CompTIA Network+ Certification Exam N10-009 Practice Test 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

An IPv6 address consists of:

128 bits

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?

192.168.63.255

An IPv6 link-local address is an equivalent of IPv4's:

APIPA address

IPv6 was primarily developed to mitigate the issue of:

Address exhaustion

Which of the following answers refers to an IPv6-only, one-to-nearest data transmission type?

Anycast

What IaC feature enables the creation of separate development paths that can be merged back into the main configuration, facilitating parallel development and testing?

Branching

Which of the terms listed below refers to a single point of reference for all configurations in IaC?

Central repository

A system administrator discovers that one server in a managed environment is running a different software version due to a manual update, despite no changes being made in the automation scripts. What issue does this represent?

Configuration drift

Which of the answers listed below refers to the technology and solutions used to link multiple data centers into a single, unified network?

DCI

Which of the answers listed below refers to IaC templates?

Dynamic content or configurations, which can be filled in with specific values at runtime

Which IaC automation component enables the real-time retrieval, storage, and management of configuration data?

Dynamic repositories

Which of the following answers refers to an IPv6 link-local address?

FE80::/10

Which of the answers listed below refers to a valid IPv6 address of FE80:00A7:0000:0000:02AA:0000:4C00:FE9A after compression?

FE80:A7::2AA:0:4C00:FE9A

IPv6 addresses are expressed with the use of:

Hexadecimal numbers

What is the primary advantage/improvement of VXLANs over traditional VLANs?

Improved scalability

Which VXLAN feature enables the creation of a single, unified network that spans multiple locations?

Layer 2 encapsulation

Which of the following answers refer(s) to both SDN and SD-WAN? (Select all that apply)

Prioritization and management of network traffic based on applications being used (application awareness, Automatic configuration and deployment of network devices without manual intervention (zero-touch provisioning) , Capability to operate over a variety of network connection types (transport-agnostic technology), Unified control over network policies and configurations (central policy management)

Which of the following acronyms refers to a cybersecurity framework that combines networking and security functions into a single cloud-based service?

SASE

Which of the answers listed below refers to a framework focused exclusively on delivering cloud-based security services?

SSE

Which of the following statements describes IaC playbooks?

Step-by-step instructions for automating processes such as deployments, configurations, or update

Which of the following best describes the purpose of version control in IaC?

Tracks changes and manages multiple versions of configuration files over time

A double colon in an IPv6 address indicates that a section of consecutive zeros has been compressed to shorten the address.

True

Globally-routable IPv6 addresses are designated for Internet-wide communication and serve a similar purpose to public IPv4 addresses. In IPv6, it is possible to identify a globally-routable (also known as a global unicast) address by examining the first 16 bits (or the first 4 hexadecimal digits) of the address. If an IPv6 address starts with a value between 2000 and 3FFF (or simply with a 2 or 3 as the first digit), it indicates that this address is a globally-routable IPv6 address.

True

Zero Trust Architecture (ZTA) is a security framework that eliminates implicit trust from networks. In ZTA, access decisions are made based on a combination of policies that consider factors like user identity, device health, and location (policy-based authentication). Additionally, in ZTA users and devices are continuously verified before being granted access to resources, based on real-time assessment of risk and behavior (authorization). To further enhance security, ZTA enforces the principle of giving users and devices only the minimum level of access required for their tasks, thereby reducing the attack surface (least privilege access).

True

packets within IPv4 headers, allowing IPv6 traffic to traverse IPv4 networks?

Tunneling


संबंधित स्टडी सेट्स

F446 Chapter 6: Finance Companies

View Set

Small group communications final

View Set

ch. 16 quiz (mastering for microbiology)

View Set

AP Chemistry Unit 5 Progress Check

View Set

U.S. History Chapter 2 Section 4

View Set