CompTIA Network+ Certification Exam N10-009 Practice Test 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/23

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

24 Terms

1
New cards

In the context of the OSI model, the term "Data encapsulation" is used to describe a process where each layer of the OSI model adds its own control information to the original data that is being passed across the layers from the Physical Layer up to the Application Layer.

False

2
New cards

In the OSI model, the Layer 4 TCP protocol data unit is referred to as:

Segment

3
New cards

Which of the answers listed below refers to the Physical Layer of the OSI model?

Layer 1

4
New cards

Layer 7 of the OSI model is also known as:

Application Layer

5
New cards

At which OSI layers is the protocol data unit referred to simply as data?

Application Layer Presentation Layer Session Layer

6
New cards

Which of the following answers refers to Layer 5 of the OSI model?

Session Layer

7
New cards

What is the name of Layer 3 in the OSI model?

Network Layer

8
New cards

Which of the following answers describe the characteristics of a router?

Connects multiple networks together, Operates at Layer 3 of the OSI model, Uses IP addresses to send data packets to their destination

9
New cards

Which of the answers listed below refer to a network switch? (Select 3 answers)

Connects multiple devices within a single network , Uses MAC addresses to forward data frames to the correct port, Operates at Layer 2 of the OSI model

10
New cards

Which of the following answers refers to a hardware security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules?

Firewall

11
New cards

Which of the answers listed below illustrates the difference between passive and active network security breach response?

IDS vs. IPS

12
New cards

Which of the following answers can be used to describe the characteristic features of an IDS? (Select 3 answers)

Does not take direct action to block or prevent attacks, Generates alerts and notifies security personnel or administrators when suspicious activity is detected, Monitors network traffic without direct involvement in traffic routing or packet modification

13
New cards

Which of the answers listed below refer to an IPS? (Select 3 answers)

Takes proactive measures to block or mitigate intrusion attempts, Operates in an inline mode, actively intercepting and inspecting network traffic, Can drop or reject network packets, terminate connections, or take other actions to stop the attack

14
New cards

A network hardware or software solution designed for managing the optimal distribution of workloads across multiple computing resources is called:

Load balancer

15
New cards

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Proxy

16
New cards

A dedicated storage appliance that can be added to a local network is known as:

NAS

17
New cards

A dedicated local network consisting of devices providing data access is called:

SAN

18
New cards

A WAP is a specific type of AP that allows Wi-Fi capable devices to connect to a wired network.

True

19
New cards

Which network infrastructure device enables centralized management of WAPs?

Wireless LAN controller

20
New cards

One of the key benefits provided by a CDN is the improvement of:

Content load times

21
New cards

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is referred to as:

VPN

22
New cards

Which of the following answers refers to a solution that allows network administrators to prioritize certain types of network traffic?

QoS

23
New cards

A field in an IP packet that specifies how many more hops a packet can travel before being discarded is known as:

TTL

24
New cards

Which of the answers listed below refers to a solution that enables the replacement of traditional network hardware functionalities with software via virtualization?

NFV