Net+ Flashcards
Which of the following protocols reside at the application layer of the OSI model? (Select all that apply)
A. SMTP
B. TCP
C. IP
D. HTTP
A & D. Layer 7 is the application level. QoS, file transfer, and email are the major popular services at layer 7. SMTP, HTTP, & FTP
A network engineer is adding a bridge into the network design. Where in the OSI model will this bridge operate?
A. Layer 5
B. Data link layer
C. Transport layer
D. Layer 2
B & D. The bridge creates a link between the 2 physical segments so that host in segment A can send and receive messages to hosts in segment B.
Client A is sending data to Server A. The packet has left the application layer and transversed the ISO model through to the data link layer. Which header will get encapsulated onto the packet at the data link layer?
A. UDP header
B. TCP header
C. Ethernet header
D. IP header
C. Ethernet encapsulates the payload from higher layer protocols within a PDU called a frame. The ethernet header encapsulates onto a packet at the data link layer
Host A is communicating with Host B. Host A uses the ASCII and Host B uses Unicode. The client agree to translate the communication to ASCII. What layer of the OSI model does the agreement and translation occur?
A. Application
B. Presentation
C. Transport
D. Session
B. Layer 6 transforms data between the format required for the network and the format required for the application
A device connects all hosts and routes network traffic. Based on the device’s characteristics, what does the network utilize for connectivity and traffic flow?
A. Multilayer switch
B. Repeater
C. IDS/IPS
D. Firewall
A. Multilayer switch routes based on the contents of packets at layer 3 and up and more effectively in a VLAN environment
Which OSI layer assumes responsibility for managing network connections between applications?
A. Physical
B. Session
C. Data Link
D. Network
B. The Session Layer (Layer 5) involves the exchange of multiple messages between the client and server. Sessions can work in 3 modes: Simplex, Half-duplex or Duplex
A network admin is looking at an ARP table on a switch for connected devices. Which OSI layer are they looking at?
A. Network
B. Physical
C. Data link
D. Session
C. The data link layer (layer 2) transfer data between different nodes on the same logical segment. This is where ARP tables are located
A wireless access point I available on the floor for wireless users in the area. User 1 wants to send a file to user 2 using their laptop’s wireless adapters. Which of the following is the most secure way of sending files to one another using their current wireless adapters?
A. Using the ad hoc connection
B. Using a bus network connection
C. Using an infrastructure connection
D. Using a wireless mesh network
A. In an ad hoc technology, the wireless adapter allows connection to and from other devices
Which blade should an installer use that has a customizable blade on one end of the punch tool?
A. Krone
B. Bix
C. 110
D. 66
B. Bix panels are rare but still uses. The blades for these panels are adjustable on one end of the punch tool. They are similar to a 110 punch tool but
A tech configures a network to use an E-lines service. Compare and evaluate the choices to determine which network type the tech configures.
A. WAN
B. CAN
C. PAN
D. MAN
D. A MAN uses a service category such as an E-line, which establishes a point-to-point link or an E-LAN
An IT engineer considers optical mode OM1 or OM2 cables for a project. The project requires cables that are rated for apps up to 1 Gbps and use LED transmitters. Of the following choices, which type of cable does the engineer select to use?
A. Duplex
B. Multimode
C. Single mode
D. Bidirectional
B. Multimode fiber is inexpensive to deploy compared to single mode fiber and it does not support long distances
A network installer is building a long distance link. The nodes are approximately 10 km apart. What type of fiber link should the installer build for this link?
A. 100BASE-FX
B. 1000BASE-LX
C. 10GBASE-SR
D. 100BASE-SX
B. 1000BASE-LX is a gigabit ethernet standard and supports 1 Gbps and a distance of 10 km using single mode fiber
A network technician is installing a new router in a new wing of the corporate building. The technician needs to connect the new router to the core router. The router is about 300 feet away from the core router and requires a 100 Mbps connection. What type of connection should the technician building for the router?
A. Coaxial/RG-6
B. 10GBASE-T
C. 100BASE-TX
D. 10BASE-T
C. A 100BASE-TX refers to fast ethernet working over Cat 5 twisted pair copper cable for speeds up to 100 Mbps, and a maximum supported link length of 100 meters
A network administrator is setting up a 192.168.1.0/24 network using variable length subnet masking (VLSM) to support the sales and marketing department. The sales department has 120 computers and the marketing department has 50 computers. Which of the following Internet Protocol (IP) address configurations will provide adequate support for the marketing department? (Select all that apply.)
A. 192.168.1.0/25
B. 255.255.255.192
C. 255.255.255.224
D. 192.168.1.128/26
B & D.
A host with a Media Access Control (MAC) of 00:72:8b:31:8b:cb uses a global scope addressing scheme. Compose the MAC-derived address for the Extended Unique Identifier (EUI) 64.
A. 0272:8bff:ee31:8bcb
B. 0272:8bff:fe31:8bcb
C. 0072:8bff:fe31:8bcb
D. 0072:8bff:ee31:8bcb
B. Globally scoped unicast addresses are routable over the Internet and are the equivalent of public Internet Protocol version 4 (IPv4) addresses. A MAC address is 48 bits and an Extended Unique Identifier (EUI)-64 creates a 64-bit interface. The digits fffe are added in the middle of the address and the Universally Administered (U)/Locally Administered (L) bit is flipped. The proper EUI-64 in this scenario is 0272:8bff:fe31:8bcb.
A small office is utilizing a total of 25 Internet Protocol (IP) addresses to support various workstations and printers. One of the workstations has an IP address of 192.168.10.50. Which of the following are true about this network’s subnet? (Select all that apply.)
A. CIDR notation of /27
B. Subnet mask of 255.255.255.224
C. Broadcast address of 192.168.10.31
D. CIDR notation of /28
A & B. IP address 192.169.10.50 is part of the second subnet of the 192.168.10.0 network that is notated as 192.168.10.32/27. Its subnet mask is 255.255.255.224.
A system uses a private address to send a packet within the internal network. The address is ff02::1. Compare private address types and determine what type of address the system is using.
A. Multicast
B. Broadcast
C. Unicast
D. Internet Protocol (IP)
A. A multicast address identifies multiple network interfaces. Unlike Internet Protocol version 4 (IPv4), Internet Protocol version 6 (IPv6) must support multicast. The first 8 bits indicate the address is within the multicast scope (1111 1111 or ff). The address ff02::1 has a target of all link-local nodes.
The hosts on a company’s network all use a public Internet Protocol (IP) address. The first octet in the IP range is 132. Determine which class the network belongs to after comparing the octet ranges of the following classes of addresses.
A. Class D
B. Class B
C. Class C
D. Class A
B. The company will require the use of a Class B public network. This network can have up to 65,534 hosts and the first octet of the address will range from 128-191. The first octet in the scenario is 132 and falls within this range.
A real estate agent is uploading photos of the latest listing onto the corporate website. Once the agent uploads the photos, they pass through multiple servers undergoing quality checks and sorting to ensure that they appear in the most relevant searches. What term best describes the passing of data from server to server?
A. TOR Switching
B. Branch office vs 0n-premises data center vs colocation
C. North-South
D. East-West
D. East-West is a term to describe traffic that travels or flows between server to server in a data center
The T11 ANSI standard can be a particularly expensive way to connect a SAN and involves three main types of components: the initiator, the target, and a director. What is the name of the standard described?
A. Fibre Channel
B. Application layer
C. North-South
D. iSCSI
A. The Fibre Channel connects SANs using 3 main types of components: the initiator, the target, and the Fibre Channel switch. The initiator is the client device of the SAN. The target is the network port for a storage device. The Fibre Channel switch, sometimes referred to as a director, provides the connections between the initiator and the target.
A restaurant chain’s corporate office connect via a hierarchical star network topology. What term does CompTIA use to describe the links that aggregate and distribute traffic from multiple different areas of the network?
A. Backbone
B. Control layer
C. Access/edge
D. Infrastructure layer
A. The term backbone describes that aggregate and distribute traffic from multiple different areas in the network
In a spine and leaf topology, there are two layers: the spine and the leaf. What do the top-tier switches in the spine layer compromise, even though neither link to one another?
A. Backbone
B. Control layer
C. Access/edge
D. Infrastructure layer
A. Backbone
An org looks to implement a solution where remote workers can access both cloud-based resources and on-premises data. Some users will use company issues laptops, while others will use personally owned desktop computers. Which solution does the IT department deploy?
A. A DaaS environment
B. A VPN
C. A hybrid cloud
D. A multitenancy environment
B. VPN
Office desktop computers and VoIP phones will most likely connect to this network device to communicate with other systems over the LAN.
A. AP
B. Wireless LAN controller
C. Layer 3 switch
D. SCADA system
C. A layer 3 capable switch is a standard switch optimized for routing between VLANs
A tech is reviewing the routing gateway protocols for the org under the AS control as a single owner. In reviewing the available protools, which one identifies routes within an AS?
A. IGP
B. EIGRP
C. TTL
D. RIP
A. An Interior Gateway Protocol is the protocol that identifies routes within an AS
A network architect has positioned multiple routers in different floor levels of a 10 story office building that will support the internal network of a large software company. Each routing device has redundant paths and connections. Which routing protocol would benefit the org’s hierarchical structure?
A. RIP
B. OSFP
C. BGP
D. EIGRP
B. Open Shortest Path First (OSPF) is a link state type of routing protocol ideal for hierarchical systems and networks. OSPF is suitable for orgs with multiple redundant paths between networks
A network contractor is reviewing the algorithms used for path selection. The algorithms categorize according to the topology and metrics used to build and update a routing info base. It also prioritizes optimal or least-cost paths. What algorithm uses the number of hops to determine the destination as a metric?
A. Hybrid routing protocol
B. Routing info protocol
C. Distance vector
D. Static route
C. Distance vector protocols use the number of hops to the destination as the metric. The route with the fewest hops is the least cost path and the network will select it for use
A network engineer is reviewing the IP header fields and notices that the field reduces by one every time a packet forwards to a router. What is the name of this IP header field?
A. Static Route
B. EIGRP
C. TTL
D. Routing info protocol
C. The Time to Live IP header field reduces by one every time a packet forwards by a router. The TTL output field in the ping command shows the counter’s value when the packet arrives at its destination
A network admin made recommendations to an org to implement QoS features for video conferencing rooms and data networks. However, the op manager was unsure of its benefit. How would the net admin describe QoS to the manager? (Select all that apply)
A. The data plane handles the switching of traffic
B. The control plane decides how to prioritize traffic
C. The service is basically a traffic shaper
D. The management plane creates static routes
A, B & D. In terms of QoS, network functions divide into three planes. The control plane makes decisions about how to prioritize traffic and where it should switch them. The data plane handles the actual switching of traffic. This basically forwards packets through the router to their destination. Protocols, appliances, and software that can apply these three functions are known as traffic shapers or bandwidth shapers. Traffic shapers delay certain packet types—based on their content—to ensure that other packets have a higher priority.
Protocols, appliances, and software that can apply a control plan, data plane, and management plane to its network functionality are known as which of the following?
A. Border Gateway Protocol
B. Distance vector
C. Bandwidth shaper
D. Link state
C. Protocols, appliances, and software that apply these 3 functions are traffic shapers or bandwidth shapers. Traffic shapers delay certain packet types based on their content
The network monitoring software alerts to issues where packets are circulating between 2 routers before they get discarded. How would a net admin confirm this routing issue on the network?
A. Check if the TTL goes to 0
B. Check the ISP to ISP route
C. Check the routing table for next hop
D. Check the link state of the routers
A. The TTL IP header field reduces by one every time a router forwards a packet. When pinging a destination, the routing loop will eventually reduce the TTL value to 0
Which protocol would a switch authenticating via 802.1x mechanism use?
A. EAPoW
B. EAPoL
C. NAC
D. EAP-TLS
B. Under 802.1x, the device requesting access is the supplicant. The switch, referred to as the authenticator, enables the EAPoL protocol only and waits for the device to supply authentication data
A network manager for CBA company in Dallas, TX adds host Manage30 to AD. Manage30 is a client in the Management office. Utilize this information to design the distinguished name of the client.
A. DC=com, DC=CBA, ST=TX, L=Dallas, O=CBA, OU=Management, CN=Manage30
B. CN=Manage30, OU=Management, O=CBA, L=Dallas, ST=TX, DC=com, DC=CBA
C. OU=Management, CN=Manage300, O=CBA, L=Dallas, ST=TX, DC=com, DC=CBA
D. CN=Manage30, OU=Management, O=CBA, L=Dallas, ST=TX, DC=CBA, DC=com
A distinguished name is a unique identifier for any given resource within a X.500 directory. The most specific attribute is listed first, and successive attributes become progressively broader. In this scenario the client name (CN) is Manage30 and is the most specific attribute followed by the Organization (OU), Organization (O), Locality (L), State (ST), Domain Component (DC).
Communications on an ethernet network occur in which way?
A. Full duplex
B. Half duplex
C. Collision free
D. Non-Shared
A. In full-duplex ethernet cables, each node is cabled to a switch with a pair of circuits. One circuit is used for transmitting data to the switch, and the other for receiving data from it. Simultaneous transmission is the default setting but only occurs between the Ethernet cables switch and each node.
Ethernet’s collision detection mechanism results in any network communications to happen in which way?
A. Half duplex
B. Full duplex
C. Collision free
D. Non shared
A. The collision detection mechanism means that only half duplex transmission is possible.
Network switches at a small manufacturing firm use the ND protocol. Which features will the network benefit from as a result?
A. Hosts can configure IPv6 addresses automatically
B. Hosts are allowed to discover other nodes
C. Switches are organized into a hierarchy
D. Each switch determines the shortest path to the root
A & B. The neighbor discovery protocol features address autoconfig using IPv6 which allows a host to discover other nodes and routers on the local network
An installer is cabling a new building and is laying cable in every area of the building that may need a computer or telephone. What kid of cable is the installer laying?
A. UTP
B. STP
C. Fiber optic
D. Crossover cable
A. Installers often flood-wire modern buildings using UTP cabling, which involves laying cable in every location in the building that may need to support a telephone or computer
An admin is using a wire map tester to identify different types of issues with cabling. What kinds of issues can the wire map tester detect? (Select all that apply)
A. Incorrect pin-out
B. Bad port
C. Short
D. Continuinty
A, C & D.
A network is running slow. To determine why the admin wants detailed properties for the cable run, including how much attenuation, crosstalk, noise & resistance are on it. What tool should the admin use to get all this information?
A. OTDP
B. Multimeter
C. Spectrum analyzer
D. Cable tester
D. The admin should use a cable tester that reports detailed info on the cable’s physical and electrical properties, including crosstalk, attenuation, noise and resistance
A cable installer is using a special tool to affix an RJ-45 connector to an ethernet cable. What tool has this purpose?
A. Fusion splicer
B. Snips
C. Cable crimper
D. Punchdown tool
C. A cable crimper creates a patch cord and fixes a plug to a cable. The tools are specific to the connector and cable type, though some may have modular dies to support a range of RJ-type plugs
An admin manually configured a server’s NIC settings to run at 100Mbps and connected the server to the switch. However, communications between the server and other hosts on the network were extremely slow. When the admin checked the light on the server’s switch port, it was blinking amber. What kind of issue does this indicate?
A. Duplexing issue
B. Transceiver issue
C. Shielded cable issue
D. Short issue
A. Setting both a NIC and switch port to auto-negotiate will solve a duplex mismatch which will slow the link down by causing high packet loss and late collisions
An admin connected both a router and a gateway that has dissimilar media types. What kind of of issue does this solution remedy?
A. Short issue
B. Shielded cable issue
C. Transceiver issue
D. Duplexing issue
C. A transceiver converts from one media type to another, uses an appropriate ethernet standard and wavelength, and must match in pairs
IT security specialists respond to a security breach. An investigation determines that open service ports on an old server was the entry point for malicious activity. Which of the following utilities should the specialists use to determine the cause of the breach?
A. netstat
B. pathping
C. arp
D. dig
A. The netstat command allows for checking the state of ports on a local host
What is a device designed to filter and transfer data packets between dissimilar types of computer networks called?
A. Router
B. Hub
C. Switch
D. Load balancer
A. A router connects two or more packet-switched networks.
An engineer connects two network devices together that do not have the auto-MDI/MDIX enabled by default. The devices each have a medium dependence interface (MDI) port. For the devices to properly communicate with one another, the engineer uses which type of cable?
A. Straight through
B. Crossover
C. Duplex
D. Bidirectional
B. If the auto-MDI/MDIX is not enabled, then connecting two MDI ports requires a crossover cable
A network admin is deciding which session control protocol they should use for their environment. Which of the following would they use?
A. RTP
B. SIP
C. EGP
D. RIP
B. The Session Initiation Protocol (SIP) is one of the most widely used session control protocols. SIP endpoints are the end user devices such as IP enabled handsets or client and server web conference software
Which of the following tools would a network admin use to make new network cables for the comm closet?
A. Crimper
B. Cable tester
C. OTDR
D. Punch down tool
A. Cable crimpers create network cables with terminated ends
A user is having trouble downloading a file from a file server. A network technician checks the connection and that pings commands are receiving replies. The technician can also browse correctly to the file server using Windows Explorer. What should the technician begin to troubleshoot and why? (Select all that apply)
A. The application layer
B. If the file application is misconfigured
C. Any TCP flags
D. The payload
A & B. The application layer is where the technician should begin to troubleshoot because the lower levels are verified to be working.
A linux admin is configuring a Linux server’s NIC. The server must have a static IP address for a Class C network. Settings must be verified. Analyze and select which commands would be most appropriate to run in this scenario. (Select all that apply)
A. ifconfig eth0 netmask 255.255.255.0
B. ifconfig eth0 broadcast 192.168.101.100
C. ifconfig eth0 192.168.101.120
D. ifconfig
The default static IP address is 192.168.101.120 and subnet mask is 255.255.255.0
An admin normally working on a remote server using RDP, loses the session abruptly. The admin pings the server and does not receive a reply. An RDP session is attempted again, and the admin can log in. Why was the admin unable to ping the server?
A. TCP traffic was blocked
B. IP traffic was not tunneled
C. ICMP traffic was blocked
D. IP traffic was not encrypted
C. ICMP is used for a status messaging and connectivity testing. An inbound rule blocking ICMP traffic using a firewall will prevent a reply if a ping command is used externally on the server