CompTIA Network+ Question C-41

Which of the following WAN technologies is associated with high latency?

A. T1
B. Satellite
C. Cable
D. OCx

Correct Answer: B

Explanation:
Latency in this instance is the time it takes for the signal to and from the satellite. Since signal has to travel to the satellite, then from the satellite to the ground station, and then out to the Internet (or IP WAN). Not forgetting the return trip, and processing delays.

CompTIA Network+ Question C-40

A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder cannot access the intranet. Which of the following security techniques should be used?

A. Place them behind honeypots
B. Place them in a separate subnet
C. Place them between two internal firewalls
D. Place them in the demilitarized zone

Correct Answer: D

CompTIA Network+ Question C-39

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5 packets respond. Which of the following tools should be used to discover the cause of the poor performance?

A. Port scanner tool
B. Interface monitoring tool
C. Packet capture tool
D. Spectrum Analyzer tool

Correct Answer: D

CompTIA Network+ Question C-38

A customer has engaged a company to improve the availability of all of the customer’s services and applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?

A. MLA
B. MOU
C. SOW
D. SLA

Correct Answer: C

Explanation:
SOW stands for Statement of Work. When a company has been hired for a project that involves many tasks, a statement of work is often issued at the start of the project.
The SOW will outline the tasks or activities in a project, their costs and the timelines for deliverables within the project. In an IT project, the SOW would define what tasks will be performed (hardware and software upgrades etc.), why the work is being done and how long each stage of the project will take.

CompTIA Network+ Question C-37

A client is receiving certificate errors in other languages when trying to access the company’s main intranet site. Which of the following is MOST likely the cause?

A. DoS
B. Reflective DNS
C. Man-in-the-middle
D. ARP poisoning

Correct Answer: C

CompTIA Network+ Question C-36

A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it?

A. An SNMP GET
B. A top listener tool
C. An intrusion detection system
D. A packet sniffer

Correct Answer: D

CompTIA Network+ Question C-35

A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any

A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ.

The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company’s objectives?

A. 11, 10, 12, 13
B. 12, 10, 11, 13
C. 13, 10, 12, 11
D. 13, 12, 11, 10

Correct Answer: A

Explanation:
ACL are processed in TOP DOWN process in routers or switches. This means that when a condition in the ACL is met, all processing is stopped. We start by allowing any protocol on the 10.200.0.0/16 subnet:11. Allow 10.200.0.0/16 to Any DMZ eq to Any
We then deny any traffic on TCP port 22:10. Deny Any Trust to Any DMZ eq to TCP port 22
We allow browsing (port 80 and 443) on the 10.0.0.0/8 subnet:Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443 Finally we deny all other traffic:13. Deny Any Trust to Any DMZ eq to Any

CompTIA Network+ Question C-34

After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?

A. Event log
B. Syslog
C. SIEM
D. SNMP

Correct Answer: C

Explanation:
Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated.
SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.
SIEM capabilities include Data aggregation; Log management aggregates data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data to help avoid missing crucial events.

CompTIA Network+ Question C-33

While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which of the following should the technician check to resolve the problem?

A. Default gateway address
B. Misconfigured DNS
C. DHCP server
D. NIC failure

Correct Answer: C

Explanation:
If a DHCP server fails, the workstations are assigned an address from the 169.254.0.0 address range by Automatic Private IP Addressing (APIPA). APIPA also configures a suitable subnet mask, but it doesn’t configure the system with a default gateway address. This allows communication on the local network, but not externally.

CompTIA Network+ Question C-32

A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the firewall’s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?

A. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389
B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
C. Set the firewall to operate in transparent mode
D. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123

Correct Answer: B