CompTIA Network+ Practice Tests. Craig Zacker

Читать онлайн книгу.

CompTIA Network+ Practice Tests - Craig Zacker


Скачать книгу
is installing a wireless LAN that includes three Access Points (APs) to provide coverage for a large building. Which of the following must Ralph do to ensure that users are able to roam without interruption from one AP to another using their portable devices? (Choose all that apply.)Configure each AP with the same IP address.Configure each AP with the same security passphrase.Configure each AP to use the same security protocol.Configure each AP with the same SSID.

      187 Which of the following is the maximum theoretical download speed for a 5G cellular network?42 megabits per second150 megabits per second1 gigabit per second10 gigabits per second100 gigabits per second

      188 Which of the following statements about 5G cellular networks are true? (Choose all that apply.)5G networks can operate on three frequency bands.5G networks with the highest speeds also have a more limited range.4G devices can connect to 5G networks at reduced speeds.On a 5G network, the lower frequency bands provide the highest speeds.

      189 Which of the following IEEE standards describes an implementation of port-based access control for wireless networks?802.11ac802.11n802.1X802.3x

      190 Unauthorized users are connecting to your Wireless Access Point (WAP) and gaining access to the network. Which of the following are steps you can take to prevent this from happening? (Choose all that apply.)Disable SSID broadcasting.Use Kerberos for authentication.Place the Access Point (AP) in a DMZ.Implement MAC address filtering.

      191 On a Wireless Access Point (WAP) that uses an Access Control List (ACL) to specify which devices are permitted to connect to the network, which of the following is used to identify the authorized devices?UsernamesIP addressesDevice namesMAC addresses

      192 On a network carrying both voice and data traffic, separate Virtual Local Area Networks (VLANs) enable the voice traffic to be assigned a higher priority than the data traffic. Which of the following are methods for identifying the packets carrying voice traffic, so the switches can assign them to the voice VLAN? (Choose all that apply.)MAC addressesVLAN tagsIP addressesDNS names

       THE COMPTIA NETWORK+ EXAM N10-008 TOPICS COVERED IN THIS CHAPTER INCLUDE THE FOLLOWING:

       3.1 Given a scenario, use the appropriate statistics and sensors to ensure network availability.Performance metrics/sensorsDevice/chassisTemperatureCentral processing unit (CPU) usageMemoryNetwork metricsBandwidthLatencyJitterSNMPTrapsObject identifiers (OIDs)Management information bases (MIBs)Network device logsLog reviewsTraffic logsAudit logsSyslogLogging levels/severity levelsInterface statistics/statusLink state (up/down)Speed/duplexSend/receive trafficCyclic redundancy checks (CRCs)Protocol packet and byte countsInterface errors or alertsCRC errorsGiantsRuntsEncapsulation errorsEnvironmental factors and sensorsTemperatureHumidityElectricalFloodingBaselinesNetFlow dataUptime/downtime

       3.2 Explain the purpose of organizational documents and policies.Plans and proceduresChange managementIncident response planDisaster recovery planBusiness continuity planSystem life cycleStandard operating proceduresHardening and security policiesPassword policyAcceptable use policyBring your own device (BYOD) policyRemote access policyOnboarding and offboarding policySecurity policyData loss preventionCommon documentationPhysical network diagramFloor planRack diagramIntermediate distribution frame (IDF)/main distribution frame (MDF) documentationLogical network diagramWiring diagramSite survey reportAudit and assessment reportBaseline configurationsCommon agreementsNon-disclosure agreement (NDA)Service-level agreement (SLA)Memorandum of understanding (MOU)

       3.3 Explain high availability and disaster recovery concepts and summarize which is the best solution.Load balancingMultipathingNetwork interface card (NIC) teamingRedundant hardware/clustersSwitchesRoutersFirewallsFacilities and infrastructure supportUninterruptible power supply (UPS)Power distribution units (PDUs)GeneratorHVACFire suppressionRedundancy and high availability (HA) conceptsCold siteWarm siteHot siteCloud siteActive-active vs. active-passiveMultiple Internet service providers (ISPs)/diverse pathsVirtual Router Redundancy Protocol (VRRP)/First Hop Redundancy Protocol (FHRP)Mean time to repair (MTTR)Mean time between failure (MTBF)Recovery time objective (RTO)Recovery point objective (RPO)Network device backup/restoreStateConfiguration

      1 After starting work as the network administrator of Wingtip Toys, you discover that all of the switches in the company's datacenter have support for remote management, with built-in Simple Network Management Protocol (SNMP) agents in each port. Which of the following tasks must you perform to be able to gather information from the agents on those switches and display it on a central console? (Choose all that apply.)Install the network management software on a network computer.Install a Management Information Base (MIB) on each of the switches.Install an agent on the console computer.Install an MIB on the console computer.Purchase a network management product.

      2 Which versions of the Simple Network Management Protocol (SNMP) do not include any security protection other than a cleartext community string? (Choose all that apply.)SNMPv1SNMPv2SNMPv2cSNMPv3

      3 Which of the following statements about the Simple Network Management Protocol (SNMP) are not true? (Choose all that apply.)To effectively monitor a network using SNMP, you must be sure that all of the equipment you purchase when designing and building your network supports the protocol.SNMP is not only the name of a protocol, it is also the name of a network management product.SNMPv1 and SNMPv2 rely on a community string as their only means of security.Most of the network management products on the market today support SNMPv3.

      4 What Windows utility is shown in the accompanying figure?Network MonitorSystem MonitorEvent ViewerLog Viewer

      5 Which of the following was created to provide logging services for the Unix sendmail program?SyslogNetstatSNMPCARP

      6 You are the network administrator of your company's network. Your company wants to perform a baseline analysis of network-related traffic and statistics. They want to track broadcasts, Cyclical Redundancy Check (CRC) errors, and collisions for all traffic traversing a switched network. In addition, they want to provide historical and daily reports for management. They also want to keep track of software distribution and metering. What type of network software product best meets these needs?SNMP managementProtocol analyzerPerformance MonitorNetwork traffic monitor

      7 Which of the following technologies provides both real-time monitoring of security events and automated analysis of the event information gathered?SIEMSNMPSEMSIM

      8 SIEM products combine the capabilities of which of the following? (Choose all that apply.)SyslogSNMPSEMSIM

      9 Which of the following statements about web server logs is not true?To analyze web server activity, you typically use an application that interprets the web server log files.Web server logs are typically maintained as text files.Web server logs record the IP addresses of all visiting users.To interpret web server logs, you use a protocol analyzer.

      10 Which of the following statements best describes a baseline?A baseline is an estimation of expected performance levels, based on manufacturers’ specifications.A baseline is a record of performance levels captured under actual workload conditions.A baseline is a record of performance levels captured under simulated workload conditions.A baseline is a record of performance levels captured before the system is actually in use.

      11 When monitoring performance metrics on one of your servers, you notice that the server is utilizing 100 percent of the network bandwidth available to it. What modification could you make to the server that will most likely address the problem?Add memory to the system.Install a second network adapter.Update the network adapter's firmware.Install a second processor.

      12 Which of the following indicators is typically not included in an operating system's performance monitoring tool, such as the Windows Performance Monitor or the MacOS Activity Monitor?TemperatureCPU/processor activityMemory consumptionNetwork utilizationStorage statistics

      13 Which of the following syslog message severity levels indicates that a system is unusable?01234

      14 Which of the following syslog message severity levels indicates a call for immediate action?01234

      15 Which of the following syslog message severity


Скачать книгу