Meyers CompTIA Network+ Certification (N10-007): Test 1 - Results Flashcards
What TCP/IP protocol is used to resolve an IP address to a MAC address?
Address Resolution Protocol (ARP) is a TCP/IP protocol that is responsible for resolving an IP address to a MAC address.
Which network solution provides at least 50 Mbps of bandwidth and supports full-duplex communication?
10/100 layer 2 switch is correct. Switches are usually configured to be full-duplex, and the 100 part of the label means that the switch supports 100 Mbps.
Wi-Fi is only half duplex
Which characteristic is true of TCP?
TCP uses the FIN message to close a connection and The TCP three-way handshake is SYN - SYN, ACK - ACK.
Which coaxial cable(s) have a characteristic impedance of 50 ohms?
RG-8 and RG-58, known as Thicknet and Thinnet, have 50-ohm impedance and were used in early Ethernet installations.
RG-59 has 75-ohm impedance and is found in older CATV installations. RG-6 has 75-ohm impedance is used in modern CATV and home satellite installations.
Which type of fiber optic cable supports longer run lengths?
Single-mode cable carries laser pulses the longest distance.
Incorrect Answers:
Multi-mode carries light pulses short and moderate distances.
Laser-mode and fractal-mode are nonsense terms in the world of fiber optic cables.
Which choices are characteristic of an IP address? (Select two)
Correct Answers:
IP addresses are logically assigned to hosts; they are not fixed values and so can be changed or re-assigned. IP networks (not hosts) are connected with routers.
Incorrect Answers:
MAC addresses are physically programmed into Network Interface Cards, but IP addresses are not.
Hosts are connected with switches, but networks are connected by routers.
Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack?
The DoS attack described is known specifically as a smurf attack.
Incorrect Answers:
The other choices are not the attack described.
Which would be the best solution to make an encrypted tunnel using SSH?
piggyback a VPN session over an SSH connection.
Incorrect Answers:
Recoding an existing tunneling program isn’t very practical and might be illegal if the coder does not have permission, due to copyright issues, to change the program.
PPTP and L2TP/IPsec are already encrypted, so further encrypting them with SSH is not necessary and can introduce performance slowdowns.
A small factory would like to connect a separate warehouse on its property to the network. The warehouse is about 200 meters (656 feet) away from the main factory building. They need a high-speed connection but do not have an unlimited budget. Which would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building?
Correct Answer:
1000Base-SX supports a long run (up to 500 m) with gigabit speed over multimode fiber. It is commonly used for intra-building links.
Incorrect Answers:
10GBase-LW is for 10Gigabit and is very expensive.
1000BaseT is twisted pair and only good for 100 meters.
1000Base-LX is single-mode fiber used as a backbone run because it supports long runs of up to 10 km.
Which networking technology is best defined as Fast Ethernet?
Fast Ethernet is also known at 100BaseT. It is also associated with 100BaseTX, 100BaseT4, and 100BaseFX. There is a pattern. If it has “100” in it, it’s good for Fast Ethernet.
Incorrect Answers:
All of the other answers do not have “100” in their name, and therefore, incorrect.
Which statement is true of VLANs?
VLANs break up a single broadcast domain into multiple, smaller broadcast domains.
Incorrect Answer:
VLANs don’t enable hosts from outside the LAN to connect, but VPNs do.
VLANs do not encrypt connections, either within the VLAN or when connecting VLANs.
VLANs are implemented in switches, not routers.
Which protocol in the TCP/IP protocol suite deals with logical addresses for hosts and resides at Layer 3 (Network Layer) of the OSI model?
Correct Answer:
Internet Protocol (IP) is the TCP/IP protocol that deals with logical addresses, commonly known as IP addresses, for host computers.
Incorrect Answers:
TCP and UDP work at the Transport layer, while PPP works at the Data Link layer.
Which choice is not found in a change request?
The cost is not included in a change request. Cost is evaluated by the change-management team and approved or denied by management.
Incorrect Answers:
There are five items found in a change request: type of change, configuration procedures, rollback procedure, potential impact, and notification.
WPS is used for what purpose?
Correct Answer:
Wireless Protected Setup (WPS) automatically negotiates and configures Wi-Fi settings between a peripheral and a WAP.
Incorrect Answers:
The Wi-Fi password is shared, but there is more that happens under WPS.
WPS does not establish a personal network.
WPS does not provide protection services except during the initial configuration.
Which of the following is allowed by port forwarding?
Port forwarding enables access to hosts on the LAN side of a NAT router from beyond the WAN interface of the router.
Incorrect Answers:
Port forwarding does not enable support for LAN side hosts to be assigned public addresses.
Port forwarding has nothing to do with DNS, and there is no such thing as a “DNS address.”