CompTIA Network+ Certification Exam N10-009 Practice Test 9
An IPv6 address consists of:
128 bits
Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?
192.168.63.255
An IPv6 link-local address is an equivalent of IPv4's:
APIPA address
IPv6 was primarily developed to mitigate the issue of:
Address exhaustion
Which of the following answers refers to an IPv6-only, one-to-nearest data transmission type?
Anycast
What IaC feature enables the creation of separate development paths that can be merged back into the main configuration, facilitating parallel development and testing?
Branching
Which of the terms listed below refers to a single point of reference for all configurations in IaC?
Central repository
A system administrator discovers that one server in a managed environment is running a different software version due to a manual update, despite no changes being made in the automation scripts. What issue does this represent?
Configuration drift
Which of the answers listed below refers to the technology and solutions used to link multiple data centers into a single, unified network?
DCI
Which of the answers listed below refers to IaC templates?
Dynamic content or configurations, which can be filled in with specific values at runtime
Which IaC automation component enables the real-time retrieval, storage, and management of configuration data?
Dynamic repositories
Which of the following answers refers to an IPv6 link-local address?
FE80::/10
Which of the answers listed below refers to a valid IPv6 address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression?
FE80:A7::2AA:0:4C00:FE9A
IPv6 addresses are expressed with the use of:
Hexadecimal numbers
What is the primary advantage/improvement of VXLANs over traditional VLANs?
Improved scalability
Which VXLAN feature enables the creation of a single, unified network that spans multiple locations?
Layer 2 encapsulation
Which of the following answers refer(s) to both SDN and SD-WAN? (Select all that apply)
Prioritization and management of network traffic based on applications being used (application awareness, Automatic configuration and deployment of network devices without manual intervention (zero-touch provisioning) , Capability to operate over a variety of network connection types (transport-agnostic technology), Unified control over network policies and configurations (central policy management)
Which of the following acronyms refers to a cybersecurity framework that combines networking and security functions into a single cloud-based service?
SASE
Which of the answers listed below refers to a framework focused exclusively on delivering cloud-based security services?
SSE
Which of the following statements describes IaC playbooks?
Step-by-step instructions for automating processes such as deployments, configurations, or update
Which of the following best describes the purpose of version control in IaC?
Tracks changes and manages multiple versions of configuration files over time
A double colon in an IPv6 address indicates that a section of consecutive zeros has been compressed to shorten the address.
True
Globally-routable IPv6 addresses are designated for Internet-wide communication and serve a similar purpose to public IPv4 addresses. In IPv6, it is possible to identify a globally-routable (also known as a global unicast) address by examining the first 16 bits (or the first 4 hexadecimal digits) of the address. If an IPv6 address starts with a value between 2000 and 3FFF (or simply with a 2 or 3 as the first digit), it indicates that this address is a globally-routable IPv6 address.
True
Zero Trust Architecture (ZTA) is a security framework that eliminates implicit trust from networks. In ZTA, access decisions are made based on a combination of policies that consider factors like user identity, device health, and location (policy-based authentication). Additionally, in ZTA users and devices are continuously verified before being granted access to resources, based on real-time assessment of risk and behavior (authorization). To further enhance security, ZTA enforces the principle of giving users and devices only the minimum level of access required for their tasks, thereby reducing the attack surface (least privilege access).
True
packets within IPv4 headers, allowing IPv6 traffic to traverse IPv4 networks?
Tunneling