Comptia Questions and Answer 3 Sourced by Pinguis Web
 
  1. In the 2.4GHz range, which of the following channel combinations are non-overlapping?
    1.   1, 6, 11
    2.   2, 7, 10
    3.   2, 8, 13
    4.   3, 6, 9
  2. Which of the following is the port number used by HTTP?
    1.   21
    2.   80
    3.   443
    4.   3389
  3. Which of the following is most effective against threats when used with an updated server?
    1.   Kerberos server
    2.   Stateful firewall
    3.   Content filter
    4.   IDS
    5.   VPN concentrator
  4. A crossover cable is MOST commonly associated with which of the following layers of the OSI model?
    1.   Session
    2.   Application
    3.   Network
    4.   Physical
  5. For security reasons Kurt, a network technician, wants to install a Linux based email server. Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to
    reduce hardware costs?
    1.   VPN concentrator
    2.   Virtual servers
    3.   Wireless
    4.   Multimode fiber
  6. A company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?
    1.   IS-IS
    2.   BGP
    3.   OSPF
    4.   RIP
  7. A layer 3 switch can move packets between subnets based on which of the following criteria?
    1.   802.1q tag
    2.   Port
    3.   Application
    4.   IP address
  8. Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?
    1.   Honeynet
    2.   Honeypot
    3.   Vulnerability scanner
    4.   Network based IDS
  9. A bridge handles frames at which of the following layers of the OSI model?
    1.   Network
    2.   Session
    3.   Transport
    4.   Data Link
  10. Joe, an administrator, is using a punch-down tool to connect a cable. To which of the following is Joe MOST likely connecting?
    1.   A 110 block
    2.   A demarc
    3.   A DB-9
    4.   A smart jack
  11. Joe, an administrator, has just finished installing a new switch and connected two servers with IPs of
    192.168.105.20 and 30.
    The servers are able to communicate with each other, but are unable to reach the Internet. Joe sees the following information in the switch configuration: Interface VLAN 105 IP address 192.168.105.5 255.255.255.0 Joe is able to ping the router at 192.168.105 1 from the switch. Which of the following is the MOST likely cause of the problem?
    1.   The subnet mask is incorrect.
    2.   A routing loop has occurred.
    3.   Joe used a crossover cable to connect the switch to the gateway
    4.   The server is missing default-gateway information
  12. Which of the following wireless technologies can support the MOST allowable MIMO streams?
    1.   802.11a
    2.   802.11b
    3.   802.11g
    4.   802.11n
  13. Which of the following devices should Joe, an administrator, connect to a protocol analyzer in order to collect all of the traffic on a LAN segment?
    1.    Hub
    2.   VLAN
    3.   Router
    4.   Server
  14. Switch A is configured with VLAN 105 and 106. Switch B is configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?
    1.   Reverse ARP
    2.   Full duplex on the fiber link
    3.   PoE
    4.   802.1q trunking
  15. Sandy, a user, is unable to access the company website on a laptop. A network technician verifies that the user can access other Internet pages. According to network troubleshooting methodology, which of the following steps should be taken NEXT?
    1.   Remotely connect to Sandy's laptop and review the network configuration settings.
    2.   Ping the web server from inside the network to ensure it is still up and running.
    3.   Check to make sure the company's website is accessible from the Internet.
    4.   Ensure the Ethernet cable is securely plugged into Sandy's laptop.
  16. Karen, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology?
    1.   Verify full system functionality and if applicable implement preventative measures.
    2.   Implement the solution or escalate as necessary.
    3.   Document findings, actions, and outcomes.
    4.    Establish a theory of probable cause (e.g. question the obvious).
  17. Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?
    1.   802.11a
    2.   802.11b
    3.   802.11g
    4.   802.11n
  18. A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?
    1.   WEP
    2.   Port filtering
    3.   WPA
    4.   Longer SSID broadcast intervals
  19. Which of the following ports is the default telnet port?
    1.   
      20
    2.   21
    3.   22
    4.   23
  20. Sandy, a network technician, is attempting to map a FQDN to an internal server at the address of 10.0.0.15 without NAT/PAT. Which of the following is the reason this will ultimately not work?
    1.   This is a private address which cannot be seen by external users.
    2.   The address does not have the appropriate subnet mask assigned.
    3.   This is a public address which can only be seen by internal users.
    4.   This is a private address which can only be seen by external users.
  21. Which of the following is the network topology in which computers connect to form a straight line?
    1.   Ring
    2.   Star
    3.   Bus
    4.   Mesh
  22. Users have reported slow access limes when retrieving information from a server on the company's

    network. Which of the following tools would provide access time information on each segment of the

    network to reach the server?
    1.   arp
    2.   route
    3.   ipconfig
    4.   tracert
  23. Karen, a network administrator, needs to add an additional connection to a room. She adds a new Ethernet switch and must connect it to an existing switch. Which cable type should Karen use to connect the two switches?
    1.   CAT3cable
    2.   Serial cable
    3.   Crossover cable
    4.   Rollover cable
  24. Which of the following DNS record types provides the hostname to IP address mapping?
    1.   A record
    2.   NS record
    3.   CNAME record
    4.   MX record
  25. The selection of the correct punch down tool to use depends on which of the following?
    1.   Connector type
    2.   Demarcation point location
    3.   Block type
    4.   Switch location
  26. Which of the following uses a ring topology?
    1.   DSL
    2.   Ethernet
    3.   DOCSIS
    4.   SONET
  27. A company wants to secure access to its internal wireless network. The company wants to use the most secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?
    1.   WEP encryption
    2.   Channel rotation
    3.   Disable SSID
    4.   WPA encryption
  28. 1000BaseT has a MAXIMUM run distance of:
    1.   25 meters (82 feet)
    2.   100 meters (328 feet)
    3.   500 meters (1640 feet)
    4.   1000 meters (3280 feet)
  29. Sandy, an administrator, attempts to open a web page and sees the following error 'Error 404: Page not found'.
    She then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?
    1.   Layer 1
    2.   Layer 4
    3.   Layer 5
    4.   Layer 7
  30. Which of the following protocols is Joe, a technician, using to encrypt data between web servers and web browsers?
    1.   SMTP
    2.   SIP
    3.   HTTP
    4.   SSL
  31. Which of the following would Karen, a technician, use in voice over IP communications?
    1.   SNTP
    2.   SCP
    3.   SMTP
    4.   SIP
  32. Kurt, an administrator, needs to install a new 100 foot (30 meter) cable run from an IDF switch to the MDF, through a room that has a large number of motors. Which of the following would be the BEST cable type to choose?
    1.   CAT3
    2.   STP
    3.   Coaxial
    4.   Fiber
  33. Karen, a customer, wants to install a wireless network into a shared office space. There are several other wireless networks from other companies that can be detected within the office space. Which of the following should be configured on Karen's wireless network to differentiate it from other wireless network and still provide the BEST performance and security? .
    1.   SSID
    2.   Channel
    3.   Antenna type
    4.   Wireless standard
    5.   NAT
  34. Joe, a user, can no longer access the accounting file share, but others are still able to access the share.
    Which of the following would be the FIRST step in troubleshooting the issue?
    1.   Notify senior management of the issue.
    2.   Develop a probable cause theory.
    3.   Ask Joe if anything has changed on the system.
    4.   Escalate the issue to the vendor.
  35. Which of the following wiring standards would Karen, a technician, MOST likely use to interconnect two devices without the use of a hub or switch?
    1.   568A
    2.   568B
    3.   Crossover
    4.   Loopback
  36. Which of the following would provide Kurt, a technician, with a performance reference point to refer back to after hardware repair?
    1.   Baseline
    2.   Network map
    3.   Wire scheme
    4.   Asset management
  37. Which of the following connector types is MOST commonly found with coaxial cabling?
    1.   DB-9
    2.   BNC
    3.   RJ-45
    4.   RJ-11
  38. Which of the following connector types will MOST likely be located on a serial cable?
    1.   DB-9
    2.   LC
    3.   ST
    4.   BNC
  39. Kurt, a user, on a network cannot access any network resources. The link light on his computer shows that a connection is present. Which of the following is the MOST likely cause of the problem?
    1.   The wrong cable type has been used
    2.   IDS has shut down the computer's switch port
    3.   The port on the switch is configured incorrectly
    4.   Spanning tree protocol was implemented
  40. Which of the following basic devices blocks ports and can sometimes filter data?
    1.   Repeater
    2.   Hub
    3.   Firewall
    4.   Switch
  41. Which of the following protocols is commonly used for VoIP technology?
    1.   Telnet
    2.   SMTP
    3.   SIP
    4.   SNMP
  42. Which of the following metrics indentifies the number of connections that is between two devices?
    1.   Hop count
    2.   MTU
    3.   Latency
    4.   Bandwidth
  43. A router that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is and example of which of the following?
    1.   NAT
    2.   IDS
    3.   NMAP
    4.   DMZ
  44. Karen, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Karen purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
    1.   Install two CAT6 cables with a repeater.
    2.   Install a 500 foot (152 meter) CAT5 cable.
    3.   Install a 500 foot (152 meter) CAT5e cable.
    4.   Install three CAT6 cables with a repeater.
  45. Kurt, the network administrator, has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. Kurt checks the port connecting the new switch to the core switch and sees the following
    information:

    #show run interface GigabitEthernet 0/10
    Switchport trunk encapsulation dotlq
    Switchport mode trunk
    Switchport trunk native VLAN 10

    Which of the following is the MOST likely cause of the slow connections?
    1.   The servers have not had VLAN tagging enabled on their NICs
    2.   Speed and duplex have not been set
    3.   VLAN tagging was not set on the trunk
    4.   The servers have been connected with CAT5 cable
  46. Karen, an administrator, wants to list all the network connections to and from the server. Which of the following commands would MOST likely be used?
    1.   traceroute
    2.   ping
    3.   ipconfig
    4.   netstat
  47. A company plans to implement a wired network between several computers. The company wants this network to be able to have a transmission rate of 1Gbps. Which of the following cable types should be purchased?
    1.   Coaxial
    2.   CAT3
    3.   CAT5
    4.   CAT5e
  48. Which of the following regulates the amount of network traffic a single node receives in a server cluster?
    1.   Load balancer
    2.   Proxy server
    3.   Content filter
    4.   Quality of service
  49. Before installing a wireless network, which of the following should Karen, a network technician, take into consideration to reduce signal exposure for war drivers?
    1.   Device placement
    2.   MAC address filtering
    3.   User authentication
    4.   Encryption protocols
  50. Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? .
    1.   22
    2.   23
    3.   143
    4.   161
    5.   162
    6.   8080
  51. Which of the following virtual components maintains a MAC-to-port forwarding table?
    1.   Virtual PBX
    2.   Virtual desktop
    3.   Virtual switch
    4.   Virtual server
  52. In which of the following layers of the OSI model does the TCP protocol operate?
    1.   Session
    2.   Network
    3.   Data link
    4.   Transport
  53. Which of the following DNS records would be queried to locate a company's mail server?
    1.   A
    2.   MX
    3.   AAAA
    4.   CNAME
  54. Which of the following improves wireless performance only allowing only one wireless transmission on the network at a time?
    1.   CSMA/CA
    2.   CSMA/CD
    3.   Wireless encryption
    4.   Wireless bonding
  55. Creating a uniform user environment throughout the network can BEST be achieved by using which of the following?
    1.   Honeypots
    2.   Virtual switches
    3.   Virtual PBX
    4.   Virtual desktops
  56. After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should Joe, the technician, do NEXT to determine where the network problems are occurring?
    1.   Upgrade the firmware on all routers and switches
    2.   Reboot the entire network one device at a time
    3.   Conduct a network traffic analysis
    4.   Rerun the baseline to ensure the results were correct
  57. he location where the Telco wiring stops and the clients wiring starts is known as the:
    1.   MDF
    2.   demarc
    3.   IDF
    4.   66 block
  58. Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack?

    .
    1.   Physical
    2.   Session
    3.   Data Link
    4.   Network
    5.   Transport
  59. Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?
    1.   Baselines
    2.   Regulations
    3.   Logical network diagrams
    4.   Wiring schematics
  60. Keyword and blacklist filtering would be handled at which level in a network?
    1.   Layer 2 managed switch
    2.   DHCP server
    3.   Hardware firewall
    4.   Bridge
  61. A common technique used to prevent the unauthorized network devices from sending traffic across a network is port.
    1.   spanning
    2.   address translation
    3.   mirroring
    4.   authentication
  62. When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?
    1.   5 and 6
    2.   1 and 6
    3.   6 and 10
    4.   2 and 6
  63. Which of the following devices transmits timed broadcasts onto an active network?
    1.   Bridge
    2.   Unmanaged switch
    3.   DHCP client
    4.   Firewall
  64. Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?
    1.   A short
    2.   Open pairs
    3.   ESD
    4.   EMI
  65. Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?
    1.   Switch
    2.   Smart jack
    3.   Router
    4.   Patch panel
  66. Which of the following can be an STP cable?
    1.   RG-6
    2.   CAT5e
    3.   Fiber
    4.   RG-59
  67. Which of the following is used to identify active hosts along with their network addresses?
    1.   Port scan
    2.   Ping sweep
    3.   IDS
    4.   NIPS
  68. A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?
    1.   Document the solution and process.
    2.   Establish the most probable cause.
    3.   Implement and test the solution.
    4.   Identify additional symptoms and problems
  69. Which of the following tools should be used to determine the listening port of the web server?
    1.   Route
    2.   Ifconfig
    3.   Netstat
    4.   Nslookup
  70. Which of the following utilities can be used to list the routing table?
    1.   ipconfig
    2.   nslookup
    3.   netstat
    4.   dig
  71. Which of the following is a multifunction device in a SOHO network?
    1.   Bandwidth shaper
    2.   Proxy server
    3.   Wireless router
    4.   Load balancer
  72. At which of the following layers does the TFTP protocol operate?
    1.   Layer 1
    2.   Layer 4
    3.   Layer 5
    4.   Layer 7
  73. Which of the following is an EGP routing protocol?
    1.   IGP
    2.   OSPF
    3.   BGP
    4.   RIP
  74. Which of the following is used by RADIUS to encrypt messages between the server and the client?
    1.   Public key
    2.   CSU/DSU
    3.   Private key
    4.   Shared secret
  75. Which of the following is the name of the routing update process involved when a change occurs in the routing environment?
    1.   Supernetting
    2.   Dynamic
    3.   Subletting
    4.   Convergence
  76. Which of the following is MOST commonly powered using PoE?
    1.   Routers
    2.   Switches
    3.   Laptops
    4.   Access points
  77. Which of the following should an administrator do after running a command from the console on the perimeter router?
    1.   Update the configuration logs
    2.   Update the network wiring schematics
    3.   Update the network configuration procedures
    4.   Compare the configuration with the baseline
  78. Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?
    1.   ARP spoofing
    2.   VLAN
    3.   Mirroring
    4.   Spanning tree
  79. Which of the following utilities would be used to display a NIC's cache of MAC addresses?
    1.   arp
    2.   nslookup
    3.   dig
    4.   netstat
  80. Which of the following WAN technologies uses a telephone cable?
    1.   POTS
    2.   FDDI
    3.   SONET
    4.   Cable modem
  81. Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?
    1.   Gateway
    2.   Hub
    3.   Bridge
    4.   Router
  82. Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?
    1.   IDS
    2.   VPN
    3.   NIPS
    4.   HIDS
  83. At which of the following layers does the ICMP protocol operate?
    1.    Layer 1
    2.   Layer 3
    3.   Layer 4
    4.   Layer 5
  84. A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?
    1.   The client does not support 802.11n.
    2.   Incorrect frequency on the client is being used.
    3.   Incorrect encryption on the AP.
    4.   The client distance from the AP.
  85. Which of the following are common VPN transports?
    1.   RDP
    2.   VNC
    3.   SSL
    4.   PPTP
    5.   RAS
  86. Which of the following interfaces is used to connect analog devices to the Internet?
    1.   POTS
    2.   ATM
    3.   VDSL
    4.   SDSL
  87. Which of the following would contain information regarding network device alerts using SNMP?
    1.   Syslog
    2.   Audit log
    3.   History log
    4.   Ping sweep reports
  88. A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?
    1.   Network maps
    2.   Change management
    3.   Baselines
    4.   Cable management
  89. Which of the following are valid MAC addresses?
    1.   00-1C-1F-2C-13-43
    2.   FFFF.FFFF.FFFF
    3.   00-1B-26-3F-B1-16-34
    4.   00-01-1E-2F-B3-16-01
    5.   001C.1G2F.1234
  90. Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?
    1.   nbtstat
    2.   dig
    3.   netstat
    4.   hostname
  91. Which of the following is a correct IP ACL?
    1.   PERMIT 192.268.20.1
    2.   DROP 00-12-34-56-78-9A
    3.   DENYO:::0:::0:::3
    4.   DENY ANY ANY
    5.   PERMIT 192.168 1.100 80
  92. Which of the following is an example of a MAC address?
    1.   10.0.10.1
    2.   1A-23-F9-CD-06-9L
    3.   1A-23-F9-CD-06-9B
    4.   1A-23-F9-CD-06-9B-23-5C
  93. Which of the following is a performance optimization technology?
    1.   QoS
    2.   Trunking
    3.   Spanning
    4.   VoIP
  94. A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?
    1.   Identity symptoms and problems
    2.   Document the process and solutions
    3.   Establish the most probable cause
    4.   Escalate if necessary.
  95. By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email? .
    1.   21
    2.   25
    3.   80
    4.   110
    5.   123
  96. A Stateful firewall is MOST useful in protecting against which of the following network scans?
    1.   PING
    2.   UDP
    3.   Xmas
    4.   ACK
  97. Which of the following would be BEST to use when identifying HTTP traffic running on TCP port 53?
    1.   Network layer firewall
    2.   Stateful inspection firewall
    3.   Zone aware firewall
    4.   Application layer firewall
  98. An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?
    1.   NAT
    2.   Dynamic
    3.   Subnetting
    4.   Static
  99. Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices? .
    1.   Trap receivers
    2.   HTTPS
    3.   Authentication
    4.   Privacy
    5.   Availability
  100. An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?
    1.   SNAT
    2.   SNAP
    3.   NAC
    4.   MPLS