CompTIA Network+ Question C-55

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There are a finite known number of approved handheld devices needing to access the store’s wireless network. Which of the following is the BEST security method to implement on the access points?

A. Port forwarding
B. MAC filtering
C. TLS/TTLS
D. IP ACL

Correct Answer: B

Explanation:
MAC filtering allows traffic to be permitted or denied based on a device’s MAC address. We make a MAC filtering which contains the MAC addresses of all approved devices that need to access the wireless network. This ensures that only approved devices are given access to the network.

CompTIA Network+ Question C-49

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem

Correct Answer: C

Explanation:
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

CompTIA Network+ Question C-11

A network technician has been assigned to install an additional router on a wireless network. The router has a different SSID and frequency. All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet. Which of the following is the MOST likely cause of this issue?

A. The gateway is misconfigured on the new router.
B. The subnet mask is incorrect on the new router.
C. The gateway is misconfigured on the edge router.
D. The SSID is incorrect on the new router.

Correct Answer: A

Explanation:
A missing or incorrect default gateway parameter limits communication to the local segment.
The question states: “All users on the new access point and the main network can ping each other and utilize the network printer, but all users on the new router cannot get to the Internet”.

CompTIA Network+ Question B-53

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?

A. PoE
B. Port bonding
C. VLAN
D. Trunking

Correct Answer: A

Explanation:
Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards.
PoE allows an Ethernet switch to provide power to an attached device (for example, a wireless access point, security camera, or IP phone) by applying power to the same wires in a UTP cable that are used to transmit and receive data.

CompTIA Network+ Question B-47

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings’ connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues?

A. UTP patch cables
B. Antenna
C. Power adapter
D. Security standard

Correct Answer: B

CompTIA Network+ Question B-9

A company is installing several APs for a new wireless system that requires users to authenticate to the domain. The network technician would like to authenticate to a central point. Which of the following would work BEST to achieve these results?

A. A TACACS+ device and a RADIUS server
B. A TACACS and a proxy server
C. A RADIUS server and an access point
D. A RADIUS server and a network controller

Correct Answer: C

CompTIA Network+ Question A-17

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?

A. Firewall
B. Router
C. 802.11 AP
D. Switch

Correct Answer: C

Explanation:
802.11 AP is a Wireless Access Point used in a wireless network.
If two computers on a network send data frames at the same time, a collision between the frames can occur. The frames are then discarded and the sending computers will attempt to send the data again.
Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless networks where computers connected to the wireless network attempt to avoid collisions by transmitting data only when the channel is sensed to be “idle”. Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is unreliable in wireless networks because computers connected to the wireless network often cannot see each other so CSMA/CA is a better option for avoiding collisions.
Request to Send/Clear to Send (RTS/CTS) can also be used to mediate access to the wireless network. This goes some way to alleviating the problem of computers not being able to see each other because in a wireless network, the Wireless Access Point only issues a “Clear to Send” to one node at a time.
With RTS/CTS, a Request to Send (RTS) packet is sent by the sending computer, and a Clear to Send (CTS) packet is sent by the intended receiver. This will alert all computers within range of the sender, receiver or both, to not transmit for the duration of the transmission. This is known as the IEEE 802.11 RTS/CTS exchange.

CompTIA Network+ Question A-1

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

Correct Answer: A

Explanation:
To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee.

CompTIA Network+ Simulation 13

You have been tasked with setting up a wireless network in an office. The network will consist of 3 access points and a single switch. The network must meet the following parameters.

The SSIDs need to be configured as corpnet with a key of S3cr3t! The wireless signals should not interfere with each other.

The subnet the Access points and Switch are on should only support 30 devices maximum The access Points should be configured to only support TKIP clients at a maximum speed

Instructions: Click on the devices to review their information and adjust the setting of the APs to meet the given requirements.

Correct Answer:

Exhibit 1 as follows
Access Point Name: AP1
IP Address: 192.168.1.3
Gateway: 192.168.1.2
SSID: corpnet
SSID Broadcast: yes
Mode: G
Channel: 1
Speed: Auto
Duplex: Auto
WPA Passphrase: S3cr3t!

Exhibit 2 as follows
Access Point Name: AP2
IP Address: 192.168.1.4
Gateway: 192.168.1.2
SSID: corpnet
SSID Broadcast: yes
Mode: G
Channel: 6
Speed: Auto
Duplex: Auto
WPA Passphrase: S3cr3t!

Exhibit 3 as follows
Access Point Name: AP3
IP Address: 192.168.1.5
Gateway: 192.168.1.2
SSID: corpnet
SSID Broadcast: yes
Mode: G
Channel: 11
Speed: Auto
Duplex: Auto
WPA Passphrase: S3cr3t!

CompTIA Network+ Simulation 6

Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant’s specifications and has always worked without a problem.

You a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following exhibits and perform any necessary changes to the wireless and wired infrastructure by adjusting devices. Note: Adjust the LEAST number of devices needed to fix the issue.

Select and Place:

Correct Answer:


After you fix AP2, you must click on the switch, which will bring up the switch interface. Type in the two commands that they show there, to prove the fix. Do not worry that interface 4 is down, there is no interface 4 for you to do