Informatik

Comptia N+

Comptia N+

Celiktemel Okan

Celiktemel Okan

Set of flashcards Details

Flashcards 87
Students 17
Language English
Category Computer Science
Level Primary School
Created / Updated 30.11.2014 / 18.01.2021
Weblink
https://card2brain.ch/box/informatik26
Embed
<iframe src="https://card2brain.ch/box/informatik26/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>

219

A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the

following would be the MOST appropriate solution? (Select TWO).

212

A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible on

the network. Which of the following is the MOST likely cause of the problem?

QUESTION NO: 115

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a

secure wireless network. The installed antenna limits the signal to her half of the floor. Through

analysis, the frequency and channels of surrounding wireless networks have been determined and

configuration changes made accordingly. Which of the following would be the NEXT step in setting

up this secure wireless network?

QUESTION NO: 114

A network administrator is adding 24 - 802.3af class 2 VoIP phones and needs to purchase a

single PoE switch to power the phones. Which of the following is the MINIMUM PoE dedicated

wattage the switch supports to power all of the phones at full power?

QUESTION NO: 113

A network consultant arrives at a customer’s site to troubleshoot their email server. The server is

running a Linux operating system, but the consultant is only familiar with Windows operating

systems. Which of the following troubleshooting steps should the consultant take?

QUESTION NO: 112

Users have been stating that they need to logon to too many applications and web apps with

different credentials that use different rule sets. Which of the following would BEST address these

concerns?

QUESTION NO: 111

A Linux-based workstation is unable to connect to an IP printer on the same network segment.

The printer IP address settings have been verified. How would a network technician verify IP

address settings on the Linux-based workstation?

QUESTION NO: 110

A small business owner is setting up a SOHO office. The business owner needs one device that

will allow for Internet access, trunk VLANs, translate multiple private IP addresses into public IP

addresses, and filter packets. Which of the following network devices will allow for all functions?

QUESTION NO: 109

Which of the following can be used to limit wireless network access to a single computer?

QUESTION NO: 108

A user cannot access the LAN after working successfully most of the day. Which of the following

should the network administrator check FIRST?

QUESTION NO: 107

A technician working for a company with a wireless network named WirelessA notices a second

wireless network named WirelessB. WirelessB is MOST likely a:

QUESTION NO: 106

A technician has been given the task to install a wireless network in a user’s home. Which of the

following should the technician consider when implementing the network? (Select TWO).

QUESTION NO: 105

Some employees are unable to maintain a wireless network connection. The network’s wireless

infrastructure is comprised of three different buildings with the configurations listed below.

Wireless network in Building A and C is used exclusively for internal employees and Building B is

used for visitors and requires no additional configuration on their devices. Which of the following

settings would need to be modified to provide the BEST wireless experience for all employees as

they move between buildings?

 

Building ABuilding BBuilding C

Channel: 1Channel: 6Channel: 11

Encryption: WPA2Encryption: OpenEncryption: WPA2

SSID. CorpSSID. GuestSSID. Sales

QUESTION NO: 104

Some visitors are unable to access the wireless network. The network’s wireless infrastructure is

comprised of three different buildings with the configurations listed below. Wireless network in

Building A and C is used exclusively for internal employees and Building B is used for visitors and

requires no additional configuration on their devices. Which of the following settings would need to

be modified to provide wireless access to all visitors?

 

Building ABuilding BBuilding C

Channel: 2Channel: 6Channel: 11

Encryption: WPA2Encryption: WPA2Encryption: WPA2

QUESTION NO: 103

A company has recently allowed its employees to telecommute two days a week. The employees

MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following

MUST the employees have at their home in order to connect to the Internet?

QUESTION NO: 102

After a network technician has added a new workstation and cabling to the network, users report

the network is very slow. The activity lights on all switches are blinking rapidly, showing large

amounts of traffic. Which of the following is the BEST explanation for the traffic?

QUESTION NO: 101

Which of the following performance benefits would multiple domain controllers BEST provide?

234

Several users are reporting connectivity issues with their laptops. Upon further investigation, the

network technician identifies that their laptops have been attacked from a specific IP address

outside of the network. Which of the following would need to be configured to prevent any further

attacks from that IP address?

235

The company is setting up a new website that will be requiring a lot of interaction with external

users. The website needs to be accessible both externally and internally but without allowing

access to internal resources. Which of the following would MOST likely be configured on the

firewall?

240

Which of the following ports would have to be allowed through a firewall for POP3 traffic to pass

on its default port?

NO: 244

Management has decided that they want a high level of security. They do not want Internet

requests coming directly from users. Which of the following is the BEST recommendation?

246

A customer wants to increase firewall security. Which of the following are common reasons for

implementing port security on the firewall? (Select TWO).

NO: 250

A network administrator is responding to a statement of direction made by senior management to

implement network protection that will inspect packets as they enter the network. Which of the

following technologies would be used?

252

A strong network firewall would likely support which of the following security features for controlling

access? (Select TWO).

255

A network technician is concerned that an attacker is attempting to penetrate the network, and

wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are

valid on the network. Which of the following protocols needs to be denied?

256

A network technician has configured a new firewall with a rule to deny UDP traffic. Users have

reported that they are unable to access Internet websites. The technician verifies this using the IP

address of a popular website. Which of the following is the MOST likely cause of the error?

258

Which of the following network appliances will only detect and not prevent malicious network

activity?

 

267
Which of the following security methods is used to attract users attempting to gain unauthorized
access to various systems within a single network?
 

268

An administrator needs to open ports in the firewall to support both major FTP transfer modes.

Which of the following default ports was MOST likely opened? (Select TWO)

284

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

287

Which of the following features will a firewall MOST likely use to detect and prevent malicious

traffic on the network

288
Stateful packet inspection is a security technology used by which of the following devices?
 

300

Which of the following would be used in a firewall to block incoming TCP packets that are not from

established connections?

314
Which of the following preventative measures would BEST secure a web server from being port
scanned by attackers publicly?

 

342

A network technician has been asked to look into a report from the IDS to determine why traffic is

being sent from an internal FTP server to an external website. Which of the following tools can be

used to inspect this traffic?

346

A network is having problems with traffic flowing to several critical websites that are used for

necessary company work. Which of the following appliances would BEST handle network traffic to

increase network performance?

351

An administrator has set up a NIPS and connected it to the same switch as the internal firewall

interface and the internal router. The device, however, only detects traffic from itself to the firewall

or router. Which of the following explains why additional corporate traffic cannot be detected?

355

Which of the following BEST describes a firewall that can be installed via Add/Remove programs

on a Windows computer?

393

A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with

the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

405

A network administrator is tasked with blocking unwanted spam is being relayed by an internal

email server. Which of the following is the FIRST step in preventing spam that is originating from

bots on the network?