Download - Test Questions Comp TIA Network
Which protocol in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is responsible for reporting errors and providing information about packet delivery?
ICMP
UDP
ARP
IGMP
When is it necessary to use plenum-rated cable when installing network cabling?
In environments in which there is a risk of electrical interference
Only when installing Ethernet coaxial cable
When required by local building codes
In all network wiring applications
Which network device is used to extend the length of a network segment by simply amplifying the data signal?
Repeater
Switch
Bridge
Hub
The Network layer of the Open Systems Interconnect (OSI) model is responsible for managing what function?
Routing and subnetting
Physical connection to the cable plant
Establishing and maintaining communication sessions
Providing reliable data transfer and error control
You want to view IP address information on a computer running UNIX.
What should you do?
Run nslookup.
Run nbtstat.
Run ipconfig.
Run ifconfig.
A malicious program that resides in memory, copies itself, and sends copies of itself to other network hosts is known as what?
A virus
A Trojan
A man-in-the-middle
A worm
Which Transmission Control Protocol/Internet Protocol (TCP/IP) protocol is used to transfer e-mail messages and attachments between mail servers?
SNMP
SMTP
TFTP
POP3What type of coaxial cable is used when wiring a 10Base2 Ethernet network?
RG-6
RG-58
RG-11
RG-59
You need to extend an existing 10Base2 network segment. The new segment will be wired as 10BaseT. Both segments must be logically addressed as part of the same subnet.
What should you do?
Use a router to connect the segments.
Use a repeater to connect the segments.
Use a hub to connect the segments.
Use a bridge to connect the segments
File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) are implemented as which layer of the Open System Interconnect (OSI) model?
Transport layer
Application layer
Session layer
Presentation layer
You need to determine where the route is failing between your computer running Windows and a remote host. You need this information as quickly as possible.
What should you do?
Run ping.
Run tracert.
Run mtr.
Run route.
Your employees are being targeted by phishing attacks. How can you minimize the impact of these attacks? (Choose two.)
Through antivirus software
Through regular computer updates
Through enforced policies and procedures
Through traffic monitoring
Through user education
What protocol is used to find a network device's Media Access Control (MAC) address when its IP address is known?
DNS
ARP
DHCP
FTP
What category of twisted pair cable should you use when wiring a 10GBaseT Ethernet network?
CAT 3
CAT 6
CAT 5e
CAT 5
You need to extend your office network, but you cannot run new cable in the area. Devices should be addressed as part of an existing subnet that is wired as 10BaseT.
What should you do first?
Deploy a router.
Deploy a bridge.
Deploy a basic firewall.
Deploy a wireless access point
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are implemented at which layer of the OSI model?
Layer 6
Layer 7
Layer 4
Layer 5
You want to retrieve information about TCP/IP network connections and protocol statistics.
What should you do?
Run netstat.
Run ping.
Run nbtstat.
Run ipconfig.
You are setting up a home office with two computers. The computers will access the Internet through a cable modem connected to a switch that shares the connection.
You want to protect the computers from unwanted traffic and block access to unused TCP and UDP ports. You need to keep the cost and complexity of the network to a minimum.
What should you do?
Use a network firewall.
Use a host-based firewall on each computer.
Use an intrusion prevention system (IPS).
Use an intrusion detection system (IDS).
For what purpose is User Datagram Protocol (UDP) port 67 used?
IP address assignment
Host name resolution
File transfers
Mail delivery
What type of connector is used with RG-58 coaxial cable networking implementations?
RJ-11
BNC
SC
RJ-45
You are connecting your local area network (LAN) to the Internet. You need deploy a device to filter traffic between the Internet and your LAN based on TCP and UDP port usage.
What should you do?
Install and configure a router.
Install and configure a firewall
Install and configure a hub
Install and configure a bridge.
After you extended the length of a coaxial cable, you have problems with the signal strength at the far ends of the cable.
What should you do?
Test the new section of cable to see if it has a short and replace it if necessary.
Add an additional length of cable.
Install a repeater between the cable segments.
Increase the resistance of the cable terminators.
You need to determine if your network's Domain Name System (DNS) servers are properly supporting reverse lookup.
What should you do? (Choose two.)
Run the dig command.
Run the ping command.
Run the arp command.
Run the rarp command.
Run the nbtstat command.
Run the nslookup command.
You have three Web servers deployed in your perimeter network. You want to limit the traffic between your perimeter network and the Internet to secured and unsecured Hypertext Transfer Protocol (HTTP) only.
What should you do?
Deploy an IPS in the perimeter network.
Deploy a personal firewall on each Web server.
Deploy a network firewall between the perimeter network and the Internet.
Deploy an IDS in the perimeter network.
What Transmission Control Protocol (TCP) port is used for secure communications between Web clients and Web servers?
110
443
80
123
What type of connector is used with 10BaseT Ethernet networks?
BNC
RJ-11
RS-232
RJ-45
You need to prioritize network traffic so that you can control data transmission rates by port usage. What should you use?
Load balancer
Content switch
Multilayer switch
Bandwidth shaper
You add a computer to an existing 10BaseT network that is configured as a single subnet. The computer is configured with a static IP address. Other computers on the network cannot communicate with the new computer using its IP address. The new computer's network interface card and protocol stack appear to be working correctly.
What is most likely wrong? (Choose two).
Invalid IP address
Incorrect default gateway
Incorrect subnet mask
Problem with contacting a Dynamic Host Configuration Protocol (DHCP) server
Invalid computer name
When would you use a port scanner to test your perimeter network?
To identify potential holes in network firewalls
To determine if your network's Web servers are operating properly
To see if your proxy server is forwarding traffic
To tell how well your network responds to threats
When would you use a stateful firewall to filter traffic?
To filter by protocol type
To filter by individual packet headers
To filter by monitoring connections and allowing valid traffic by connection type
To filter by evaluating detailed packet content