davhow5368
Test por , creado hace más de 1 año

Study material for comptia network plus

57
1
0
davhow5368
Creado por davhow5368 hace más de 8 años
Cerrar

Comptia Net Plus Pre Test

Pregunta 1 de 20

1

Sandy, the network administrator, has funding to do a major upgrade of the company’s LAN. This
upgrade is currently in the planning stage, and Sandy still needs to determine the network
requirements, bottlenecks, and any future upgrades in mind. Which of the following is the FIRST
step in the planning process?

Selecciona una o más de las siguientes respuestas posibles:

  • Conduct a vulnerability scan

  • Establish a network baseline

  • Conduct traffic analysis

  • Conduct a risk assessment

Explicación

Pregunta 2 de 20

1

Sandy, a network administrator, wants to be able to block all already known malicious activity.
Which of the following would allow her to perform this activity?

Selecciona una de las siguientes respuestas posibles:

  • Behavioral Based IDS

  • Signature Based IDS

  • Behavioral Based IPS

  • Signature Based IPS

Explicación

Pregunta 3 de 20

1

Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?

Selecciona una de las siguientes respuestas posibles:

  • Set up an account with an Internet service provider

  • Create a list of requirements and constraints.

  • Arrange a domain name with a suitable registrar.

  • Choose the correct operating system version.

Explicación

Pregunta 4 de 20

1

Which of the following is an example of two-factor authentication?

Selecciona una de las siguientes respuestas posibles:

  • A username and PIN

  • A username and password

  • A username, password, finger print scan, and smart card

  • A username, password, and key fob number

Explicación

Pregunta 5 de 20

1

Which of the following connector types would Sandy, a network technician, use to connect a serial
cable?

Selecciona una de las siguientes respuestas posibles:

  • RJ-11

  • BNC

  • LC

  • DB-9

Explicación

Pregunta 6 de 20

1

Which of the following would Joe, a technician, configure to modify the time a device will hold an
IP address provided through DHCP?

Selecciona una de las siguientes respuestas posibles:

  • DNS suffixes

  • Leases

  • Static IP addressing

  • Reservations

Explicación

Pregunta 7 de 20

1

Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot
access the Internet. Which of the following is the MOST likely cause of the problem?

Selecciona una de las siguientes respuestas posibles:

  • The signal strength has been degraded and latency is increasing hop count.

  • An incorrect subnet mask has been entered in the WAP configuration.

  • The signal strength has been degraded and packets are being lost.

  • Users have specified the wrong encryption type and routes are being rejected.

Explicación

Pregunta 8 de 20

1

Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but
does not want to use an encryption method. Which of the following methods would be BEST to
accomplish this?

Selecciona una de las siguientes respuestas posibles:

  • MAC filtering

  • SSL VPN

  • PPPoE

  • WPA Enterprise

Explicación

Pregunta 9 de 20

1

Which of the following network topologies, when a single machine's cable breaks, would only
affect one network device and not the rest of the network?

Selecciona una de las siguientes respuestas posibles:

  • Bus

  • Peer-to-peer

  • Ring

  • Star

Explicación

Pregunta 10 de 20

1

Joe, a network technician, is tasked with installing a router and firewall to get an office working
with Internet access. Which of the following features MUST be configured to allow sharing of a
single public IP address?

Selecciona una de las siguientes respuestas posibles:

  • QoS

  • POP3

  • PAT

  • SMTP

Explicación

Pregunta 11 de 20

1

Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?

Selecciona una de las siguientes respuestas posibles:

  • RAS

  • PPTP

  • IPSec

  • ICA

Explicación

Pregunta 12 de 20

1

A company has only three laptops that connect to their wireless network. The company is currently
using WEP encryption on their wireless network. They have noticed unauthorized connections on
their WAP and want to secure their wireless connection to prevent this. Which of the following
security measures would BEST secure their wireless network? (Select TWO).

Selecciona una o más de las siguientes respuestas posibles:

  • Change the encryption method to WPA

  • Limit the DHCP scope to only have three addresses total

  • Enable the SSID broadcast

  • Enable and configure MAC filtering

  • Change the broadcast channel to a less commonly used channel

Explicación

Pregunta 13 de 20

1

Two duplicate pieces of equipment can be used in conjunction for which of the following
purposes? (Select TWO)

Selecciona una o más de las siguientes respuestas posibles:

  • High availability

  • Fault tolerance

  • Reduce latency

  • Wi-MAX

  • CARP

Explicación

Pregunta 14 de 20

1

The location that the local network connection ends and the ISP responsibility begins is known as
the:

Selecciona una de las siguientes respuestas posibles:

  • Access point.

  • Default gateway.

  • IDF connection.

  • Demarcation point.

Explicación

Pregunta 15 de 20

1

Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses.
Which of the following is the MOST likely problem?

Selecciona una de las siguientes respuestas posibles:

  • Incorrect subnet mask

  • Incorrect DNS

  • Missing default gateway

  • Incorrect IPv6 address

Explicación

Pregunta 16 de 20

1

Which of the following sizes is the fixed cell length in ATM?

Selecciona una de las siguientes respuestas posibles:

  • 8 bytes

  • 53 bytes

  • 64 kilobytes

  • 128 kilobytes

Explicación

Pregunta 17 de 20

1

Which of the following network scanners detects and sends out alerts for malicious network
activity?

Selecciona una de las siguientes respuestas posibles:

  • Packet sniffers

  • IDS

  • Port scanners

  • IPS

Explicación

Pregunta 18 de 20

1

Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port
speed to 1000 Mbps. A user’s PC is no longer able to access the network. Which of the following
is MOST likely the problem?

Selecciona una de las siguientes respuestas posibles:

  • The user’s NIC does not support 1Gbps

  • The switch is not compatible with 1000Mbps.

  • The user's NIC does not support 100Mbps.

  • Joe needs to restart the DNS server.

Explicación

Pregunta 19 de 20

1

Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received
successfully at its destination?

Selecciona una de las siguientes respuestas posibles:

  • The transport OSI model layer and the transport TCP/IP model layer

  • The transport OSI model layer and the Internet TCP/IP model layer

  • The network OSI model layer and the transport TCP/IP model layer

  • The network OSI model layer and the Internet TCP/IP model layer

Explicación

Pregunta 20 de 20

1

Which of the following network appliances would facilitate an even amount of traffic hitting each
web server?

Selecciona una de las siguientes respuestas posibles:

  • Load balancer

  • VPN concentrator

  • Proxy server

  • Content filter

Explicación