Informatik
Comptia N+
Comptia N+
Kartei Details
Karten | 87 |
---|---|
Lernende | 17 |
Sprache | English |
Kategorie | Informatik |
Stufe | Grundschule |
Erstellt / Aktualisiert | 30.11.2014 / 18.01.2021 |
Weblink |
https://card2brain.ch/box/informatik26
|
Einbinden |
<iframe src="https://card2brain.ch/box/informatik26/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
219
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the
following would be the MOST appropriate solution? (Select TWO).
212
A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on
the network. Which of the following is the MOST likely cause of the problem?
QUESTION NO: 115
Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a
secure wireless network. The installed antenna limits the signal to her half of the floor. Through
analysis, the frequency and channels of surrounding wireless networks have been determined and
configuration changes made accordingly. Which of the following would be the NEXT step in setting
up this secure wireless network?
QUESTION NO: 114
A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a
single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated
wattage the switch supports to power all of the phones at full power?
QUESTION NO: 113
A network consultant arrives at a customer’s site to troubleshoot their email server. The server is
running a Linux operating system, but the consultant is only familiar with Windows operating
systems. Which of the following troubleshooting steps should the consultant take?
QUESTION NO: 112
Users have been stating that they need to logon to too many applications and web apps with
different credentials that use different rule sets. Which of the following would BEST address these
concerns?
QUESTION NO: 111
A Linux-based workstation is unable to connect to an IP printer on the same network segment.
The printer IP address settings have been verified. How would a network technician verify IP
address settings on the Linux-based workstation?
QUESTION NO: 110
A small business owner is setting up a SOHO office. The business owner needs one device that
will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP
addresses, and filter packets. Which of the following network devices will allow for all functions?
QUESTION NO: 109
Which of the following can be used to limit wireless network access to a single computer?
QUESTION NO: 108
A user cannot access the LAN after working successfully most of the day. Which of the following
should the network administrator check FIRST?
QUESTION NO: 107
A technician working for a company with a wireless network named WirelessA notices a second
wireless network named WirelessB. WirelessB is MOST likely a:
QUESTION NO: 106
A technician has been given the task to install a wireless network in a user’s home. Which of the
following should the technician consider when implementing the network? (Select TWO).
QUESTION NO: 105
Some employees are unable to maintain a wireless network connection. The network’s wireless
infrastructure is comprised of three different buildings with the configurations listed below.
Wireless network in Building A and C is used exclusively for internal employees and Building B is
used for visitors and requires no additional configuration on their devices. Which of the following
settings would need to be modified to provide the BEST wireless experience for all employees as
they move between buildings?
Building ABuilding BBuilding C
Channel: 1Channel: 6Channel: 11
Encryption: WPA2Encryption: OpenEncryption: WPA2
SSID. CorpSSID. GuestSSID. Sales
QUESTION NO: 104
Some visitors are unable to access the wireless network. The network’s wireless infrastructure is
comprised of three different buildings with the configurations listed below. Wireless network in
Building A and C is used exclusively for internal employees and Building B is used for visitors and
requires no additional configuration on their devices. Which of the following settings would need to
be modified to provide wireless access to all visitors?
Building ABuilding BBuilding C
Channel: 2Channel: 6Channel: 11
Encryption: WPA2Encryption: WPA2Encryption: WPA2
QUESTION NO: 103
A company has recently allowed its employees to telecommute two days a week. The employees
MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following
MUST the employees have at their home in order to connect to the Internet?
QUESTION NO: 102
After a network technician has added a new workstation and cabling to the network, users report
the network is very slow. The activity lights on all switches are blinking rapidly, showing large
amounts of traffic. Which of the following is the BEST explanation for the traffic?
QUESTION NO: 101
Which of the following performance benefits would multiple domain controllers BEST provide?
234
Several users are reporting connectivity issues with their laptops. Upon further investigation, the
network technician identifies that their laptops have been attacked from a specific IP address
outside of the network. Which of the following would need to be configured to prevent any further
attacks from that IP address?
235
The company is setting up a new website that will be requiring a lot of interaction with external
users. The website needs to be accessible both externally and internally but without allowing
access to internal resources. Which of the following would MOST likely be configured on the
firewall?
240
Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass
on its default port?
NO: 244
Management has decided that they want a high level of security. They do not want Internet
requests coming directly from users. Which of the following is the BEST recommendation?
246
A customer wants to increase firewall security. Which of the following are common reasons for
implementing port security on the firewall? (Select TWO).
NO: 250
A network administrator is responding to a statement of direction made by senior management to
implement network protection that will inspect packets as they enter the network. Which of the
following technologies would be used?
252
A strong network firewall would likely support which of the following security features for controlling
access? (Select TWO).
255
A network technician is concerned that an attacker is attempting to penetrate the network, and
wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are
valid on the network. Which of the following protocols needs to be denied?
256
A network technician has configured a new firewall with a rule to deny UDP traffic. Users have
reported that they are unable to access Internet websites. The technician verifies this using the IP
address of a popular website. Which of the following is the MOST likely cause of the error?
258
Which of the following network appliances will only detect and not prevent malicious network
activity?
267
Which of the following security methods is used to attract users attempting to gain unauthorized
access to various systems within a single network?
268
An administrator needs to open ports in the firewall to support both major FTP transfer modes.
Which of the following default ports was MOST likely opened? (Select TWO)
284
Which of the following is the MOST secure way to prevent malicious changes to a firewall?
287
Which of the following features will a firewall MOST likely use to detect and prevent malicious
traffic on the network
288
Stateful packet inspection is a security technology used by which of the following devices?
300
Which of the following would be used in a firewall to block incoming TCP packets that are not from
established connections?
314
Which of the following preventative measures would BEST secure a web server from being port
scanned by attackers publicly?
342
A network technician has been asked to look into a report from the IDS to determine why traffic is
being sent from an internal FTP server to an external website. Which of the following tools can be
used to inspect this traffic?
346
A network is having problems with traffic flowing to several critical websites that are used for
necessary company work. Which of the following appliances would BEST handle network traffic to
increase network performance?
351
An administrator has set up a NIPS and connected it to the same switch as the internal firewall
interface and the internal router. The device, however, only detects traffic from itself to the firewall
or router. Which of the following explains why additional corporate traffic cannot be detected?
355
Which of the following BEST describes a firewall that can be installed via Add/Remove programs
on a Windows computer?
393
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with
the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?
405
A network administrator is tasked with blocking unwanted spam is being relayed by an internal
email server. Which of the following is the FIRST step in preventing spam that is originating from
bots on the network?