TOTAL: CompTIA Network+ Cert. (N10-007) Practice Tests Trouble Questions #1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which network solution provides at least 50 Mbps of bandwidth and supports full-duplex communication?

10/100 layer 2 switch. Switches are usually configured to be full-duplex, and the 100 part of the label means that the switch supports 100 Mbps

The only Gigabyte Ethernet standard that has a maximum cable length shorter than 100 meters is:

1000Base-CX - uses copper cabling and is limited to 25 meters

1000Base-LX has the longest maximum run distance for Gigabit Ethernet running multimode fiber- what is that distance?

1000Base-LX running multimode has a maximum length of 550 meters

A small factory would like to connect a separate warehouse on its property to the network. The warehouse is about 200 meters (656 feet) away from the main factory building. They need a high-speed connection but do not have an unlimited budget. Which would be the MOST cost-effective method to supply a gigabit Ethernet connection to the second building?

1000Base-SX supports a long run (up to 500 m) with gigabit speed over multimode fiber. It is commonly used for intra-building links.

Which of the following statements is not true of Gigabit Ethernet?

1000BaseSX supports runs of up to 500 m over multi-mode fiber optic cable (220m/275m with 62.5 cable and 500m/550m with 50 micro cable) It does not support 10km runs.

Which statement is not true of 100 megabit Ethernet?

100BaseTX supports runs of up to 2km - 100BaseTX only supports runs of up to 100 meters

Which statement is not true about 10BaseT?

10BaseT requires Cat 5a UTP cable - 10BaseT can run on Cat 3 or higher UTP

Doug needs to install a fiber run between the MDF and the IDF in his building. The distance between the buildings is roughly 20 meters. He wants to use the fastest connection possible. Which standard should he use?

10GBaseSR - 10GBaseSR will run at 10 Gbps over fiber. The "S" states that it is short-range. It can go at distances up to roughly 300 meters. The "R" means that it is designed to be used with existing Ethernet standards

Which choice is not a valid representation of the IPv6 address: 2001:C2A:0000:0000:BB29:0000:3F00:A5B6?

2001:C2A::BB29::3F00:A5B6 (IPv6 addresses cannot use more than one set of double colons (::) to represent strings of zeroes.)

Which of the following tools enables you to inspect network traffic?

A protocol analyzer - A protocol analyzer's job is to capture data traffic and inspect it

What does ad-hoc mode describe?

A wireless network comprised only of peer computers

What is the default gateway?

Although the terms "gateway" and "default gateway" are often used interchangeably to refer to the router itself, the default gateway is the IP address of the router interface that connects to the LAN

Which of the following is not a packet switching technology?

Circuit switching is the opposite of packet switching - it creates a hard-wired circuit between two communicating nodes

Which choice is not found in a change request?

Cost of implementation

Which choices are examples of asymmetric encryption? (Choose two.)

Elliptic Curve Cryptography & Rivest-Shamir-Aldeman

A technician suspects a problem with the structured cabling system. The work areas have all been tested and verified as functioning properly. What other elements should be checked? (Choose three.)

Failed power and failed switches can impact multiple users. Overheating can cause equipment to shut down

Which networking technology is best defined as Fast Ethernet?

Fast Ethernet is also known at 100BaseT. It is also associated with 100BaseTX, 100BaseT4, and 100BaseFX. There is a pattern. If it has "100" in it, it's good for Fast Ethernet

Which techniques should a technician utilize to achieve HA? (Choose three.)

High Availability (HA) is achieved with tools such as RAID arrays, Link Aggregation of multiple NICs and redundant systems. Redundant system may include power supplies, routers, etc. will help keep systems running in the event of a failure. Backups don't keep systems running, they make it easy to recover

Patch panels and punch down tools are used on which kind of network cables?

Horizontal runs are punched down to the back of a patch panel on one end and the back of the wall jack of a work area at the other end

Using an ACL in a firewall to block known malicious Web addresses is an example of which of the following?

IP filtering is correct. Filtering prevents access by names and/or IP addresses

Some users on a wireless network, but not all, are having trouble accessing certain network resources. Which of the following is the least likely cause?

If the WAP is unpowered, all users will be affected

In what folder is the HOSTS file located on a Windows computer?

In a Windows-based computer, the HOSTS file is found in the C:\Windows\System32\Drivers\etc folder

Clark is troubleshooting a user's PC. They are using their browser to visit Web sites such as PayPal, eBay, and Newegg. They begin seeing SSL certificate mismatch warnings. Which of the following attacks could be happening?

MITM - A man-in-the-middle attack is a form of eavesdropping in which the attacker makes a connection with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker

Which of the following connectors would be found on a fiber-optic cable?

MT-RJ - The way I remember this one is that the MT-RJ supposedly resembles the RJ-45. The MT-RJ is one of four fiber-optic cable connectors, including the ST, SC, and LC

A technician has been tasked with planning for equipment failures. Which specs will the technician need to review to create a failure plan? (Choose three.)

Mean Time To Repair (MTTR), Mean Time To Failure (MTTF) and Mean Time Between Failures (MTBF) are all specifications that should be known in planning for inevitable future failures

Mesh networks come in two varieties. What are the two primary variants? (Select two.)

Mesh network topologies can be installed as a partial mesh or a full mesh

What command will assign a drive letter to a network share?

Net use - The net use command assigns a drive letter in the local computer to a shared folder on another computer

A technician suspects that a virus has infected the network. One of its actions appears to be that it utilizes a large amount of network bandwidth. What is the BEST tool that the technician can use to quickly determine which workstations are infected?

Network Sniffer - A sniffer is used to examine network traffic. These are more commonly known as packet sniffers

What is a chunk of data that has been sent out of a NIC called?

Network interface cards generate and receive frames

Get, Response, Set, and Trap are communications that occur between an SNMP manager and an SNMP managed device. These communications are examples of what?

PDUs - The commands and responses passed between SNMP managers and devices are sent as protocol data units (PDU)

Which would be the best solution to make an encrypted tunnel using SSH?

Piggyback a VPN session over an SSH connection

Network upgrades have been completed, and the network protocols have been modernized. The WINS server was shut down. Since there is no need for NetBIOS traffic, it will no longer be allowed on the network. Which of the following will accomplish this objective?

Port filtering, NetBIOS uses three well-known ports. Filter these (137, 139, and 15), and there will not be any more NetBIOS traffic

Which of the following is allowed by port forwarding?

Port forwarding enables access to hosts on the LAN side of a NAT router from beyond the WAN interface of the router

What is the role of port numbers in IP headers?

Port numbers identify sending and receiving processes in a sender and receiver.

Which protocols are implementations of AAA? (Choose two.)

RADIUS & TACACS+ provide authentication, authorization, and accounting

Which coaxial cable(s) have a characteristic impedance of 50 ohms? (Select two)

RG-58 & RG-8

Which choice is true of a rogue DHCP server?

Rogue DHCP servers can assign incompatible IP addresses to hosts on a network, making them unable to communicate with other hosts or the Internet

A network technician needs to check the configuration of a port on a switch. Which tool will he MOST likely to use to verify the configuration?

SNMP - Simple network messaging protocol, is used to, among other things, remotely administer SNMP-enabled devices

Which of the following protocols is associated with monitoring devices on a network?

Simple Network Management Protocol (SNMP) is designed to monitor networks, reporting an incredible amount of detail about devices on a network

Which of the following is a secure email protocol?

Start Transport Layer Security (STLS) is the current approach to running secure email protocols

Which statement is not true of a subnet mask?

Subnet masks are sent out as one of the fields in the IP packet is false - they are never sent out of a host

Which device can determine the length of a cable?

TDR - Time Domain Reflectometers (TDRs) can accurately determine cable lengths, which can also tell how far down the cable a break exists. This is accomplished by sending a signal down the cable and seeing how long it takes the signal to reflect back

Continuously bombarding a remote computer with broadcast pings that contain a bogus return address is an example of what specific type of attack?

The DoS attack described is known specifically as a smurf attack

Scott complains about slow access to the server and asks you to fix it. Which of the following utilities can you use to find the bottleneck on the network?

Tracert - Tracert traces the route between the host and destination. When it finds a problem, it either shows the slow link with high access times or simply stops

Your Internet connection works just fine, but you cannot access www.totalsem.com using its domain name or IP address. What command can you use to see if the Web site is down or if the problem is a router between your machine and the Web server?

Tracert - Whether you cannot reach a Web site, or the connection is just sluggish, if you trace the path to the site using tracert (or traceroute in UNIX/Linux), you will discover if the site itself is not responding or if a server or router between your machine and the remote host is causing the problem

WPS is used for what purpose?

Wireless Protected Setup (WPS) automatically negotiates and configures Wi-Fi settings between a peripheral and a WAP

Which of the following are common network problems? (Choose three.)

Wiring loops (between switches or between routers), replay attacks, and Initialization Vector (IV) attacks are all network threats and problems


संबंधित स्टडी सेट्स

Assessing Peripheral Pulse by Palpitation

View Set

AP Biology Chapter 5 - Membrane Structure and Function

View Set

Career Planning: The Job Search Process

View Set