QoS operates at which of the following OSI model layers? (Select TWO)
Layer2, Layer 3
A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?
192.168.1.1
The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents
Implement standard UNC
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used
Crossover
A company installs a new mail server. The following DNS records need to be configured to allow the organization to receive email
MX record
At what later we may find a repeater
Layer 1
As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use?
OSPF and IS-IS
The following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths
DWDM
A network engineer is conducting an assessment for a customer that wants to implement an 802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is important to reference
a site survey
A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted
MSDS
The OSI is
Model used for troubleshooting
Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?
BNC
An attack where the potential intruder tricks a user into providing sensitive information is known as
Social Engineering
A company plan established to resume normal system operations following a disruption in business would be described as
business continuity
An IPV4 address is in length...
32 bits
This protocol can be found at layer 7
HTTP
Is a UC application
Softphone
A network technician receives a call from a use who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. He most likely introduced a
Rogue DHCP server
This topology has a central point of failure
star
a malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom. This is an example of
Jamming
The TCP/IP Model has ___ layers
4
CompTIA Network+ Question B-23
A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. Which of the following should the network administrator do to correct the issue?
Add additional network cards to the server
A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee’s computer. This type of attack is an example of
ARP Cache poisoning
The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones. They should use...
802.11a
12*20
240