CompTIA Network+ Question A-17

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?

A. Firewall
B. Router
C. 802.11 AP
D. Switch

Correct Answer: C

Explanation:
802.11 AP is a Wireless Access Point used in a wireless network.
If two computers on a network send data frames at the same time, a collision between the frames can occur. The frames are then discarded and the sending computers will attempt to send the data again.
Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless networks where computers connected to the wireless network attempt to avoid collisions by transmitting data only when the channel is sensed to be “idle”. Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is unreliable in wireless networks because computers connected to the wireless network often cannot see each other so CSMA/CA is a better option for avoiding collisions.
Request to Send/Clear to Send (RTS/CTS) can also be used to mediate access to the wireless network. This goes some way to alleviating the problem of computers not being able to see each other because in a wireless network, the Wireless Access Point only issues a “Clear to Send” to one node at a time.
With RTS/CTS, a Request to Send (RTS) packet is sent by the sending computer, and a Clear to Send (CTS) packet is sent by the intended receiver. This will alert all computers within range of the sender, receiver or both, to not transmit for the duration of the transmission. This is known as the IEEE 802.11 RTS/CTS exchange.

CompTIA Network+ Question A-15

A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface. Which of the following would be the result of this action?

A. The normal amount of errors and the connection problem has been resolved.
B. The interface status will indicate that the port is administratively down.
C. The traffic will flow, but with excessive errors.
D. The interface status will show line protocol down.

Correct Answer: D

Explanation:
Devices of different types are connected with a straight through cable (patch cable). In this case, it is used to connect two devices of the same type. It is for this reason that the interface will display the line protocol down status.

CompTIA Network+ Question A-3

A network technician has created a network consisting of an external internet connection, a DMZ, an internal private network, and an administrative network. All routers and switches should be configured to accept SSH connections from which of the following network segments?

A. The internal network since it is private
B. The admin private network allowing only admin access
C. The DMZ only allowing access from the segment with the servers
D. The internet connection to allow admin access from anywhere

Correct Answer: B

CompTIA Network+ Question A-1

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

A. Install host-based anti-malware software
B. Implement MAC filtering on all wireless access points
C. Add an implicit deny to the core router ACL
D. Block port 80 outbound on the company firewall
E. Require users to utilize two-factor authentication

Correct Answer: A

Explanation:
To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee.

CompTIA A+ Core 2 Question J-77

A user is trying to access an application on their home machine from work. The user sets up port forwarding on their router but is still unable to connect to the application. Which of the following should be the users NEXT step in resolving this issue?

A. Configure Wake-on-LAN for the NIC on the Work PC.
B. Configure a firewall exception on the Home PC.
C. Switch the Work PC network from “Work” to “Home”.
D. Disable the Windows firewall on the Home PC.

CompTIA A+ Core 2 Question J-48

A user has just purchased a wireless router for their home. Which of the following should be done to BEST secure the router from unauthorized access? (Select TWO).

A. Change router default logins
B. Change the security settings on their computer
C. Set encryption on the router
D. Update router firmware
E. Change the encryption on the computers wireless adapter

Correct Answer: AC

Explanation:
First change default router logins to avoid guesswork by hackers. Set encryption on the router using WPA and/or WPA2.

CompTIA A+ Core 2 Question J-45

A small office has two routers, one wired and one wireless. Peter, a laptop user, experiences no issues while at his desk, but when he unplugs his laptop to go to a conference room, Peter is no longer able to access the Internet. Other users do not have this issue. A technician checks the laptop and sees an IP address of 169.254.13.142. Which of the following actions should the technician take FIRST so that Peter can access the Internet?

A. Disable the wired connection.
B. Reinstall DHCP on the server.
C. Refresh the network connection.
D. Power cycle the wireless router.

Correct Answer: C

CompTIA A+ Core 2 Question J-34

Jane, a customer, has a wired router that connects to the Internet without any issue, but does not provide any other network services. When users connect PCs to the router, they cannot access the Internet or any other network resources. Which of the following should Jane do to connect the PCs to the Internet?

A. Change the gateway address on the wired router
B. Set the DNS to an external public source on the PCs
C. Remove the PCs from the MAC filter list in the wired router
D. Change the switch port duplex setting from half to full

Correct Answer: B

CompTIA A+ Core 2 Question J-18

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO).

A. Disable unused ports
B. Change the SSID
C. Position the antennas to prevent outside access
D. Enable MAC filtering
E. Change the default user name

Correct Answer: BE

Explanation:
The basic tasks to secure a network is to change SSID and the default user name. This is the basic security a user can employ to secure the network immediately.

CompTIA A+ Core 2 Question I-92

A technician has been dispatched to a SOHO to troubleshoot an issue with a USB printer shared on the network. All networked devices obtain their IP address automatically from the router. Additionally, all computers were printing fine the previous day, when the printer was first installed. Which of the following should the technician implement to fix the printing issue?

A. A DHCP reservation should be made for the host computer.
B. The printer should be connected to a USB hub.
C. An updated printer driver should be installed on all office computers.
D. The printer should be configured with a static IP address.

Correct Answer: A