No products in the cart.
CompTIA Network+ (N10-009) Exam Questions
Page 9 of 55
161.
An e-commerce company is concerned about sudden surges of traffic to its sites during Black Friday sales. Which of the following cloud features would be the MOST beneficial to them?
-
Elasticity
-
Scalability
-
Flexibility
-
Agility
Correct answer: Elasticity
Elasticity refers to the cloud's ability to automatically scale up rapidly to meet sudden surges in demand, which would be useful in this case.
Scalability refers to the ability to support more long-term growth, such as when a company grows or shifts more services to the cloud. Scalability generally refers to planned, manual changes, while elasticity refers to the capacity for automatic and dynamic allocation of resources.
Flexibility in cloud computing is a more general term, referring to the ability to adapt to changing business needs quickly. Flexibility can encompass many areas, such as scalability, agile development, and real-time processing.
Agility in cloud computing involves the capability to rapidly develop, test, and deploy applications.
162.
Of the following, which could be considered an attack on confidentiality?
-
On-path attack
-
DDoS
-
Deauthentication
-
Exploit
Correct answer: On-path attack
An on-path attack, formerly known as a Man-in-the-Middle (MitM) attack, attempts to intercept traffic between two parties that do not know the third party is listening. Therefore, this is an attack on confidentiality.
In a Distributed Denial-of-Service (DDoS), the attacker overwhelms a server in an attack on availability.
A deauthentication attack occurs when an attacker tries to cause a user to lose connectivity to a wireless access point. This is also an attack on availability.
The word exploit refers to a method used to act on a network weakness. It is not the name of a particular attack.
163.
An engineer is looking for a crossover cable to connect a switch to a switch. The engineer will be able to tell that it's a crossover cable when looking at it because the wires connect to which pins on each end?
-
Opposite
-
Same
-
Rolled-over
-
Straight-through
Correct answer: Opposite
A crossover cable is used to connect a switch to a switch, a hub to a hub, and a host to a host, as well as others. When creating crossover cables, it's important to remember that the pins do not match on either side of the connection with several pins crossed. Instead of showing 1 to 1 and 2 to 2 like on a straight cable, the four wires on the crossover cable are crossed to show the following matchup on the ends:
- 1 to 3
- 2 to 6
- 3 to 1
- 6 to 2
If the pins were the same on both ends, it would be a straight-through cable.
A rollover cable uses eight wires to connect a Telecommunications Industry Association and Electronic Industries Alliance (TIA-EIA) 232 interface to a router console com port.
A straight-through cable shows the same pins on both ends.
164.
In the EIA/TIA 568B wiring standard, what is the fifth pin color?
-
White/Blue
-
Green
-
Blue
-
White/Brown
Correct answer: White/Blue
The pinout for the EIA/TIA 568B standard is as follows:
- Pin 1 - White/Orange
- Pin 2 - Orange
- Pin 3 - White/Green
- Pin 4 - Blue
- Pin 5 - White/Blue
- Pin 6 - Green
- Pin 7 - White/Brown
- Pin 8 - Brown
165.
Of the following, which technologies operate on the session layer of the Open Systems Interconnection (OSI) model?
-
RPC
-
HTTP
-
TCP
-
DNS
Correct answer: RPC
The Remote Procedure Call (RPC) involves a computer program calling a subroutine to reach out to another resource (computer) on the network for procedure execution. In this way, the RPC protocol creates and breaks down sessions between computers, thus operating on Layer 5.
Hypertext Transfer Protocol (HTTP) is an application layer protocol used to transfer information between computers. It is commonly used in web browsers. Transmission Control Protocol (TCP) is a transport layer protocol used to ensure the reliable transmission of network data. Domain Name System (DNS) works at the application layer, handling the domains that we use in browsing web traffic.
166.
Which of the following most accurately describes how quickly a wireless network can effectively carry data?
-
Throughput
-
Speed
-
Rate
-
Efficiency
Correct answer: Throughput
The throughput of a wireless network is a measurement of how quickly it effectively carries data. The actual transmission data rate will always be less than the theoretical maximum.
In networking, throughput is normally considered practical while the term speed is theoretical. The speed ratings for wireless protocols are theoretical maximums. Wireless standards define the maximum designed speeds for particular specifications. For example, IEEE 802.11n is rated for 300 Mbps.
Rate is a less specific term and does not refer specifically to how quickly a network can effectively carry data.
Efficiency does not specifically refer to the quickness of data transmission.
167.
At which stage of the structured troubleshooting methodology might it be necessary to return to an earlier step?
-
Test the theory to determine the cause.
-
Establish a theory of probable cause.
-
Identify the problem.
-
Establish a plan of action to resolve the problem and identify potential effects.
Correct answer: Test the theory to determine the cause.
In the process of testing the theory, the theory may be proven to be incorrect. If this is true, then the troubleshooter needs to return to the Identify the Problem stage of the troubleshooting methodology.
After identifying the problem, it should be possible to develop a theory about the cause, so there is no need to return to an earlier step at that point. Similarly, if a theory is proven correct, then it should be possible to create a plan to fix the issue.
168.
What is the default setting for the Maximum Transmission Unit (MTU) for an Ethernet packet?
-
1500 bytes
-
1500 bits
-
9000 bytes
-
9000 bits
Correct answer: 1500 bytes
According to the Ethernet standard, the default Maximum Transmission Unit (MTU) for a packet is 1500 bytes. Packets that exceed this size are called giants and may be dropped by systems configured to follow the standard.
The correct unit of measurement is bytes rather than bits. One byte is equivalent to eight bits. So the correct answer would be 1500 bytes rather than 1500 bits.
The MTU size is configurable, and an MTU size mismatch along a connection can cause transmission problems. MTU size is usually limited to 9000 bytes, but the potential range is much higher.
169.
Translate the following binary IP address:
11000000.10101000.00000001.00000001
-
192.168.1.1
-
192.168.1.2
-
192.168.1.0
-
10.0.1.1
Correct answer: 192.168.1.1
To convert the binary to decimal, each position of the ones needs to be added. By taking each position of the one, and then referring to the chart below, you can add the values together to get the full binary address for each octet, which leads to the full Internet Protocol (IP) address.
Using the first octet (192) as an example, you can determine whether the full binary address equals 192.168.1.1 by using the values below.
The first octet 11000000 (192) would be the equivalent of 10000000 (128) plus 01000000 (64). 128 + 64 = 192. You can do the same binary to decimal conversion with the rest of the address.
Binary Value | Decimal Value |
00000001 | 1 |
00000010 | 2 |
00000100 | 4 |
00001000 | 8 |
00010000 | 16 |
00100000 | 32 |
01000000 | 64 |
10000000 | 128 |
170.
Which of the following types of antenna radiates relatively equal power in all directions?
-
Omnidirectional
-
Parabolic
-
Yagi
-
Omniradiant
Correct answer: Omnidirectional
There are two broad classes of antennae: omnidirectional and directional (Yagi, parabolic). Omnidirectional antennae broadcast a signal in a relatively uniform direction all around. This makes them ideal for internal office or home use.
Parabolic and Yagi antennae direct the signal primarily in one direction, making them ideal for external point-to-point connections. Omniradiant is not a commonly used term for antennas.
171.
What type of attack searches for unsecured wireless networks for later attacks?
-
War driving
-
War chalking
-
WEP and WPA cracking
-
Rogue access point
Correct answer: War driving
War driving is a wireless attack in which attackers drive around and search for unsecured wireless networks.
War chalking occurs when someone creates markings in a public place to indicate an open Wi-Fi network.
Cracking of Wireless Equivalency Protocol (WEP) and Wi-Fi Protected Access (WPA) networks is often done with brute force attacks.
A rogue access point is used to try to fool people into thinking that it is a legitimate Wi-Fi router.
172.
Which of the following is NOT an advantage of Fibre Channel over iSCSI?
-
Better scalability
-
Lower latency
-
Higher performance
-
Greater reliability
Correct answer: Better scalability
Both Fibre Channel and Internet Small Computer System Interface (iSCSI) are used for Storage Area Networks (SAN). Fibre Channel has become more prevalent than iSCSI, but iSCSI remains a more scalable solution that is cheaper and easier to implement. Since iSCSI is based on Ethernet networks, it is more scalable using standard networking devices. Fibre Channel does not use Ethernet, but it can be configured for it using Fibre Channel over Ethernet (FCoE).
Compared to iSCSI, Fibre Channel offers:
- Lower latency
- Higher performance
- Greater reliability
173.
What is the LOWEST OSI layer that a router can operate at?
-
3
-
2
-
4
-
1
Correct answer: 3
A router can operate at the Open Systems Interconnection (OSI) model Layers 3 and above. This is because it performs routing based on Internet Protocol (IP) addresses, which exist at Layer 3. Routers forward and manage IP packets, which encapsulate Protocol Data Units (PDUs) from the higher layers. Routers may forward Virtual Local Area Network (VLAN) traffic from switches, but they are still operating at layer 3 when they do this.
Layer 2 is the OSI layer for switches and bridges.
Firewalls, load balancers, and gateways operate at Layer 4.
Equipment and cabling operate at Layer 1.
The seven layers of the OSI model are:
- Layer 7 - Application
- Layer 6 - Presentation
- Layer 5 - Session
- Layer 4 - Transport
- Layer 3 - Network
- Layer 2 - Data link
- Layer 1 - Physical
174.
What port is commonly used by the Secure File Transfer Protocol (SFTP)?
-
22
-
20
-
21
-
23
Correct answer: 22
Secure File Transfer Protocol (SFTP) uses Secure Shell (SSH) to transfer data, so it provides a secure platform. By design, File Transfer Protocol (FTP) does not encrypt or protect the credentials used to log in, so it's incredibly insecure. To counteract this, SFTP is used. It operates on Transmission Control Protocol (TCP) port 22.
Ports 20 and 21 are used by FTP.
Port 23 is used by telnet and insecure remote access protocol.
175.
To prevent interference, how should adjacent wireless APs be configured?
-
Using non-overlapping channels
-
Using different modulation techniques
-
Using overlapping channels
-
Using different speeds
Correct answer: Using non-overlapping channels
When two adjacent wireless Access Points (APs) are using the same channels, the result can be a lot of interference and signal loss. The solution would be to configure them on different, non-overlapping channels.
Using different modulation techniques can reduce interference by placing APs or users on different carrier frequencies.
Using APs with different speeds would not cause interference.
176.
Your Network Management System (NMS) generates alarms based on Simple Network Management Protocol (SNMP) traps sent from network devices. However, you have noticed that there have been many temperature-related alarms that do not warrant investigation.
What is the BEST solution for decreasing the number of invalid alarms?
-
Modify thresholds
-
Add thresholds
-
Delete thresholds
-
Stop thresholds
Correct answer: Modify thresholds
If the temperature alarms received do not warrant investigation, then it makes sense to modify alarm thresholds to reflect appropriate temperature ranges. Only when a device exceeds an acceptable temperature range should it trigger an environmental alarm.
Adding thresholds would not solve the problem of excessive alarms.
Deleting or stopping thresholds would eliminate alarms, but then you would not be made aware of actual temperature issues.
177.
You are troubleshooting a network connectivity issue. You have just established a theory of probable cause. What is the next step in the troubleshooting process?
-
Test the theory to determine the cause.
-
Establish a plan of action.
-
Implement a solution or escalate if necessary.
-
Document findings, actions, and outcomes.
Correct answer: Test the theory to determine the cause.
These are the basic steps in the troubleshooting process:
- Identify the problem.
- Establish a theory of probable cause.
- Test the theory to determine the cause.
- Establish a plan of action to resolve the problem.
- Implement the solution or escalate if necessary.
- Verify full system functionality.
- Document findings, actions, and outcomes.
The step after establishing a probable cause is to test the theory and determine the cause.
178.
How would you describe a security risk?
-
A potential loss or damage
-
A system weakness
-
A perceived danger
-
A method of attack
Correct answer: A potential loss or damage
The term risk in network security represents the potential for loss or damage to network resources and data. Risk assessments take into account the value of the threatened resources.
A vulnerability is a weakness in network security. It could be found in applications, systems, networks, or digital products.
A threat is a perceived danger to the network. This could come in the form of environmental hazards, malicious actors, or leaked information.
The term exploit refers to a method of attack that takes advantage of a security vulnerability. Security exploit methods might include malicious software, exploit toolkits, or a social engineering attack like shoulder surfing.
179.
Of the following, which is a characteristic of IP addresses?
-
They are considered logical addresses
-
They are technically physical addresses
-
They can be found on the Network Interface Card (NIC)
-
They cannot be determined by an "ipconfig/all" command
Correct answer: They are considered logical addresses
An IP address is a logical address.
The physical address is a Media Access Control (MAC) address, and MAC addresses are those found on the Network Interface Card (NIC).
Both MAC and IP addresses can be located via the "ipconfig/all" command.
180.
You are troubleshooting an issue with a network that involves uneven or decreased performance of network traffic in one area of the network. What is the name given to this type of issue?
-
Botteneck
-
Open
-
Short
-
Echo
Correct answer: Bottleneck
A network bottleneck occurs when certain parts of the physical network can't properly handle the traffic. This may be temporary, or it may require an upgrade of cabling or equipment.
An open circuit is a break in a wire that stops current from flowing through a cable.
A short circuit is when two wires touch that shouldn't. Since the current takes the path of least resistance, it will flow through the short rather than through the intended circuit.
When cables of different thicknesses or compositions connect, electrons may not flow uniformly between them; this can cause echo.