Comptia Network+ (N10-008) Flashcards
Some of what I have found and learnt while studying (283 cards)
Generic Routing Encapsulation (GRE) is a protocol for wrapping data packets inside secondary data packets in order to set up a direct point-to-point network connection..
Which of the following extends this capability from a limited number of sites by dynamically establishing tunnels without the need to explicitly configure mapping entries?
a. GRE2
b. zGRE
c. xGRE
d. mGRE
d. mGRE
While GRE provides a secure private path for packets through a public network using a point-to-point tunnel between two sites, Multipoint Generic Routing Encapsulation (mGRE) extends this capability from a limited number of sites by dynamically establishing tunnels without the need to explicitly configure mapping entries.
The other options presented do not exist and are, thus, incorrect.
Which of the following is designed to keep the system’s uptime running in the event of a disaster?
a. High availability
b. Load balancing
c. Quality of Service
d. Caching engines
a. High availability
High availability (HA) is a component of a technology system that eliminates single points of failure to ensure continuous operations or uptime for an extended period. If a network switch or router stops operating correctly (meaning that a network fault occurs), communication through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore, network availability, called uptime, is a major design consideration for high availability networks.
A cable operator needs to transition from one cable type to another.
Which of the following would be best help?
a. MDI
b. Repeater
c. Hub
d. Media converter
d. Media converter
Where a repeater connects two cable segments of the same type, a media converter transitions from one cable type to another.
Media converters also work at Layer 1, the Physical Layer of the OSI model.
When Ethernet gets wired with a hub, there needs to be a means of distinguishing the interface on an end system with the hub. The end system interface is known as Medium Dependent Interface (MDI)
**Repeaters **overcome distance limitations by boosting the signal somewhere along the cable run. A repeater works at the physical layer (Layer 1) of the OSI model and is transparent concerning the rests of the network infrastructure.
A **Hub **acts like a multiport repeater, so that every port receives transmissions sent from any other port.
Which of the following is the IEEE specification developed to ensure interoperability of VLAN technologies from the various vendors?
a. 802.1X
b. 802.1z
c. 802.1Q
d. 802.1s
c. 802.1Q
IEEE 802.1Q is the networking standard that supports Virtual LANs (VLANs) on an Ethernet network and was developed to ensure interoperability of VLAN technologies from the various vendors.
The standard defines a system of VLAN tagging for Ethernet frames and the accompanying procedures to be used by bridges and switches in handling such frames.
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
a. A backup of a large video presentation to cloud storage for archival purposes
b. A duplication of a hosted virtual server to another physical server for redundancy
c. A download of navigation data to a portable device for offline access
d. A query from an IoT device to a cloud-hosted server for a firmware update
b. A duplication of a hosted virtual server to another physical server for redundancyis MOST likely to generate significant East-West traffic in a datacenter
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP:
IP Address: 196.26.4.30
Subnet Mask: 255.255.255.224
Gateway: 196.24.4.1
The network engineer observes that all users have lost Internet connectivity.
Which of the following describes the issue?
a. The incorrect subnet mask was configured
b. The incorrect gateway was configured
c. The incorrect IP address was configured
d. The incorrect interface was configured
a. The incorrect subnet mask was configured
A CIDR of /26 would give a subnet of 255.255.255.192
In a crossover cable, which wire is wire 1 crossed with?
a. 4
b. 5
c. 3
d. 2
c. 3
In a crossover cable, wires 1 and 3 and wires 2 and 6 are crossed.
After a recent breach, the security technician decides to aggregate and analyse its security logs. Which system should be used?
a. Event log
b. Syslog
c. SIEM
d. SNMP
c. SIEM
Security information and event management (SIEM) is a term for software products and services combining security information management (SIM) and security event management (SEM).
A SIEM can consolidate syslog, SNMP, and event log data into a single repository. Security logs can be analysed and aggregated.
What speed and frequency does Wireless standard 802.11n have?
802.11n:
- 74Mbs-600Mbs
- 2.4GHz & 5GHz
A network technician has set up a link where the cable length exceeds the distance limitation and may not achieve the required speed or be unreliable. What should the network technician use in this case?
a. Media Converter
b. Repeater
c. MDI
d. Hub
b. Repeater
A repeater works at the physical layer (Layer 1) of the OSI model and overcomes distance limitations by boosting the signal somewhere along the cable run.
a. Media Converter
Where a repeater connects two cable segments of the same type, a media converter transitions from one cable type to another. Media converters also work at the Physical Layer of the OSI model.
c. MDI
When Ethernet gets wired with a hub, there needs to be a means of distinguishing the interface on an end system with the hub. The end system interface is known as Medium Dependent Interface (MDI).
d. Hub
A hub acts like a multiport repeater so that every port receives transmissions sent from any other port.
What is the network ID associated with the host located at 205.12.35.26/27?
a. 205.12.35.32
b. 205.12.35.48
c. 205.12.35.0
d. 205.12.35.16
c. 205.12.35.0
In classless subnets using variable length subnet mask (VLSM), the network ID is the first IP address associated within an assigned range. In this example, the CIDR notation is /27, so each subnet will contain 32 IP addresses.
This means that there eight networks in this class C range: 205.12.35.0, 205.12.35.32, 205.12.35.64, 205.12.35.96, 205.12.35.128, 205.12.35.160, 205.12.35.196, and 205.12.35.224.
Since the IP address provided is 205.12.35.26, it will be in the 205.12.35.0/27 network.
At which layer of the OSI model does STP operate?
a. Transport
b. Session
c. Data link
d. Presentation
c. Data link
Protocols and technologies such as Spanning Tree Protocol (STP) operate at the data link layer.
What type of connector is this?
a. MTRJ Connector.
b. RJ-45
c. SC (Subscriber Connector)
d. LC (Lucent Connector)
e. FC (Ferrule Core Connector)
f. RJ-11
g.ST (Straight Tip Connector)
d. LC (Lucent Connector)
The LC Connectors have a flange on top, similar to an RJ-45 connector that aids secure connection.
This week, you’ve been assigned to help solve connectivity problems between the home office and several remote locations. What type of legacy device provides serial communication capabilities across phone lines?
a. A router
b. A modem
c. PBX
d. A switch
b. A modem
A traditional modem provides serial communication capabilities across phone lines.
aA helpdesk technician is reviewing the network layout in various areas. What is the purpose of subnetting?
A. Layer 2 tracking
b. Layer 3 segments
c. Port security
d. Flow control
b. Layer 3 segments
Subnetting creates Layer 3 broadcast domain segments with fewer hosts.
A network administrator updated an internet server to evaluate some new features in the current release. A week after the update, the internet server vendor warns that the latest release may have introduced a new vulnerability, and a patch is not available for it yet.
Which of the following should the administrator do to mitigate the risk?
a. Utilize WAF to restrict the malicious activity to the internet server
b. Downgrade the server and defer the new feature testing
c. Enable the host-based firewall on the internet server
d. Enable HIPS to protect the server until the patch is released
c. Enable the host-based firewall on the internet server
Enabling the host-based firewall adds an additional layer of protection to the server by controlling incoming and outgoing network traffic based on a set of predefined rules. This can help in restricting access to vulnerable services or applications on the server, reducing the potential impact of the identified vulnerability.
Utilize WAF (Web Application Firewall) A WAF is generally used to protect web applications from various attacks. While it adds security, it might not directly address vulnerabilities introduced by the specific update on the internet server.
Downgrade the server and defer the new feature testing: While downgrading may temporarily remove the new feature, it might not be a feasible or recommended solution, especially if the new feature is essential or brings significant improvements.
Enable HIPS (Host-based Intrusion Prevention System) to protect the server: HIPS can provide additional security by monitoring and preventing malicious activities on the host. However, enabling the host-based firewall is a more specific and targeted measure in response to a known vulnerability.
In summary, enabling the host-based firewall is a proactive step to mitigate the risk until a patch becomes available.
What are the meanings of cloud basics:
A. Elasticity
B. Scalability
C. Multi-tenancy?
A. Elasticity is the ability to increase or decrease resources based on the demand of the your applications, services etc.
B. Scalability enables quickly increasing resources without the investment of more on-site hardware by utilizing the cloud’s resources.
C. Multi-tenancy refers to a cloud provider’s ability to host multiple tenants on the same infrastructure.
Which type of media is used to connect telecommunication rooms, server rooms, and remote locations and offices?
a. Vertical
b. Tracer
c. PLC
d. Plenum
a. Vertical
Vertical cable, or backbone cable, refers to the media used to connect telecommunication rooms, server rooms, and remote locations and offices.
Plenum cable is used in the space between the structural ceiling and a drop-down ceiling.
PLC and Tracer are fictitious choices.
A network technician wants to upgrade the company’s hub to avoid collisions.
Which solution would help the technician accomplish this to the fullest extent?
a. Router
b. Switch.
c. Bridge
d. Hub
b. Switch
An Ethernet Layer 2 Switch performs a similar function as a bridge, but in a more granular way, and for many more ports than bridges support. Each switch port is a separate collision domain.
The router’s other interfaces divide the network into 3 logical subnetworks. These subnets map to Layer 2 segments, each implemented using a Switch.
An Ethernet **bridge **works at the Data Link Layer (Layer 2), establishing separate physical network segments while keeping all nodes in the same logical network, reducing the number of collisions
Hubs have no configuration options. The technician connects the device to a power source and then connects the network cables for the hosts, becoming part of the network segment served by the hub.
What is SIEM?
Security Information and Event Management (SIEM)
SIEM gathers logs and data from all sorts of different systems.
It provides real-time or near real-time analysis of security alerts generated by network hardware and applications
What are Hash values used for?
Hashes values are used for verifying data, not for encryption.
Hash values are always fixed in size
Two common hashes are MD5 and SHA-1
A hash function is any function that can be used to map data of arbitrary size to fixed-size values, though there are some hash functions that support variable length output. The values returned by a hash function are called hash values, hash codes, digests, or simply hashes
What might be an example of a network metric?
A. Bandwidth Usage
B. Memory Timings
C. CPU Usage
D. Dropped Packets
A. Bandwidth Usage
Bandwidth usage is very important when determining if your network is running at optimal performance.
Memory timings and CPU usage are more of a local hardware issue.
Dropped packets is something left from pinging another device.
A User moves seamlessly between access points when walking between two campus buildings. Which of the following provides this functionality?
a. Cellular Roaming
b. MU-MIMO
c. ESSID
d. CSMA/CA
e. WPA3
c. EESID
Extended Service Set Identification (ESSID)
Mesh WiFi uses standards (such as 802.11s) where the mesh topology is more complex and the repeaters or access points are all part of the same ESSID (Extended Service Set Identification) which provides a seamless connection.
Which of the following DNS record types is a pointer to the canonical name, which is used to perform a reverse DNS lookup?
a. NS
b. PTR
c. CNAME
d. MX
b. PTR
A PTR record is a pointer to the canonical name, which is used to perform a reverse DNS lookup, in which case the name is returned when the query originates with an IP address.