CompTIA's new set of 30 questions (obsolete ones deleted) Which protocol in the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite is responsible for reporting errors and providing information about packet delivery? UDP IGMP ARP ICMP OMG When is it necessary to use plenum-rated cable when installing network cabling? In environments in which there is a risk of electrical interference Only when installing Ethernet coaxial cable When required by local building codes In all network wiring applications Which network device is used to extend the length of a network segment by simply regenerating the data signal? --obsolete Switch Repeater obsolete Hub obsolete Bridge obsolete The Network layer of the Open Systems Interconnect (OSI) model is responsible for managing what function? Establishing and maintaining communication sessions Providing reliable data transfer and error control Routing and subnetting Physical connection to the cable plant You want to view IP address information on a computer running UNIX. What should you do? Run ipconfig. Run ifconfig. Run nslookup. Run nbtstat. A malicious program that resides in memory, copies itself, and sends copies of itself to other network hosts is known as what? A worm A virus A man-in-the-middle A Trojan Which Transmission Control Protocol/Internet Protocol (TCP/IP) protocol is used to transfer e-mail messages and attachments between mail servers? TFTP POP3 SNMP SMTP File Transfer Protocol (FTP) and Simple Mail Transfer Protocol (SMTP) are implemented as which layer of the Open System Interconnect (OSI) model? Transport layer Presentation layer Session layer Application layer You need to determine where the route is failing between your computer running Windows and a remote host. You need this information as quickly as possible. What should you do? Run ping. Run route. Run mtr. Run tracert. Run away. Your employees are being targeted by phishing attacks. How can you minimize the impact of these attacks? (Choose two.) Through antivirus software Through traffic monitoring Through user education Through enforced policies and procedures Through regular computer updates What protocol is used to find a network device's Media Access Control (MAC) address when its IP address is known? DHCP FTP DNS ARP ICMP What category of twisted pair cable should you use when wiring a 10GBaseT Ethernet network? CAT 3 CAT 6 CAT 5 CAT 5e You need to extend your office network, but you cannot run new cable in the area. Devices should be addressed as part of an existing subnet that is wired as 10BaseT. What should you do first? Deploy a wireless access point. Deploy a bridge. Deploy a router. Deploy a basic firewall. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are implemented at which layer of the OSI model? Layer 6 Layer 4 Layer 7 Layer 5 You want to retrieve information about TCP/IP network connections and protocol statistics. What should you do? Run nbtstat. Run ipconfig. Run ping. Run netstat. You are setting up a home office with two computers. The computers will access the Internet through a cable modem connected to a switch that shares the connection. You want to protect the computers from unwanted traffic and block access to unused TCP and UDP ports. You need to keep the cost and complexity of the network to a minimum. What should you do? Use an intrusion detection system (IDS). Use a network firewall. Use a host-based firewall on each computer. Use an intrusion prevention system (IPS). For what purpose is User Datagram Protocol (UDP) port 67 used? Mail delivery Host name resolution IP address assignment File transfers What type of connector is used with RG-58 coaxial cable networking implementations? --obsolete SC BNC RJ-45 RJ-11 You are connecting your local area network (LAN) to the Internet. You need deploy a device to filter traffic between the Internet and your LAN based on TCP and UDP port usage. What should you do? Install and configure a hub Install and configure a router. Install and configure a bridge. Install and configure a firewall You need to determine if your network's Domain Name System (DNS) servers are properly supporting reverse lookup. What should you do? (Choose two.) Run the nslookup command. Run the ping command. Run the arp command. Run the rarp command. Run the nbtstat command. Run the dig command. You have three Web servers deployed in your perimeter network. You want to limit the traffic between your perimeter network and the Internet to secured and unsecured Hypertext Transfer Protocol (HTTP) only. What should you do? Deploy an IDS in the perimeter network. Deploy a personal firewall on each Web server. Deploy a network firewall between the perimeter network and the Internet. Deploy an IPS in the perimeter network. What Transmission Control Protocol (TCP) port is used for secure communications between Web clients and Web servers? 443 123 110 80 What type of connector is used with 10BaseT Ethernet networks? RJ-45 BNC RJ-11 RS-232 You need to prioritize network traffic so that you can control data transmission rates by port usage. What should you use? Load balancer Multilayer switch Bandwidth shaper Content switch You add a computer to an existing 10BaseT network that is configured as a single subnet. The computer is configured with a static IP address. Other computers on the network cannot communicate with the new computer using its IP address. The new computer's network interface card and protocol stack appear to be working correctly. What is most likely wrong? (Choose two). Problem with contacting a Dynamic Host Configuration Protocol (DHCP) server Incorrect subnet mask Incorrect default gateway Invalid computer name Invalid IP address When would you use a port scanner to test your perimeter network? To see if your proxy server is forwarding traffic To tell how well your network responds to threats To identify potential holes in network firewalls To determine if your network's Web servers are operating properly When would you use a stateful firewall to filter traffic? To filter by individual packet headers To filter by evaluating detailed packet content To filter by protocol type To filter by monitoring connections and allowing valid traffic by connection type