UDEMY CompTIA Network (N10-008) Practice Exam #5 Flashcards
Which of the following applies to data as it travels from Layer 7 to Layer 1 of the OSI model?
De-encapsulation
Tunneling
Correct answer
Encapsulation
Tagging
OBJ-1.1: Data encapsulation and de-encapsulation in a computer network is a necessary process. Data encapsulation is performed at the sender side while the data packet is transmitted from source host to destination host. This is a process through which information is added to the data as it moved from layer 7 to layer 1 of the OSI model before the data is sent over the network to the receiver. De-encapsulation, on the other hand, in networking is performed at the receiver side or destination side as data moves from layer 1 to layer 7 of the OSI model.
As information travels up the layers of the OSI layer, information added from the sender’s encapsulation process is removed layer by layer. Tagging is used in 802.1q to identify ethernet traffic as part of a specific VLAN. This occurs at Layer 2 of the OSI model and remains at Layer 2 of the OSI model. Tunneling is the process by which VPN packets reach their intended destination. This normally occurs using the IPsec or TLS protocols, and occurs at Layer 2 of the OSI model.
Which of the following components is used to describe the structure of a device subsystem using a hierarchical namespace containing all of the variables that may be set or read using SNMP?
Granular trap
MIB
OID
Verbose trap
OBJ-3.1: The Simple Network Management Protocol (SNMP) uses ports 161 and 162, and it is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks. The management information base (MIB) is a translation file that is used to describe the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers (OID).
A unique objective identifier (OID) identifies a variable that can be read or set using the SNMP protocol. A trap is an asynchronous notification from the agent to the manager. A trap is sent by the agent to notify the management of a significant event that is occurring in real-time, such as an alarming condition.
A granular trap contains a unique object identifier (OID) number and a value for that OID. A verbose trap may contain all the information about a given alert or event as its payload. A verbose trap contains more information and data than a granular trap, and therefore requires more bandwidth to send the verbose trap over the network.
Your company’s corporate headquarters provided your branch office a portion of their Class C subnet to use at a new office location. You must allocate the minimum number of addresses using CIDR notation in order to accommodate each department’s needs. What is the correct CIDR notation for the Marketing department’s subnet which requires 11 devices?
/30
/28
/29
/27
/25
/26
OBJ-1.4: Since the Marketing department needs 11 devices plus a network ID and broadcast IP, it will require 13 IP addresses. The smallest subnet that can fit 13 IPs is a /28 (16 IPs). A /28 will borrow 4 host bits and assign those to the network portion of the subnet mask. This would create a subnet with 2^4 available host IP addresses, or 16 total IP addresses. Of the 16 IP addresses, there are 14 available for clients to use, one for the network ID, and one for the broadcast address.
Which of the following is often used to allow one node to communicate with many other nodes, such as in DMVPN connections?
SDWAN
MPLS
mGRE
WLAN
OBJ-1.2: Multipoint GRE (mGRE) is a protocol that can be used to enable one node to communicate with many nodes by encapsulating layer 3 protocols to create tunnels over another network. The mGRE protocol is often used in Dynamic Multipoint VPN (DMVPN) connections.
Multiprotocol Label Switching (MPLS) is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses, thus avoiding complex lookups in a routing table and speeding traffic flows.
A software-defined wide area network (SDWAN) is a network that is abstracted from its hardware which creates a virtualized network overlay.
A wireless local area network (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network within a limited area such as a home, school, computer laboratory, campus, or office building.
What is BEST used to perform a one-time temporary posture assessment in a NAC environment?
Non-persistent agent
Antivirus
Host-based firewall
Intrusion prevention system
OBJ-4.1: A non-persistent agent is used to access the device during a one-time check-in at login.
A persistent agent is agent software that resides on the client making the connection, and a non-persistent agent is software the client runs (usually from a browser) as they are connecting so the agent can perform the checks, but the software does not permanently stay with the client after they disconnect. This is beneficial in BYOD (Bring Your Own Device) policies.
Which of the following must be combined with a threat to create risk?
Vulnerability
Malicious actor
Your answer is incorrect
Exploit
Mitigation
OBJ-4.1: A risk results from the combination of a threat and a vulnerability. A vulnerability is a weakness in a device, system, application, or process that might allow an attack to take place. A threat is an outside force that may exploit a vulnerability. Remember, a vulnerability is something internal to your organization’s security goals. Therefore, you can control, mitigate, or remediate a vulnerability. A threat is external to your organization’s security goals. A threat could be a malicious actor, a software exploit, a natural disaster, or other external factors. In the case of an insider threat, they are considered an external factor for threats and vulnerabilities since their goals lie outside your organization’s security goals.
What access control model will a network switch utilize if it requires multilayer switches to use authentication via RADIUS/TACACS+?
802.3af
PKI
802.1q
802.1x
OBJ-4.1: 802.1x is the standard that is used for network authentication with RADIUS and TACACS+. The IEEE 802.1x standard is a network authentication protocol that opens ports for network access when an organization authenticates a user’s identity and authorizes them for access to the network. This defines port security. The user’s identity is determined based on their credentials or certificate, which is confirmed by the RADIUS or TACACS+ server.
A home user ran a bandwidth speed test from their laptop and receive the following results:
Ping: 53ms
Download speed: 33.3 Mbps
Upload speed: 10.2 Mbps
Which of the following is the best interpretation of these results?
The website downloaded data at 33.3 Mbps and uploaded data at 10.2 Mbps
The laptop received data at 33.3 Mbps and sent data at 10.2 Mbps
The laptop took 53 ms to complete the bandwidth speed test
The laptop downloaded 33.3 MB of data and uploaded 10.2 MB of data
OBJ-5.3: This connection appears to be an asymmetric connection, like a cable modem or aDSL, since the download and upload speeds do not match. According to the bandwidth speed test results, the laptop received data at 33.3 Mbps when receiving the test file and uploaded the test file back to the server at a speed of 10.2 Mbps. The laptop had a latency of 53ms during the test, which is indicated by the ping test conducted as part of the bandwidth speed test. During a bandwidth speed test, the laptop will first conduct a ping test to the server to measure the latency of the connection. Next, the laptop will download a sample file from the server and then upload that same file back to the server. During the download and upload, the server measures the time it took to accurately calculate the throughput of the connection between the laptop and the server.
Your company’s security policy states that its workstations must hide their internal IP addresses whenever they make a network request across the WAN. You have been asked to recommend a technology that would BEST implement this policy. Which of the following is the BEST solution for you to recommend?
NAT
OSPF
VPN
DMZ
OBJ-1.4: Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device. Using NAT, you can have the internal IP address of each workstation mapped to a public IP address or port when it crosses the router to access the WAN.
A DMZ or demilitarized zone is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to an untrusted, usually larger, network such as the Internet.
A virtual private network extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Open Shortest Path First (OSPF) is a link-state routing protocol that was developed for IP networks and is based on the Shortest Path First (SPF) algorithm. OSPF is an Interior Gateway Protocol (IGP).
A technician receives a report that a VoIP phone is experiencing a “no network connectivity” error. The technician notices the Cat6a patch cable running from the back of the phone is routed behind the user’s rolling chair. The cable appears to have been rolled over numerous times by the user, and it looks flattened from the abuse. Which of the following is the most likely cause of the connectivity issues being experienced on the VoIP phone?
Improperly crimped cable
Excessive collisions
Cross-talk
Transmit and receive reversed
OBJ-5.2: Crosstalk is defined as an effect caused by the unintentional and undesired transmission (leakage) of a signal from one cable to another. Due to the abuse of the cable being run over repeatedly by the user’s chair, the cable’s shielding could have been damaged and the cable may no longer be made up of the same consistency. This can lead to crosstalk amongst the cable pairs, or even opens/shorts of the wires in those cable pairs.
Which of the following components is used by an agent to send a single key-pair value about a significant event or condition that is occurring in real-time to a manager?
Granular trap
MIB
Verbose trap
OID
OBJ-3.1: The Simple Network Management Protocol (SNMP) uses ports 161 and 162, and it is a networking protocol used for the management and monitoring of network-connected devices in Internet Protocol networks.
A trap is an asynchronous notification from the agent to the manager. A trap is sent by the agent to notify the management of a significant event that is occurring in real-time, such as an alarming condition.
A granular trap contains a unique object identifier (OID) number and a value for that OID.
A verbose trap may contain all the information about a given alert or event as its payload. A verbose trap contains more information and data than a granular trap, and therefore requires more bandwidth to send the verbose trap over the network.
A unique objective identifier (OID) identifies a variable that can be read or set using the SNMP protocol.
The management information base (MIB) is a translation file that is used to describe the structure of the management data of a device subsystem using a hierarchical namespace containing object identifiers (OID).
A network technician believes that a network appliance is suffering from extremely slow performance. A technician is troubleshooting the issue using a performance monitoring tool and receives the following results:
Avg % Processor Time = 10%
Avg Pages/Second = 0
Avg Disk Queue Length = 3
Based on the results, what might be causing this network appliance’s performance bottleneck?
NIC
Processor
Memory
Hard drive
OBJ-5.5: Based on the results, the hard drive (disk queue) is causing the performance bottleneck. Since the average processor is not over 50%, the pages/second (memory) is not heavily burdened, nor do we have any information or statistics about the NIC. Whenever the system is queuing data to the hard drive, it slows down the network appliance’s performance since the hard disk is much slower than the processor and onboard memory.
Which protocol is used to establish a secure and encrypted VPN tunnel that can be initiated through a web browser?
SSL
PPP
IPsec
PPTP
OBJ-4.4: An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol in a standard web browser to provide secure, remote-access VPN capability. In modern browsers and servers, it is more common to use TLS (transport layer security) which is the successor to SSL.
Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network and is used heavily in virtual private networks, but not with web browser initiated ones.
The Point-to-Point Tunneling Protocol (PPTP) is an obsolete method for implementing virtual private networks. Point-to-Point Protocol (PPP) is a TCP/IP protocol that is used to connect one computer system to another.
You recently started a new job with Facebook as a network technician. You have been asked to connect several of their buildings together to form a larger network. All of the buildings are within walking distance of each other. What type of network are you creating?
PAN
CAN
LAN
WAN
OBJ-1.2: A campus area network (CAN) is a computer network that spans a limited geographic area. CANs interconnect multiple local area networks (LAN) within an educational or corporate campus. A personal area network (PAN) is centered around a short distance, usually around a person or up to a few meters. PANs are heavily used with Bluetooth and NFC. A personal area network (PAN) is centered around a short distance, usually around a person or up to a few meters. PANs are heavily used with Bluetooth and NFC. A wide area network (WAN) will typically cover a larger area geographically, such as a continent, a state, or a country.
Which of the following describes a design where traffic is shared between multiple network servers to provide greater throughput and reliability?
Multiplexing
VLAN tagging
MPLS trunking
Load balancing
OBJ-3.3: Load balancing is a technique used to spread work across multiple computers, network links, or other devices.
Multiprotocol Label Switching is a routing technique in telecommunications networks that directs data from one node to the next based on short path labels rather than long network addresses, thus avoiding complex lookups in a routing table and speeding traffic flows.
VLAN tagging is used to keep traffic from different networks separate when traversing shared links and devices within a network topology.
Multiplexing is the technology that is able to combine multiple communication signals together in order for them to traverse an otherwise single signal communication medium simultaneously.