CompTIA Network+ Question C-81

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?

A. WPA2
B. IPv6
C. SNMPv3
D. RIPv2

Correct Answer: C

Explanation:
To manage the remote network devices we need to use a network management protocol. SNMP has become the de facto standard of network management protocols. The security weaknesses of SNMPv1 and SNMPv2c are addressed in SNMPv3.

CompTIA Network+ Question C-80

An F-connector is used on which of the following types of cabling?

A. CAT3
B. Single mode fiber
C. CAT5
D. RG6

Correct Answer: D

Explanation:
An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and universally for satellite television and cable modems, usually with RG-6/U cable or, in older installations, with RG-59/U cable.

CompTIA Network+ Question C-79

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub

Correct Answer: A

Explanation:
The question states that the traffic being transported is a mixture of multicast and unicast signals. There are three basic types of network transmissions: broadcasts, which are packets transmitted to every node on the network; unicasts, which are packets transmitted to just one node; and multicasts, which are packets transmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

CompTIA Network+ Question C-78

Which of the following helps prevent routing loops?

A. Routing table
B. Default gateway
C. Route summarization
D. Split horizon

Correct Answer: D

Explanation:
Routing loops occur when the routing tables on the routers are slow to update and a redundant communication cycle is created between routers. Split horizon, which prevents the router from advertising a route back to the other router from which it was learned, can be used to resist routing loops. Poison reverse, also known as split horizon with poison reverse, is also used to resist routing loops.

CompTIA Network+ Question C-77

A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PC’s that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, which of the following network devices should a network technician use to connect all the devices to the wireless network?

A. Wireless bridge
B. VPN concentrator
C. Default WAP
D. Wireless router

Correct Answer: D

CompTIA Network+ Question C-76

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk?

A. Add an outbound ACL to the firewall
B. Change the FTP server to a more secure SFTP
C. Use the implicit deny of the firewall
D. Move the server to the DMZ of the firewall

Correct Answer: D

CompTIA Network+ Question C-75

A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?

A. SLIP
B. SNMPv3
C. TKIP
D. SNMPv2

Correct Answer: B

CompTIA Network+ Question C-74

A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?

A. Use a modem to console into the router
B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site

Correct Answer: A

CompTIA Network+ Question C-73

A company is implementing enhanced user authentication for system administrators accessing the company’s confidential servers. Which of the following would be the BEST example of two-factor authentication?

A. ID badge and keys
B. Password and key fob
C. fingerprint scanner and retina scan
D. Username and password

Correct Answer: B

CompTIA Network+ Question C-72

A technician has determined the most likely cause of an issue and implement a solution. Which of the following is the NEXT step that should be taken?

A. Document the findings, actions, and outcomes
B. Duplicate the problem if possible
C. Verify system functionality
D. Make an archival backup

Correct Answer: C