Meyers CompTIA Network+ Certification (N10-007): Test 3 - Results Flashcards
Which of the following are not steps in network design? (Choose two.)
The organization may have current WAPs. The organization may have older wiring that is incompatible with modern speeds and technologies.
Incorrect Answers:
Assessing customer needs, current infrastructure, and operating system compatibility are all steps to take when designing networks.
The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?
Correct Answer:
Critical assets and nodes represent single failure points. It is the job of IT management and senior management to determine which elements are critical.
Incorrect Answers:
Not every server or link may be a critical node.
Drives that are not critical nodes are assets that don’t necessarily need to be in a RAID array.
Critical drives should be backed up, but not every drive is critical.
Which of the following is not a common wired network problem?
Correct Answer:
UTP cables can be shorter than or equal to (
Which of the following is not a “special” IP address?
Correct Answer:
169.253.4.185 is a valid class B address (note, any address that starts with 169.254 is an Automatic Private IP Address - APIPA). Watch for this subtle type of distinction on the CompTIA exam.
Incorrect Answers:
- 255.1.1 is on the 10.0.0.0 network - a valid private IP network.
- 168.70.70 is in the range of valid Class C private IP networks (192.168.x.0). 127.0.0.1 is the loopback IP address.
A company has added new offices in a space that is 370 feet (113 meters) away from the networking equipment. A technician has been assigned to run CAT6 cables to the new offices. The tech installs a 500-foot (152-meter) run of CAT6 cable. When testing the installation, the tech notes weak signals between the offices and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?
Correct Answer:
Install two CAT6 cables with a repeater - Cat 6, unlike almost all the other twisted-pair cables, is limited to 55 meters for10 Gbps throughput, so two cables with a repeater will reach 107 meters without losing bandwidth. Even at 1 Gbps throughput, CAT6 is limited to 100 meters, so two cables and a repeater will solve the distance issue.
Incorrect Answers:
No need for 3 Cat6 cables, when 2 will do.
Cat 5e (like Cat5) is limited to 100 meters.
Log management includes which of the following tasks? (Select three.)
Correct Answers:
Certain jurisdictions have legal requirements that logs be archived for future review.
Not everyone should be able to read, edit, or delete log files.
Left unchecked, log files could outgrow available space. Log size must be managed to conform to space, utility, and legal limitations.
Incorrect Answers:
Deleting full logs may run afoul of the law and may also make it impossible to investigate important events.
Logs should not be selectively edited; they must be maintained in their entirety so that a complete record is available to trace or reconstruct an event.
Which option is categorized data that can be accessed with an SNMP query?
Correct Answer:
A management information base (MIB) contains categorized information.
Incorrect Answers:
The snmpwalk utility, also known as walk, automatically runs a series of get commands.
Syslog is a Linux performance-monitoring tool.
A trap is an agent-issued command to solicit information from an NMS.
Which selections provide single sign-on services? (Choose two.)
Correct Answers:
Windows Active Directory (and other Active Directory implementations) and Security Assertion Markup Language (SAML) provide single sign-on services.
Incorrect Answers:
TACACS+ and RADIUS provide authentication and other services but not single sign-on.
A firewall that checks out all the incoming traffic and decides if the traffic is going to be allowed or filtered out is an example of which of the following?
Correct Answer:
With a stateful firewall, the entire conversation between hosts will be monitored as a single stream. It will keep and discard packets based on how it was configured.
Incorrect Answers:
Packet sniffing is not a feature of a firewall as much as it is a feature on packet analyzers such as Wireshark.
Packet filtering is basically what a firewall does. It’s not a type of firewall. It’s like saying “high-speed RAM.”
Content filtering is the ability to keep or discard specific types of transmission. It operates higher in the OSI model and doesn’t concern itself with IP addresses and ports.
Which of the following is not a characteristic of the RIP routing protocol?
Correct Answer:
Router Information Protocol (RIP) supports a maximum hop count of 15 hops, not 127 hops.
Incorrect Answers:
All of the other choices are characteristics of RIP.
Which statement is not true about early Ethernet?
Correct Answer:
10Base5 connections are made by dropping a cable from a transceiver directly to the NIC.
Incorrect Answers:
All of the other statements are true.
A network technician has been tasked with monitoring the network. What are some common network functions she should monitor? (Select three.)
Correct Answers:
She should monitor several network metrics, such as server utilization, errors, and bandwidth usage.
Incorrect Answer:
Changes to file hashes are not a typical, real-world thing that needs aggressive monitoring.
Which of the following is not an element of contingency planning?
Correct Answers:
Fire suppression systems are preventative measures, not recovery, and continuity elements.
Incorrect Answers:
Disaster recovery, business continuity, backup site planning, and restoration procedures are all elements of contingency planning.
Which of the following is not an element of structured cabling?
Correct Answer:
While table-top racks may be used in a structured wiring environment, they are not a standard element of structured cabling.
Incorrect Answers:
All of the other choices are all elements of structured cabling.
Which choices are examples of symmetric encryption? (Choose three.)
Correct Answer:
RC4, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are examples of symmetric encryption.
Incorrect Answers:
Pretty Good Privacy (PGP) and Elliptical Curve Cryptography (ECC) are examples of asymmetric encryption.