Dion #3 CompTIA Network+ (N10-007) 6 Practice Exams and Simulations Flashcards
What type of cable would you use to connect a switch to a hub?
When connecting a switch to a hub, you can use a crossover cable (unless they support MDIX). If this were a real question on the exam, you would have the words provided in a list, and you would drag them below the appropriate drawing.
Which of the following port or ports does SIP use?
SIP works with other protocols over 5060/5061. 443 is HTTPS, 389/636 is LDAP, and 135/139/445 is NetBIOS and SMB.
What describes an IPv6 address of ::1?
OBJ-1.3: In IPv6, ::1 is the loopback address, whereas, in IPv4, it is 127.0.0.1. The loopback address is used to send a test signal sent to a network destination to diagnose problems.
Dion Training has just installed a brand new email server. Which of the following DNS records would need to be created to allow the new server to receive email on behalf of diontraining.com?
An MX record is required in the DNS for a domain for the email server to accept emails on behalf of a registered domain name.
Which of the following technologies deliver multiple voice calls over a copper wire if you have an ISDN or T-1 connection?
OBJ-2.5: Time-division multiplexing allows for two or more signals or bitstreams to be transferred in what appears to be simultaneous sub-channels in one communication channel but is physically taking turns on the channel. This is the technology used in a single PRI (ISDN or T-1) service to essentially share a single cable but pass multiple voice calls over it.
Which of the following protocols are designed to avoid loops on a Layer 2 network?
OBJ-1.3: The Spanning Tree Protocol is part of the 802.1d standard and avoids loops in the switching network (layer 2).
Which of the following describes the ID of a specified native VLAN when traffic passes over a trunk?
OBJ-1.3: Trunk ports carry all traffic, regardless of VLAN number, between all switches in a LAN. The VLAN designation for a trunk port is its native VLAN. If the trunk port has a native VLAN that differs from the tag placed on the frame as it entered the access port, the switch leaves the tag on the frame and sends the tagged frame along to the next switch or switches. If the trunk port’s native VLAN is the same as the access ports VLAN, then the switch drops the tag and sends the untagged frame out the trunk port.
***A small law office has a network with three switches (8 ports), one hub (4 ports), and one router (2 ports). Switch 1 (switch port 8) is connected to an interface port (FastEthernet0/0) on the router. Switch 2 (switch port 8) and switch 3 (switch port 8) are connected to Switch 1 (switch ports 1 and 2). The hub has three computers plugged into it on ports 1, 2, and 3. The fourth port on the hub is connected to the router’s other interface port (FastEthernet0/1). Based on the configuration described here, how many broadcast domains are there within this network?
***OBJ-1.3: A broadcast domain is a logical division of a computer network in which all nodes can reach each other by broadcast at the data link layer. A broadcast domain can be within the same LAN segment, or it can be bridged to other LAN segments. Routers break up broadcast domains. Therefore there are two broadcast domains in this network - one for each side of the router (the three switches make up one broadcast domain, and the hub makes up the second broadcast domain).
A technician is testing a new web-based tool capable of generating an automatic teller machine (ATM) cash and service availability reports. A consortium of financial institutions developed the web-based tool. Which of the following cloud delivery models is being described in this scenario?
: A community or private delivery model would work best. A community cloud in computing is a collaborative effort in which infrastructure is shared between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The scenario described is a community cloud created tool by the banking industry.
A technician needs to ensure wireless coverage in the green space near the center of the college campus. The antenna is being installed in the middle of the field on a pole. Which type of antenna should be installed to ensure maximum coverage?
OBJ-2.2: Omnidirectional antennas send the signal out equally in all directions. Therefore it will provide the best coverage since it is located in the center of the field.
A company suffers an outage due to a bad module in a core switch. What is the NEXT step to conduct troubleshooting?
OBJ-5.1: The troubleshooting steps are to (1) Identify the problem, (2) Establish a theory of probable cause, (3) Test the theory to determine the cause, (4) Establish a plan of action to resolve the problem and identify potential effects, (5) Implement the solution or escalate as necessary, and (6) Verify full system functionality and if applicable implement preventative measures. Since the cause of the problem is already known (a bad module), we can skip directly to establishing a plan of action to solve the problem.
A technician has finished configuring AAA on a new network device. However, the technician cannot log into the device with LDAP credentials but can with a local user account. What is the MOST likely reason for the problem?
OBJ-4.2: AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems
Your company’s security policy states that its workstations must hide their internal IP addresses whenever they make a network request across the WAN. You have been asked to recommend a technology that would BEST implement this policy. Which of the following is the BEST solution for you to recommend?
OBJ-1.3: Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. Using NAT, you can have the internal IP address of each workstation mapped to a public IP address or port when it crosses the router to access the WAN.
Michael has been tasked with assigning two IP addresses to WAN interfaces on connected routers. To conserve address space, which of the following subnet masks should he use for this subnet?
OBJ-1.4: An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address, and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address, and from that, we can calculate how many bits are used for the host addresses. In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing, and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 - 2), a /30 subnet mask will provide 2 usable IP addresses.
A third-party vendor has just released patches to resolve a major vulnerability. There are over 100 critical devices that need to be updated. What action should be taken to ensure the patch is installed with minimal downtime?
: Patches should always be tested first. Once successfully tested, deployment to the production environment can then be accomplished.