CompTIA Network+ Question C-11

A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue?

A. The gateway is misconfigured on the new router.
B. The subnet mask is incorrect on the new router.
C. The gateway is misconfigured on the edge router.
D. The SSID is incorrect on the new router.

Correct Answer: A

Explanation:
A missing or incorrect default gateway parameter limits communication to the local segment.
The question states: “All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet”.

CompTIA Network+ Question C-10

A network administrator received the following email from a user:
From: user@company.com
To: abuse@company.com
Subject: Free smart phone
Dear user,
please click the following link to get your free smart phone http://www.freesmartphone.it:8080/survey.php

Which of of the following should the administrator do to prevent all employees from accessing the link in the above email, while still allowing Internet access to the freesmartphone.it domain?

A. Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
B. Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C. Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D. Add http://www.freesmartphone.it:8080/survey.php to the load balancer

Correct Answer: A

CompTIA Network+ Question C-9

A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office. On which of the following devices will the technician implement the loopback?

A. Channel remote module
B. Fiber optic modem
C. Channel service unit
D. Digital subscriber line modem

Correct Answer: C

CompTIA Network+ Question C-8

A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo” command to list information about the existing condition.
myClient$ wificard –getinfo agrCtlRSSI:-72 agrExtRSSI:0 state:running
op mode: station lastTxRate:178 MaxRate:300
802.11 auth:open link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless Channel:149,1
Given this output, which of the following has the technician learned about the wireless network? (Select TWO).

A. The WAP is using RC4 encryption
B. The WAP is using 802.11a
C. The WAP is using AES encryption
D. The WAP is using the 2.4GHz channel
E. The WAP is using the 5GHz channel
F. The WAP is using 802.11g

Correct Answer: CE

Explanation:
WPA2 makes use of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption protocol, which is an AES based protocol.
The output shows that the wireless network operates on channel 149, which is a channel in the 5GHz band.

CompTIA Network+ Question C-7

Which of the following protocols must be implemented in order for two switches to share VLAN information?

A. VTP
B. MPLS
C. STP
D. PPTP

Correct Answer: A

Explanation:
The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to other switches in a group of switches (that is, a VTP domain).

CompTIA Network+ Question C-6

Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?

A. 110 block
B. MDF
C. DSU
D. CSU

Correct Answer: B

Explanation:
MDF stands for Main Distribution Frame. A Main Distribution Frame is a commonly a long steel rack accessible from both sides. On one side of the rack is cabling that connects the service provider’s network. The other side of the rack is for the connections to the customer’s equipment.

CompTIA Network+ Question C-5

Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario?

A. Compromised system
B. Smurf attack
C. SQL injection attack
D. Man-in-the-middle

Correct Answer: A

Explanation:
As the extra unexplainable traffic comes from an internal host on your network we can assume that this host has been compromised.
If your system has been compromised, somebody is probably using your machine–possibly to scan and find other machines to compromise

CompTIA Network+ Question C-4

A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?

A. Tone generator
B. Multimeter
C. OTDR
D. Loopback adapter

Correct Answer: A

CompTIA Network+ Question C-3

In a service provider network, a company has an existing IP address scheme. Company A’s network currently uses the following scheme: Company B uses the following scheme: Subnet 1: 192.168.1.50/28
The network administrator cannot force the customer to update its IP scheme. Considering this, which of the following is the BEST way for the company to connect these networks?

A. DMZ
B. PAT
C. NAT
D. VLAN

Correct Answer: C

CompTIA Network+ Question C-2

The administrator’s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets

A. Set the loopback address
B. Change the IP address
C. Change the slash notation
D. Change duplex to full

Correct Answer: D

Explanation:
From the output we see that the half-duplex is configured. This would not use the full capacity of ports on the network. By changing to full duplex the throughput would be doubled.
Note: All communications are either half-duplex or full-duplex. During half-duplex communication, a device can either send communication or receive communication, but not both at the same time. In full-duplex communication, both devices can send and receive communication at the same time. This means that the effective throughput is doubled and communication is much more efficient.