CompTIA Network+ (N10-009) Exam Questions

Page 6 of 55

101.

You've used the wrong type of cable (crossover, straight-through) to connect two switches together. Which of the following can fix this?

  • MDI/MDI-X

  • STP

  • LACP

  • VTP

Correct answer: MDI/MDI-X

Medium-Dependent Interface Crossover (MDI) is an Ethernet switch feature that can be configured as MDI or MDI-X. Crossover cables require the switch port to be set to MDI, while a straight-through cable requires MDI-X. Auto MDI-X is a feature in modern switches that eliminates the need to worry about using crossover vs. straight-through cables by automatically sensing and selecting which setting to use for sending and receiving data.

The Spanning Tree Protocol (STP) protects against loops in layer 2 networks that have redundant network links. The Link Aggregation Control Protocol (LACP) aggregates multiple physical links into a single logical channel, which it makes available to a route processor. The VLAN Trunking Protocol (VTP) allows a virtual LAN's configuration information to be distributed from one switch to others via trunk links.

102.

What issue can you diagnose when you know the RTT?

  • Delay

  • Jitter

  • Throughput

  • Fragmentation

Correct answer: Delay

Delay measures the time it takes for traffic to move from source to destination. Delay grows with distance, which is why satellite connections often show significant lag. The most common tool for measuring delay (latency) is ping, which measures the Round-Trip Time (RTT) to a destination device.

Jitter occurs when there is a variation in delay on a network, which may be caused by traffic congestion.

Throughput is the amount of data sent through a network over a given time.

Fragmentation is the breaking up of large chunks of data into smaller pieces.

103.

An administrator at Acme Inc. is looking to receive alerts about environmental monitoring of the many routers and switches that operate in their company network. Which of the following would be MOST suitable for this scenario?

  • SNMP

  • Loopback plugs

  • Server message block

  • Active reporting

Correct answer: SNMP

Simple Network Management Protocol (SNMP) is an Internet standard protocol for collecting and organizing information about managed devices on Internet Protocol (IP) networks and for modifying that information to change device behavior. Many routers support SNMP communications and can be configured to send them to a central server in order to provide centralized notifications and auditing.

Loopback plugs are used to test the functionality of a network connection.

Server Message Block (SMB) is used to share files on a Windows network.

Active reporting is a fabricated term.

104.

You are troubleshooting a network issue in which a user is complaining of slowdowns on the network. Of the following, which is LEAST LIKELY to be the culprit?

  • Bad cable

  • Bandwidth shortage

  • Signal strength

  • Dropped packets

Correct answer: Bad cable

Once a cable has been made, installed, and tested, it is less likely to fail than other components of the network. A bad cable won't cause intermittent issues or slowdowns, but rather permanent disconnects.

A bandwidth shortage could cause intermittent congestion and bottlenecks on the network, slowing traffic and affecting performance.

Decreased signal strength can slow transmission throughput.

Dropped packets (packet loss) can cause a slow network and performance problems.

105.

What type of router silently discards packets that are larger than the network's Maximum Transmission Unit (MTU) and are not allowed to be fragmented?

  • Black-hole router

  • Default gateway

  • Area border router

  • Next-hop router

Correct answer: Black-hole router

Black-hole routers silently drop packets that are larger than a network's Maximum Transmission Unit (MTU) and have the Don't Fragment (DF) flag set. These routers can be identified using traceroute.

A default gateway indicates where a device should send traffic intended for hosts outside of its local subnet.

An Area Border Router (ABR) is the designation given to a router running the Open Shortest Path First (OSPF) routing protocol that has one interface participating in one OSPF area and one or more other interfaces participating in a different OSPF area.

A next-hop router is a parameter appearing in a routing table, indicating the Internet Protocol (IP) address of the next router to which a packet should be forwarded to reach a specific destination network.

106.

Which type of connection would you make to connect your laptop to a switch to gain root access?

  • Console

  • API

  • SSH

  • Crossover

Correct answer: Console

A console connection is used to connect your laptop to a switch to gain root access. It is commonly used for the initial configuration of a device. Console ports on a router or switch allow root access to a device. Console connections can also be used with terminal servers. To make this connection, use a rolled Ethernet cable, or console cable, which uses opposite wiring on each end, as follows:

  • 1 to 8
  • 2 to 7
  • 3 to 6
  • 4 to 5
  • 5 to 4
  • 6 to 3
  • 7 to 2
  • 8 to 1

An Application Programming Interface (API) allows software applications to communicate with each other.

A Secure Shell (SSH) connection is used for remote network access to a device.

A crossover is a connection between two devices using a crossover cable. Crossover cables are used for the following connections:

  • Switch to switch
  • Hub to hub
  • Host to host
  • Hut to switch
  • Router direct to host

107.

An organization needs to make a modification to its network infrastructure. They want to ensure that this modification is done in a way that is organized, controlled, and safe. Which of the following processes will assist with this?

  • Change management

  • Acceptable use

  • Risk management

  • Service level

Correct answer: Change management

A change management process is a way to ensure that when change happens in your infrastructure, it is done in a way that is organized, controlled, and safe. A team known as the change management team is responsible for investigating, testing, and authorizing changes to the network.

Acceptable use policy instructs employees on how they may use company-owned devices.

Risk management is important in any business, but it is not a distinct network policy or procedure.

Service level agreement outlines the services promised to the provider with specific levels.

108.

What Windows command could identify which router hop is causing a reachability issue?

  • tracert

  • route

  • traceroute

  • nslookup

Correct answer: tracert

Traceroute (tracert on Windows) maps the path of a packet from source to destination by pinging each router hop on that route and calculating the route-trip time for each hop. Tracert is typically used to identify the location of an unreachable router along a packet's route.

The route command is used to manipulate network routing tables. The traceroute command is a Linux command that is similar to the Windows tracert command. The nslookup command queries DNS information.

109.

Which of the following enables Ethernet nodes to detect if data was damaged during transit?

  • Frame check sequence

  • Half-duplex mode

  • Start of frame delimiter

  • Frame error flag

Correct answer: Frame check sequence

Before transmitting data, the sender calculates a Cyclic Redundancy Check (CRC) value for it, creating a frame check sequence field in the Ethernet frame that allows the recipient to determine if the data has been damaged in transit.

Half-duplex mode allows bidirectional traffic but only in one direction at a time.

The Start Of Frame (SOF) delimiter is a 1-byte field that indicates the end of the preamble in an Ethernet frame.

Frame error flag is a fabricated term.

110.

Your manager would like to know the normal utilization for a particular network resource. Which document should contain this information?

  • Baseline configuration

  • SLA

  • Production configuration

  • Base configuration

Correct answer: Baseline configuration

Baseline configurations describe the "normal" network performance for particular resources. Assessments may include devices, throughput, and various performance indicators. Golden configuration describes a network when it is performing optimally. Key components for baseline configurations include:

  • Processor
  • Memory
  • Storage
  • Wired/ wireless utilization

A Service Level Agreement (SLA) defines the expectations for service as agreed between the provider and the customer. An SLA would describe expected rather than actual network performance.

A production configuration document includes setup and provisioning information. It is used for the development and maintenance of a network.

Base configuration is an incorrect term.

111.

Which of the following is NOT a DNS security protocol?

  • DNSTLS

  • DNSSEC

  • DoH

  • DoT

Correct answer: DNSTLS

DNSTLS is NOT the proper name for a Domain Name System (DNS) security protocol. The DNS security protocol that uses Transport Layer Security (TLS) is called DNS over TLS (DoT).

Domain Name Security (DNSSEC) can digitally sign DNS records and protect DNS against attacks. DNSSEC was created as part of an expansion of DNS protocols known as Extension Mechanisms for DNS (EDNS).

DNS over HTTPS (DoH) encrypts DNS traffic that passes over Hypertext Transfer Protocol Secure (HTTPS), which enables secure browser connections. DoH is enabled by default in the Firefox browser.

DNS over TLS (DoT) encrypts traffic using Transport Layer Security (TLS).

112.

Which of the following environmental conditions is MOST LIKELY to lead to ESD?

  • Low humidity

  • Excessive heat

  • Moist air

  • High humidity

Correct answer: Low humidity

The dry conditions caused by low humidity can cause static electricity, leading to Electrostatic Discharge (ESD). ESD can damage equipment. Relative air humidity should be kept between 40% and 60%. Data center technicians are encouraged to use a grounding strap on their wrists to prevent ESD.

The heat generated by ESD can cause damage to equipment, but excessive heat does not generally cause ESD. Cold air is more likely to allow for ESD.

Moist air is another way to say high humidity. ESD is less likely to occur with high humidity than with low humidity.

113.

Your organization has undergone a rapid round of hiring, and many employees are complaining about slow network speeds. What might be the problem?

  • Device saturation

  • Security type mismatch

  • Excessive WAPs

  • WLAN overload

Correct answer: Device saturation

If too many devices are connected to a wireless access point, it can become saturated with less bandwidth available for each user. This is more likely to be the problem than the other options.

A wireless device would not be able to connect to an access point if there is a security type mismatch.

A greater number of Wireless Access Points (WAPs) might alleviate network traffic and reduce device saturation, depending on the design. However, the current problem is the saturation for each WAP.

Wireless Local Area Network (WLAN) overload is a fabricated term.

114.

Of the following, which is often the last stage of a system life cycle?

  • Disposal

  • Phase-out

  • Utilization and support

  • Production and construction

Correct answer: Disposal

The last stage of a system life cycle is normally asset disposal.

When working in IT networking, the organization should consider adhering to a well-planned system life cycle for the equipment and software in use. The system life cycle should provide valuable guidance on best practices throughout the organization concerning network components. Proper disposal is the last stage in the typical system life cycle.

Neither phase-out, utilization and support, nor production and construction are normally the last stage of a system life cycle.

Here are some example phases in a system life cycle:

  • Conceptual design
  • Preliminary system design
  • Detailed design and development
  • Production and construction
  • Utilization and support
  • Phase-out
  • Disposal

115.

What Ethernet switch feature allows a PC that is running packet capture software and that is connected to one switch port to receive a copy of traffic seen on another switch port?

  • Port mirroring

  • STP

  • EtherChannel

  • Port redundancy

Correct answer: Port mirroring

Port mirroring is a feature that makes a copy of traffic seen on one port and sends that duplicated traffic out to another port (to which a network sniffer can be attached). This feature is often used for monitoring purposes.

The Spanning Tree Protocol (STP) protects against loops in layer 2 networks that have redundant network links. EtherChannel is a technology primarily used by Cisco switches to collect several physical connections into a single logical connection. Port redundancy involves having multiple interfaces in case one fails.

116.

What technique could an attacker use to identify the operating system of a target computer?

  • Port scan

  • Ping sweep

  • Smurf attack

  • SYN flood

Correct answer: Port scan

A port scan can often help attackers find out which operating systems are running on target systems. Port scanners can do this by analyzing responses to various request types. The nmap utility functions as a port scanner.

Ping sweeps can be used to help attackers find which systems are online, but they will not help them identify the operating systems of those devices.

Smurf attacks and SYN floods are common Denial-of-Service (DoS) attacks and will not help with reconnaissance.

117.

What attack is involved when a legitimate frame tag is replaced by a fake frame tag before passing through an 802.1Q trunk?

  • VLAN hopping

  • Frame masking

  • Frame spoofing

  • MAC spoofing

Correct answer: VLAN hopping

An 802.1Q trunk uses frame tagging for Virtual Local Area Network (VLAN) trunking between two switches. If an attacker manages to replace frame tags that identify the VLAN at the first switch, the data can be routed to an alternate VLAN.

Frame masking is a fabricated term.

Frame spoofing involves the modification of source and destination information in a frame. It does not involve changing the frame tag or VLAN information.

Media Access Control (MAC) spoofing involves assuming the MAC address of another device.

118.

Which of the following messages should a host send if it wants to generate an IPv6 address?

  • Router Solicitation

  • Router Advertisement

  • Neighbor Solicitation

  • Neighbor Advertisement

Correct answer: Router Solicitation

Router solicitation is the first of a three-step process of IPv6 address autogeneration.

The Router Advertisement protocol allows hosts in a subnet to create their own IPv6 addresses based on their MAC addresses. The router sends out a Router Advertisement (RA) message both in response to a Router Solicitation (RS) request from a host and at regular intervals. This RA message contains a prefix and instructions for using it to create an IPv6 address.

Neighbor Solicitation and Neighbor Advertisement addresses are used in the Neighbor Discovery protocol to learn the link layer addresses of neighbors in a network.

119.

You have recently started a new job at Acme Incorporated. They have provided you with the name and password of their wireless network, AcmeWiFi, and put you right next to a wireless access point. You open up your device's network and internet settings to discover wireless networks in the area, but the wireless network AcmeWiFi does not appear. What is likely occurring?

  • Hidden SSID

  • Distance limitation

  • Hidden WLID

  • Rogue access point

Correct answer: Hidden SSID

The Service Set Identifier (SSID), also known as the network name, can be hidden in order to prevent unauthorized individuals from seeing it. When this occurs, you can manually enter the SSID (in this case, AcmeWiFi) to locate the wireless network and connect to it.

It's unlikely an issue with distance limitations since you are sitting near a wireless access point.

WLID is not a valid wireless term.

Rogue access points and security type mismatch would not cause the SSID to be invisible.

120.

Of the following, which is the BEST option for remote locations that have limited Wide Area Network (WAN) connectivity choices?

  • Satellite

  • HSPA+

  • LTE

  • Radio

Correct answer: Satellite

Many types of Wide Area Network (WAN) connectivity, such as Digital Subscriber Lines (DSLs) and cable modems, are not available in remote areas. Satellite internet provides connectivity in these areas by bouncing traffic off a satellite to a ground station connected to wired networks.

Evolved High-Speed Packet Access (HSPA+) is a mobile communications technology that may not be as available as satellite for remote locations.

Long-Term Evolution (LTE) is a form of 4G cellular technology.

Radio is not considered a wide area network service.