Website Design Limerick Cork Kerry & Ireland COMPTIA A+ ESSENTIALS Quiz questions and answers. available free of charge.
Reload if needed, should be 100 questions
Joe, a customer, has reported that the wireless signal from a WAP can only be found in one specific corner of a conference room. Which of the following is the MOST likely cause?
Incorrect encryption method
Incorrect antenna type
Incorrect channel
Incorrect SSID identifier
Joe, a user, accidentally unplugs a cable from the patch panel and plugs it into the switch stack. Now, all users are unable to access any network resources. Which of the following is the MOST likely cause?
EMI
Mismatched MTUs
Looping
Faulty module
Kurt and Sandy, users, are reporting that they no longer have network access. A computer icon shows that network connection is unplugged. Which of the following is the MOST likely reason for this?
NIC power failure on the server
Firewall is denying all traffic
Patch panel power failure
Switch power failure
Which of the following technologies is used on cellular networks?
Ethernet
CDMA
CSMA/CA
POTS
Which of the following networking protocols would Kurt, a technician, use to standardize correct time on network devices?
NTP
RTP
FTP
TFTP
Karen, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
MS-CHAP
Kerberos
TACACS+
PKI
Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
802.11a
802.11b
802.11g
802.11n
Which of the following terms correctly defines the event in which multiple dynamic routers agree on the state of the network?
Convergence
Spanning tree
Port mirroring
Link state
Which of the following would Sandy, a technician, find in a network map?
QoS standards
MDF/IDFs
System logs
Firewall rules
Joe, a network technician, has configured a server with the following IP settings: IP Address: 192.168.1.40/27 Default Gateway: 192.168.1.64 DNS: 192.168.1.33 The server cannot access the Internet. Which of the following settings needs to be changed?
Default gateway
IP address
VLAN
DNS
Sandy, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?
TDR
Protocol analyzer
Multimeter
Cable crimper
Which of the following is the broadcast address for a network defined as 192.168.0.0/24?
192.168.0.255
192.168.0.1
C.
D.
192.168.0.0
192.168.0.253
Which of the following describes a single computer that is setup specifically to lure hackers into revealing their methods, and preventing real attacks on the production network?
Evil twin
Honeypot
DMZ
Honeynet
Which of the following network performance methods would Sandy, a technician, use with SIP phones?
CARP
Load balancing
Qos
Caching engines
Which of the following BEST describes the point at which an ISP's responsibility for an Internet connection ends?
Router
MDF
IDF
Demarc
After a switch upgrade, several users report no connection to the Internet, while other users report no problems. Which of the following is the MOST likely problem?
Wrong gateway
Faulty or missing routes
No DNS
VLAN port assignments
When examining a suspected faulty copper network cable. Karen, the administrator, notices that some of the pairs are untwisted too much. This is MOST likely causing which of the following?
DB loss
Dispersion
Collisions
Cross-talk
Joe, a network technician, is installing multiple 802.11 g WAPs with the same SSID. Which of the following channel combinations would allow all three WAPs to operate without interfering with each other?
1, 6, 11
2, 6, 10
3, 5, 9
7, 9, 11
Which of the following capabilities of a firewall allows Kurt, an administrator, to block traffic based on keywords determined by the company?
Stateless traffic monitor
Stateful traffic monitor
Signature identification
Content filter
Which of the following ports would Kurt, a technician, need to open on a firewall to allow SSH on the default port?
20
21
22
23
Which of the following technologies has different upload and download speeds?
OC12
SDSL
OC3
ADSL
Kurt, the network technician, is troubleshooting a network issue by implementing a new security device. After installing and configuring the device, which of the following steps should he take NEXT?
Verify full system functionality
Identify the main problem and question the user
Document their findings, actions, and outcomes
Escalate the issue to upper management.
on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem?
Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable.
Use the DB-9 port with a DB-9 to RJ-45 adapter on the server.
Manually adjust the duplex mode on the server1 slink.
Configure the laptop to receive a DHCP address from the server, rather than manually setting one
Which of the following is a Class A private IP address?
4.2.2.2
10.1.1.45
169.254.9.15
192.168.0 100
Which of the following defines the purpose of a DHCP scope?
To allocate a preset range of MAC addresses available for assignment.
To tell a DHCP server to exclude IP addresses.
To properly configure a DHCP server's allowed bandwidth level.
To allocate a preset range of IP addresses available for assignment.
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?
VLAN
MPLS
VPN
PSTN
Sandy, an administrator, wants to limit the wireless guest network traffic to 100Kbps so that utilization issues do not occur on the company's T1 Internet access network. Which of the following optimizations should Sandy implement?
Load balancing
Caching engine
Traffic shaping
Quality of service
Which of the following tools would Sandy, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together?
Cable tester
Toner probe
Cable crimper
Punch down tool
A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?
SSID disable
ACL rules
WPA encryption
MAC filtering
A wireless LAN discovery tool that sends a null probe request to seek out wireless LANs, is a component of which of the following?
War driving
War chalking
WEP cracking
An evil twin
Joe, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Joe is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat?
Implement WEP encryption
Decrease signal strength
Change wireless channels
Rotate the SSID daily
Karen, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason?
Incorrect DNS
Incorrect subnet mask
Duplicate IP address
Incorrect SSID
Karen, a technician, is connecting a new desktop computer to a switch. She was only able to locate one cable in the office for the installation. The wires at each end are color coded as follows: End A: orange-white, orange, green-white, blue, blue-white, green, brown-white, brown End B: green-white, green, orange-white, blue, blue-white, orange, brow-white, brown Which of the following should Karen do to complete the installation?
Re-end the provided cable, keeping the wiring the same.
Use the provided cable
Purchase a crossover cable.
Purchase a straight-through cable
Which of the following identifies the WLAN Joe, a user, is connected to?
SSID
Frequency
WEP
Channel
Which of the following describes the purpose of DHCP?
Applying prioritization to certain types of network traffic.
Resolving FQDNs to IP addresses.
Filtering web content based on keywords.
Dynamic assignment of IP addresses.
Joe, a technician, is configuring a wireless access point. Which of the following channels should he use if the LEAST interference potential is desire
1, 6, 11
2, 5, 10
3, 7, 10
7, 8, 9
Sandy, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Sandy use in this scenario?
Event logs
Baselinee
Change management
Syslog
Which of the following connectors push and twist-on?
LC
SC
ST
RJ-45
Joe, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems compared to the limited number of wireless devices used. Joe believes that other nonemployees are using the wireless network to access the Internet. Which of the following could be used tolimit the access to the wireless network? (Select TWO).
WPA encryption
Changing wireless channels
MAC filtering
Changing wireless speed standard
SSID disable
Which of the following network appliances can BEST be described as allowing multiple servers to share
requests for a website through the same public IP address?
VPN concentrator
Content filter
Load balancer
Proxy server
Joe, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems compared to the limited number of wireless devices used. Joe believes that other nonemployees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).
WPA encryption
Changing wireless channels
MAC filtering
Changing wireless speed standards
SSID disable
Which of the following security devices is used in providing packet and MAC address filtering services for the network?
Host-based proxy server
Network-based firewall
IDS
IPS
Which of the following media types will block EMI?
UTP
Serial
STP
Non-plenum
Joe, a customer, wants to have wireless network access only in the conference room. He has placed a WAP in the room, but notices that offices across the hall also receive a wireless signal. Which of the following could be done together to solve this problem? (Select TWO).
Turn down the signal gain.
Increase the encryption method.
Change the wireless channel.
Replace the WAP's antennas with directional antennas
Disable the SSID
Kurt, a user, is having difficulty connecting a laptop to the company's wireless network. The technician
determines Kurt's wireless NIC has failed and replaces it. Which of the following network troubleshooting
methodology steps should the technician do NEXT?
Implement the solution
Verify full system functionality
Test the theory to determine cause
Establish a plan of action to resolve the problem
Which of the following devices will allow Sandy, a user, to see a cached copy of websites?
Content switch
DNS server
Proxy server
Load balancer
An organization currently has CAT5e cabling throughout its office. Karen, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause?
Improper grounding
TXRX reversed
Incorrect termination
Outdated NIC drivers
Which of the following is a purpose of a VLAN?
Decreases bandwidth on a network
Segments broadcast traffic
Increases port speed
Allows another connection to the router
Which of the following is an authentication, authorization, and accounting method that provides administrative access to network devices?
PKI
TACACS+
CHAP
SSH
Which of the following layers of the OSI model would a NIC operate on?
Physical
Network
Session
Transport
Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following?
IP filtering
Application filtering
MAC filtering
Port filtering
Karen, a network administrator, has discovered attempts to penetrate the network and access the customer database. Which of the following methods could she use to provide a false customer database to the attacker?
Radius
DMZ
Honeypot
Kerberos
Which of the following OSI layers is included in the TCP/IP model's Application layer?
Data Link
Session
Transport
Network
Which of the following DNS records would allow for a website to have more than one FQDN?
TXT
PTR
MX
CNAME
Joe, a customer, is looking to implement wireless security. Which of the following provides the WEAKEST encryption?
SSH
WEP
TLS
EAP
Which of the following commands can Sandy, a technician, use on a server to display the default router setting?
ping
nslookup
route
arp
A company is expanding and has found that logging into each device to collect error information is consuming too much time. They have asked Sandy, a network administrator, to set up a server that will capture errors from each device automatically. Which of the following technologies would BEST fit this requirement?
Syslog
RADIUS
IPSec
Network sniffer
Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?
Allow UDP port 53
Allow TCP port 80
Allow UDP port 340
Allow TCP port 443
Karen, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress?
Man-in-the-middle
Denial of service
Ping flooding
Smurfing
Joe, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
A VPN client and VPN concentrator
A smart jack installed for each network jack
A managed switch with port mirroring
A proxy server with content filter
Joe, a technician, is asked to install a new wireless router, and make sure access to the new wireless network is secured. Which of the following should be considered for security?
The router has the correct antenna type
The router has SSID disabled.
The router is compatible with 802.11g.
The router is broadcasting on the correct frequency.
Which of the following OSI layers performs error detection using a Frame Check Sequence?
Session
Transport
Physical
Data link
Which of the following commands can Sandy, a network technician, use to check whether the DNS server for a given domain is reachable?
nmap
nbtstat
dig
arp
Kurt, a network technician, has been notified that several PCs are infected and are sending spam emails. He wants to add a rule to the firewall to prevent the sending of emails from the internal network. Which of the following rules will prevent this?
Deny TCP port 25 outbound
Deny UDP port 53 outbound
Deny TCP port 110 outbound
Deny UDP port 213 outbound
Which of the following solutions will detect and disable a rogue access point?
Port scan
Packet sniffer
IPS
IDS
Which of the following layers of the OSI model is above the Session layer?
Data link
Presentation
Physical
Transport
Kurt, a user, is able to connect to a distant wireless network then loses connection. This is an ongoing problem for Kurt and the only wireless network around. Which of the following is MOST likely causing this problem?
Signal strength
Encryption type
Incorrect SSID
Incorrect channel
Which of the following is the loopback address for IPv6?
::1
::255
127.0.0.254
127:0:0:1
Which of the following tools would Sandy, an administrator, use to determine if there is a problem with a telephone line?
Port scanner
Punch down tool
Butt set
Toner probe
A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following?
Packet sniffing
Packet filter
Stateful inspection
Content filter
Joe, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement?
Set a separate VLAN on each WAP with the same encryption type
Set the SSID on each WAP and set contiguous WAPs to different channels
Set the SSID on each WAP and set contiguous WAPs to the same channel
Set a separate VLAN on each WAP with the same frequency
Which of the following connectors would Karen, a technician, use only for RG-6 cables?
F-connector
MTRJ
RJ-45
RS-232
Which of the following allows for multiple operating systems to be run simultaneously on a single server?
Dual boot
Multiple hard drives
PXE boot
Virtual machines
Sandy, a network technician, would like to keep the IP address of the Human Resource department" s server in the same group of 100 DHCP IP addresses that are assigned to the Human Resource department's employee workstations. Which of the following would BEST allow this and have the ability for the server to keep the same IP address?
Implement a set of static IPs for the entire human resource department.
Use a DHCP reservation for the server IP address.
Use a small DHCP scope for the human resource department.
Connect the server to a router in the network closet on the same floor.
Which of the following wireless network standards allows for the HIGHEST speeds?
802.11a
802.11b
802.11g
802.11n
Sandy, a network technician, needs to push changes out to network devices and also monitor the devices based on each device's MIB. Which of the following should she use?
SNMP
Traffic analysis
Syslog
Asset management
Which of the following would Joe, a technician, MOST likely use to remotely verify port configuration of a switch?
traceroute command
SNMP monitor
nbtstat command
dig command
Which of the following can be used to view the list of ports on which a server is listening?
dig
net statistics
netstat
nslookup
Which of the following protocols uses port 3389?
IMAP
DHCP
SSH
RDP
Sandy, a technician, needs to customize various cable lengths and verify that the cables are working correctly. Which of the following tools would be needed to accomplish this? (Select TWO).
Cable certifier
Multimeter
Crimper
Punch down tool
Loopback plug
Which of the following is an invalid MAC address?
AA:CE:58:FD:90:08
44:98:3E:F8:33:23
56:AD:BX89:55:54
94:9E:FE:EE:8C:DF
On which of the following layers does a hub function?
Transport
Data link
Physical
Network
Sandy, an administrator, is experiencing availability issues on a Linux server. She decides to check the server for an IP address conflict on the server. Which of the following commands should Sandy use?
Traceroute
Tracert
Ifconfig
Ipconfig
After Kurt, a technician, has established a plan of action to resolve the problem, which of the following steps should he perform NEXT?
Establish a theory of probable cause.
Implement preventative measures.
Verify full system functionality.
Implement the solution or escalate as necessary.
Which of the following protocols does a router use to communicate packets to other routers?
RIP
VLAN
STP
VTP
Which TCP/IP model layer does the OSI model layer named 'session' respond to?
Application
Presentation
Internet
Transport
Which of the following defines access for a network?
ACL
RDF
RAS
ARP
Which of the following protocols would Sandy, a technician, use to disable switch ports automatically to prevent switching loops?
RIP
OSPF
STP
EGP
Karen, an administrator, finds a phone line but does not know where the line goes or if it is active. Which of the following can be used to test if it is active?
Butt set
Punch down tool
Cable tester
Cable stripper
After a brownout, Kurt, a user, can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue?
Switching loop
Power failure
Broadcast storm
Duplicate IP address
The protocols that use a three way handshake to transfer information can be found within which layer of the OSI model?
Layer 2
Layer 3
Layer 4
Layer 5
Which of the following uses copper wiring?
10GBaseER
10GBaseLW
100BaseFX
1000BaseT
Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issued?
Increased uptime
Caching engines
Traffic shaping
Load balancing
Which of the following is a reason to use dynamic DNS?
The host IP address is not listed in the firewall.
The host IP address is assigned by DHCP.
Static routes cannot be used on the host network.
A third-party certificate is being used.
Sandy, a network consultant, is asked to set up a wireless network in a home. The home user wants the wireless network to be available in every corner of the house. Which of the following additional information will Sandy need to determine the equipment for the installation? (Select TWO).
The length of the house
How many rooms are in the house?
How many users will be using the wireless network?
The building material of the house
The cost of the house
Which of the following tools allows Kurt, an administrator, to test connectivity between two computers?
route
ping
ipconfig
tfconfig
Which of the following should Joe, a technician, implement to provide high bandwidth to a VoIP application?
Caching engines
Fault tolerance
Load balancing
High availability
Joe, a network technician, is concerned about the environmental effects of power consumption and heat from network resources. Limited space is also a concern. Which of the following technologies should be implemented?
Circuit switching
Network address translation
Power over Ethernet
Virtual servers
Which of the following is used by RADIUS to encrypt messages between the server and the client?
Public key
CSU/DSU
Private key
Shared secret
Which of the following is the MAIN purpose of a packet sniffer?