Meyers CompTIA Network+ Certification (N10-007): Test 3 - Results Flashcards

1
Q

Which of the following are not steps in network design? (Choose two.)

A

The organization may have current WAPs. The organization may have older wiring that is incompatible with modern speeds and technologies.

Incorrect Answers:

Assessing customer needs, current infrastructure, and operating system compatibility are all steps to take when designing networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The solution to a single point of failure is redundancy. Which failure points should be selected to be bolstered with redundancy?

A

Correct Answer:

Critical assets and nodes represent single failure points. It is the job of IT management and senior management to determine which elements are critical.

Incorrect Answers:

Not every server or link may be a critical node.

Drives that are not critical nodes are assets that don’t necessarily need to be in a RAID array.

Critical drives should be backed up, but not every drive is critical.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a common wired network problem?

A

Correct Answer:

UTP cables can be shorter than or equal to (

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is not a “special” IP address?

A

Correct Answer:

169.253.4.185 is a valid class B address (note, any address that starts with 169.254 is an Automatic Private IP Address - APIPA). Watch for this subtle type of distinction on the CompTIA exam.

Incorrect Answers:

  1. 255.1.1 is on the 10.0.0.0 network - a valid private IP network.
  2. 168.70.70 is in the range of valid Class C private IP networks (192.168.x.0). 127.0.0.1 is the loopback IP address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company has added new offices in a space that is 370 feet (113 meters) away from the networking equipment. A technician has been assigned to run CAT6 cables to the new offices. The tech installs a 500-foot (152-meter) run of CAT6 cable. When testing the installation, the tech notes weak signals between the offices and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable?

A

Correct Answer:

Install two CAT6 cables with a repeater - Cat 6, unlike almost all the other twisted-pair cables, is limited to 55 meters for10 Gbps throughput, so two cables with a repeater will reach 107 meters without losing bandwidth. Even at 1 Gbps throughput, CAT6 is limited to 100 meters, so two cables and a repeater will solve the distance issue.

Incorrect Answers:

No need for 3 Cat6 cables, when 2 will do.

Cat 5e (like Cat5) is limited to 100 meters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Log management includes which of the following tasks? (Select three.)

A

Correct Answers:

Certain jurisdictions have legal requirements that logs be archived for future review.

Not everyone should be able to read, edit, or delete log files.

Left unchecked, log files could outgrow available space. Log size must be managed to conform to space, utility, and legal limitations.

Incorrect Answers:

Deleting full logs may run afoul of the law and may also make it impossible to investigate important events.

Logs should not be selectively edited; they must be maintained in their entirety so that a complete record is available to trace or reconstruct an event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which option is categorized data that can be accessed with an SNMP query?

A

Correct Answer:

A management information base (MIB) contains categorized information.

Incorrect Answers:

The snmpwalk utility, also known as walk, automatically runs a series of get commands.

Syslog is a Linux performance-monitoring tool.

A trap is an agent-issued command to solicit information from an NMS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which selections provide single sign-on services? (Choose two.)

A

Correct Answers:

Windows Active Directory (and other Active Directory implementations) and Security Assertion Markup Language (SAML) provide single sign-on services.

Incorrect Answers:

TACACS+ and RADIUS provide authentication and other services but not single sign-on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A firewall that checks out all the incoming traffic and decides if the traffic is going to be allowed or filtered out is an example of which of the following?

A

Correct Answer:

With a stateful firewall, the entire conversation between hosts will be monitored as a single stream. It will keep and discard packets based on how it was configured.

Incorrect Answers:

Packet sniffing is not a feature of a firewall as much as it is a feature on packet analyzers such as Wireshark.

Packet filtering is basically what a firewall does. It’s not a type of firewall. It’s like saying “high-speed RAM.”

Content filtering is the ability to keep or discard specific types of transmission. It operates higher in the OSI model and doesn’t concern itself with IP addresses and ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not a characteristic of the RIP routing protocol?

A

Correct Answer:

Router Information Protocol (RIP) supports a maximum hop count of 15 hops, not 127 hops.

Incorrect Answers:

All of the other choices are characteristics of RIP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which statement is not true about early Ethernet?

A

Correct Answer:

10Base5 connections are made by dropping a cable from a transceiver directly to the NIC.

Incorrect Answers:

All of the other statements are true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network technician has been tasked with monitoring the network. What are some common network functions she should monitor? (Select three.)

A

Correct Answers:

She should monitor several network metrics, such as server utilization, errors, and bandwidth usage.

Incorrect Answer:

Changes to file hashes are not a typical, real-world thing that needs aggressive monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not an element of contingency planning?

A

Correct Answers:

Fire suppression systems are preventative measures, not recovery, and continuity elements.

Incorrect Answers:

Disaster recovery, business continuity, backup site planning, and restoration procedures are all elements of contingency planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is not an element of structured cabling?

A

Correct Answer:

While table-top racks may be used in a structured wiring environment, they are not a standard element of structured cabling.

Incorrect Answers:

All of the other choices are all elements of structured cabling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which choices are examples of symmetric encryption? (Choose three.)

A

Correct Answer:

RC4, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are examples of symmetric encryption.

Incorrect Answers:

Pretty Good Privacy (PGP) and Elliptical Curve Cryptography (ECC) are examples of asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of download and upload speed does ADSL provide?

A

Correct Answer:

Asynchronous Digital Subscriber Line (ADSL) has a different download and upload speed. DSL customers usually require faster download speed than upload speed.

Incorrect Answers:

Synchronous Digital Subscriber Line (SDSL) have the same upload and download speed.

While theoretically possible, it is unusual for ADSL to provide faster upload speed than download speed.

DSL is a full-duplex connection.

17
Q

You have just installed an auto-sensing NIC on a computer. When a NIC has auto-sensing capabilities, what does that mean? (Select two.)

A

Correct Answers:

The link duplex and the link speed will be determined once you connect a cable to your auto-sensing NIC. For instance, it could be 1 Gbps and full-duplex. It could also be 10 Mbps at half-duplex.

Incorrect Answers:

You cannot receive a new MAC address. A MAC address is permanently attached to your NIC–unless you want to talk about MAC spoofing, but that’s a topic for a different day.

The auto-sensing won’t determine what kind of cable you have. This may sound silly, but the type of cable you have will determine the type of cable you have.

Distance from the switch (or hub), the type of cabling used, and most importantly, the amount of data on the network are factors that affect latency.

18
Q

You are working with a certified cable installer to troubleshoot the DSL line coming into your office. He thinks that the DSL signal is coming in on the wrong POTS line. Which tool would he use to troubleshoot this issue?

A

Correct Answer:

The butt set is used by technicians to install and test telephone lines.

Incorrect Answers:

In networking, multimeters can be used to test for continuity on cabling.

The toner probe is used to track down unidentified cables.

The time-domain reflectometer (TDR) is used to locate faults in network cables.

19
Q

Which settings must be manually configured in a switch that does not feature auto-negotiation? (Select TWO.)

A

Correct Answers:

Port speed and duplex - Both characteristics need to be the same to get a connection.

Incorrect Answers:

MAC, IPv4, and IPv6 addressing deal with getting the traffic to the right location after a connection has been established.

20
Q

What is the purpose of IPv6 tunneling? (Choose two.)

A

Correct Answers:

IPv6 tunnels are used to pass IPv6 traffic over IPv4 networks. They accomplish this by encapsulating IPv6 packets within IPv4 packets.

Incorrect Answers:

IPv6 tunnels exist to pass IPv6 traffic across IPv4 networks.

Encapsulating IPv4 packets within IPv6 packets is an IPv4 tunnel that would pass IPv4 traffic over an IPv6 network.

21
Q

Select two advantages of switches over hubs. (Choose two.)

A

Switches reduce collision domains to the two ports involved in communication by isolating them from the other switch ports for the duration of the communication. All ports of a hub are on the same collision domain and can be involved in a broad spectrum of collisions. Switches can autodetect connections to other switches and internally configure the connection port to be a crossover or straight-through, as necessary.

Incorrect Answer

Hubs can be linked together. While hubs were still available, there were just as many ports available on them as there are on modern switches.

22
Q

The Internet layer of the TCP model corresponds to which layer(s) of the OSI model?

A

Correct Answer:

The TCP Internet layer most closely matches the OSI Network layer.

Incorrect Answers:

The OSI Data Link layer most closely fits into the TCP Network Interface layer.

The OSI Transport layer most closely matches the TCP Transport layer. The OSI Session, Presentation, and Application layer most closely match the TCP Application layer.

23
Q

Which of the following are true of broadcast addresses? (Choose two.)

A

Explanation
Collect Answers:

The broadcast address is FF-FF-FF-FF-FF-FF and is found in the first field (destination) of the frame.

Incorrect Answers:

Though the broadcast is a series of 1s, there are not 12 of them, there are 48.

The second field of the frame is the sender’s MAC address.

24
Q

Which of the following is not an element that is exclusive to Mobile NAC?

A

Correct Answer:

Two-factor authentication is generic and can apply to a standalone system as well as a network.

Incorrect Answers:

Onboarding, captive portals, and geofencing are all elements of Network Access Control (NAC) and Moblie NAC.

25
Q

Which of the following are true of web servers and browsers? (Choose three.)

A

Correct Answer:

HTTPS uses TCP port 443, not 143 (IMAP uses port 143).

Incorrect Answers:

All of the other choices are true about web servers and browsers.

26
Q

What is a digital signature?

A

Correct Answer:

A digital signature starts by encrypting a data chunk with a private key. The results are hashed and sent to a receiver. The receiver performs the same operation on the same data chunk but uses the public key and compares the results.

Incorrect Answers:

A digital signature is not just a hashed data chunk (like a web page) or just an encrypted data chunk.

Public and private keys are not used in the hashing process.

27
Q

A network administrator has been assigned to simplify the reviewing of network device events. Which could she use to achieve the desired result?

A

Correct Answer:

Syslog can be used for computer system management and security auditing, as well as generalized information, analysis, and debugging.

Incorrect Answers:

History and Event logs require sifting through many hours of network operation looking for interesting data, while a traffic analyzer is used to determine traffic patterns or problems on the network, but nothing else.