Practice TestTake a test on your terms and definitions
Spaced RepetitionScientifically backed study method
Matching GameHow quick can you match all your cards?
FlashcardsStudy terms and definitions
1 / 133
Earn XP
Description and Tags
Everything you need to pass the CompTIA Network+ Exam (N10-007) from Mike Meyers, CompTIA expert and bestselling author.
134 Terms
1
1 Which best describes a model?
A duplicate of a real objects or process A representation of a real object or process multiple steps of a process converted into a single step The expansion of a single process step into multiple steps
A representation of a real object or process
New cards
2
2 The OSI model has ____ layers and the TCP/IP model has ____ layers.
Four and four seven and seven seven and four four and seven
seven and four
New cards
3
3 The Internet layer of the TCP model corresponds to which layer(s) of the OSI model?
Network transport session lock session, presentation, and application
Network
New cards
4
4What is a chunk of data that has been sent out of a NIC called?
Packet Segment Frame Mac
Frame
New cards
5
5Where does a computer get the MAC address?
It is generated by the frameterm-3 it is built into network interface card the Mac address is another term for the IP address the receiving computer applies a Mac address to each inbound frame
it is built into network interface card
New cards
6
6Which protocol is connectionless?
UDP TCP port number well known port
UDPF
New cards
7
7Which of the following is not a valid network topology?
Bus/linear plus Ring mesh bus Star star bus mesh
mesh bus
New cards
8
8An organization is building out its offices. Initially, computer connections will be 1 gigabit Ethernet but the company plans to upgrade to 10 gigabit connections in the near future. What category of wiring should be installed so that the company will not have to re-wire the facility when they upgrade their Ethernet speed?
CAT5 cat 5E CAT6A thicknet
cat6a
New cards
9
9Which type of fiber optic cable supports longer run lengths?
Laser mode Multimode fractal mode Single mode
single mode
New cards
10
10Which of the following is not a fire rating for network cables?
Plenum CAT6A Riser PVC
cat6a
New cards
11
11Which of the following is not a characteristic of serial ports?
Sends out eight bits at the same time on different pins uses RS232 signaling uses DB9 connector uses DB25 connector
Sends out eight bits at the same time on different pins
New cards
12
12Which committee governs the standards of Ethernet?
IEEE 802.11 N IEEE 9001 IEEE 9002 IEEE 802.3
IEEE 802.3
New cards
13
13Which field would not be found in an Ethernet frame?
Destination IP address source Mac address ethertype destination Mac address
Destination ip address
New cards
14
14Which statement is not true about early Ethernet?
thick Ethernet coaxials called 10 base 5 10base5 connects to a network card with a BNC T connector thick Ethernet must be terminated on both ends of the coaxial cable thin Ethernet is called 10base2
10base5 connects to a network card with a BNC T connector
New cards
15
15Which statement is not true about 10BaseT?
Ten base T runs at 10 megabits per second maximum distance between the switch and the node is 100 meters ten base tea requires cap 5A utp cable ten base tea supports a maximum of 1024 notes per switch
ten base tea requires cap 5A utp cable
New cards
16
16Which of the following is a UTP wiring standard?
10baseT runs at 10 megabits per second Tia A568 IEEE 802.3 Tia 568B
TIA 568B
New cards
17
17Which statement is not true of 100 megabit Ethernet?
100base TX support runs up to 2 KM both 100 base T and 100 base TX run over unshielded twisted pairs both 100 base F and 100 base FX run over multi mode cable Ethernet can run at 100MBPS on fiber or copper
100base TX support runs up to 2 KM
New cards
18
18Why can straight-through cables be used to connect modern switches together?
Straight through cables cannot be used to connect monitor switches together. straight through cables can be used connect modern switches together but autosensing sets the switch port to half duplex, reducing performances by half the switch will rewire the cable termination to that it becomes a crossover cable auto sensing and I switch will cause the switchboard to rewire itself into a crossover configuration
auto sensing and I switch will cause the switchboard to rewire itself into a crossover configuration
New cards
19
19Which of the following statements is not true of Gigabit Ethernet?
1000 base T support up to 100 meter runs over UTP 1000 base LX support between 100 meters and 5 kilometers and can be used with multimode or single mode fiber optic cable 1000 base SX support runs of 100 meters over multimode fiber optic cable 1000 base SX supports between 100 meters and 10 kilometers and can be used with multi mode or single mode fiber optic cable
1000 base SX supports between 100 meters and 10 kilometers and can be used with multi mode or single mode fiber optic cable
New cards
20
20Which of the following is not a common network problem?
Loops connecting switches in a tree structure replay attack initialization vector attack
connecting switches in a tree structure
New cards
21
21Which of the following is not an element of structured cabling?
Telecommunication closet table top rack horizontal run work area
Table-top rack
New cards
22
22Patch panels and punch down tools are used on which kind of network cables?
Patch cables work area cables horizontal runs fiber optic runs
Horizontal runs
New cards
23
23Which of the following is not a distribution panel?
25A network tech suspects a wiring issue in a work area. Which element does she not need to check?
Verify link flights at the workstation in the switchport insure that the connections from the router to the ISP good confirm network settings in the operating system ping lower station Nic with the loop back plug installed
Ensure that the connection from the router to the ISP good
New cards
26
26A Fox and Hound are also known as what?
Time domain reflectometer (TDR) Wiremap A tone generator and a tone probe continuity tester
Tone generator and a tone probe
New cards
27
27Which of the following is not a common wired network problem?
Attenuation UTP cables < 100 meters jitter wrong cable type
UTP cables < 100 meters
New cards
28
28Which decimal number is represented by the binary number 1 0 1 1 0 1 1 0?
182 176 73 182\.176.783.0
182
New cards
29
29What does ARP stand for and what does it do?
Advanced routing protocol determines route between Mac addresses alternate routing protocol determines backup routes between Mac addresses address resolution protocol results Mac address with IP address advanced resolution protocol results network name to IP address
address resolution protocol results Mac address with IP address
New cards
30
30Which statement is not true of a subnet mask?
Subnet masks are used by a computer to determine the normal county subnet masks are sent out as one of the fields in the IP packet subnet masks are made-up of continuous 1s starting at the leftmost (most significant bit) of an IP address subnet masks are never sent out of a host
subnet masks are sent out as one of the fields in the IP packet
New cards
31
31Here are three IP addresses: 216.53.12.11, 130.222.255.170, 223.255.6.88. What class of addresses are each one (in order)?
C,B,C B,A,C C,A,B A,C,A
C,B,C
New cards
32
32An organization has five campus buildings. They want each building to be on its own subnet. Each campus will need a minimum of twenty-five IP addresses. The organization has the Class C network address 217.105. 2.0 assigned to it. Using CIDR, what subnet mask will yield the minimum number of subnetworks with the maximum number of hosts per network that will meet the requirements of the organization?
/26 /27 /28 /29
/27
New cards
33
33A company has subnetted their Class C network address into four subnets with a /26 subnet mask. What are the addresses of the four subnets?
0,1,2,3 128,64,32,16 0,64,128,192 1,2,4,8
0,64,128,192
New cards
34
34Which service does not automatically assign an IP address to a host?
Static DHCP bootP APIPA
static
New cards
35
35Which choice is true of a rogue DHCP server?
A rogue DHCP server increases the speed of the DHCP service A rogue DHCP server increases the pool of available IP addresses A rogue DHCP server can assign compatible IP addresses to host A rogue DHCP server make sure the host will get compatible APIPA addresses
A rogue DHCP server can assign compatible IP addresses to host
New cards
36
36Which of the following is not a "special" IP address?
37Which symptom is not a result of an IP addressing problem?
Duplicate IP address static IP address duplicate Mac address incorrect gateway
static ip address
New cards
38
38What is the job of a router?
to assign IP addresses to host on the network to connect networks with different network IDs to map IP addresses against Mac addresses to allow outside host to initiate contact with hosts on the LAN side of a network
to connect networks with different network IDs
New cards
39
39What is the role of port numbers in IP headers?
Port numbers identify the sending and receiving processes between two host port numbers identify which interfaces on a router should receive data in and which interfaces should forward data out four numbers identify which connectors on a switch that should receive data in and which should forward data out port numbers identify the path of routers between any two hosts that need to communicate with each other
Port numbers identify the sending and receiving processes between two host
New cards
40
40Which statement is true of a NAT router?
NAT routers replaced the source IP address with its own IP address NAT routers allow public addresses to exist on the land side of the router all hosts on the land side of the net router are assigned the same IP address as a public address in router the NAT faction is performed at the ISP facility
NAT routers replaced the source IP address with its own IP address
New cards
41
41True or false: Most SOHO routers come with NAT enabled?
True
New cards
42
42Port forwarding allows which of the following?
Public addresses to be assigned to the land side of the NAT router white host on the land side of the narrator to be assigned with the same public address of the router's WAN interface but it just says a landside hose with a portable DNS address outside access to host on the LAN side of the NAT router
outside access to host on the LAN side of the NAT router
New cards
43
43A tech has just installed a new SOHO router for a client. Which security task should the tech perform first?
Change administrator name and password disable port forwarding disable the DHCP server enable Mac address cloning
Change the administrator name and password
New cards
44
44Which feature of a SOHO router is not typically found in an enterprise router?
Two or more router interfaces graphical textual management interface each interface in a router must be configured built-in switch
Built-in Switch
New cards
45
45Which statement is not true of static routes?
Routers can have static routes hosts can have static routes static routers are enter manually must be manually changed by a human static router enter manually but can be automatically changed by the router
static router enter manually but can be automatically changed by the router
New cards
46
46Which of the following is a not an element of a route metric?
MTU hop distance cost bandwidth
Hop Distance
New cards
47
47Which of the following is not a characteristic of the RIP routing protocol?
RIP is a distance vector protocol RIP is an interior gateway protocol RIP supports a maximum hop count of 127 pops the primary metric in RIP is hop count
RIP supports a maximum hop count of 127 pops
New cards
48
48Which of the following is not a characteristic of the OSPF routing protocol?
OSPF is a link state protocol OSPF is it distance vector protocol OSPF routers are grouped into areas OSPF routers in area like the designated router and a backup designated router
OSPF is it distance vector protocol
New cards
49
49Which of the following is not a characteristic of the BGP routing protocol?
BGP is a hybrid of distance vector and link state routing protocols BGP is broken up into divisions called autonomous system (AS) the primary job of BGP is to route between ASes OSPF is a primary router protocol between ASes
OSPF is a primary router protocol between ASes
New cards
50
50Which characteristic is true of TCP?
TCP is connectionless the TCP 3-way handshake beings with a SYN message, followed by an ACK followed by an ACK SYN message TCP uses the FIN message to close the connection. TCP uses the END message to close a connection.
TCP uses the FIN message to close the connection.
New cards
51
51Ping uses which IP layer protocol?
ICMP ARP RIP FTP
ICMP
New cards
52
52Which of the following is not a network information or troubleshooting utility?
Traceart Pathping FTP Bandwidth tester
FTP
New cards
53
53Which choice is not true about protocol analyzers such as WireShark?
Protocol analyzers can capture packets and frames Protocol analyzers can show the contents of packets and frames Protocol analyzers can filter the content of the packet frames Protocol analyzers can generate packets and frame
Protocol analyzers can generate packets and frame
New cards
54
54What is the primary purpose of netstat?
Capture frames and packets for later review shows the computer's connection to any web servers graphical utility that charts amount of network data entering and leaving the host display all connections to and from the host computer
display all connections to and from the host computer
New cards
55
55FTP uses TCP port 20 and TCP port 21. Which choice describes how the ports are used?
FTP servers listen for commands on port 20 and response with data on port 21 FTP servers listen for commands on port 21 and response with data on port 20 FTP client request on port 21 and receive data on port 21 FTP client request on port 20 and receive data on port 20
FTP servers listen for commands on port 21 and response with data on port 20
New cards
56
56Which of the following is a secure email protocol?
STMP STLS POP IMAP
STLS
New cards
57
57Which choice describes a significant difference between Telnet and SSH?
Telnet is an Internet telephony protocol, SSH it's a secure sharing protocol Telnet runs on a client, SSH runs on the server Telnet runs on a server, SSH runs on a client Telnet is unencrypted, SSH is encrypted
Telnet is unencrypted, SSH is encrypted
New cards
58
58Which is the default port for NTP?
321 123 132 231
123
New cards
59
59Which of the following is not a network service problem?
Duplicate IP address in DHCP scope not enough IP addresses in the DHCP scope overlong DHCP lease Periods exclusion in the DHCP scope
exclusion in the DHCP scope
New cards
60
60In what folder is the HOSTS file located in a Windows computer?
61What command will assign a drive letter to a network share?
Net assign Net drive Net share Net use
Net use
New cards
62
62The primary command-line tool to troubleshoot Windows naming issues is what?
Nbstat Netstat Ipconfig Net
Nbstat
New cards
63
63What is the job of DDNS?
DDNS allows a locker device around the change its DNS name DDNS rotates the IP address of a local device DDNS tracks IP address changes of a local device and update DNS to reflect those changesDDNS prevents the pH of the local device from being changed
DDNS tracks IP address changes of a local device and update
New cards
64
64A website just changed its IP address and a user is unable to reach it by typing the site's domain name into their browser. What command can the user run to make the computer learn the website's new IP address?
66In terms of network security, what is the purpose of hashing?
Hash is a great side dish with eggs hashing encrypts data hashes are used to verify data integrity hashing decrypt that out that was encrypted by hashem
hashes are used to verify data integrity
New cards
67
67Which of the following is not an authentication factor?
Something you are Something you can do Something you know Something you have
Something you can do
New cards
68
68What is a digital signature?
Hash web page encrypted web page hash of an encrypted data chunk that sender and receiver both have web page that has been hashed with the private key
hash of an encrypted data chunk that sender and receiver both have
New cards
69
69Which of the following is not a common certificate error or warning?
Certificate is on the certificate relocation list (CRL) self signed certificate expired certificate certificate not valid for the site
Certificate is on the certificate relocation list (CRL)
New cards
70
70Which would be the best solution to make an encrypted tunnel using SSH?
Recode an unencrypted tunneling program to support SSH encryption Piggyback an existing program into SSH set up a tunnel using PPTP set up a tunnel using L2TP/IPSEC
Piggyback an existing program into SSH
New cards
71
71Which statement is true of VLANs?
VLANs enabled remove stations to connect to the LAN from across the Internet VLANs break up broadcast domains into multiple, smaller broadcast domains VLANs use SSH tunnels for cross-VLAN traffic VLANs can only be specific ports on a router
VLANs break up broadcast domains into multiple, smaller broadcast domains
New cards
72
72Which statement is true of inter-VLAN routing?
Inter-VLAN routing Calls for connecting each VLAN to a port on the routers so that data can pass between the VLANs Inter-VLAN routing is implemented within the switches to network communication between VLANs Inter-VLAN routing encrypts and decrypts traffic between VLANs Inter-VLAN router enables VLANs to connect over a public network, such as the Internet
Inter-VLAN routing is implemented within the switches to network communication between VLANs
New cards
73
73Which port on a switch is used to manage the switch?
Rollover port console port Yost port layer 3 port
console port
New cards
74
74When operating multiple, duplicate servers such as web servers, which method is best to to take advantage of the full power of all of the servers?
HSRP DNS server Round robin Server Server Side Load Balancer
Server Side Load Balancer
New cards
75
75What is the Cisco protocol to perform port bonding?
LACP HSRP CARP Inter-VLAN routing
LACP
New cards
76
76What does port mirroring accomplish?
Enabled inbound and outbound traffic from switch ports to duplicate at the mirrored port double switch-port bandwidth by bonding a specified ports to the mirror redirects any inbound traffic to the near port to another, specified port redirects any outbound traffic from the mirror port to a house with a specific IP address
Enabled inbound and outbound traffic from switch ports to duplicate at the mirrored port
New cards
77
77What does QoS provide?
Higher Performance of selected traffic blocking of specific traffic types redirection of low priority traffic to slower router interfaces prioritized throughput of different traffic types
prioritized throughput of different traffic types
New cards
78
78Which statement is true of IPS and IDS systems?
Passive IDS is the same as IPS IPS responds to threats with a notification to specified staff IPS detects then attempts to defend against a threat passive IPS is the same as IDS
IPS detects then attempts to defend against a threat
New cards
79
79Which statement is not true of a forward proxy?
Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured Forward proxy servers function between the local network and the front-end router Forward proxy servers are application specific Hosts must be configured to access the forward proxy server
Forward proxy servers are connected in-line between the front-end router and the LAN and they do not require hosts to be configured
New cards
80
80Which is the BEST device to dole out requests to duplicate servers to ease congestion?
DNS Server Round Robin Server Server side Load Balancer Clusterer
Server side Load Balancer
New cards
81
81Which of the following is not a characteristic of an IPv6 address?
128 bits Written with hexadecimal characters Groups are separated by dashes Broken up into eight groups
Groups are separated by dashes
New cards
82
82Which choice is not a valid representation of the IPv6 address: 2001:C2A:0000:0000:BB29:0000:3F00:A5B6?
Outbound IPv6 addresses are randomized by the operating system EUI-64 can be traced back to the source computer IPv4 and IPv6 are automatically translated back and forth as required there are no private IPv6 addresses
IPv4 and IPv6 are automatically translated back and forth as required
New cards
84
84A DS0 line has what bandwidth?
1.544 mbps 32 kbps 64 kbps 128 kbps
64 kbps
New cards
85
85What is the speed of an OC-1 line?
1\.544 mbps 64 kbps 155 mbps 51\.85 mbps
51.85 mbps
New cards
86
86Which of the following is not a packet switching technology?
Circuit switch Frame Relay ATM MPLS
Circuit Swtich
New cards
87
87Dial-up connections require which piece of equipment?
Modem Cable modem NIC Multi-speed switch
Modem
New cards
88
88What kind of download and upload speed does ADSL provide?
Same download and upload speed slower upload speeds and download speed faster upload speed than download speed half duplex operation provides the same upload and download speed for uploading and downloading cannot happens simultaneously
slower upload speeds and download speed
New cards
89
89The primary technical disadvantage to satellite Internet is what?
Slow upload slow Download latency expense
latency
New cards
90
90Remote desktop is a term that describes what?
Installing two keyboards and two monitors on the same computer that it can run two different sessions, simultaneously duplicating the output of a monitor to another monitor separating the monitor from a computer so it can operate over a distant connection using a computer to take over the screen and keyboard of another computer
using a computer to take over the screen and keyboard of another computer
New cards
91
91SCADA differs from ICS/DCS for what major reason?
SCADA uses conventional computers while ICS/DCS uses highly socialized computers ICS/DCS uses conventional computers while SCADA uses highly socialized computers ICS/DCS operates over long distances while SCADA is local SCADA operates over long distances while ICS/DCS is local
SCADA operates over long distances while ICS/DCS is local
New cards
92
92What does ad-hoc mode describe?
Wireless devices connected to a WAP A bluetooth environment comprised of a mouse and keyboard Wireless network comprised only of peer computers 802\.11 network
Wireless network comprised only of peer computers
New cards
93
93PoE describes what?
Using power lines to carry Ethernet data Using wireless access points to provide power to wireless clients Using ethernet cables to carry data and power to network devices Using power cables as wireless antennas in Wi-Fi environments
Using ethernet cables to carry data and power to network devices
New cards
94
94Which of the following is not an antenna type typically found in a Wi-Fi environment?
Tripole Dipole Patch Yagi
Tripole
New cards
95
95Which of the following is not a security task that should be performed on a new WAP?
96Which term describes the process of scouting for Wi-Fi networks that may be vulnerable?
War Driving Snooping sniffing fox hunting
War Driving
New cards
97
97Documenting a "find" after a war driving excursion is known as what?
War marking Blogging War chalking Updating
war chalking
New cards
98
98WPS is used for what purpose?
Automatically shares the Wi-Fi password Automatically sets up a personal area network Automatically applies protection services to wireless devices Automatically configures a wireless device to connect to a WAP
Automatically configures a wireless device to connect to a WAP
New cards
99
99Which choice is not a step in planning and installing a wireless network?
Plan the WAP locations Perform site survey Install patch antennas configure WAP security
Install patch antennas
New cards
100
100Which choice is not a typical Wi-Fi problem?
Interface WPS failure Wrong WAP password WAP configuration has changed