TOTAL: CompTIA Network+ Certification (N10-007)---practice sets

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 133

flashcard set

Earn XP

Description and Tags

Everything you need to pass the CompTIA Network+ Exam (N10-007) from Mike Meyers, CompTIA expert and bestselling author.

134 Terms

1
1 Which best describes a model?

A duplicate of a real objects or process
A representation of a real object or process
multiple steps of a process converted into a single step
The expansion of a single process step into multiple steps
A representation of a real object or process
New cards
2
2 The OSI model has ____ layers and the TCP/IP model has ____ layers.

Four and four
seven and seven
seven and four
four and seven
seven and four
New cards
3
3 The Internet layer of the TCP model corresponds to which layer(s) of the OSI model?

Network
transport
session lock
session, presentation, and application
Network
New cards
4
4What is a chunk of data that has been sent out of a NIC called?

Packet
Segment
Frame
Mac
Frame
New cards
5
5Where does a computer get the MAC address?

It is generated by the frameterm-3
it is built into network interface card
the Mac address is another term for the IP address
the receiving computer applies a Mac address to each inbound frame
it is built into network interface card
New cards
6
6Which protocol is connectionless?

UDP
TCP
port number
well known port
UDPF
New cards
7
7Which of the following is not a valid network topology?

Bus/linear plus
Ring
mesh bus
Star
star bus
mesh
mesh bus
New cards
8
8An organization is building out its offices. Initially, computer connections will be 1 gigabit Ethernet but the company plans to upgrade to 10 gigabit connections in the near future. What category of wiring should be installed so that the company will not have to re-wire the facility when they upgrade their Ethernet speed?

CAT5
cat 5E
CAT6A
thicknet
cat6a
New cards
9
9Which type of fiber optic cable supports longer run lengths?

Laser mode
Multimode
fractal mode
Single mode
single mode
New cards
10
10Which of the following is not a fire rating for network cables?

Plenum
CAT6A
Riser
PVC
cat6a
New cards
11
11Which of the following is not a characteristic of serial ports?

Sends out eight bits at the same time on different pins
uses RS232 signaling
uses DB9 connector
uses DB25 connector
Sends out eight bits at the same time on different pins
New cards
12
12Which committee governs the standards of Ethernet?

IEEE 802.11 N
IEEE 9001
IEEE 9002
IEEE 802.3
IEEE 802.3
New cards
13
13Which field would not be found in an Ethernet frame?

Destination IP address
source Mac address
ethertype
destination Mac address
Destination ip address
New cards
14
14Which statement is not true about early Ethernet?

thick Ethernet coaxials called 10 base 5
10base5 connects to a network card with a BNC T connector
thick Ethernet must be terminated on both ends of the coaxial cable
thin Ethernet is called 10base2
10base5 connects to a network card with a BNC T connector
New cards
15
15Which statement is not true about 10BaseT?

Ten base T runs at 10 megabits per second
maximum distance between the switch and the node is 100 meters
ten base tea requires cap 5A utp cable
ten base tea supports a maximum of 1024 notes per switch
ten base tea requires cap 5A utp cable
New cards
16
16Which of the following is a UTP wiring standard?

10baseT runs at 10 megabits per second
Tia A568
IEEE 802.3
Tia 568B
TIA 568B
New cards
17
17Which statement is not true of 100 megabit Ethernet?

100base TX support runs up to 2 KM
both 100 base T and 100 base TX run over unshielded twisted pairs
both 100 base F and 100 base FX run over multi mode cable
Ethernet can run at 100MBPS on fiber or copper
100base TX support runs up to 2 KM
New cards
18
18Why can straight-through cables be used to connect modern switches together?

Straight through cables cannot be used to connect monitor switches together.
straight through cables can be used connect modern switches together but autosensing sets the switch port to half duplex, reducing performances by half
the switch will rewire the cable termination to that it becomes a crossover cable
auto sensing and I switch will cause the switchboard to rewire itself into a crossover configuration
auto sensing and I switch will cause the switchboard to rewire itself into a crossover configuration
New cards
19
19Which of the following statements is not true of Gigabit Ethernet?

1000 base T support up to 100 meter runs over UTP
1000 base LX support between 100 meters and 5 kilometers and can be used with multimode or single mode fiber optic cable
1000 base SX support runs of 100 meters over multimode fiber optic cable
1000 base SX supports between 100 meters and 10 kilometers and can be used with multi mode or single mode fiber optic cable
1000 base SX supports between 100 meters and 10 kilometers and can be used with multi mode or single mode fiber optic cable
New cards
20
20Which of the following is not a common network problem?

Loops
connecting switches in a tree structure
replay attack
initialization vector attack
connecting switches in a tree structure
New cards
21
21Which of the following is not an element of structured cabling?

Telecommunication closet
table top rack
horizontal run
work area
Table-top rack
New cards
22
22Patch panels and punch down tools are used on which kind of network cables?

Patch cables
work area cables
horizontal runs
fiber optic runs
Horizontal runs
New cards
23
23Which of the following is not a distribution panel?

166 punchdown block
110 punchdown block
66 punchdown block
fiber distribution panel
166 punchdown block
New cards
24
24Which of the following is not a cable test?

Wiremap
Continuity
cable length
ping
ping
New cards
25
25A network tech suspects a wiring issue in a work area. Which element does she not need to check?

Verify link flights at the workstation in the switchport
insure that the connections from the router to the ISP good
confirm network settings in the operating system
ping lower station Nic with the loop back plug installed
Ensure that the connection from the router to the ISP good
New cards
26
26A Fox and Hound are also known as what?

Time domain reflectometer (TDR)
Wiremap
A tone generator and a tone probe
continuity tester
Tone generator and a tone probe
New cards
27
27Which of the following is not a common wired network problem?

Attenuation
UTP cables < 100 meters
jitter
wrong cable type
UTP cables < 100 meters
New cards
28
28Which decimal number is represented by the binary number 1 0 1 1 0 1 1 0?

182
176
73
182\.176.783.0
182
New cards
29
29What does ARP stand for and what does it do?

Advanced routing protocol determines route between Mac addresses
alternate routing protocol determines backup routes between Mac addresses
address resolution protocol results Mac address with IP address
advanced resolution protocol results network name to IP address
address resolution protocol results Mac address with IP address
New cards
30
30Which statement is not true of a subnet mask?

Subnet masks are used by a computer to determine the normal county
subnet masks are sent out as one of the fields in the IP packet
subnet masks are made-up of continuous 1s starting at the leftmost (most significant bit) of an IP address
subnet masks are never sent out of a host
subnet masks are sent out as one of the fields in the IP packet
New cards
31
31Here are three IP addresses: 216.53.12.11, 130.222.255.170, 223.255.6.88. What class of addresses are each one (in order)?

C,B,C
B,A,C
C,A,B
A,C,A
C,B,C
New cards
32
32An organization has five campus buildings. They want each building to be on its own subnet. Each campus will need a minimum of twenty-five IP addresses. The organization has the Class C network address 217.105. 2.0 assigned to it. Using CIDR, what subnet mask will yield the minimum number of subnetworks with the maximum number of hosts per network that will meet the requirements of the organization?

/26
/27
/28
/29
/27
New cards
33
33A company has subnetted their Class C network address into four subnets with a /26 subnet mask. What are the addresses of the four subnets?

0,1,2,3
128,64,32,16
0,64,128,192
1,2,4,8
0,64,128,192
New cards
34
34Which service does not automatically assign an IP address to a host?

Static
DHCP
bootP
APIPA
static
New cards
35
35Which choice is true of a rogue DHCP server?

A rogue DHCP server increases the speed of the DHCP service
A rogue DHCP server increases the pool of available IP addresses
A rogue DHCP server can assign compatible IP addresses to host
A rogue DHCP server make sure the host will get compatible APIPA addresses
A rogue DHCP server can assign compatible IP addresses to host
New cards
36
36Which of the following is not a "special" IP address?

10\.255.1.1
169\.253.4.185
192\.168.70.70
127\.0.0.1
169.253.4.185
New cards
37
37Which symptom is not a result of an IP addressing problem?

Duplicate IP address
static IP address
duplicate Mac address
incorrect gateway
static ip address
New cards
38
38What is the job of a router?

to assign IP addresses to host on the network
to connect networks with different network IDs
to map IP addresses against Mac addresses
to allow outside host to initiate contact with hosts on the LAN side of a network
to connect networks with different network IDs
New cards
39
39What is the role of port numbers in IP headers?

Port numbers identify the sending and receiving processes between two host
port numbers identify which interfaces on a router should receive data in and which interfaces should forward data out
four numbers identify which connectors on a switch that should receive data in and which should forward data out
port numbers identify the path of routers between any two hosts that need to communicate with each other
Port numbers identify the sending and receiving processes between two host
New cards
40
40Which statement is true of a NAT router?

NAT routers replaced the source IP address with its own IP address
NAT routers allow public addresses to exist on the land side of the router
all hosts on the land side of the net router are assigned the same IP address as a public address in router
the NAT faction is performed at the ISP facility
NAT routers replaced the source IP address with its own IP address
New cards
41
41True or false: Most SOHO routers come with NAT enabled?
True
New cards
42
42Port forwarding allows which of the following?

Public addresses to be assigned to the land side of the NAT router
white host on the land side of the narrator to be assigned with the same public address of the router's WAN interface
but it just says a landside hose with a portable DNS address
outside access to host on the LAN side of the NAT router
outside access to host on the LAN side of the NAT router
New cards
43
43A tech has just installed a new SOHO router for a client. Which security task should the tech perform first?

Change administrator name and password
disable port forwarding
disable the DHCP server
enable Mac address cloning
Change the administrator name and password
New cards
44
44Which feature of a SOHO router is not typically found in an enterprise router?

Two or more router interfaces
graphical textual management interface
each interface in a router must be configured
built-in switch
Built-in Switch
New cards
45
45Which statement is not true of static routes?

Routers can have static routes
hosts can have static routes
static routers are enter manually must be manually changed by a human
static router enter manually but can be automatically changed by the router
static router enter manually but can be automatically changed by the router
New cards
46
46Which of the following is a not an element of a route metric?

MTU
hop distance
cost
bandwidth
Hop Distance
New cards
47
47Which of the following is not a characteristic of the RIP routing protocol?

RIP is a distance vector protocol
RIP is an interior gateway protocol
RIP supports a maximum hop count of 127 pops
the primary metric in RIP is hop count
RIP supports a maximum hop count of 127 pops
New cards
48
48Which of the following is not a characteristic of the OSPF routing protocol?

OSPF is a link state protocol
OSPF is it distance vector protocol
OSPF routers are grouped into areas
OSPF routers in area like the designated router and a backup designated router
OSPF is it distance vector protocol
New cards
49
49Which of the following is not a characteristic of the BGP routing protocol?

BGP is a hybrid of distance vector and link state routing protocols
BGP is broken up into divisions called autonomous system (AS)
the primary job of BGP is to route between ASes
OSPF is a primary router protocol between ASes
OSPF is a primary router protocol between ASes
New cards
50
50Which characteristic is true of TCP?

TCP is connectionless
the TCP 3-way handshake beings with a SYN message, followed by an ACK followed by an ACK SYN message
TCP uses the FIN message to close the connection.
TCP uses the END message to close a connection.
TCP uses the FIN message to close the connection.
New cards
51
51Ping uses which IP layer protocol?

ICMP
ARP
RIP
FTP
ICMP
New cards
52
52Which of the following is not a network information or troubleshooting utility?

Traceart
Pathping
FTP
Bandwidth tester
FTP
New cards
53
53Which choice is not true about protocol analyzers such as WireShark?

Protocol analyzers can capture packets and frames
Protocol analyzers can show the contents of packets and frames
Protocol analyzers can filter the content of the packet frames
Protocol analyzers can generate packets and frame
Protocol analyzers can generate packets and frame
New cards
54
54What is the primary purpose of netstat?

Capture frames and packets for later review
shows the computer's connection to any web servers
graphical utility that charts amount of network data entering and leaving the host
display all connections to and from the host computer
display all connections to and from the host computer
New cards
55
55FTP uses TCP port 20 and TCP port 21. Which choice describes how the ports are used?

FTP servers listen for commands on port 20 and response with data on port 21
FTP servers listen for commands on port 21 and response with data on port 20
FTP client request on port 21 and receive data on port 21
FTP client request on port 20 and receive data on port 20
FTP servers listen for commands on port 21 and response with data on port 20
New cards
56
56Which of the following is a secure email protocol?

STMP
STLS
POP
IMAP
STLS
New cards
57
57Which choice describes a significant difference between Telnet and SSH?

Telnet is an Internet telephony protocol, SSH it's a secure sharing protocol
Telnet runs on a client, SSH runs on the server
Telnet runs on a server, SSH runs on a client
Telnet is unencrypted, SSH is encrypted
Telnet is unencrypted, SSH is encrypted
New cards
58
58Which is the default port for NTP?

321
123
132
231
123
New cards
59
59Which of the following is not a network service problem?

Duplicate IP address in DHCP scope
not enough IP addresses in the DHCP scope
overlong DHCP lease Periods
exclusion in the DHCP scope
exclusion in the DHCP scope
New cards
60
60In what folder is the HOSTS file located in a Windows computer?

C:\\etc
C:\\Windows\\System32\\Drivers\\etc
C:\\Windows\\etc
C:\\Windows\\System32\\etc
C:\Windows\System32\Drivers\etc
New cards
61
61What command will assign a drive letter to a network share?

Net assign
Net drive
Net share
Net use
Net use
New cards
62
62The primary command-line tool to troubleshoot Windows naming issues is what?

Nbstat
Netstat
Ipconfig
Net
Nbstat
New cards
63
63What is the job of DDNS?

DDNS allows a locker device around the change its DNS name
DDNS rotates the IP address of a local device
DDNS tracks IP address changes of a local device and update
DNS to reflect those changesDDNS prevents the pH of the local device from being changed
DDNS tracks IP address changes of a local device and update
New cards
64
64A website just changed its IP address and a user is unable to reach it by typing the site's domain name into their browser. What command can the user run to make the computer learn the website's new IP address?

Ipconfig /updatednscache
Ipconfig /flushdns
Ipconfig /all
Ipconfig /dnsupdate
Ipconfig /flushdns
New cards
65
65When securing IP networks, developers focus on several key principles. Which of the following is NOT one of those principles?

Performance
confidentiality
integrity
availability
Performance
New cards
66
66In terms of network security, what is the purpose of hashing?

Hash is a great side dish with eggs
hashing encrypts data
hashes are used to verify data integrity
hashing decrypt that out that was encrypted by hashem
hashes are used to verify data integrity
New cards
67
67Which of the following is not an authentication factor?

Something you are
Something you can do
Something you know
Something you have
Something you can do
New cards
68
68What is a digital signature?

Hash web page
encrypted web page
hash of an encrypted data chunk that sender and receiver both have
web page that has been hashed with the private key
hash of an encrypted data chunk that sender and receiver both have
New cards
69
69Which of the following is not a common certificate error or warning?

Certificate is on the certificate relocation list (CRL)
self signed certificate
expired certificate
certificate not valid for the site
Certificate is on the certificate relocation list (CRL)
New cards
70
70Which would be the best solution to make an encrypted tunnel using SSH?

Recode an unencrypted tunneling program to support SSH encryption
Piggyback an existing program into SSH
set up a tunnel using PPTP
set up a tunnel using L2TP/IPSEC
Piggyback an existing program into SSH
New cards
71
71Which statement is true of VLANs?

VLANs enabled remove stations to connect to the LAN from across the Internet
VLANs break up broadcast domains into multiple, smaller broadcast domains
VLANs use SSH tunnels for cross-VLAN traffic
VLANs can only be specific ports on a router
VLANs break up broadcast domains into multiple, smaller broadcast domains
New cards
72
72Which statement is true of inter-VLAN routing?

Inter-VLAN routing Calls for connecting each VLAN to a port on the routers so that data can pass between the VLANs
Inter-VLAN routing is implemented within the switches to network communication between VLANs
Inter-VLAN routing encrypts and decrypts traffic between VLANs
Inter-VLAN router enables VLANs to connect over a public network, such as the Internet
Inter-VLAN routing is implemented within the switches to network communication between VLANs
New cards
73
73Which port on a switch is used to manage the switch?

Rollover port
console port
Yost port
layer 3 port
console port
New cards
74
74When operating multiple, duplicate servers such as web servers, which method is best to to take advantage of the full power of all of the servers?

HSRP
DNS server
Round robin Server
Server Side Load Balancer
Server Side Load Balancer
New cards
75
75What is the Cisco protocol to perform port bonding?

LACP
HSRP
CARP
Inter-VLAN routing
LACP
New cards
76
76What does port mirroring accomplish?

Enabled inbound and outbound traffic from switch ports to duplicate at the mirrored port
double switch-port bandwidth by bonding a specified ports to the mirror
redirects any inbound traffic to the near port to another, specified port
redirects any outbound traffic from the mirror port to a house with a specific IP address
Enabled inbound and outbound traffic from switch ports to duplicate at the mirrored port
New cards
77
77What does QoS provide?

Higher Performance of selected traffic
blocking of specific traffic types
redirection of low priority traffic to slower router interfaces
prioritized throughput of different traffic types
prioritized throughput of different traffic types
New cards
78
78Which statement is true of IPS and IDS systems?

Passive IDS is the same as IPS
IPS responds to threats with a notification to specified staff
IPS detects then attempts to defend against a threat
passive IPS is the same as IDS
IPS detects then attempts to defend against a threat
New cards
79
79Which statement is not true of a forward proxy?

Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured
Forward proxy servers function between the local network and the front-end router
Forward proxy servers are application specific
Hosts must be configured to access the forward proxy server
Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured
New cards
80
80Which is the BEST device to dole out requests to duplicate servers to ease congestion?

DNS Server
Round Robin Server
Server side Load Balancer
Clusterer
Server side Load Balancer
New cards
81
81Which of the following is not a characteristic of an IPv6 address?

128 bits
Written with hexadecimal characters
Groups are separated by dashes
Broken up into eight groups
Groups are separated by dashes
New cards
82
82Which choice is not a valid representation of the IPv6 address: 2001:C2A:0000:0000:BB29:0000:3F00:A5B6?

2001:0C2A::BB29:0000:3F00:A5B6
2001:C2A::BB20::3F00:A5B6
2001:0C2A:0000:0000:BB29:0000:3F00:A5B6
2001:0C2A:0000:0000:BB29::3F00:A5B6
2001:C2A::BB@9::3F00:A5B6
New cards
83
83Which statement is not true of IPv6 addresses?

Outbound IPv6 addresses are randomized by the operating system
EUI-64 can be traced back to the source computer
IPv4 and IPv6 are automatically translated back and forth as required
there are no private IPv6 addresses
IPv4 and IPv6 are automatically translated back and forth as required
New cards
84

84A DS0 line has what bandwidth?

1.544 mbps 32 kbps 64 kbps 128 kbps

64 kbps
New cards
85
85What is the speed of an OC-1 line?

1\.544 mbps
64 kbps
155 mbps
51\.85 mbps
51.85 mbps
New cards
86
86Which of the following is not a packet switching technology?

Circuit switch
Frame Relay
ATM
MPLS
Circuit Swtich
New cards
87
87Dial-up connections require which piece of equipment?

Modem
Cable modem
NIC
Multi-speed switch
Modem
New cards
88
88What kind of download and upload speed does ADSL provide?

Same download and upload speed
slower upload speeds and download speed
faster upload speed than download speed
half duplex operation provides the same upload and download speed for uploading and downloading cannot happens simultaneously
slower upload speeds and download speed
New cards
89
89The primary technical disadvantage to satellite Internet is what?

Slow upload
slow Download
latency
expense
latency
New cards
90
90Remote desktop is a term that describes what?

Installing two keyboards and two monitors on the same computer that it can run two different sessions, simultaneously
duplicating the output of a monitor to another monitor
separating the monitor from a computer so it can operate over a distant connection
using a computer to take over the screen and keyboard of another computer
using a computer to take over the screen and keyboard of another computer
New cards
91
91SCADA differs from ICS/DCS for what major reason?

SCADA uses conventional computers while ICS/DCS uses highly socialized computers
ICS/DCS uses conventional computers while SCADA uses highly socialized computers
ICS/DCS operates over long distances while SCADA is local
SCADA operates over long distances while ICS/DCS is local
SCADA operates over long distances while ICS/DCS is local
New cards
92
92What does ad-hoc mode describe?

Wireless devices connected to a WAP
A bluetooth environment comprised of a mouse and keyboard
Wireless network comprised only of peer computers
802\.11 network
Wireless network comprised only of peer computers
New cards
93
93PoE describes what?

Using power lines to carry Ethernet data
Using wireless access points to provide power to wireless clients
Using ethernet cables to carry data and power to network devices
Using power cables as wireless antennas in Wi-Fi environments
Using ethernet cables to carry data and power to network devices
New cards
94
94Which of the following is not an antenna type typically found in a Wi-Fi environment?

Tripole
Dipole
Patch
Yagi
Tripole
New cards
95
95Which of the following is not a security task that should be performed on a new WAP?

Enable Backwards compatibility
change administrator account and password.
enable encryption.
disable SSID broadcast.
Enable Backwards compatibility
New cards
96
96Which term describes the process of scouting for Wi-Fi networks that may be vulnerable?

War Driving
Snooping
sniffing
fox hunting
War Driving
New cards
97
97Documenting a "find" after a war driving excursion is known as what?

War marking
Blogging
War chalking
Updating
war chalking
New cards
98
98WPS is used for what purpose?

Automatically shares the Wi-Fi password
Automatically sets up a personal area network
Automatically applies protection services to wireless devices
Automatically configures a wireless device to connect to a WAP
Automatically configures a wireless device to connect to a WAP
New cards
99
99Which choice is not a step in planning and installing a wireless network?

Plan the WAP locations
Perform site survey
Install patch antennas
configure WAP security
Install patch antennas
New cards
100
100Which choice is not a typical Wi-Fi problem?

Interface
WPS failure
Wrong WAP password
WAP configuration has changed
WPS failure
New cards
robot