CompTIA Network+ (N10-009) 6 Practice Exams Set 1 Flashcards
(28 cards)
What is Transmit Power Control (TPC) in the 802.11h standard?
TPC allows devices to adjust their transmitting power levels, crucial in areas with dense wireless traffic and strict regulatory oversight. It helps minimize interference by reducing power to the necessary level for communication.
What are the syslog severity levels and their meanings?
Level 0: Emergency – system is unstable.
Level 1: Alert – immediate correction needed.
Level 2: Critical – failure in primary system application.
Level 3: Error – system functionality impacted.
Level 4: Warning – potential issues if not addressed.
Level 5: Notice – unusual events, not errors.
Level 6: Informational – normal operations, no action needed.
Level 7: Debugging – useful for developers.
How much signal is required for a smartphone call and data usage?
At least one bar of signal is required for a phone call. For data, signal strength impacts speed; as it decreases, data speeds lower, often below 100 Kbps with one bar, insufficient for loading content like a Facebook news feed.
What does Public Key Infrastructure (PKI) manage?
PKI manages digital certificates, including their issuance, revocation, and verification, providing a framework for secure communication and authentication.
What is the Main Distribution Frame (MDF)?
The MDF is the central point where external access provider cables are terminated.
How does optimizing routing paths reduce latency?
Optimizing routing paths selects the most efficient routes for network traffic, significantly reducing latency and improving overall network performance.
What is a Clientless VPN setup?
A Clientless VPN allows remote users to securely access corporate resources through a web browser without installing dedicated VPN client software.
What is Teredo in networking?
Teredo is a transition technology that provides full IPv6 connectivity for IPv6-capable hosts on an IPv4 network without a native IPv6 connection.
What are Access Control Lists (ACLs) used for?
ACLs are used to implement security rules that control the traffic allowed or denied to network devices, such as restricting access to an accounting server based on the finance department’s devices.
What are the 7 steps in troubleshooting?
- Identify the problem.
- Establish a theory of probable cause.
- Test the theory.
- Plan the action and potential effects.
- Implement the solution or escalate.
- Verify functionality and implement preventive measures.
- Document findings, actions, outcomes, and lessons.
What does North-South and East-West traffic refer to in a data center?
North-South traffic: Communication that enters or leaves the data center.
East-West traffic: Communication within the data center.
What is the function of a NAT Gateway in a VPC?
A NAT Gateway allows resources in a VPC to access the internet without exposing them directly, enhancing security for private instances.
What are wiring diagrams used for?
Wiring diagrams label cables to ports and, in detailed versions, show floorplans or rack diagrams, helping visualize cable runs in a physical environment.
What is the command to view the MAC address table on a Cisco switch?
The command is ‘show mac-address-table.’
What is the DNS TXT record used for?
The TXT record allows domain administrators to add human-readable and machine-readable data into DNS, often used for email authentication methods like SPF, DKIM, and DMARC.
What is a Power Distribution Unit (PDU)?
A PDU is a device with multiple outputs designed to distribute power efficiently, especially to racks of computers and networking equipment in data centers.
What is the VXLAN Network Identifier (VNI)?
VNI is a 24-bit identifier that differentiates between VXLAN overlay networks, helping VXLAN endpoints route traffic correctly within the appropriate network.
What is Variable Length Subnet Masking (VLSM)?
VLSM allows subnets of varying sizes within a larger network, optimizing the use of IP addresses by tailoring subnet sizes to specific needs.
What is Security Service Edge (SSE)?
SSE is a network security architecture that shifts security enforcement to the cloud, protecting users and devices accessing data from distributed locations.
What is the advantage of dynamic inventories in networking?
Dynamic inventories simplify network management by automatically discovering and updating devices, reducing the need for manual effort and improving accuracy.
What is an Autonomous System Number (ASN)?
ASN is used to control routing in BGP, allowing network operators to define routing policies and exchange information with ISPs.
What is Netstat used for?
Netstat is a network utility tool that displays network connections, routing tables, and network protocol statistics, useful for detecting suspicious activity like malware.
What CIDR block represents 16 IP addresses?
A /28 CIDR block represents 16 IP addresses, as 2^4 = 16.
What is the most secure option for using a pre-shared key without an authentication server?
WPA Personal is the most secure option, as it uses a pre-shared key and doesn’t require a separate authentication server.