take NEXT?
Verify full system functionality
Identify the main problem and question the user
Document their findings, actions, and outcomes
Escalate the issue to upper management.
on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.
Manually adjust the duplex mode on the server1 slink.
Configure the laptop to receive a DHCP address from the server, rather than manually setting one
Which of the following is a Class A private IP address?
Which of the following defines the purpose of a DHCP scope?
To allocate a preset range of MAC addresses available for assignment.
To tell a DHCP server to exclude IP addresses.
To properly configure a DHCP server's allowed bandwidth level.
To allocate a preset range of IP addresses available for assignment.
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?
Sandy, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 Internet access network. Which of the following optimizations should Sandy implement?
Quality of service
Which of the following tools would Sandy, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?
Punch down tool
A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?
A wireless LAN discovery tool that sends a null probe request to seek out wireless LANs, is a component of which of the following?
An evil twin
Joe, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Joe is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?
Implement WEP encryption
Decrease signal strength
Change wireless channels
Rotate the SSID daily
Karen, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?
Incorrect subnet mask
Duplicate IP address
Karen, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows: End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown End B: green-white, green, orange-white, blue, blue-white, orange, brow-white, brown Which of the following should Karen do to complete the installation?
Re-end the provided cable, keeping the wiring the same.
Use the provided cable
Purchase a crossover cable.
Purchase a straight-through cable
Which of the following identifies the WLAN Joe, a user, is connected to?
Which of the following describes the purpose of DHCP?
Applying prioritization to certain types of network traffic.
Resolving FQDNs to IP addresses.
Filtering web content based on keywords.
Dynamic assignment of IP addresses.
Joe, a technician, is configuring a wireless access point. Which of the following channels should he use if the LEAST interference potential is desire
1, 6, 11
2, 5, 10
3, 7, 10
7, 8, 9
Sandy, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Sandy use in this scenario?
Which of the following connectors push and twist-on?
Joe, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems compared to the limited number of wireless devices used. Joe believes that other nonemployees are using the wireless network to access the Internet. Which of the following could be used tolimit the access to the wireless network? (Select TWO).
Changing wireless channels
Changing wireless speed standard
Which of the following network appliances can BEST be described as allowing multiple servers to share
requests for a website through the same public IP address?
Joe, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems compared to the limited number of wireless devices used. Joe believes that other nonemployees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).
Changing wireless channels
Changing wireless speed standards
Which of the following security devices is used in providing packet and MAC address filtering services for the network?
Host-based proxy server
Which of the following media types will block EMI?
Joe, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal. Which of the following could be done together to solve this problem? (Select TWO).
Turn down the signal gain.
Increase the encryption method.
Change the wireless channel.
Replace the WAP's antennas with directional antennas
Disable the SSID
Kurt, a user, is having difficulty connecting a laptop to the company's wireless network. The technician
determines Kurt's wireless NIC has failed and replaces it. Which of the following network troubleshooting
methodology steps should the technician do NEXT?
Implement the solution
Verify full system functionality
Test the theory to determine cause
Establish a plan of action to resolve the problem
Which of the following devices will allow Sandy, a user, to see a cached copy of websites?
An organization currently has CAT5e cabling throughout its office. Karen, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?
Outdated NIC drivers
Which of the following is a purpose of a VLAN?
Decreases bandwidth on a network
Segments broadcast traffic
Increases port speed
Allows another connection to the router
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?
Which of the following layers of the OSI model would a NIC operate on?
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
Karen, a network administrator, has discovered attempts to penetrate the network and access the customer database. Which of the following methods could she use to provide a false customer database to the attacker?
Which of the following OSI layers is included in the TCP/IP model's Application layer?
Which of the following DNS records would allow for a website to have more than one FQDN?
Joe, a customer, is looking to implement wireless security. Which of the following provides the WEAKEST encryption?
Which of the following commands can Sandy, a technician, use on a server to display the default router setting?
A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Sandy, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement?
Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?
Allow UDP port 53
Allow TCP port 80
Allow UDP port 340
Allow TCP port 443
Karen, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?
Denial of service
Joe, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
A VPN client and VPN concentrator
A smart jack installed for each network jack
A managed switch with port mirroring
A proxy server with content filter
Joe, a technician, is asked to install a new wireless router, and make sure access to the new wireless network is secured. Which of the following should be considered for security?
The router has the correct antenna type
The router has SSID disabled.
The router is compatible with 802.11g.
The router is broadcasting on the correct frequency.
Which of the following OSI layers performs error detection using a Frame Check Sequence?
Which of the following commands can Sandy, a network technician, use to check whether the DNS server for a given domain is reachable?
Kurt, a network technician, has been notified that several PCs are infected and are sending spam emails. He wants to add a rule to the firewall to prevent the sending of emails from the internal network. Which of the following rules will prevent this?
Deny TCP port 25 outbound
Deny UDP port 53 outbound
Deny TCP port 110 outbound
Deny UDP port 213 outbound
Which of the following solutions will detect and disable a rogue access point?
Which of the following layers of the OSI model is above the Session layer?
Kurt, a user, is able to connect to a distant wireless network then loses connection. This is an ongoing problem for Kurt and the only wireless network around. Which of the following is MOST likely causing this problem?
Which of the following is the loopback address for IPv6?
Which of the following tools would Sandy, an administrator, use to determine if there is a problem with a telephone line?
Punch down tool
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?
Joe, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement?
Set a separate VLAN on each WAP with the same encryption type
Set the SSID on each WAP and set contiguous WAPs to different channels
Set the SSID on each WAP and set contiguous WAPs to the same channel
Set a separate VLAN on each WAP with the same frequency
Which of the following connectors would Karen, a technician, use only for RG-6 cables?
Which of the following allows for multiple operating systems to be run simultaneously on a single server?
Multiple hard drives
Sandy, a network technician, would like to keep the IP address of the Human Resource department" s server in the same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employee workstations. Which of the following would BEST allow this and have the ability for the server to keep the same IP address?
Implement a set of static IPs for the entire human resource department.
Use a DHCP reservation for the server IP address.
Use a small DHCP scope for the human resource department.
Connect the server to a router in the network closet on the same floor.
Which of the following wireless network standards allows for the HIGHEST speeds?
Sandy, a network technician, needs to push changes out to network devices and also monitor the devices based on each device's MIB. Which of the following should she use?
Which of the following would Joe, a technician, MOST likely use to remotely verify port configuration of a switch?
Which of the following can be used to view the list of ports on which a server is listening?
Which of the following protocols uses port 3389?
Sandy, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).
Punch down tool
Which of the following is an invalid MAC address?
On which of the following layers does a hub function?
Sandy, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Sandy use?
After Kurt, a technician, has established a plan of action to resolve the problem, which of the following steps should he perform NEXT?
Establish a theory of probable cause.
Implement preventative measures.
Verify full system functionality.
Implement the solution or escalate as necessary.
Which of the following protocols does a router use to communicate packets to other routers?
Which TCP/IP model layer does the OSI model layer named 'session' respond to?
Which of the following defines access for a network?
Which of the following protocols would Sandy, a technician, use to disable switch ports automatically to prevent switching loops?
Karen, an administrator, finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
Punch down tool
After a brownout, Kurt, a user, can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue?
Duplicate IP address
The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model?
Which of the following uses copper wiring?
Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issued?
Which of the following is a reason to use dynamic DNS?
The host IP address is not listed in the firewall.
The host IP address is assigned by DHCP.
Static routes cannot be used on the host network.
A third-party certificate is being used.
Sandy, a network consultant, is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every corner of the house. Which of the following additional information will Sandy need to determine the equipment for the installation? (Select TWO).
The length of the house
How many rooms are in the house?
How many users will be using the wireless network?
The building material of the house
The cost of the house
Which of the following tools allows Kurt, an administrator, to test connectivity between two computers?
Which of the following should Joe, a technician, implement to provide high bandwidth to a VoIP application?
Joe, a network technician, is concerned about the environmental effects of power consumption and heat from network resources. Limited space is also a concern. Which of the following technologies should be implemented?
Network address translation
Power over Ethernet
Which of the following is used by RADIUS to encrypt messages between the server and the client?
Which of the following is the MAIN purpose of a packet sniffer?