Platform(Module 1) Flashcards

1
Q

Which of the following networking terms refers to the nodes that send and receive data traffic?
- Network links
- Intermediate nodes
- Network protocols
- End systems

A

End systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You own a small business and have decided to set up a network where each computer acts as both a client and a server. What type of network would BEST meet your requirements?
- Peer-to-Peer network
- Virtual Private network
- Enterprise network
- Client-Server network

A

Peer-to-Peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A growing company has recently moved into a new office space with 50 employees. Which type of network would be MOST effective for this setup?
- Small and Medium-sized Enterprise (SME) network
- Data Center
- Wide Area Network (WAN)
- Small Office/Home Office (SOHO) network

A

Small and Medium-sized Enterprise (SME) network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A multinational corporation has its main office in New York and branch offices in London, Tokyo, and Sydney. Which type of network would be MOST suitable for this setup?
- Small Office/Home Office (SOHO) network
- Wide Area Network (WAN)
- Local Area Network (LAN)

A

Wide Area Network (WAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What distinguishes half-duplex from full-duplex communication in a point-to-point link?
- Half-duplex allows for data transmission in both directions, but not simultaneously; full-duplex permits simultaneous two-way data transmission.
- Half-duplex communication can only occur in one direction.
- Full-duplex communication is limited to one direction at a time.
- Half-duplex communication uses a single cable for data transmission.

A

Half-duplex allows for data transmission in both directions, but not simultaneously; full-duplex permits simultaneous two-way data transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Your company has a network where all devices can communicate with each other as if they were directly connected, regardless of the physical connections. What type of network topology does this describe?
- Mesh topology
- Star topology
- Logical topology
- Ring topology

A

Logical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You manage a network that’s connected using a physical star topology. One of the drop cables connecting a workstation has been removed. Which of the following BEST describes the effect this will have on network communications?
- All devices will be able to communicate.
- All devices except the device connected with the drop cable will be able to communicate.
- Devices on one side of the missing cable will be able to communicate.
- No devices will be able to communicate.

A

All devices except the device connected with the drop cable will be able to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following networking topologies connects each network device to a central forwarding appliance?
- Mesh
- Star
- Bus
- Ring

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You have a network that’s connected using a full physical mesh topology. The link between Device A and Device B is broken. Which of the following BEST describes the effect this will have on network communications?
- Device A will be able to communicate with all other devices.
- Device A will be able to communicate with any device except for Device B.
- Device A will not be able to communicate with any other device.
- No devices will be able to communicate with any other device.

A

Device A will be able to communicate with any device except for Device B.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You’ve implemented an ad hoc wireless network that doesn’t employ a wireless access point. Which type of physical network topology have you implemented in this network?
- Star
- Ring
- Bus
- Mesh

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A team of network consultants is configuring an Internet of Things (IoT) network. Which of the following network topologies would BEST save power and scale easily to thousands of IoT sensor devices?
- Mesh
- Ring
- Bus
- Star

A

Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are layers of the OSI reference model? (Select three.)
- Connection Layer
- Presentation Layer
- Session Layer
- WAN Layer
- Application Layer
- Encryption Layer
- Transmission Layer

A

Presentation Layer, Session Layer, Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Protocol Data Unit (PDU)?
- A measure of data transmission speed
- A type of encryption used in data transmission
- A device that manages data transmission rates
- A chunk of data with protocol-specific headers added at each OSI layer

A

A chunk of data with protocol-specific headers added at each OSI layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary purpose of data encapsulation in network protocols?
- To compress data for faster transmission
- To convert data into an analog signal for transmission
- To encrypt data for secure transmission
- To add additional data headers for routing and delivery

A

To add additional data headers for routing and delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An engineer uses a type of network adapter to connect a fiber link to a router. The transceiver fits into an optical interface on a layer 3 Ethernet router. Of the choices, which layer 1 implementation does the engineer utilize?
- Media converter
- Bridge
- VoIP endpoint
- Switch

A

Media converter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A communications engineer notices that every time it rains the signal becomes very degraded. Which layer of the OSI model is the engineer most likely troubleshooting?
- Data Link
- Physical
- Transport
- Application

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following devices operate at the Data Link layer of the OSI model? (Select three.)
- Switches
- Hubs
- Routers
- Repeaters
- Bridges
- Gateways
- Network interface cards (NICs)

A

Switches, Bridges, Network interface cards (NICs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When the Data Link layer performs encapsulation, it adds control information to the payload in the form of header fields. Which of the following are header fields added by the Data Link layer during encapsulation? (Select three.)
- Source hardware address
- Window size
- Sequence number
- Checksum for basic error checking
- Destination hardware address
- TTL (Time to Live)
- Encryption type

A

Source hardware address, Checksum for basic error checking, Destination hardware address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the role of an Access Control List (ACL) at Layer 3 (Network layer) of the OSI model?
- To serve as a list of permissions for file access on the network
- To act as a routing protocol for determining the best path for data packets
- To define the maximum size for packets transmitted across the network
- To filter network traffic by permitting or blocking packets based on IP addresses and other criteria

A

To filter network traffic by permitting or blocking packets based on IP addresses and other criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the OSI model, what is the primary function of the Network layer?
- To move data around an internetwork using logical network and host IDs
- To establish, manage, and terminate connections between applications on different hosts
- To ensure reliable transmission of data across a physical link
- To encode and convert data into signals suitable for transmission over the physical medium

A

To move data around an internetwork using logical network and host IDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following functions are performed by the OSI Transport layer? (Select three.)
- Packet formatting for delivery through a medium
- Data segmentation and reassembly
- Path identification and selection
- End-to-end flow control
- Media access control, logical topology, and device identification
- Reliable message delivery
- Consistent data formatting between dissimilar systems

A

Data segmentation and reassembly, End-to-end flow control, Reliable message delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A security engineer configures software-based port security on a hardware firewall. Which OSI model layer identifies the application ports to configure?
- Layer 4
- Layer 3
- Layer 2
- Layer 1

A

Layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What role does the Presentation layer (layer 6) of the OSI model play in terms of data compression and encryption?
- The Presentation layer supports data compression and encryption to prepare data for network transmission.
- The Presentation layer is primarily responsible for the physical encryption of data using hardware-based methods.
- The Presentation layer handles the routing of data between different networks and supports encryption protocols like IPsec.
- The Presentation layer is involved in the logical organization of data into frames for transmission.

A

The Presentation layer supports data compression and encryption to prepare data for network transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which of the following statements accurately describes the function of the Session layer (layer 5) in the OSI model?
- The Session layer administers the process of establishing, managing, and terminating a dialog between client and server.
- The Session layer is used for character set conversion, such as between ASCII and Unicode.
- The Session layer is responsible for routing packets across different networks.
- The Session layer provides the physical transmission of data over network media.

A

The Session layer administers the process of establishing, managing, and terminating a dialog between client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Match each networking function or device on the left with its associated OSI model layer on the right:
- Application layer: HTTP
- Presentation layer: Translates data
- Session layer: Session ID number
- Transport layer: Port number
- Network layer: Router
- Data Link layer: Switch

A

HTTP, Translates data, Session ID number, Port number, Router, Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A network engineer is designing a network in various offices to create multiple broadcast domains. Each has its own Virtual Local Area Network (VLAN). When configuring these multiple broadcast domains on the switch, the switch will be operating at what layer of the OSI model?
- Layer 2 (Data Link Layer)
- Layer 1 (Physical Layer)
- Layer 7 (Application Layer)
- Layer 4 (Transport Layer)

A

Layer 2 (Data Link Layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A freelance photographer is setting up a home office. They need to connect a desktop, a laptop, a network printer, and occasionally, guests’ devices to the Internet and each other for file sharing and printing. Which type of network is MOST suitable for this scenario?
- SOHO (Small Office/Home Office) Network
- PAN (Personal Area Network)
- CAN (Campus Area Network)
- MAN (Metropolitan Area Network)

A

SOHO (Small Office/Home Office) Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following interfaces does a SOHO router provide at the Physical Layer of the OSI model? (Select three.)
- USB ports for direct computer connection
- Radio antennas for wireless signal transmission
- RJ-45 ports for a local cabled network
- HDMI ports for multimedia streaming
- VGA ports for video output
- WAN port for Internet Service Provider (ISP) connection
- SATA ports for internal storage connection

A

Radio antennas for wireless signal transmission, RJ-45 ports for a local cabled network, WAN port for Internet Service Provider (ISP) connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following functions does a SOHO router implement at layer 2 to make use of its Physical layer adapters? (Select two.)
- Firewall
- DHCP server
- Ethernet switch
- Wireless access point
- Network Address Translation (NAT)

A

Ethernet switch, Wireless access point

30
Q

A small office/home office (SOHO) network is configured to use the private IP address range of 192.168.1.0/24. If you are setting up a SOHO router for this network, which of the following IP addresses would be the MOST appropriate for the router?
- 192.168.2.1
- 203.0.113.1
- 192.168.1.255
- 192.168.1.1

A

192.168.1.1

31
Q

What is the MOST effective method for protecting the management interface of a SOHO router?
- Enabling UPnP (Universal Plug and Play)
- Disabling the firewall
- Setting the router to automatically accept firmware updates
- Configuring a strong administrative account passphrase

A

Configuring a strong administrative account passphrase

32
Q

At layer 4 of the OSI model, how is each application identified to facilitate proper routing and delivery of data?
- Through the application’s unique username and password
- By a unique port number assigned to the application
- By the MAC address of the destination device
- Through the use of encryption algorithms

A

By a unique port number assigned to the application

33
Q

Which of the following BEST describes a demarcation point in the context of telecommunications?
- The protocol used for encrypting data over the Internet
- The point at which the telco’s cabling enters the customer premises
- The maximum data transfer rate achievable by the ISP
- The central hub where all ISPs connect and exchange data

A

The point at which the telco’s cabling enters the customer premises

34
Q

What do Internet Service Providers (ISPs) use to establish links between their networks within an Internet Exchange Point (IXP) data center?
- Peer-to-peer file sharing
- Transit and peering arrangements
- NFC (Near Field Communication)
- Bluetooth connectivity

A

Transit and peering arrangements

35
Q

What is the decimal form of the following binary IP address?
11001101.00111001.10101001.01000010
- 205.57.169.66
- 206.58.170.67
- 238.90.202.99
- 190.42.154.51

A

205.57.169.66

36
Q

Which of the following sets correctly represents the possible values that can be represented by each digit in hexadecimal notation?
- 1 through 10
- 0 through 9 and A through F
- 0 through 7
- 0 through 9 and A through E

A

0 through 9 and A through F

37
Q

What is the next step you should take after establishing a detailed plan of action to resolve a network issue?
- Establish a new theory of probable cause
- Verify full system functionality
- Implement the solution
- Document the problem and the solution

A

Implement the solution

38
Q

Drag each troubleshooting task on the left to the correct step on the right:
Step 1: Identify the problem
Step 2: Establish a theory of probable cause
Step 3: Test the theory to determine the cause
Step 4: Establish a plan of action
Step 5: Implement the solution or escalate
Step 6: Verify full system functionality
Step 7: Document findings, actions, and outcomes

A

Correct mapping provided in question.

39
Q

Which of the following is the first step a technician should take when a user cannot print to a network printer?
- Establish a plan of action
- Establish a theory of probable cause
- Identify the problem
- Implement preventative measures

A

Identify the problem

40
Q

When troubleshooting a software issue, which type of question is MOST effective to begin the diagnostic process?
- Asking for the error code
- Asking if they rebooted
- Asking what they were doing when the issue occurred
- Asking if they experienced this issue before

A

Asking what they were doing when the issue occurred

41
Q

How is identifying the location and scope of a problem helpful in troubleshooting? (Select two.)
- Helps identify the source of the problem
- Allows immediate resolution
- Eliminates further user input
- Helps prioritize the problem
- Resolves related issues automatically

A

Helps identify the source of the problem, Helps prioritize the problem

42
Q

Which key questions should be asked when identifying the cause of a problem? (Select two.)
- Should we switch platforms?
- What has changed?
- Did it ever work?
- Is the system on?
- Can we solve it with new hardware?

A

What has changed?, Did it ever work?

43
Q

What should you do when you discover symptoms of more than one problem?
- Escalate all problems
- Treat each problem separately
- Advise the user to report only severe issues
- Focus on the most complex problem first

A

Treat each problem separately

44
Q

Using the bottom-to-top OSI model approach, what should you check first when troubleshooting a single workstation’s internet connectivity?
- Browser settings
- Firewall settings
- Valid IP address
- Ethernet cable and NIC

A

Ethernet cable and NIC

45
Q

What is the divide and conquer approach in OSI model troubleshooting?
- Focus on Application Layer first
- Start at the most likely layer
- Start at Layer 1 and work up
- Check all layers simultaneously

A

Start at the most likely layer

46
Q

What should you do after diagnosing symptoms and identifying likely causes?
- Ignore the symptoms
- Replace all components
- Test each possible cause
- Document the symptoms

A

Test each possible cause

47
Q

Before escalating a problem, what should you do? (Select two.)
- Escalate immediately
- Communicate basic facts
- Wait for resolution
- Establish basic facts
- Change settings randomly

A

Communicate basic facts, Establish basic facts

48
Q

After speaking with application support and testing a problem, what is the next step for IT to troubleshoot an issue?
- Determine if anything changed
- Verify system functionality
- Identify the problem
- Establish a plan of action

A

Establish a plan of action

49
Q

When applying a disruptive solution to a network, what is the recommended action?
- Schedule and notify users
- Disconnect the network
- Proceed without informing users
- Apply the solution immediately

A

Schedule and notify users

50
Q

What is the primary goal of verifying a solution?
- Change system settings
- Validate the fix without new issues
- Implement new features
- Ensure the system runs faster

A

Validate the fix without new issues

51
Q

What is the last step an operator should perform in troubleshooting?
- Implement solution
- Determine cause
- Establish plan of action
- Document findings

A

Document findings

52
Q

Which of the following statements accurately describe characteristics of the decimal numbering system? (Select two.)
- It is primarily used for representing binary data.
- Each digit can have one of two possible values.
- A digit positioned to the left of another has 10 times the value of the digit to the right.
- Each digit can have one of ten possible values.
- Each digit represents a power of 2

A

A digit positioned to the left of another has 10 times the value of the digit to the right, Each digit can have one of ten possible values.

53
Q

Which of the following functions does a SOHO router implement at layer 2 to make use of its Physical layer adapters? (Select two.)
- DHCP server
- Wireless access point
- Network Address Translation (NAT)
- Firewall
- Ethernet switch

A

Wireless access point, Ethernet switch

54
Q

When troubleshooting network issues using the CompTIA Network+ troubleshooting methodology, what is the first step to resolving it?
- Establish a theory of probable cause.
- Identify the problem.
- Establish a plan of action to resolve.
- Test the theory to determine cause.

A

Identify the problem

55
Q

When you have diagnosed the symptoms of a network issue and know what is likely causing them, what should you do next?
- Immediately replace all network components.
- Test each possible cause until you find the right one.
- Document the symptoms without further action.
- Ignore the symptoms and focus on unrelated components.

A

Test each possible cause until you find the right one.

56
Q

Which of the following statements are true about Requests for Comments (RFCs)? (Select two.)
- An older RFC is never updated; a new RFC is published with a new number if changes are required.
- All RFCs are considered official internet standards.
- RFCs are only published by the Internet Assigned Numbers Authority (IANA).
- RFCs are confidential documents only available to government agencies.
- Some RFCs are designated informational or experimental.

A

An older RFC is never updated; a new RFC is published with a new number if changes are required, Some RFCs are designated informational or experimental.

57
Q

What is the best approach when trying to resolve a network connectivity issue in a newly deployed stack with servers and switches?
- Plan of action
- Divide and conquer
- Bottom-to-top
- Top-to-bottom

A

Bottom-to-top

58
Q

Which of the following OSI layers does a router operate at?
- Layer 1
- Layer 2
- Layer 3
- Layer 4

A

Layer 3

59
Q

When troubleshooting requires a change to the system or network environment, what is MOST likely to be recommended as a course of action?
- Ignoring the standard procedures and making the change immediately
- Only making changes outside of business hours without notification
- Following a change management plan
- Making all changes at once to save time

A

Following a change management plan

60
Q

A network administrator notices a consistent communication failure to a distant node in a star topology. What is the MOST appropriate solution?
- Replace the switch with a hub to increase signal strength.
- Implement a mesh topology for the entire network.
- Increase the bandwidth of the central switch.
- Use a repeater to strengthen the signal over the extended distance.

A

Use a repeater to strengthen the signal over the extended distance.

61
Q

You want to implement a fault-tolerant topology as you connect routers on your wide area network. Which of the following topologies BEST meets your requirements?
- Star
- Bus
- Ring
- Mesh

A

Mesh

62
Q

A user reports a network issue that affects all users. What is the next troubleshooting step?
- Determine what has changed.
- Create an action plan.
- Establish the most probable cause.
- Identify the affected areas of the network.

A

Determine what has changed.

63
Q

Which organization developed the Open Systems Interconnection (OSI) reference model?
- IETF (Internet Engineering Task Force)
- ISO (International Organization for Standardization)
- ITU (International Telecommunication Union)
- IEEE (Institute of Electrical and Electronics Engineers)

A

ISO (International Organization for Standardization)

64
Q

Your manager has asked you to implement a wired network infrastructure with redundancy for critical devices on a limited budget. Which topology should you implement?
- Partial mesh
- Bus
- Full mesh
- Star

A

Partial mesh

65
Q

What is the role of a Media Access Control (MAC) address in the context of host interfaces at the Data Link Layer?
- It encrypts data packets for secure transmission between devices.
- It serves as a global IP address for devices to communicate over the Internet.
- It is used to determine the routing path across multiple networks.
- It acts as a unique identifier assigned to each host interface, such as NIC ports in computers and radios in mobile devices.

A

It acts as a unique identifier assigned to each host interface, such as NIC ports in computers and radios in mobile devices.

66
Q

An application developer is troubleshooting ASCII conversion issues. At which layer of the OSI model are they troubleshooting?
- Data link
- Presentation
- Application
- Session

A

Presentation

67
Q

Emily is looking for a device to support file sharing, internet access, and video conferences for her small business. What device would work BEST?
- A network-attached storage (NAS) device
- A basic modem
- A high-capacity external hard drive
- A SOHO router

A

A SOHO router

68
Q

You’ve implemented an ad hoc wireless network that doesn’t employ a wireless access point. Which type of physical network topology have you implemented?
- Star
- Bus
- Ring
- Mesh

A

Mesh

69
Q

Your company plans to deploy a network appliance as a virtual machine on a hypervisor. What type of appliance are you planning on deploying?
- Network node
- Virtual appliance
- Network protocol
- Physical appliance

A

Virtual appliance

70
Q

How are packets forwarded at Layer 3 of the OSI model?
- Based on their physical MAC addresses
- Using signal amplification
- According to the quality of the service set by the user
- Based on their destination network address

A

Based on their destination network address

71
Q

What is the correct order of steps in the CompTIA Network+ troubleshooting methodology?
- Identify the problem
- Establish a theory of probable cause
- Test the theory to determine the cause
- Establish a plan of action
- Implement the solution or escalate
- Verify full system functionality
- Document findings, actions, and outcomes

A

Correct order as listed