100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Network+ Mock Exam with complete correct solutions $19.99   Add to cart

Exam (elaborations)

Network+ Mock Exam with complete correct solutions

 4 views  0 purchase
  • Course
  • Public and home internet access
  • Institution
  • Public And Home Internet Access

Network+ Mock Exam with complete correct solutions

Preview 4 out of 39  pages

  • September 18, 2024
  • 39
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Public and home internet access
  • Public and home internet access
avatar-seller
BravelRadon
Network+ Mock Exam

Which of the following protocols use tunneling to establish secured links between TCP/IP systems?
(Choose all that apply.)



a. L2TP

b. NAT

c. MGRE

d. IPSec - correct answer ✔✔Layer 2 Tunneling Protocol (L2TP), Internet Protocol Security (IPSec), and
Multipoint Generic Routing Encapsulation (MGRE) are all protocols that encapsulate packets in an
encrypted form within another protocol to secure their contents.



Network Address Translation (NAT) enables workstations on private networks to access the Internet by
substituting a public IP address in packets generated with private addresses. NAT does not use tunneling.



The correct answers are: L2TP, IPSec, MGRE



Parity is a fault tolerance technique used by disk storage arrays in which an additional parity bit is stored
for a specified number of data bits. By using the parity information, the storage subsystem can calculate
the values of bits that have been lost due to a disk failure, enabling the system to re-create the lost data.
Redundant Array of Independent Disks (RAID) is a type of storage array that sometimes uses parity to
provide fault tolerance. Which of the following RAID levels provide fault tolerance by using parity data?
(Choose all that apply.)



a. RAID 5

b. RAID 6

c. RAID 1

d. RAID 0

e. RAID 10 - correct answer ✔✔RAID is a technology for storing data on multiple hard disk drives,
providing fault tolerance, increased performance, or both. The various RAID levels provide different
levels of functionality and have different hardware requirements. RAID 5 and RAID 6 both combine disk
striping with distributed storage of parity information. RAID 5 enables recovery from a single disk failure.

,RAID 6 uses redundant parity to enable recovery from a double disk failure. RAID 1 and RAID 10 both use
disk mirroring to provide fault tolerance, which does not require parity data. RAID 0 uses data striping
only (blocks written to each disk in turn), which does not provide any form of fault tolerance.



The correct answers are: RAID 5, RAID 6



You are a new hire at Adatum Corp., and this is your first day on the job. You are setting up your
workstation, but you are unsure whether you are permitted to install your favorite software on the
company's computer. The Human Resources server has a large library of employee documents. Which of
the following is a document that you might want to consult to determine whether personal software is
allowed?



a. NDA

b. SLA

c. AUP

d. BYOD - correct answer ✔✔An Acceptable Use Policy (AUP) specifies whether and how employees can
use company-owned hardware and software resources. AUPs typically specify what personal work
employees can perform while on the job, what hardware and software they can install, and what levels
of privacy they are permitted when using company equipment. This is the document that will most likely
include the information you seek. A Service Level Agreement (SLA) is a contract between a provider and
a subscriber. A Non-Disclosure Agreement (NDA) specifies what company information employees are
permitted to discuss outside the company. Bring Your Own Device (BYOD) is a policy that specifies how
employees can connect their personal devices to the company network.



The correct answer is: AUP



What is the name of the tool shown in the following figure?



a. Crimper

b. Tone generator and locator

c. Butt set

d. Punchdown tool - correct answer ✔✔The device shown in the figure is a butt set, a basic tool of
telephone installers and line workers. By connecting the clips to pins in a punchdown block, you can

,access telephone circuits in order to test them or place telephone calls. The device shown is not a
crimper, a tone generator and locator, or a punchdown tool.



The correct answer is: Butt set



Which of the following is not a means of preventing unauthorized individuals from entering a sensitive
location, such as a datacenter?

a. Key fobs

b. Identification Badges

c. Biometric scans

d. Motion detection - correct answer ✔✔Biometric scans, identification badges, and key fobs are all
mechanisms that are designed to distinguish authorized from unauthorized personnel. Motion detection
cannot make this distinction and is therefore not a means of preventing unauthorized access.



The correct answer is:

Biometric scans



You have been engaged to design a Wireless Local Area Network (WLAN) for a site you have never seen.
For that reason, you want the WLAN to be able to support both the 2.4 GHz and 5 GHz frequencies.
Which of the following IEEE 802.11 WLAN standards should you look for when you are shopping for
equipment that supports both frequencies? (Choose all that apply.)



a.802.11n

b.802.11ax

c.802.11ac

d.802.11b

e.802.11a

f.802.11g - correct answer ✔✔Of the options shown, only the 802.11n and 802.11ax standards define
WLAN devices that can support both the 2.4 GHz and 5 GHz frequencies. The 802.11a and 802.11ac
standards support only 5 GHz, and the 802.11b and 802.11g standards support only 2.4 GHz.



The correct answers are: 802.11n, 802.11ax

, Your company is a contractor for the government that regularly works with highly sensitive defense data.
To prevent this data from being compromised, the company's datacenter has various special security
measures installed. All of the servers have crimped metal tags holding the cases closed. All of the
hardware racks are locked in clear-fronted cabinets. All of the cable runs are installed in transparent
conduits. These are all examples of which of the following types of physical security measure?



a. Geofencing

b. Port security

c. Asset tracking

d. Tamper detection - correct answer ✔✔All of the mechanisms listed are designed to make any
attempts to tamper with or physically compromise the hardware devices immediately evident. These
mechanisms are therefore various forms of tamper detection. Asset tracking is for locating and
identifying hardware. Geofencing is a wireless networking technique for limiting access to a network.
Port security refers to network switch ports. These options do not apply to the specified mechanisms.



The correct answer is: Tamper detection



Which of the following are tasks that can be performed by a protocol analyzer that could provide
potential intruders with information about the network? (Choose all that apply.)



a. A protocol analyzer can display the IP addresses of the systems on the network.

b. A protocol analyzer can detect open ports on network systems and launch attacks against them.

c. A protocol analyzer can decrypt protected information in packets captured from the network.

d. A protocol analyzer can display the application data in packets captured from the network. - correct
answer ✔✔Protocol analyzers capture packets from the network and interpret their contents, which can
include displaying the application layer payload. Depending on the application, the payload can
conceivably include confidential information, such as passwords. Protocol analyzers also display the IP
addresses of the systems involved in packet transmissions. Although this in itself might not be a great
security threat, intruders might use the IP address information to launch other types of attacks. Protocol
analyzers cannot decrypt the protected information they find in captured packets. Vulnerability scanners
detect open ports and launch attacks against them; protocol analyzers do not do this.



The correct answers are: A protocol analyzer can display the IP addresses of the systems on the
network., A protocol analyzer can display the application data in packets captured from the network.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller BravelRadon. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $19.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$19.99
  • (0)
  Add to cart