Meyers CompTIA Network+ Certification (N10-007): Test 1 - Results Flashcards

1
Q

What TCP/IP protocol is used to resolve an IP address to a MAC address?

A

Address Resolution Protocol (ARP) is a TCP/IP protocol that is responsible for resolving an IP address to a MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which network solution provides at least 50 Mbps of bandwidth and supports full-duplex communication?

A

10/100 layer 2 switch is correct. Switches are usually configured to be full-duplex, and the 100 part of the label means that the switch supports 100 Mbps.

Wi-Fi is only half duplex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which characteristic is true of TCP?

A

TCP uses the FIN message to close a connection and The TCP three-way handshake is SYN - SYN, ACK - ACK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which coaxial cable(s) have a characteristic impedance of 50 ohms?

A

RG-8 and RG-58, known as Thicknet and Thinnet, have 50-ohm impedance and were used in early Ethernet installations.

RG-59 has 75-ohm impedance and is found in older CATV installations. RG-6 has 75-ohm impedance is used in modern CATV and home satellite installations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of fiber optic cable supports longer run lengths?

A

Single-mode cable carries laser pulses the longest distance.

Incorrect Answers:

Multi-mode carries light pulses short and moderate distances.

Laser-mode and fractal-mode are nonsense terms in the world of fiber optic cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which choices are characteristic of an IP address? (Select two)

A

Correct Answers:

IP addresses are logically assigned to hosts; they are not fixed values and so can be changed or re-assigned. IP networks (not hosts) are connected with routers.

Incorrect Answers:

MAC addresses are physically programmed into Network Interface Cards, but IP addresses are not.

Hosts are connected with switches, but networks are connected by routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack?

A

The DoS attack described is known specifically as a smurf attack.

Incorrect Answers:

The other choices are not the attack described.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which would be the best solution to make an encrypted tunnel using SSH?

A

piggyback a VPN session over an SSH connection.

Incorrect Answers:

Recoding an existing tunneling program isn’t very practical and might be illegal if the coder does not have permission, due to copyright issues, to change the program.

PPTP and L2TP/IPsec are already encrypted, so further encrypting them with SSH is not necessary and can introduce performance slowdowns.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A small factory would like to connect a separate warehouse on its property to the network. The warehouse is about 200 meters (656 feet) away from the main factory building. They need a high-speed connection but do not have an unlimited budget. Which would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building?

A

Correct Answer:

1000Base-SX supports a long run (up to 500 m) with gigabit speed over multimode fiber. It is commonly used for intra-building links.

Incorrect Answers:

10GBase-LW is for 10Gigabit and is very expensive.

1000BaseT is twisted pair and only good for 100 meters.

1000Base-LX is single-mode fiber used as a backbone run because it supports long runs of up to 10 km.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which networking technology is best defined as Fast Ethernet?

A

Fast Ethernet is also known at 100BaseT. It is also associated with 100BaseTX, 100BaseT4, and 100BaseFX. There is a pattern. If it has “100” in it, it’s good for Fast Ethernet.

Incorrect Answers:

All of the other answers do not have “100” in their name, and therefore, incorrect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement is true of VLANs?

A

VLANs break up a single broadcast domain into multiple, smaller broadcast domains.

Incorrect Answer:

VLANs don’t enable hosts from outside the LAN to connect, but VPNs do.

VLANs do not encrypt connections, either within the VLAN or when connecting VLANs.

VLANs are implemented in switches, not routers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which protocol in the TCP/IP protocol suite deals with logical addresses for hosts and resides at Layer 3 (Network Layer) of the OSI model?

A

Correct Answer:

Internet Protocol (IP) is the TCP/IP protocol that deals with logical addresses, commonly known as IP addresses, for host computers.

Incorrect Answers:

TCP and UDP work at the Transport layer, while PPP works at the Data Link layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which choice is not found in a change request?

A

The cost is not included in a change request. Cost is evaluated by the change-management team and approved or denied by management.

Incorrect Answers:

There are five items found in a change request: type of change, configuration procedures, rollback procedure, potential impact, and notification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WPS is used for what purpose?

A

Correct Answer:

Wireless Protected Setup (WPS) automatically negotiates and configures Wi-Fi settings between a peripheral and a WAP.

Incorrect Answers:

The Wi-Fi password is shared, but there is more that happens under WPS.

WPS does not establish a personal network.

WPS does not provide protection services except during the initial configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is allowed by port forwarding?

A

Port forwarding enables access to hosts on the LAN side of a NAT router from beyond the WAN interface of the router.

Incorrect Answers:

Port forwarding does not enable support for LAN side hosts to be assigned public addresses.

Port forwarding has nothing to do with DNS, and there is no such thing as a “DNS address.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which choice is not a step in planning and installing a wireless network?

A

Correct Answer:

Patch antennas may not be appropriate for every installation.

Incorrect Answers:

Performing a site survey, planning WAP locations, and configuring WAP access and security are all planning and execution steps when installing a wireless network.

17
Q

Get, Response, Set, and Trap are communications that occur between an SNMP manager and an SNMP managed device. These communications are examples of what?

A

The commands and responses passed between SNMP managers and devices are sent as protocol data units (PDU).

Incorrect Answers:

SNMP protocol data units (PDU) are sent as UDP traffic, not TCP.

NMS is the program that sends and receives the communications.

Managed Information Base (MIB) is the categorized information being queried.

18
Q

Which committee governs the standards of Ethernet?

A

IEEE 802.3 manages and maintains Ethernet standards.

Incorrect Answers:

IEEE 802.11n manages and maintains aspects of one of the Wi-Fi wireless standards.

ISO 9001 and 9002 are quality control standards, but they are not IEEE committees.

19
Q

A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected?

A

A sniffer is used to examine network traffic. These are more commonly known as packet sniffers.

Incorrect Answers:

Web servers, seriously?

Syslog might be useful, but it would almost certainly not be quick.

SNMP is used for, among other things, remotely managing SNMP-capable devices on the network.

20
Q

Which techniques should a technician utilize to achieve HA? (Choose three.)

A

Backups don’t keep systems running, they make it easy to recover.High Availability (HA) is achieved with tools such as RAID arrays, Link Aggregation of multiple NICs and redundant systems. Redundant system may include power supplies, routers, etc. will help keep systems running in the event of a failure.

21
Q

A technician has been tasked with planning for equipment failures. Which specs will the technician need to review to create a failure plan? (Choose three.)

A

Mean Time To Repair (MTTR), Mean Time To Failure (MTTF) and Mean Time Between Failures (MTBF) are all specifications that should be known in planning for inevitable future failures.

Incorrect Answer:

Service Level Agreement (SLA) is a document that describes the job of a service provider to deal with issues like equipment or service failures.

22
Q

What is the role of port numbers in IP headers?

A

Port numbers identify sending and receiving processes in a sender and receiver.

Incorrect Answers:

Port numbers have nothing to do with switch connectors, router interfaces, or routing paths.

23
Q

What is a chunk of data that has been sent out of a NIC called?

A

Network interface cards generate and receive frames.

Incorrect Answers:

A packet comes from the Network layer.

A segment comes from the Transport layer.

MAC stands for Media Access Control and describes physical addressing and the rules about creating and transmitting frames.

24
Q

Which of the following is not a packet switching technology?

A

Circuit switching is the opposite of packet switching - it creates a hard-wired circuit between two communicating nodes.

Incorrect Answers:

Frame Relay, Asynchronous Transfer Mode (ATM), and Multiprotocol Label Switching (MPLS) are all examples of packet switching networks.

25
Q

Which of the following statements is not true of Gigabit Ethernet?

A

1000BaseSX supports runs of up to 500 m over multi-mode fiber optic cable (220m/275m with 62.5 cable and 500m/550m with 50 micro cable) It does not support 10km runs.

Incorrect Answers:

All of the other choices are true regarding Gigabit Ethernet.

26
Q

A company has subnetted its Class C network address into four subnets with a /26 subnet mask. What are the addresses of the four subnets?

A

0, 64, 128, and 192 represent all of the possible values of 1s and 0s in the first two columns of the fourth octet in a Class C address: 0 0, 0 1, 1 0, and 1 1. Place those values under a 128 and a 64 column and calculate the results.

Incorrect Answers:

The leftmost two bits of the fourth octet are masked, the 128 and 64 column, using any combination of 1s and 0s in those columns it would not be possible to generate a 1, 2, 3, 4 or 8.

It would also be impossible to generate a 32 or 16, so the other choices are incorrect.

27
Q

FTP uses TCP port 20 and TCP port 21. Which choice BEST describes how the ports are used?

A

Active FTP servers receive commands on port 21 and respond with data on port 20.

Incorrect Answers:

All of the other choices do not accurately describe how FTP uses ports 20 and 21.

28
Q

Which of the following is a secure email protocol?

A

Start Transport Layer Security (STLS) is the current approach to running secure email protocols.

Incorrect Answers

SMTP, POP, and IMAP are all older, unsecured mail protocols.

29
Q

1000Base-LX has the longest maximum run distance for Gigabit Ethernet running multimode fiber- what is that distance?

A

1000Base-LX running multimode has a maximum length of 550 meters.

30
Q

A technician needs to protect the network power system. What are good solutions for her to implement? (Choose two.)

A

Generators and redundant power supplies are excellent solutions to keep systems up and running.

Incorrect Answers:

Solar power may not work during periods of low light.

Batteries help, but they soon run down.

LCD monitors have low power consumption but don’t provide any protection in a failed power or power supply condition.

31
Q

Which protocols are implementations of AAA? (Choose two.)

A

Correct Answers:

RADIUS and TACACS+ provide authentication, authorization, and accounting.

Incorrect Answers:

Kerberos provides authentication but not authorization or accounting.

Encryption does not directly provide authentication, authorization, or accounting.

32
Q

Which choices are examples of asymmetric encryption? (Choose two.)

A

Elliptic Curve Cryptography (ECC) and Rivest-Shamir-Adleman (RSA) are examples of asymmetric encryption.

Incorrect Answers:

Blowfish and Data Encryption Standard (DES) are examples of symmetric encryption.

33
Q

In what folder is the HOSTS file located on a Windows computer?

A

Correct Answer:

In a Windows-based computer, the HOSTS file is found in the C:\Windows\System32\Drivers\etc folder.

Incorrect Answers:

The other folder choices do not hold the HOSTS file.

34
Q

Which protocol maps IP addresses to Layer 2 (Data Link Layer) addresses?

A

ARP is the protocol used to resolve an IP address into a MAC address, which functions at Layer 2 (Data Link Layer) of the OSI seven-layer model.

Incorrect Answers:

Ping test connectivity, Netstat deals with sessions, and TCP doesn’t deal with MAC addresses.

35
Q

A network technician needs to check the configuration of a port on a switch. Which tool will he MOST likely to use to verify the configuration?

A

Correct Answer:

SNMP, simple network messaging protocol, is used to, among other things, remotely administer SNMP-enabled devices.

Incorrect Answers:

Traceroute tells you what routers your packets are passing through on their way to a destination.

Nbtstat is only used in NetBIOS/NetBEUI networks, and dig is a DNS query tool.

36
Q

Patch panels and punch down tools are used on which kind of network cables?

A

Horizontal runs are punched down to the back of a patch panel on one end and the back of the wall jack of a work area at the other end.

Incorrect Answers:

Patch cables patch from the front of the patch panel to a switch port or another patch panel.

Work area cables are terminated on each end and go from the wall jack in a work area to a computer or other device.

Fiber optic runs are not punched into punch down blocks - they are always terminated with a fiber optic connector.

37
Q

a fiber run between the MDF and the IDF in his building. 20 meters distance fastest connection possible. Which standard?

A

10GBaseSR will run at 10 Gbps over fiber. The “S” states that it is short-range. It can go at distances up to roughly 300 meters. The “R” means that it is designed to be used with existing Ethernet standards.

Incorrect Answers:

1000BaseSX is fast, but not fast enough. However, it does use fiber at short ranges.

10GBaseT is fast enough, but it uses twisted pair, not fiber.

10GBaseSW is almost perfect, except for that “W,” which means that it is designed for WAN connections, using the existing SONET infrastructure.