No products in the cart.
CompTIA Network+ (N10-009) Exam Questions
Page 4 of 55
61.
You've opted for log level 4 in syslog. What is the LEAST critical type of log that you will receive?
-
Warning
-
Error
-
Emergency
-
Critical
Correct answer: Warning
Log level 4 in syslog will show log messages from levels 0-4. Warning (level 4) is the least critical of these and indicates that an operation failed.
More severe log levels include:
- Errors (3): Warn of error conditions that don't break the system
- Critical (2): Issue that should be addressed to avoid service outages
- Alerts (1): Issues that require immediate attention
- Emergency (0): Errors that make the system unusable
62.
Which of the following terms is often considered synonymous with 4G?
-
LTE
-
CDMA
-
HSPA+
-
TDMA
Correct answer: LTE
Long-Term Evolution (LTE) is a standard used in fourth-generation (4G) cellular networks, and the terms are often used interchangeably. 4G has been an evolving standard with many implementations, but it's now being replaced by 5G in many locations. 4G/LTE and 5G networks use Orthogonal Frequency Division Multiple Access (OFDMA), which is an advanced combination of Frequency-Division Multiple Access (FDMA) and Time-Division Multiple Access (TDMA).
Code Division Multiple Access (CDMA) is used by 2G and 3G networks, which have served as backup to 4G networks for some carriers.
High-Speed Packet Access Plus (HSPA+) was released in 2008 as part of Wideband Code Division Multiple Access (WCDMA) in 3G networks.
The Global System for Mobile Communications (GSM) is a 2G network that uses Time-Division Multiplexing (TDMA) to allow multiple users to share the same channel.
63.
Which of the following is NOT a distinct state of data addressed by Data Loss Prevention (DLP)?
-
Data in cloud
-
Data in transit
-
Data in use
-
Data at rest
Correct answer: Data in cloud
Data in cloud is not a distinct state of data. Data in a cloud infrastructure can be classified as either in transit, in use, or at rest; the same as for traditional IT infrastructures.
Data in transit, also called data in motion, is data being transferred between two locations on a network.
Data in use, also called data in operation, is data currently being accessed by an application.
Data at rest refers to data that is stored somewhere, like a hard drive or flash drive.
64.
Which of the following would allow you to find the break in a 1000Base-SX cable?
-
Visual fault locator
-
TDR
-
Cable certifier
-
Toner probe
Correct answer: Visual fault locator
A visual fault locator is used to locate visual faults in fiber optic cables, including bends and breaks. 1000Base-SX is a fiber optic cable that uses SC fiber connectors, with a maximum speed of 1000 Mbps and a maximum transmission distance of 550 meters. An Optical Time Domain Reflectometer (OTDR) can also be used to identify breaks in optical cables. Optical cable testers are now available to detect fiber optic breaks, although cable testers are usually thought of as tools for troubleshooting twisted pair lines.
A Time Domain Reflectometer (TDR) can be used to find a break in metallic cables, such as twisted pair wires or coaxial cables.
A cable certifier is used to check integrity as well as identify transmission characteristics of a cable.
A toner probe is used to trace a wire in a wall.
65.
You are setting up a wireless network in which multiple Wireless Access Points (WAPs) connect to a central switch to become part of a single broadcast domain. What is the name of this type of wireless network?
-
ESS
-
BSS
-
SSE
-
DSS
Correct answer: ESS
When you add additional Wireless Access Points (WAPs) that connect to a central switch to become part of a single broadcast domain, this is known as an Extended Service Set (ESS).
A Basic Service Set (BSS) is the most basic type of wireless infrastructure, with just one WAP and one or more wireless clients.
Security Service Edge (SSE) is a convergence of network security services and is not related to wireless service sets.
DSS is a fabricated term.
66.
A WLAN might experience interference due to which type of cordless phone?
-
2.4 GHz
-
900 MHz
-
1.7 MHz
-
DECT
Correct answer: 2.4 GHz
A 2.4 GHz band may interfere with a Wireless Local Area Network (WLAN) signal. Using the 5 GHz band for the WLAN signal can solve this problem. The 2.4 GHz band is used by 802.11 b, g, and n networks and some types of cordless phones. As a result, they can interfere with each other. Cordless phones are used for landlines, which are used by less than 25% of the U.S. population.
The frequencies 900 MHz, 1.7 MHz, and 5.8 GHz are used by legacy cordless phones but not by WLAN. In some cases, a 5.8 GHz cordless phone may interfere with WLAN at 5 GHz.
Digital Enhanced Cordless Telecommunications (DECT) operates at 1.9 GHz and doesn't interfere with wireless or Bluetooth. DECT 6.0 is the standard in North America.
67.
What virtual service stores user data and the desktop GUI in a central server, as compared to the hard drive on a user's computer?
-
Virtual desktop
-
Virtual PBX
-
Virtual switch
-
Virtual server
Correct answer: Virtual desktop
A virtual desktop stores user data and the desktop GUI in a central server rather than on the user's local machine.
A virtual private branch exchange (PBX) is usually a Voice-over Internet Protocol (VoIP) solution, where voice is encapsulated inside data packets for transmission across a data network. Virtual switches provide layer 2 control for co-resident virtual machines on the same server, enabling the use of VLANs. A virtual server allows multiple virtual machines (potentially with different operating systems) to reside on the same physical server.
68.
Which of the following standards is LDAP based on?
-
X.500
-
X.509
-
X.25
-
X.75
Correct answer: X.500
The Lightweight Directory Access Protocol (LDAP) protocol is based on the X.500 standard, which describes global directory services.
X.509 is the standard for public key certificates.
X.25 is a standard for packet-switched data communication.
X.75 is used to connect two X.25 networks.
69.
An employee opens a secure door with their smart card and then notices someone behind them with their hands full of doughnut boxes. The employee opens the door and lets them in. What just happened?
-
Piggybacking
-
Shadowing
-
Spoofing
-
Tailgating
Correct answer: Piggybacking
When an authorized person allows an unauthorized person to follow them through a secure doorway, that is called piggybacking.
Shadowing is a fabricated term.
Spoofing involves the impersonation of network technologies, such as Internet Protocol (IP) spoofing, Domain Name Service (DNS) spoofing, or Address Resolution Protocol (ARP) spoofing.
Tailgating is when an unauthorized person follows an authorized person through a secure doorway without the authorized person's knowledge. The difference between tailgating and piggybacking is that with piggybacking the authorized person intentionally lets the unauthorized person in.
70.
A user is working at a coffee shop when she is suddenly disconnected from the coffee shop's Wi-Fi. Her computer automatically connects to the closest open Wi-Fi connection, which happens to be a rogue access point placed there by an attacker. The user is able to connect to the internet, but what she does not realize is that an attacker had purposefully kicked her computer off of its current access point so that her device would connect to the rogue access point and allow the attacker to intercept all of her internet traffic.
What is the name of this type of attack?
-
Deauth attack
-
War driving
-
Brute force
-
Session hijacking
Correct answer: Deauth attack
A deauthentication (deauth) attack is an attack in which a frame is sent out with the purpose of kicking a wireless client off of its current access point. A rogue access point is placed nearby in the hope that the wireless client will connect to it. Once the wireless client connects to the rogue access point, the attacker is able to see all the traffic and collect data from the client.
War driving occurs when a potential attacker is actively looking for insecure wireless devices, usually while traveling in a vehicle.
A brute force attack uses trial and error to hack passwords.
In session hijacking, the attacker takes control of a user's web session.
71.
Which of the following statements about DHCP scope is TRUE?
-
A scope acts as a pool of IP addresses from which a DHCP server can assign IP addresses to DHCP clients.
-
A scope is a hardcoded assignment of an IP address that will be assigned to a DHCP client with a specific MAC address.
-
A scope is additional information provided with an IP address.
-
A scope is a temporary IP address assignment that a DHCP server assigns to a DHCP client.
Correct answer: A scope acts as a pool of IP addresses from which a DHCP server can assign IP addresses to DHCP clients.
Dynamic Host Configuration Protocol (DHCP) is designed to assign Internet Protocol (IP) addresses to clients. A DHCP scope is a pool of addresses that a DHCP server draws from to assign addresses to a set of devices (typically a single subnet).
The other three answers are incorrect. These statements are associated with their correct terms as follows:
A hardcoded assignment of an IP address that will be assigned to a DHCP client with a specific Media Access Control (MAC) address is known as a reservation.
A DHCP option is additional information provided with an IP address.
A temporary IP address assignment that a DHCP server assigns to a DHCP client is called a DHCP lease.
72.
Of the following, which provides interconnection between Wireless Local Area Network (WLAN) and wired LAN?
-
AP
-
RSSI
-
RFI
-
CSMA/CA
Correct answer: AP
An Access Point (AP) connects to a wired Local Area Network (LAN) and generates a Wireless Local Area Network (WLAN).
The Received Signal Strength Indicator (RSSI) is a measure of the strength of a wireless signal. Signal strength can drop with distance or due to objects blocking line-of-sight signal transmission. WLANs may tune their transmission rates based on RSSI.
Radio Frequency Interference (RFI) can disrupt wireless networks. For example, some cordless phones, microwaves, and other devices use the 2.4 GHz spectrum, which can cause interference with Wi-Fi networks using this spectrum.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) introduces random delays before sending data to avoid collisions. This can increase latency in a WLAN.
73.
Which of the following is an example of an issue that a junior network engineer may be able to solve themselves?
-
Incorrect subnet mask
-
Switching loops
-
Broadcast storms
-
Proxy ARP Issues
Correct answer: Incorrect subnet mask
An incorrect subnet mask is a local issue on a computer that a junior engineer could fix themselves. The commands ipconfig on Windows and ifconfig on Linux will display the subnet mask on IP interfaces.
Switching loops are generally more complex and may require technical escalation. Spanning Tree Protocol (STP) is a technology that addresses switching loops.
A broadcast storm, which involves an overwhelming amount of broadcast data, may be the result of a Denial of Service (DoS) attack. It may be more difficult to troubleshoot than an incorrect subnet mask.
Proxy Address Resolution Protocol (ARP) issues may be indicative of a larger problem in the network and are likely to require escalation. A proxy ARP server handles ARP requests in a network.
74.
A network administrator is working to determine a solution for providing various large data files, such as meeting recordings, training materials, and call recordings, to the remote branches that have slower connections. Which of the following would alleviate the issue?
-
Content caching
-
Client-to-site VPN
-
Hardware redundancy
-
Load balancing
Correct answer: Content caching
Content caching helps to improve performance and reduce load on backend servers when serving data to geographically-distributed clients. A copy of data is "cached" on a server, which provides it to local clients. The backend server only needs to serve content to the remote servers, and users have the benefit of lower latency because they are served content by a nearby server rather than the remote backend server. In a Content Delivery Network (CDN), edge servers act as caching servers to deliver content faster and more efficiently.
A Virtual Private Network (VPN) creates an encrypted tunnel for data to travel through, which would not solve bandwidth issues. A client-to-site VPN would not alleviate a slow connection.
Hardware redundancy uses multiple copies of IT infrastructure to protect against outages.
Load balancing uses multiple servers to respond to requests, but the server is not the problem in this case.
75.
Which of the following syslog severity levels is applied to "Alerts"?
-
1
-
0
-
2
-
3
Correct answer: 1
These are the syslog alerts and their severity levels:
Level | Name | Description |
0 | Emergencies | The most severe error conditions, which render the system unusable |
1 | Alerts | Conditions requiring immediate attention |
2 | Critical | A less-severe condition, as compared to alerts, that should be addressed to prevent an interruption of service |
3 | Errors | Notifications about error conditions within the system that do not render the system unusable |
4 | Warnings | Notifications that specific operations failed to complete successfully |
5 | Notifications | Non-error notifications that alert an administrator about state changes within a system |
6 | Informational | Detailed information about the normal operation of a system |
7 | Debugging | Highly detailed information that is typically used for troubleshooting (e.g. individual packets) |
76.
A user reports that the company website is giving their browser an error message that says the certificate is untrusted. Of the following, what is MOST LIKELY the cause of this?
-
The certificate is expired.
-
The firewall is misconfigured.
-
The IP address has expired.
-
The browser needs to be updated.
Correct answer: The certificate is expired.
The most common reason for a browser to state that a certificate is untrusted is because the certificate has expired. To fix the issue, simply update the certificate for the site. Another possible cause for an untrusted certificate is that the Certificate Authority (CA) is not listed in the Trusted Root Certification Authorities folder on the local machine.
A misconfigured firewall would not cause an error saying that a certificate is untrusted.
If the Dynamic Host Configuration Protocol (DHCP) lease for an Internet Protocol (IP) address has expired, it would affect all connectivity.
An out-of-date browser could possibly cause an error for an untrusted certificate, but this problem would probably be associated with older browser installations. An expired certificate is more likely.
77.
Which of the following helps to protect against broadcast storms and MAC address table corruption?
-
STP
-
MDIX
-
UPS
-
GBIC
Correct answer: STP
The Spanning Tree Protocol (STP) protects against loops in Layer 2 networks that have redundant network links. These loops could cause broadcast storms, MAC address table corruption, and other issues.
Medium-Dependent Interface Crossover (MDIX) is an Ethernet switch feature that eliminates the need to worry about using crossover vs. straight-through cables by automatically selecting which wire to use for sending and receiving data.
An Uninterruptible Power Supply (UPS) provides a battery backup that can allow a device to continue operating during a power outage.
A Gigabit Interface Converter (GBIC) allows different connectors to be used to plug into a switch port. A GBIC is designed to be easy to insert and remove, making it ideal for troubleshooting.
78.
An individual has just purchased internet service from a new Internet Service Provider (ISP). They would like to find out if the speeds that were advertised are the speeds they are actually receiving in their home. Which of the following tools could they use to find this information?
-
Speed test site
-
Bandwidth speed tester
-
Protocol analyzer
-
Port scanner
Correct answer: Speed test site
Speed test sites, such as speedtest.net, are websites that allow users to verify throughput from a local computer to the internet. This can be useful in determining what type of speed they are receiving from an Internet Service Provider (ISP).
A bandwidth speed tester is a software tool used to measure traffic between a client and a server. It is installed on both the client and server machines. Unlike the publicly available speed test sites, this tool is managed locally in the data center.
A protocol analyzer captures packets in raw form as they pass through a network connection. Wireshark is a commercial protocol analyzer.
A port scanner searches a host for open ports.
79.
A crossover cable would be used to connect which of the following?
-
Switch to a switch
-
Router to a switch
-
Host to a switch
-
Host to a hub
Correct answer: Switch to a switch
A crossover cable is used to connect the following:
- Switch to switch
- Hub to hub
- Hub to switch
- Host to host
- Router direct to host
A straight-though cable is used to connect a router to a switch, a host to a switch, or a host to a hub.
80.
You've been tasked with testing the voltage on a line. Which tool should you use to accomplish this task?
-
Multimeter
-
Certifier
-
OTDR
-
Toner probe
Correct answer: Multimeter
Multimeters can test cable continuity, resistance, and voltage.
A cable certifier measures the integrity and characteristics of a cable. An Optical Time Domain Reflectometer (OTDR) tests and measures fiber optic cable. A toner probe is used to trace and identify cables.