CompTIA Network+ (N10-009) 6 Practice Exams Set 1 Flashcards

(28 cards)

1
Q

What is Transmit Power Control (TPC) in the 802.11h standard?

A

TPC allows devices to adjust their transmitting power levels, crucial in areas with dense wireless traffic and strict regulatory oversight. It helps minimize interference by reducing power to the necessary level for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the syslog severity levels and their meanings?

A

Level 0: Emergency – system is unstable.
Level 1: Alert – immediate correction needed.
Level 2: Critical – failure in primary system application.
Level 3: Error – system functionality impacted.
Level 4: Warning – potential issues if not addressed.
Level 5: Notice – unusual events, not errors.
Level 6: Informational – normal operations, no action needed.
Level 7: Debugging – useful for developers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How much signal is required for a smartphone call and data usage?

A

At least one bar of signal is required for a phone call. For data, signal strength impacts speed; as it decreases, data speeds lower, often below 100 Kbps with one bar, insufficient for loading content like a Facebook news feed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Public Key Infrastructure (PKI) manage?

A

PKI manages digital certificates, including their issuance, revocation, and verification, providing a framework for secure communication and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Main Distribution Frame (MDF)?

A

The MDF is the central point where external access provider cables are terminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does optimizing routing paths reduce latency?

A

Optimizing routing paths selects the most efficient routes for network traffic, significantly reducing latency and improving overall network performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Clientless VPN setup?

A

A Clientless VPN allows remote users to securely access corporate resources through a web browser without installing dedicated VPN client software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Teredo in networking?

A

Teredo is a transition technology that provides full IPv6 connectivity for IPv6-capable hosts on an IPv4 network without a native IPv6 connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Access Control Lists (ACLs) used for?

A

ACLs are used to implement security rules that control the traffic allowed or denied to network devices, such as restricting access to an accounting server based on the finance department’s devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 7 steps in troubleshooting?

A
  1. Identify the problem.
  2. Establish a theory of probable cause.
  3. Test the theory.
  4. Plan the action and potential effects.
  5. Implement the solution or escalate.
  6. Verify functionality and implement preventive measures.
  7. Document findings, actions, outcomes, and lessons.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does North-South and East-West traffic refer to in a data center?

A

North-South traffic: Communication that enters or leaves the data center.
East-West traffic: Communication within the data center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the function of a NAT Gateway in a VPC?

A

A NAT Gateway allows resources in a VPC to access the internet without exposing them directly, enhancing security for private instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are wiring diagrams used for?

A

Wiring diagrams label cables to ports and, in detailed versions, show floorplans or rack diagrams, helping visualize cable runs in a physical environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the command to view the MAC address table on a Cisco switch?

A

The command is ‘show mac-address-table.’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the DNS TXT record used for?

A

The TXT record allows domain administrators to add human-readable and machine-readable data into DNS, often used for email authentication methods like SPF, DKIM, and DMARC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Power Distribution Unit (PDU)?

A

A PDU is a device with multiple outputs designed to distribute power efficiently, especially to racks of computers and networking equipment in data centers.

17
Q

What is the VXLAN Network Identifier (VNI)?

A

VNI is a 24-bit identifier that differentiates between VXLAN overlay networks, helping VXLAN endpoints route traffic correctly within the appropriate network.

18
Q

What is Variable Length Subnet Masking (VLSM)?

A

VLSM allows subnets of varying sizes within a larger network, optimizing the use of IP addresses by tailoring subnet sizes to specific needs.

19
Q

What is Security Service Edge (SSE)?

A

SSE is a network security architecture that shifts security enforcement to the cloud, protecting users and devices accessing data from distributed locations.

20
Q

What is the advantage of dynamic inventories in networking?

A

Dynamic inventories simplify network management by automatically discovering and updating devices, reducing the need for manual effort and improving accuracy.

21
Q

What is an Autonomous System Number (ASN)?

A

ASN is used to control routing in BGP, allowing network operators to define routing policies and exchange information with ISPs.

22
Q

What is Netstat used for?

A

Netstat is a network utility tool that displays network connections, routing tables, and network protocol statistics, useful for detecting suspicious activity like malware.

23
Q

What CIDR block represents 16 IP addresses?

A

A /28 CIDR block represents 16 IP addresses, as 2^4 = 16.

24
Q

What is the most secure option for using a pre-shared key without an authentication server?

A

WPA Personal is the most secure option, as it uses a pre-shared key and doesn’t require a separate authentication server.

25
How does a speed test measure your connection?
The speed test measures download and upload speeds by downloading a sample file from a server and then uploading it back, showing both download and upload rates.
26
What security method is best for a university campus with individual user authentication?
Enterprise security supports individual user authentication and is ideal for environments like universities, using an authentication server like RADIUS.
27
What is Twinaxial cabling used for?
Twinaxial cabling is similar to coaxial but with two inner conductors, commonly used in short-range high-speed applications like SATA 3.0 cables or uplinks between SFP+ modules.
28
What are RTO, RPO, MTTR, and MTBF?
RTO: Time to restore a business process after a disaster. RPO: Maximum allowable data loss during a disruption. MTTR: Average time to repair a device. MTBF: Average time between device failures.