No products in the cart.
CompTIA Network+ (N10-008) Exam Questions
Page 3 of 55
41.
In wireless networks, absorption, reflection, and refraction all result in which of the following?
-
Attenuation
-
Overcapacity
-
Radio Frequency Interference (RFI)
-
Jitter
Correct answer: Attenuation
Attenuation is the loss of signal strength by Wi-Fi signals or other radio waves as they travel through various media. Absorption, reflection, and refraction all result in attenuation.
Overcapacity is when a wireless network has more users and devices than it can support.
Radio Frequency Interference (RFI) occurs when other devices use frequencies similar to those used by Wireless Local Area Network (WLAN) devices.
Jitter represents large differences in network latency.
42.
Which of the following is not considered a scope option in Dynamic Host Configuration Protocol (DHCP)?
-
Routing protocol
-
Default gateway
-
DNS server
-
WINS server
Correct answer: Routing protocol
Routing protocol is not considered a Dynamic Host Configuration Protocol (DHCP) scope option. There are options for router, NetBIOS, and static routes, but DHCP configuration has nothing to do with routing protocols.
A DHCP scope is a pool of IP addresses available for lease to clients. The configuration of a DHCP server includes these options:
- Default gateway
- Domain Name System (DNS) server
- Windows Internet Name Service (WINS) server
43.
Which of the following helps to protect against broadcast storms and MAC address table corruption?
-
STP
-
MDIX
-
UPS
-
GBIC
Correct answer: STP
The Spanning Tree Protocol (STP) protects against loops in Layer 2 networks that have redundant network links. These loops could cause broadcast storms, MAC address table corruption, and other issues.
Medium-Dependent Interface Crossover (MDIX) is an Ethernet switch feature that eliminates the need to worry about using crossover vs. straight-through cables by automatically selecting which wire to use for sending and receiving data.
An Uninterruptible Power Supply (UPS) provides a battery backup that can allow a device to continue operating during a power outage.
A Gigabit Interface Converter (GBIC) allows different connectors to be used to plug into a switch port. A GBIC is designed to be easy to insert and remove, making it ideal for troubleshooting.
44.
Which of the following switches for the "arp" command displays the current entries in the PC's Address Resolution Protocol (ARP) table?
-
-a
-
-v
-
-d
-
-s
Correct answer: -a
You can use the arp command to see what a layer 2 MAC address corresponds to as a known layer 3 IP address. The syntax of the arp command is as follows:
arp -s inet_addr eth_addr
arp -a
Parameter | Purpose |
-a or -g | These options display current entries in a PC's Address Resolution Protocol (ARP) table. |
-v | The -v option stands for "verbose" and includes any invalid and loopback interface entries in an ARP table. |
inet_addr | This option is a specific IP address. |
-d | An ARP entry for a host can be deleted with this option, in combination with the inet_addr parameter. You can also use a wildcard character of * to delete all host entries. |
-s | This option, used in conjunction with the inet_addr and eth_addr parameters, statically adds a host entry in the ARP table. |
eth_addr | This parameter would represent the 48-bit MAC address. |
45.
You need to ensure that a host always retains the same IP address assignment. To do this, you are setting up a static mapping of an IP address to the system's MAC address.
What is being described here?
-
DHCP reservation
-
DHCP lease
-
DHCP scope
-
DHCP option
Correct answer: DHCP reservation
A Dynamic Host Configuration Protocol (DHCP) reservation is a static mapping of an IP address to a specific MAC address. While this is done on the DHCP server, it is also possible to configure a static IP address on the individual host itself.
A DHCP lease is a temporary assignment of IP address information to a DHCP client. A DHCP scope is a pool of IP addresses used by a DHCP server to assign IP addresses to DHCP clients. A DHCP option is an IP address parameter (for example, the IP address of a DNS or WINS server) that a DHCP server assigns to a DHCP client.
46.
Which of the following is used interchangeably with the term Krone block?
-
110 block
-
66 block
-
25 block
-
88 block
Correct answer: 110 block
The term Krone block is used interchangeably with the term 110 block. Krone block is the European variant of 110 block, which is a wiring distribution point for copper and fiber cables.
The 66 block has been replaced by the 110 block.
25 pair (rather than 25 block) is an older type of wiring distribution point.
88 block is a fabricated term.
47.
Which OSI layer handles LLC and MAC?
-
Data link
-
Physical
-
Network
-
Application
Correct answer: Data link
The data link layer uses Logical Link Control (LLC) and Media Access Control (MAC) to perform data transmission, error notification, and flow control.
The physical layer handles the physical media, such as cabling, that the data link layer controls access to.
The network layer interfaces with the data link layer.
The application layer is at the top and doesn't control media access.
48.
Which standard incorporates TKIP, 802.1X, AES, and CCMP?
-
802.11i
-
802.11be
-
802.11h
-
802.11ax
Correct answer: 802.11i
The wireless standard 802.11i incorporates Temporal Key Integrity Protocol (TKIP), 802.1X, Advanced Encryption Standard (AES), and Counter Mode/CBC-Media Access Control (MAC) Protocol (CCMP). The wireless security protocol Wi-Fi Protected Access 2 (WPA2) uses 802.11i.
802.11be is the standard for Wi-Fi 7, which can operate at 6 GHz.
802.11h is the regulatory standard for wireless networks that includes Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC). DFS reduces interference with radars and TPC limits device power.
802.11ax is the standard for Wi-Fi 6, which can operate at 5 GHz, and Wi-Fi 6e, which can operate at 6 GHz.
49.
What is a CSU/DSU?
-
A modem
-
A switch
-
An adapter
-
A signal generator
Correct answer: A modem
A Channel Service Unit/Data Service Unit (CSU/DSU) is a type of modem. As a standalone device, it was commonly used as Data Communications Equipment (DCE) in legacy technologies such as Frame Relay. Today, the functions of a CSU/DSU may be integrated into devices such as a router or a network interface card. The word modem is a combination of the concepts modulate and demodulate. The function of a modem is the conversion of analog and digital signals over a telecom line.
A CSU/DSU is not a switch, which is used to forward communication on a Local Area Network (LAN).
While in a general sense, a CSU/DSU does adapt signals between analog and digital, the proper term for that would be modem.
A signal generator is an electronic device that creates electrical signals.
50.
An Intrusion Prevention System (IPS) is deployed at which layer of the three-tiered network architecture model?
-
Distribution
-
Access
-
Core
-
Link
Correct answer: Distribution
An Intrusion Prevention System (IPS) would be deployed at the distribution layer of the three-tiered network architecture model. This is the layer that implements network links between devices.
The access layer connects end-user host devices.
The core layer implements high-speed links between data centers and an organization's on-premise networks.
The link layer is not a layer of the three-tiered network architecture model.
51.
Which of the following is NOT a way that routes can be injected into a router's IP routing table?
-
A route is extracted from existing routes.
-
A route is directly connected.
-
A route is dynamically learned.
-
A route is statically configured.
Correct answer: A route is extracted from existing routes.
A router cannot extract a new route based on existing routes.
A router's Internet Protocol (IP) routing table can learn routes in multiple ways, including:
- Being physically connected to a network
- A dynamic routing protocol (OSFP, EIGRP, etc.)
- Static route configurations
52.
What Spanning Tree Protocol (STP) state won't forward frames and just listens to Bridge Protocol Data Units (BPDU) while dropping all other frames?
-
Blocking
-
Listening
-
Learning
-
Forwarding
Correct answer: Blocking
A blocked port won't forward any frames at all. It simply listens to the Bridge Protocol Data Units (BPDUs) which are transmitted across the local area network to detect loops in the networks' topologies. It will drop all other frames.
A listening port listens to the BPDUs to ensure that no loops are occurring before passing the data frames. The data is prepared without the MAC populating the forward/filter table.
Learning ports listen to BPDUs and learn all the paths in the switched network while populating the physical addresses they find into the forward/filter table.
Forwarding ports send and receive all the data frames on the bridged port.
53.
Which security system restricts user access based on a user's responsibilities?
-
RBAC
-
Least privilege
-
Zero trust
-
Separation of duties
Correct answer: RBAC
Role-Based Access Control (RBAC) is a system or method that implements zero trust by assigning permissions to users based on their role and responsibilities within the organization. RBAC follows the principle of least privilege.
The principle of least privilege states that a user should have only the permissions needed to do their job. Least privilege is not a specific system, or method, but a principle or policy.
Zero trust is a security model that limits permissions to only those with proper authentication and authorization. Zero trust also follows the principle of least privilege.
Separation of duties breaks processes that are high-risk or have the potential for fraud into tasks that are assigned to different users, making it more difficult for a legitimate user to abuse their power.
54.
Which Internet of Things (IoT) protocol is MOST commonly used for home automation?
-
Z-wave
-
ANT+
-
NFC
-
RFID
Correct answer: Z-Wave
Z-Wave is an IoT protocol used for home automation.
ANT+ is commonly used for sensors, such as heart rate or blood pressure monitoring. Near-Field Communications (NFC) is used to connect smartphones to nearby devices and is commonly used for tap payment apps (Apple Pay, Google Pay, etc.). Radio-Frequency Identification (RFID) is used by proximity-sensing smartcards. Tags can be passive or active and store information that can be read by an RFID reader, which does not require line-of-sight to the tag.
55.
Translate the following binary IP address:
00001010.00001011.00001100.01100011
-
10.11.12.99
-
11.12.13.100
-
9.10.11.98
-
8.10.13.98
Correct answer: 10.11.12.99
To convert the binary to decimal, each position of the 1s needs to be added. By taking each position of the 1, and then referring to the chart below, you can add the values together to get the binary address.
Binary Value | Decimal Value |
00000001 | 1 |
00000010 | 2 |
00000100 | 4 |
00001000 | 8 |
00010000 | 16 |
00100000 | 32 |
01000000 | 64 |
10000000 | 128 |
56.
You and a colleague are working to implement a new wireless network for a client. Your colleague thinks that 802.11n will be sufficient, but you recommend that the devices chosen be 802.11ac. Which of the following is an advantage of 802.11ac?
-
High speed
-
Compatibility with 802.11g
-
Compatibility with 802.11a
-
Use of infrared instead of radio
Correct answer: High speed
The 802.11ac wireless standard was designed for extremely high speeds and improved scalability. Like 802.11n, it uses Multiple-Input, Multiple-Output (MIMO), which uses multiple antennas to transmit and receive to increase data throughput. 802.11ac enhancements over 802.11n include eight spatial streams instead of four, 256 Quadrature Amplitude Modulation (QAM) instead of 64 QAM, and support for up to eight antennas instead of four with 802.11n.
Here are speeds for various standards:
- 802.11ax: 3.5+ Gbps
- 802.11ac: 1 Gbps
- 802.11n: 300 Mbps
- 802.11g: 54 Mbps
- 802.11a: 54 Mbps
- 802.11b: 11 Mbps
IEEE 802.11n is backward compatible with 802.11a/b/g, but that does not constitute an advantage over 802.11n.
The original 802.11 standard used infrared, but the Wi-Fi Alliance later dropped it.
57.
Which of the following is NOT an advanced security feature found in an NGFW?
-
Port-based filtering
-
Threat intelligence
-
Deep packet inspection
-
Application awareness
Correct answer: Port-based filtering
Traditional firewalls provide basic filtering of network traffic based on source or destination Internet Protocol (IP) addresses as well as port numbers. Port-based filtering is not an advanced feature of a Next-Generation Firewall (NGFW).
Threat intelligence includes information about potential security threats and how to mitigate them.
Deep Packet Inspection (DPI) involves the examination of the contents of network packets. DPI can be used for:
- Data leak prevention
- Intrusion detection
- Identifying threats
Application awareness is the ability to distinguish between specific applications.
58.
Cables in wiring closets often terminate at a common point, called what?
-
Patch panel
-
Access point
-
Main distribution frame
-
Central office
Correct answer: Patch panel
Typically, a wiring closet will have one or more patch panels into which cables come and terminate into a familiar RJ45 female jack. With many cables being run throughout the area, this makes it much easier to label, control and troubleshoot.
An access point is used in wireless networks and provides a point for wireless clients to connect to. A Main Distribution Frame (MDF) is typically where external communications meet internal communications in a company building. A Central Office (CO) is a telephone company's phone switching equipment location.
59.
Which of the following is another term for a multilayer switch?
-
Layer 3 switch
-
Layer 2 switch
-
Layer 4 switch
-
Layer 5 switch
Correct answer: Layer 3 switch
A switch that works at more than one layer of the Open Systems Interconnection (OSI) model is called a multilayer switch. Multilayer switches are also referred to as layer 3 switches because of their ability to make forwarding decisions like a router.
60.
What is another name for wireless ad-hoc mode?
-
IBSS
-
Yagi
-
ESS
-
Point-to-point
Correct answer: IBSS
Wireless ad-hoc mode is also known as an Independent Basic Service Set (IBSS) configuration. An ad-hoc wireless network involves the peer-to-peer connection of two or more wireless devices without the need for a Wireless Access Point (WAP).
Yagi is the name of a unidirectional wireless antenna. Yagi antennas are commonly used for point-to-point communication.
An Extended Service Set (ESS) uses multiple access points that form a single wireless network.
A point-to-point wireless connection creates a bridge between two locations using two Yagi antennas in line of sight with each other.