1/70
A comprehensive set of flashcards to aid in studying for the Network+ N10-009 certification exam.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the role of DHCP relay agents in a network?
They fire DHCP requests and responses between clients and servers across different subnets.
Which DNS record type maps a domain name to an IPv4 address?
An A record.
What protocol is used by the session layer to manage communication sessions?
RPC (Remote Procedure Call).
How does an IPS differ from an IDS?
An IPS blocks threats while an IDS only detects them.
What protocol is commonly used to establish a secure VPN connection?
IPsec.
How does network address translation (NAT) enhance security?
By hiding internal IP addresses from external networks.
Which port is commonly used by SSH for secure communications?
Port 22.
Which port is used to secure web traffic?
Port 443.
How many usable hosts are there in a /24 subnet?
254 usable hosts.
Which tool is commonly used for analyzing and detecting network-based attacks?
Wireshark.
Which DNS record type is not associated with email?
SRV (Service Record).
What cable type is best for high-speed, long-distance links?
Single mode fiber.
What access control model uses user clearance levels?
Mandatory Access Control (MAC).
What technology allows a single public IP to represent multiple private IPs?
Port Address Translation (PAT).
Which routing protocol is a distance-vector protocol?
RIP (Routing Information Protocol).
What physical tool verifies the integrity of an Ethernet cable?
Cable tester.
Which device operates primarily at Layer 2 of the OSI model?
Switch.
What is the next step after identifying a network problem?
Establish a theory of probable cause.
What should be deployed to restrict non-work website access?
A web proxy server with content filtering.
What does the golden configuration refer to in network management?
A baseline configuration saved for restoration.
Which routing protocol is a link-state protocol?
OSPF (Open Shortest Path First).
Which technology allows secure access to internal resources?
VPN.
Which protocol prevents loops in the network?
Span Tree Protocol (STP).
What is the purpose of a cable crimper?
To attach connectors to network cables.
Which of the following methods allows monitoring of network traffic?
Port mirroring.
How many IP addresses are available in a subnet mask of 255.255.255.0?
256 total IP addresses, 254 usable after accounting for network and broadcast addresses.
What tool is best used for monitoring device performance over a network?
SNMP (Simple Network Management Protocol).
Which factors are crucial for selecting the rack size?
Number of devices, future expansion, cooling requirements, and power consumption.
What is the primary benefit of using a content delivery network (CDN)?
Decreases latency and improves access speed by caching content.
What is the most effective tool for monitoring transmitted data for sensitive information?
DLP (Data Loss Prevention).
What should be done next after implementing a solution for a network problem?
Verify full system functionality.
What is the best way to ensure only authorized devices connect to a switch?
Enable port security.
Which protocol allows for real-time communication without guaranteeing delivery?
UDP (User Datagram Protocol).
What is a common method for segmenting a network?
Implement VLANs (Virtual Local Area Networks).
Which command verifies the reachability of a host?
Ping.
What command shows the MAC address table on a switch?
Show mac address table.
Which is the best metric used by RIP?
Hop count.
What is the subnet mask for a /30 network?
255.255.255.252.
Which configuration is best for devices handling requests simultaneously?
Active-active load balancing.
What does RPO stand for in disaster recovery?
Recovery Point Objective.
What is the function of the RADIUS protocol?
It provides centralized authentication, authorization, and accounting.
What type of network topology provides redundancy?
Mesh topology.
What defines a hot site in disaster recovery?
A backup site that is fully operational and can be accessed immediately.
What is the primary function of VLANs?
To segment traffic within the same physical network.
Which command tool displays active network connections?
Netstat.
What type of device connects multiple networks and directs traffic?
Router.
What does DTP (Dynamic Trunking Protocol) manage?
Trunking and VLAN configurations on switches.
Which protocol is used for network-based remote management?
SNMP.
What is the main purpose of using a patch panel?
To organize and manage network cables.
What does a network firewall typically control?
Traffic entering or leaving a network.
What is the primary role of a database server?
To store, retrieve, and manage data.
Which type of attack involves multiple unauthorized access requests?
Brute-force attack.
What document outlines a company's networking practices?
Network policy document.
What is an acceptable compromise for network performance?
QoS (Quality of Service).
What are the two primary domains of IP addressing?
Public and private IP addresses.
What does MAC flooding do in a network?
It overfills the switch's MAC address table, causing traffic to flood all ports.
What kind of system uses a Certificate Authority (CA)?
PKI (Public Key Infrastructure).
How often should a company test its backup system?
Regularly, at set intervals or after significant changes.
What is the primary purpose of a VPN?
To provide secure remote access to a network.
What is the value of a /27 subnet mask?
255.255.255.224.
What is an incorrect practice while using DNS?
Allowing unrestricted dynamic DNS updates.
How does ARP work?
It translates IP addresses to MAC addresses.
What is the function of STP in a network?
To prevent switch loops.
What does EAP stand for in network security?
Extensible Authentication Protocol.
What technique uses multiple servers to provide redundancy?
Load balancing.
How many bits are in an IPv4 address?
32 bits.
What cloud model deploys applications on shared hardware?
Multi-tenancy.
What is the general function of a firewall?
To monitor and control incoming and outgoing network traffic.
What is an ACL in networking?
Access Control List.
How should you manage dynamic IP address allocations?
Using DHCP.
What provides an additional layer of security to data transmissions?
Encryption.