All Posts

Comptia Network + 2023 Questions and answer - Part 90

Mary Mary Smith
03 Mar 2023
2 min
0

1. A network administrator is responding to a help desk ticket, which states an unknown wireless access point is broadcasting in a specific area. Upon investigation, the administrator finds that a user brought a wireless access point from home and plugged it into the corporate network. This resulted in an attacker using the unsecured wireless LAN to gain access to the network. Which of the following should the network administrator have done to BEST prevent this problem?

A) A. Changed the default credentials on the network switches
B) B. Installed a Layer 7 firewall
C) C. Implemented port security
D) D. Disabled unnecessary services on the network switches



2. A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A network technician uses a packet analysis tool and finds that many clients are continuously sending out requests for an IP address, but many of them are not receiving a response. Which of the following could be the cause of this issue?

A) A. Exhausted DHCP scope
B) B. Untrusted SSL certificates
C) C. Duplicate MAC addresses
D) D. Incorrect firewall settings



3. When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring system to describe these object identifiers?

A) A. SNMPv3
B) B. SIEM
C) C. MIB
D) D. SYSLOG



4. A SAN serves out storage to a company's virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?

A) A. InfiniBand
B) B. iSCSI
C) C. Fibre Channel
D) D. CIFS



5. A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

A) A. WEP
B) B. EAP-PEAP
C) C. PSK
D) D. CCMP-AES



1. Right Answer: C
Explanation:

2. Right Answer: A
Explanation:

3. Right Answer: C
Explanation:

4. Right Answer: B
Explanation:

5. Right Answer: B
Explanation:

0 Comments
Leave a comment