Practice Tests Overview

Dion's Practice Test

Attempt 1: 72%

Which of the following is MOST likely the cause of the slow speeds experienced by the wireless clients?
RF interference
Which of the following encryption types was used by WPA to better secure wireless networks than WEP?
Which of the following network performance metrics is used to represent the theoretical maximum rate of data transfer from a source to a destination in a given amount of time under ideal conditions?
Which of the following network devices would be considered a perimeter device and installed at the outermost part of the network?
Which of the following layers within software-defined networking focuses on resource requests or information about the network?
Application Layer Control
The application layer focuses on the communication resource requests or information about the network.
Dion Training wants to implement a technology that will automatically test any wireless device that connects to their network before allowing the device full access to the corporate network and its resources. Which of the following should be implemented?
NAC (Network Access Control)
A unique objective identifier (OID) identifies a variable that can be read or set using the SNMP protocol. The management information base (MIB) is a translation file that is used to describe the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers (OID).

You have been asked by your supervisor, Tamera, to ensure that you enable 802.3af on a managed switch. Which of the following features does she want you to enable?
PoE is 802.3af
A user's smartphone is displaying text in other languages in their web browser when accessing the company's main website. Which of the following is the MOST likely cause of the issue?
On-Path Attack.
Dion Training installed a new router 183 days ago and it stopped working today due to a faulty power supply. The network technicians replaced the power supply and the router was returned to service within 4 hours. Which of the following terms would BEST represent the 183 days in this scenario?
MTBF(Correct). The mean time between failures (MTBF) measures the average time between when failures occur on a device
NAC could also determine unknown machines (assumed to be those of CompTIA employees) and provide them with direct internet access only by placing them onto a guest network or VLAN.
The Link Aggregation Control Protocol (LACP) is the 802.3ad protocol is used to group numerous physical ports to make one high bandwidth path. This method can increase bandwidth and therefore, throughput. LACP can also provide network redundancy and load balancing.
For Wireless B and G networks, you should always use channels 1, 6, and 11 to ensure you are using non-overlapping frequencies.
SQLnet uses ports 1521, and is a relational database management system developed by Oracle that is fully compatible with the structured query language (SQL).
ATM cells occur at the Data Link Layer (2).
Patch Cables are the same as Straight-Through Cables.
A stateful firewall enhances security through packet filtering, and these types of firewalls also keep track of outbound requests and open the port for the returning traffic to enter the network.
Data wiping or clearing occurs by using a software tool to overwrite the data on a hard drive to destroy all electronic data on a hard disk or other media. Data wiping may be performed with a 1x, 7x, or 35x overwriting, with a higher number of times being more secure. This allows the hard drive to remain functional and allows for hardware reuse.
Which of the following technologies deliver multiple voice calls over a copper wire if you have an ISDN or T-1 connection?
Time-division multiplexing allows for two or more signals or bitstreams to be transferred in what appears to be simultaneous sub-channels in one communication channel but is physically taking turns on the channel.
If the user can access the site in the web browser but cannot when using ping, then ICMP is most likely being blocked by the firewall.
You should create an out-of-band management network and use an SSH (console) connection to reach the routers. Out-of-band (OOB) management is a method of remotely controlling and managing critical IT assets and network equipment using a secure connection through a secondary interface that is physically separate from the primary network connection.
Which of the following types of agreements is used to protect an organization's intellectual property and is considered legally binding between the signatories?
Which of the following is a connectionless protocol?
What remediation strategies are the MOST effective in reducing the risk to an embedded ICS from a network-based compromise? (Select TWO)
Segment the network
Disable Unused Services

Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
) instead.