Meyers CompTIA Network+ Certification (N10-007): Test 1 - Results Flashcards
What TCP/IP protocol is used to resolve an IP address to a MAC address?
Address Resolution Protocol (ARP) is a TCP/IP protocol that is responsible for resolving an IP address to a MAC address.
Which network solution provides at least 50 Mbps of bandwidth and supports full-duplex communication?
10/100 layer 2 switch is correct. Switches are usually configured to be full-duplex, and the 100 part of the label means that the switch supports 100 Mbps.
Wi-Fi is only half duplex
Which characteristic is true of TCP?
TCP uses the FIN message to close a connection and The TCP three-way handshake is SYN - SYN, ACK - ACK.
Which coaxial cable(s) have a characteristic impedance of 50 ohms?
RG-8 and RG-58, known as Thicknet and Thinnet, have 50-ohm impedance and were used in early Ethernet installations.
RG-59 has 75-ohm impedance and is found in older CATV installations. RG-6 has 75-ohm impedance is used in modern CATV and home satellite installations.
Which type of fiber optic cable supports longer run lengths?
Single-mode cable carries laser pulses the longest distance.
Incorrect Answers:
Multi-mode carries light pulses short and moderate distances.
Laser-mode and fractal-mode are nonsense terms in the world of fiber optic cables.
Which choices are characteristic of an IP address? (Select two)
Correct Answers:
IP addresses are logically assigned to hosts; they are not fixed values and so can be changed or re-assigned. IP networks (not hosts) are connected with routers.
Incorrect Answers:
MAC addresses are physically programmed into Network Interface Cards, but IP addresses are not.
Hosts are connected with switches, but networks are connected by routers.
Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack?
The DoS attack described is known specifically as a smurf attack.
Incorrect Answers:
The other choices are not the attack described.
Which would be the best solution to make an encrypted tunnel using SSH?
piggyback a VPN session over an SSH connection.
Incorrect Answers:
Recoding an existing tunneling program isn’t very practical and might be illegal if the coder does not have permission, due to copyright issues, to change the program.
PPTP and L2TP/IPsec are already encrypted, so further encrypting them with SSH is not necessary and can introduce performance slowdowns.
A small factory would like to connect a separate warehouse on its property to the network. The warehouse is about 200 meters (656 feet) away from the main factory building. They need a high-speed connection but do not have an unlimited budget. Which would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building?
Correct Answer:
1000Base-SX supports a long run (up to 500 m) with gigabit speed over multimode fiber. It is commonly used for intra-building links.
Incorrect Answers:
10GBase-LW is for 10Gigabit and is very expensive.
1000BaseT is twisted pair and only good for 100 meters.
1000Base-LX is single-mode fiber used as a backbone run because it supports long runs of up to 10 km.
Which networking technology is best defined as Fast Ethernet?
Fast Ethernet is also known at 100BaseT. It is also associated with 100BaseTX, 100BaseT4, and 100BaseFX. There is a pattern. If it has “100” in it, it’s good for Fast Ethernet.
Incorrect Answers:
All of the other answers do not have “100” in their name, and therefore, incorrect.
Which statement is true of VLANs?
VLANs break up a single broadcast domain into multiple, smaller broadcast domains.
Incorrect Answer:
VLANs don’t enable hosts from outside the LAN to connect, but VPNs do.
VLANs do not encrypt connections, either within the VLAN or when connecting VLANs.
VLANs are implemented in switches, not routers.
Which protocol in the TCP/IP protocol suite deals with logical addresses for hosts and resides at Layer 3 (Network Layer) of the OSI model?
Correct Answer:
Internet Protocol (IP) is the TCP/IP protocol that deals with logical addresses, commonly known as IP addresses, for host computers.
Incorrect Answers:
TCP and UDP work at the Transport layer, while PPP works at the Data Link layer.
Which choice is not found in a change request?
The cost is not included in a change request. Cost is evaluated by the change-management team and approved or denied by management.
Incorrect Answers:
There are five items found in a change request: type of change, configuration procedures, rollback procedure, potential impact, and notification.
WPS is used for what purpose?
Correct Answer:
Wireless Protected Setup (WPS) automatically negotiates and configures Wi-Fi settings between a peripheral and a WAP.
Incorrect Answers:
The Wi-Fi password is shared, but there is more that happens under WPS.
WPS does not establish a personal network.
WPS does not provide protection services except during the initial configuration.
Which of the following is allowed by port forwarding?
Port forwarding enables access to hosts on the LAN side of a NAT router from beyond the WAN interface of the router.
Incorrect Answers:
Port forwarding does not enable support for LAN side hosts to be assigned public addresses.
Port forwarding has nothing to do with DNS, and there is no such thing as a “DNS address.”
Which choice is not a step in planning and installing a wireless network?
Correct Answer:
Patch antennas may not be appropriate for every installation.
Incorrect Answers:
Performing a site survey, planning WAP locations, and configuring WAP access and security are all planning and execution steps when installing a wireless network.
Get, Response, Set, and Trap are communications that occur between an SNMP manager and an SNMP managed device. These communications are examples of what?
The commands and responses passed between SNMP managers and devices are sent as protocol data units (PDU).
Incorrect Answers:
SNMP protocol data units (PDU) are sent as UDP traffic, not TCP.
NMS is the program that sends and receives the communications.
Managed Information Base (MIB) is the categorized information being queried.
Which committee governs the standards of Ethernet?
IEEE 802.3 manages and maintains Ethernet standards.
Incorrect Answers:
IEEE 802.11n manages and maintains aspects of one of the Wi-Fi wireless standards.
ISO 9001 and 9002 are quality control standards, but they are not IEEE committees.
A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected?
A sniffer is used to examine network traffic. These are more commonly known as packet sniffers.
Incorrect Answers:
Web servers, seriously?
Syslog might be useful, but it would almost certainly not be quick.
SNMP is used for, among other things, remotely managing SNMP-capable devices on the network.
Which techniques should a technician utilize to achieve HA? (Choose three.)
Backups don’t keep systems running, they make it easy to recover.High Availability (HA) is achieved with tools such as RAID arrays, Link Aggregation of multiple NICs and redundant systems. Redundant system may include power supplies, routers, etc. will help keep systems running in the event of a failure.
A technician has been tasked with planning for equipment failures. Which specs will the technician need to review to create a failure plan? (Choose three.)
Mean Time To Repair (MTTR), Mean Time To Failure (MTTF) and Mean Time Between Failures (MTBF) are all specifications that should be known in planning for inevitable future failures.
Incorrect Answer:
Service Level Agreement (SLA) is a document that describes the job of a service provider to deal with issues like equipment or service failures.
What is the role of port numbers in IP headers?
Port numbers identify sending and receiving processes in a sender and receiver.
Incorrect Answers:
Port numbers have nothing to do with switch connectors, router interfaces, or routing paths.
What is a chunk of data that has been sent out of a NIC called?
Network interface cards generate and receive frames.
Incorrect Answers:
A packet comes from the Network layer.
A segment comes from the Transport layer.
MAC stands for Media Access Control and describes physical addressing and the rules about creating and transmitting frames.
Which of the following is not a packet switching technology?
Circuit switching is the opposite of packet switching - it creates a hard-wired circuit between two communicating nodes.
Incorrect Answers:
Frame Relay, Asynchronous Transfer Mode (ATM), and Multiprotocol Label Switching (MPLS) are all examples of packet switching networks.