CompTIA Network+ (N10-009) Exam Questions

Page 5 of 55

81.

You suspect that a computer may be infected with malware and participating in a Distributed Denial of Service (DDoS) attack. Which command line utility could help you to prove or disprove this hypothesis?

  • netstat

  • dig

  • nslookup

  • ipconfig

Correct answer: netstat

A DDoS attack will involve a large number of connections to different IP addresses. The netstat command shows active connections and can help with detecting this attack.

The commands dig and nslookup are used to perform DNS lookups, which would not help with this.

The command ipconfig provides information on a computer's IP configuration, not its active connections.

82.

How many cable pairs can a BIX block terminate?

  • 25

  • 66

  • 30

  • 110

Correct answer: 25

Building Industry cross-connect (BIX) blocks are punch-down blocks that can terminate up to 25 cable pairs.

A 66 block can terminate multiple cable pairs depending on the configuration. It allows for 50 pairs, 25 on each side.

The answer 30 is incorrect.

A 110 block can accommodate more than 500 cable pairs. It is also known as a Krone block.

83.

Which of the following is NOT an example of an ICS system?

  • ANT

  • PLC

  • SCADA

  • RTU

Correct answer: ANT

Industrial Control Systems (ICS) include Supervisory Control and Data Acquisition (SCADA), Programmable Logic Controllers (PLCs), and Remote Terminal Units (RTUs).

ANT is a fabricated term.

84.

Which of the following is NOT a potential issue that could exist with fiber-optic cable?

  • Incorrect pinout

  • Wavelength mismatch

  • Dirty connectors

  • Bend radius limitations

Correct answer: Incorrect pinout

Incorrect pinout is a potential issue with metallic cables, not fiber-optic cables.

Wavelength mismatch, dirty connectors, and bend radius limitations are potential issues with fiber optics.

85.

Of the following, which type of route is injected into a router's routing table due to the router's interfaces being directly connected to the network?

  • Connected route

  • Redistributed route

  • Dynamic route

  • Default static route

Correct answer: Connected route

A connected route is added to a router's routing table because a subnet is plugged into one of the router's interfaces.

A redistributed route is sent from one routing protocol to another, such as a route learned using the Routing Information Protocol (RIP) being shared with the Open Shortest Path First (OSPF) protocol.

A default static route is manually configured and indicates where traffic should be sent if the destination is not within a router's routing table.

A dynamic route is shared between routers using a routing protocol.

86.

Which specification represents a newer version of STP?

  • 802.1w

  • 802.1x

  • 802.1D

  • 802.1Q

Correct answer: 802.1w

The newer version of the Spanning Tree Protocol (STP) is called Rapid Spanning Tree Protocol (RSTP), and it is described in specification 802.1w. The purpose of STP and RSTP is to prevent switching loops. RSTP allows for much faster convergence times. RSTP is backward compatible with STP.

The 802.1X standard describes the authentication protocol Extensible Authentication Protocol (EAP).

802.1D is the standard for STP.

802.1Q is used for Virtual Local Area Network (VLAN) tagging.

87.

A wireless client cannot successfully connect to a wireless Access Point (AP).  Which is the LEAST LIKELY to be the problem?

  • Channel mismatch

  • Wireless standard mismatch

  • Encryption standard mismatch

  • SSID mismatch

Correct answer: Channel mismatch

A client is likely to automatically set its channel to match the one used by an Access Point (AP), making this the least likely cause of the issue.

For a wireless client to connect to an AP, the wireless standard, channel, encryption standard, and Service Set Identifier (SSID) must match. These are more likely causes of connectivity issues than channel selection, which is usually automatic.

88.

IPv6 link-local addresses use which address range?

  • FE80::/10

  • 2000::/3

  • FC00::/7

  • FF00::/8

Correct answer: FE80::/10

Link-local addresses are non-routable IPv6 addresses in the FE80::/10 range. They are similar to Automatic Private IP Addressing (APIPA) addresses in IPv4.

Unicast addresses are used to send packets to a particular interface. Unicast addressing exists for both IPv4 and IPv6. In IPv6, global unicast addresses are used for internet routing and are in the range 2000::/3.

Unique local unicast addresses are used within a private network and are in the range FC00::/7. IPv4 and IPV6 multicast are "one to many" addresses designed to send a packet to multiple different interfaces with a single address.

The multicast range in IPv6 is FF00::/8.

89.

What is the typical height of a server rack?

  • 42U

  • 1.75U

  • 40U

  • 36U

Correct answer: 42U

The height of a server rack is measured in rack units. The symbol for rack unit is U. A typical server rack is 45 rack units, or 42U, high. There are some racks that are 48 units high. Rack numbering starts at the bottom with rack unit number one.

1.75U is incorrect. The typical height of each rack unit is 1.75 inches (44.45 mm), for a total height of 73.5 inches.

40U is incorrect.

36U is incorrect.

90.

Which of the following is NOT a phase of the system life cycle?

  • Troubleshooting

  • Retiring

  • Purchasing

  • Managing

Correct answer: Troubleshooting

Troubleshooting is not a phase of the system life cycle.

Phases of the system life cycle include:

  • Purchasing
  • Deploying
  • Managing
  • Retiring

91.

Dynamic Frequency Selection (DFS) was introduced to prevent interference with radar signals operating in which band?

  • 5 GHz

  • 5 MHz

  • 2.4 GHz

  • 2.4 MHz

Correct answer: 5 GHz

The 5GHz Wi-Fi band can also be used by some radar signals. Dynamic Frequency Selection (DFS) monitors for radar signals and will not use frequency bands that could interfere with them.

Wireless Local Area Network (WLAN) standards are described in 802.11. None of these standards correspond to 5 MHz or 2.4 MHz. IEEE 802.11b and 802.11g are both 2.4 GHz standards.

 

92.

Data loss prevention, environmental responsibility, and regulatory compliance are the MOST important considerations for which phase of life-cycle management?

  • Decommissioning

  • Maintenance

  • EOL

  • Acquisition

Correct answer: Decommissioning

Data loss prevention, environmental responsibility, and regulatory compliance are all considerations for the decommissioning, or disposal, phase of life-cycle management.

IT asset maintenance, or management, requires attention to these issues, but environmentally-friendly disposal of equipment is especially important for the decommissioning phase.

End-Of-Life (EOL) is not a lifecycle phase. EOL is the last date the vendor will sell the product.

During the acquisition phase, purchasers should consider all aspects of the system life-cycle, including benefits and expected system life.

93.

An application is performing a query to a database. Which of the following ports is it LEAST LIKELY to be using?

  • 3389

  • 1433

  • 1521

  • 3306

Correct answer: 3389

Port 3389 is used by the Remote Desktop Protocol (RDP). Querying is a function of databases, and RDP does not necessarily involve a database like the other three answers. Using a port associated with a database would be more likely.

Ports 1433, 1521, and 3306 are all used by various databases.

Port 1433 is the default port for the Structured Query Language (SQL) server.

Port 1521 is used by the Oracle database.

Port 3306 is used by MySQL.

94.

Which of the following would an administrator use to check for gaps in their wireless networking?

  • Wi-Fi analyzer

  • Wi-Fi repeater

  • Protocol analyzer

  • Network sniffer

Correct answer: Wi-Fi analyzer

Various issues can arise with wireless networks, such as congestion and weak signals. A Wi-Fi analyzer can evaluate the network and surrounding wireless networks to determine the overall quality and environment. It may be necessary to change the wireless channel (if using 2.4 GHz technology) or implement 5 GHz wireless for faster communications without interference.

A Wi-Fi repeater extends the range of a wireless signal over a longer distance. A protocol analyzer is a software tool that captures network traffic. A network sniffer is another name for a protocol analyzer.

95.

Which of the following is the primary difference between the 802.1D and 802.1w standards?

  • Speed

  • Bandwidth

  • Scalability

  • Throughput

Correct answer: Speed

802.1w is the Rapid Spanning Tree Protocol (RSTP), which offers faster convergence time than the Spanning Tree Protocol (STP), which is IEEE 802.1D.

Bandwidth, scalability, and throughput are not relevant to the STP, which is a technology used to eliminate network loops.

96.

Which of the following is NOT an SNMP command?

  • Log

  • Trap

  • Get

  • Set

Correct answer: Log

Log is NOT a Simple Network Management Protocol (SNMP) command.

Basic SNMP commands include get, set, and trap.

The SNMP trap command proceeds from the SNMP agent on a network device. Traps can be used to create alerts in the Network Monitoring System (NMS).

Get and set are basic SNMP commands sent from the NMS. The get command queries an SNMP agent on a device for specific information about the device.

The set command changes SNMP values on a network device.

97.

Which of the following is similar to Cisco's Hot Standby Router Protocol (HSRP) but is an open standard?

  • VRRP

  • GLBP

  • VSRP

  • BDRP

Correct answer: VRRP

VRRP works similarly to Cisco's Hot Standby Router Protocol (HSRP) by automatically assigning available IP routers to hosts, improving routing availability and reliability. Both HSRP and VRRP are considered First Hop Redundancy Protocols (FHRP).

Gateway Load Balancing Protocol (GLBP) is a Cisco proprietary standard like HSRP, which also does load balancing Virtual Switch Redundancy Protocol (VSRP), and is another proprietary protocol that was developed by Foundry Networks. BDRP is not a commonly used networking acronym.

98.

What is 126.255.255.255 interpreted as?

  • All hosts on the 126 network

  • Any host outside of the 126 network

  • The external address for the 126 network

  • The gateway host of the 126 network

Correct answer: All hosts on the 126 network

A packet sent to the address 126.255.255.255 would subsequently be sent out to every host on the network. An IP address with 255 at the end would normally be considered a broadcast address.

A packet sent to 126.0.0.0 would be sent to any host on the network. A gateway host for the 126 network would typically be 126.0.0.1, meaning data would be sent to this address if a specified address wasn't found on the network. External addresses are part of Network Address Translation (NAT), and any IP address could be the external address of a computer or network.

99.

Which of the following outlines what is and is not allowed on corporate networks and systems?

  • AUP

  • BYOD

  • PUA

  • DLP

Correct answer: AUP

An Acceptable Use Policy (AUP), or fair use policy, outlines what is and is not allowed on corporate networks and systems.

A Bring-Your-Own-Device (BYOD) policy defines how personal devices may be used for company business.

A Potentially Unwanted Application (PUA) is a piece of software that may not be desired for inclusion on a company device.

Data Loss Prevention (DLP) is a strategy for preventing the loss of sensitive data.

100.

Which protocol replaced WEP with a mode of AES known as CCMP?

  • Wi-Fi Protected Access 2

  • Wireless Protection Agent 2

  • Wired Equivalent Privacy 2

  • RADIUS

Correct answer: Wi-Fi Protected Access 2

Wi-Fi Protected Access 2 (WPA2) replaced Wireless Equivalent Privacy (WEP) security protocol and uses Advanced Encryption Standard (AES) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP) encryption.

A high level of encryption you can run on a wireless network is WPA2, specifically with the AES algorithm. With this high level of encryption, cracking the key to the wireless network becomes nearly impossible. At the very least, it makes it extremely unlikely the network will be compromised due to the wireless key because the effort involved in cracking the password is extreme.

Wireless Protection Agent 2 is a fabricated term.

There is no Wireless Equivant Privacy 2.

Remote Authentication Dial-In User Service (RADIUS) is an authentication protocol.