OSI
General
Non Sense
Basic 101
I better know these ones
100

QoS operates at which of the following OSI model layers? (Select TWO)

Layer2, Layer 3

100

A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?

192.168.1.1

100

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents

Implement standard UNC

100

A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used

Crossover

100

A company installs a new mail server. The following DNS records need to be configured to allow the organization to receive email

MX record

200

At what later we may find a repeater

Layer 1

200

As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use?

OSPF and IS-IS

200

The following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths

DWDM

200

A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference

a site survey

200

A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted

MSDS

300

The OSI is

Model used for troubleshooting

300

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?

BNC

300

An attack where the potential intruder tricks a user into providing sensitive information is known as

Social Engineering

300

A company plan established to resume normal system operations following a disruption in business would be described as

business continuity

300

An IPV4 address is in length...

32 bits

400

This protocol can be found at layer 7

HTTP

400

Is a UC application

Softphone

400

A network technician receives a call from a use who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network.  He most likely introduced a 

Rogue DHCP server

400

This topology has a central point of failure

star

400

a malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom.  This is an example of 

Jamming

500

The TCP/IP Model has ___ layers

4

500


CompTIA Network+ Question B-23

A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue?

Add additional network cards to the server

500

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of

ARP Cache poisoning

500

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. They should use...

802.11a

500

12*20

240

M
e
n
u