CompTIA Network+ Question C-51

A technician configures a firewall in the following manner in order to allow HTTP traffic.

Source IPZone: Any Untrust
Dest IPZone: Any DMZ
Port: 80
Action: Allow

The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?

A. HTTPS
B. Stateless packet inspection
C. Intrusion detection system
D. Application aware firewall

Correct Answer: D

CompTIA Network+ Question C-50

Which of the following default ports is associated with protocols that are connectionless?

A. 80
B. 443
C. 2427
D. 3389

Correct Answer: C

CompTIA Network+ Question C-49

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem

Correct Answer: C

Explanation:
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

CompTIA Network+ Question C-48

A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route packages. This is an example of which of the following network segmentation techniques?

A. Compliance implementation
B. Separate public/private newtorking
C. Honeypot implementation
D. Performance optimization

Correct Answer: D

CompTIA Network+ Question C-46

Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?

A. Quarantine network
B. Core network
C. Guest network
D. Wireless network

Correct Answer: C

Explanation:
A wireless guest network could be set up so that it has limited access (no access to local resources) but does provide Internet access for guest users.

CompTIA Network+ Question C-45

A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)

A. Point-to-multipoint
B. Bus
C. Point-to-point
D. Mesh
E. Peer-peer
F. Ring

Correct Answer: CD

CompTIA Network+ Question C-43

A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be performed to verify the security controls in place?

A. Penetration testing
B. AAA authentication testing
C. Disaster recovery testing
D. Single point of failure testing

Correct Answer: A

CompTIA Network+ Question C-42

A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?

A. Does the printer have toner?
B. Are there any errors on the printer display?
C. Is the user able to access any network resources?
D. Is the printer powered up?

Correct Answer: C

Explanation:
The user has already provided you with the information relevant to the first step in the 7-step troubleshooting process. The next step is to “Question the obvious.” The user has stated: “…his colleagues are able to print their documents to the same shared printer.” The obvious question in this instance is whether the user can access any network resources.
1. Identify the problem. Information gathering. Identify symptoms. Question users.
Determine if anything has changed.
2. Establish a theory of probable cause. Question the obvious.
3. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem. If theory is not confirmed, re-establish a new theory or escalate.
4. Establish a plan of action to resolve the problem and identify potential effects.
5. Implement the solution or escalate as necessary.
6. Verify full system functionality and if applicable implement preventive measures.
7. Document findings, actions, and outcomes.