CompTIA Network+ (N10-008) Exam Questions

Page 6 of 55

101.

Of the following, which is NOT an interior gateway protocol?

  • Border Gateway Protocol (BGP)

  • Open Shortest Path First (OSPF)

  • Routing Information Protocol (RIP)

  • Intermediate System to Intermediate System (IS-IS)

Correct answer: Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) is an exterior gateway protocol, which is designed to share information between autonomous systems. In fact, BGP is the only exterior gateway protocol in widespread use today.

Open Shortest Path First (OSPF), Router Information Protocol (RIP), and Intermediate System to Intermediate System (IS-IS) are all interior gateway protocols, which are designed to route data within an autonomous system.

102.

Which layer of the three-tiered network architecture is MOST focused on security?

  • Distribution

  • Access

  • Edge

  • Core

Correct answer: Distribution

The distribution/aggregation layer is where most of the security functionality is deployed in a three-tiered network model.

While the access and core layers may have some security functionality, it is less of a focus.

The access layer is where end-user hosts are connected.

Edge is not a layer in the three-tiered model.

The core layer is also called the backbone.

Here is the three-tiered networking model:

  • Core layer
  • Distribution layer
  • Access layer

103.

Which of the following protocols combines features of distance-vector and link-state protocols?

  • EIGRP

  • OSPF

  • IS-IS

  • RIP

Correct answer: EIGRP

As a hybrid protocol, the Enhanced Interior Gateway Routing Protocol (EIGRP) combines features of both distance-vector and link-state protocols.

Open Shortest Path First (OSPF) is a link-state protocol.

Intermediate System-to-Intermediate System (IS-IS) is a link-state protocol.

Routing Information Protocol (RIP) is a distance-vector protocol.

104.

Simple Network Management Protocol version 3 (SNMPv3) has which of the following security features?

  • MD5 or SHA for authentication, and DES-256 for data integrity of messages

  • MD5 or SHA for authentication, and AES for data integrity of messages

  • CBC for authentication, and AES for data integrity of messages

  • MD5 or SHA for authentication, and nothing for data integrity of messages

Correct answer: MD5 or SHA for authentication, and DES-256 for data integrity of messages

Simple Network Management version 3 (SNMPv3) uses Message-Digest Algorithm 5 (MD5) or Secure Hash Algorithm (SHA) for authentication and provides data integrity with Data Encryption Standard-256 (DES-256) using Cipher Block Chaining (CBC).

No SNMP version uses the Advanced Encryption Standard (AES) for data integrity of messages.

CBC is not used for authentication.

To state that SNMPv3 does not provide for data integrity of messages is incorrect.

105.

Which type of Wireless Local Area Network (WLAN) only has one access point?

  • BSS

  • IBSS

  • ESS

  • SSID

Correct answer: BSS

A Basic Service Set (BSS) WLAN uses a single Access Point (AP). Because this wireless AP is often connected to a wired network infrastructure, BSSs often run in "infrastructure mode."

An Independent Basic Service Set (IBSS) WLAN is a temporary, ad hoc network created without the use of a wireless AP (to transfer files, etc.).

An Extended Service Set (ESS) WLAN is a WLAN containing two or more APs and also runs in "infrastructure mode."

A Service Set Identifier (SSID) names a wireless network and is broadcast by an AP to advertise the network to devices.

106.

Which document pertains specifically to wireless networks?

  • Site survey

  • Audit Report

  • Logical network diagram

  • Network map

Correct answer: Site survey

A site survey report pertains specifically to wireless coverage for a Wireless Local Area Network (WLAN). A site survey may also be referred to as a heat map and provides a visual representation of wireless coverage. It is typically performed before the installation of wireless equipment, but it may also be completed later when improvements in wireless coverage are needed.

Audit reports, logical network diagrams, and network maps are useful for both wired and wireless networks.

107.

Which fire suppression system uses an independent thermal link to trigger the sprinkler head?

  • Preaction

  • Deluge

  • Dry pipe

  • Wet pipe

Correct answer: Preaction

A preaction system includes an independent thermal link mechanism (along with high heat) as an additional trigger for the sprinkler head.

A deluge system dumps water from all sprinkler heads.

A dry pipe system uses air or nitrogen initially, followed by water after heat triggers a sprinkler head.

A wet pipe system is continually charged with water. When the heat causes a glycerin-based capsule to burst, a valve opens and releases water from a sprinkler head.

108.

How many collision domains does a switch with 12 ports have?

  • 12

  • 6

  • 2

  • 1

Correct answer: 12

A switch, by design, will make each of its ports a unique, singular collision domain. This enables a switch to segment each port so that collisions are nonexistent due to each node communication being on its own personal collision domain. This network still falls under one broadcast domain as routers connect broadcast domains.

The answers 6, 2, and 1 are incorrect.

109.

What is a rolled/rollover cable used for?

  • Connecting a host interface to a COM port

  • Connecting a switch with a fiber-optic port

  • Connecting a host to a switch

  • Connecting two COM ports together

Correct answer: Connecting a host interface to a COM port

A rolled/rollover cable is not used to connect Ethernet connections but to allow a host to communicate with a router through its console or communication (COM) port. This enables the user to program and configure the router directly, as opposed to using any Graphical User Interface (GUI) or software.

Fiber cables are used to connect to fiber-optic ports; no special cable is required. To connect a host to a switch, you would use a straight-through cable. You would not normally connect two COM ports together. A console communications (COM) port is used to connect a laptop to a device such as a switch or router in order to gain administrative access and control.

110.

Of the following, which provides interconnection between Wireless Local Area Network (WLAN) and wired LAN?

  • AP

  • RSSI

  • RFI

  • CSMA/CA

Correct answer: AP

An Access Point (AP) connects to a wired Local Area Network (LAN) and generates a Wireless Local Area Network (WLAN).

The Received Signal Strength Indicator (RSSI) is a measure of the strength of a wireless signal. Signal strength can drop with distance or due to objects blocking line-of-sight signal transmission. WLANs may tune their transmission rates based on RSSI.

Radio Frequency Interference (RFI) can disrupt wireless networks. For example, some cordless phones, microwaves, and other devices use the 2.4 GHz spectrum, which can cause interference with Wi-Fi networks using this spectrum.

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) introduces random delays before sending data to avoid collisions. This can increase latency in a WLAN.

111.

You are evaluating different options for data storage. One option you have exposes a pool of hard disks to clients over the network as one or more logical disks. Which type of data storage is being described?

  • SAN

  • NAS

  • SDN

  • NGFW

Correct answer: SAN

A Storage Area Network (SAN) makes a pool of hard disks accessible to client machines over the network. The SAN can pretend to be one or more logical hard disks and enables clients to read and write blocks of data to these disks.

Network Attached Storage (NAS) provides centralized file storage for clients on the network. It has its own built-in file system and is built specifically for file management with dedicated hardware and software.

SDN stands for Software-Defined Networking and is not a type of data storage.

NGFW stands for Next-Generation Firewall and is not a type of data storage.

112.

In the Spanning Tree Protocol (STP), what is the term for the port on a non-root that is closest to the root bridge?

  • Root port

  • Designated port

  • Non-designated port

  • Non-root port

Correct answer: Root port

The root port is the port on a non-root bridge that has the lowest cost to the root bridge.

Each network segment has a designated port, which is the port with the lowest cost to the root bridge (all root bridge ports are designated ports).

Non-designated ports drop traffic to prevent loops.

Non-root port is a fabricated term.

113.

Which wireless security standard implements IEEE 802.11i?

  • WPA2

  • WPA Personal

  • WPA Enterprise

  • WEP

Correct answer: WPA2

IEEE 802.11i is a standard designed to improve wireless security over Wireless Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA). It is implemented as part of WPA2.

WPA Personal is usually used in home networks.

WPA Enterprise is used in business environments and requires RADIUS authentication.

Wireless Equivalent Privacy (WEP) is an outdated wireless protocol and is no longer recommended.

114.

What type of cable can be used to link a computer to a switch?

  • Straight-through cable

  • Crossover cable

  • Rollover cable

  • Straight cable

Correct answer: Straight-through cable

A straight-through cable is used to connect a host to a switch or hub, or a router to a switch or hub.

A crossover cable is used to connect a host to another host, a switch to another switch, or a host directly to a router.

A rollover cable is used for a host to interface with a router or switch's console COM port.

Straight cable is a fabricated term.

115.

What command would you use to create a pairing between IP address 10.0.0.1 and MAC address 04-18-65-9F-41-B2 in a computer's ARP table?

  • arp -s 10.0.0.1 04-18-65-9F-41-B2

  • arp -a 10.0.0.1 04-18-65-9F-41-B2

  • arp -s 04-18-65-9F-41-B2 10.0.0.1

  • arp -a 04-18-65-9F-41-B2 10.0.0.1

Correct answer: arp -s 10.0.0.1 04-18-65-9F-41-B2

The -s flag to the arp command adds the IP/MAC address pairing to an ARP table.

The command arp -a displays the current ARP table, including associations between IP addresses and MAC addresses.

The answer arp -s 04-18-65-9F-41-B2 10.0.0.1 contains an incorrect syntax, with the addresses reversed. The correct syntax should be:

[ARP -s inet_addr eth_addr]

where inet_address is the IP address and eth_addr is the MAC address.

The answer arp -a 04-18-65-9F-41-B2 10.0.0.1 is incorrect both because it uses the incorrect option (-a) as well as the wrong syntax (IP address and MAC address are reversed).

116.

In which type of network documentation would you expect to find information about where spares are located to resolve hardware malfunctions?

  • Inventory management

  • Network configuration

  • IDF documentation

  • Change management

Correct answer: Inventory management

Inventory management includes the tracking of all assets in an organization. This includes the tracking of spares to use for hardware malfunctions and inventory of software licenses.

Network configuration involves setting parameters on network devices, but would not include tracking hardware spares.

Intermediate Distribution Frame (IDF) is a connecting point between users and the Main Distribution Frame (MDF). An IDF has nothing to do with tracking spares.

Change management may involve finding and installing spare equipment, but it is dependent on good inventory management to make that happen.

117.

You are a network engineer working to resolve an issue with a broken cable. You would like to determine whether a specific cable has a continuity problem or whether a wire map is correct. Of the following, which is the BEST tool to use to achieve this?

  • Cable tester

  • OTDR

  • Cable certifier

  • Power light meter

Correct answer: Cable tester

A cable tester will tell you if you have a continuity problem or if a wire map is incorrect.

An Optical Time-Domain Reflectometer (OTDR) is used to locate breaks in fiber-optic cables. A cable certifier is used to ensure that a cable can handle its rated amount of capacity. An optical power meter is used to measure the amount of light loss in fiber-optic cables.

118.

Which type of Network Address Translation (NAT) uses a pool of available addresses?

  • DNAT

  • SNAT

  • PAT

  • GNAT

Correct answer: DNAT

Dynamic Network Address Translation (DNAT) provides the ability to map an unregistered IP address to an inside local host.

Static NAT (SNAT) is a one-to-one translation of inside local to inside global addresses.

Port Address Translation (PAT), also called NAT overload, involves using different port numbers with a single global IP address. This allows for a many-to-one relationship in which the inside hosts can all be reached through various port numbers coupled with the global IP address.

GNAT is a fabricated term.

119.

Of the following, which is the software that resides on a single computer and seeks to detect potential attacks?

  • HIDS

  • APIDS

  • IPS

  • PPTP

Correct answer: HIDS

By definition, a Host Intrusion Detection System (HIDS) is an installed software package that monitors a single host for suspicious activity by analyzing events occurring within that host.

An Application Protocol-based Intrusion Detection System (APIDS) focuses on threats to applications that may be spread across multiple servers and protects an entire network. An Intrusion Prevention System (IPS) not only detects threats, it can also take actions to remedy them. The Point-to-Point Tunneling Protocol (PPTP) is an obsolete and insecure VPN protocol.

120.

Translate the following IP address to binary:

10.11.12.99

  • 00001010.00001011.00001100.01100011

  • 00101010.00011011.00001100.01100011

  • 10001010.00001011.00001100.01101011

  • 01101010.00001011.01101100.01100011

Correct answer: 00001010.00001011.00001100.01100011

The IP address 10.11.12.99 converts to 00001010.00001011.00001100.01100011.

The binary value 00101010.00011011.00001100.01100011 translates to 42.27.12.99.

The binary value 10001010.00001011.00001100.01101011 converts to 138.11.12.107.

The binary value 01101010.00001011.01101100.01100011 converts to 106.11.108.99.

The reverse of the binary-to-decimal process involves making comparisons against the chart below. For example, if the number is over 128, a 1 is placed at the beginning of the octet, then the remainder is compared against the chart again.

Binary ValueDecimal Value
000000011
000000102
000001004
000010008
0001000016
0010000032
0100000064
10000000128