CompTIA N10-007 Network+ 100-Question Practice Exam Developed for www.GetCertified4Less.com (Author to remain anonymous) This practice exam has been developed exclusively for GetCertif4Less.Com. Answers and explanations on last pages. 1. Which of the answers listed below refers to a secure replacement for Telnet? A. ICMP B. FTP C. IPv6 D. SSH 2. Which of the following answers refers to a protocol used in network management systems to monitor network-attached devices? A. SIP B. SNMP C. NetBIOS D. RTP 3. Network cabling, hubs, and repeaters can be found at which OSI layer? A. Physical layer B. Layer 3 C. Session layer D. Application layer 4. Switches and MAC addresses are defined at which of the OSI layers? A. Data link layer B. Layer 4 C. Application layer D. Layer 1 5. Which of the following devices operates at Layer 3 of the OSI model? A. Passive hub B. Switch C. Router D. Active hub 6. The largest data unit expressed in bytes which may be sent over a network link is referred to as: A. QoS B. MX C. Hop count D. MTU 7. Data from multiple VLANs on a single switch is carried through a single network link between switches. This is often referred to as: (Select two answers) A. Routing B. Trunking C. VLAN multiplexing D. Tunneling E. Load balancing 8. What is PoE? A. Media converter type B. Another term for Wireless Access Point (WAP) C. Technology that allows for supplying electrical power over Ethernet cable D. Another term for Private Branch Exchange (PBX) system 9. A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is known as: A. VPN B. Access Point (AP) C. VLAN D. DMZ 10. An IPv6 address consists of: A. 32 bits B. 48 bits C. 64 bits D. 128 bits 11. A double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to help make the address shorter. A. True B. False 12. An IP address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service? A. DNS B. SNMP C. SMTP D. DHCP 13. Which of the following is an example of an APIPA address? A. 127.0.0.1 B. 192.168.0.3 C. 169.254.10.20 D. 65.55.57.27 14. IEEE 802.11 is a set of standards for implementing: A. Ethernet B. WiMAX C. WLANs D. Bluetooth 15. In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network). A. True B. False 16. Personal Area Network (PAN) over Bluetooth is known as: A. Intranet B. Piconet C. Extranet D. Ethernet 17. Which of the answers listed below refer(s) to the characteristic feature(s) of the IEEE 802.11a wireless standard amendment? (Select all that apply) A. Maximum data signaling rate of 54 Mbps B. 5.0 GHz frequency band C. CSMA/CA network access method D. 2.4 GHz frequency band E. Maximum data signaling rate of 11 Mbps F. CSMA/CD network access method 18. Which of the following answers list(s) the feature(s) of the IEEE 802.11b wireless standard amendment? (Select all that apply) A. Maximum data signaling rate of 54 Mbps B. 5.0 GHz frequency range C. CSMA/CD network access method D. 2.4 GHz frequency range E. Maximum data signaling rate of 11 Mbps F. CSMA/CA network access method 19. What are the characteristics of the IEEE 802.11g wireless standard amendment? (Select all that apply) A. CSMA/CD network access method B. Maximum data signaling rate of 54 Mbps C. CSMA/CA network access method D. 2.4 GHz frequency range E. Maximum data signaling rate of 11 Mbps F. 5.0 GHz frequency range 20. The characteristic features of the IEEE 802.11n wireless standard amendment include: (Select all that apply) A. Multiple Input / Multiple Output (MIMO) B. Maximum data signaling rate of 54 Mbps C. 2.4 GHz frequency band D. CSMA/CD network access method E. 5.0 GHz frequency band F. Multi-User Multiple Input / Multiple Output (MU-MIMO) G. Maximum data signaling rate of 600 Mbps H. CSMA/CA network access method 21. Which of the following answers refers(s) to the feature(s) of the IEEE 802.11ac wireless standard amendment? (Select all that apply) A. Data signaling rate of up to 600 Mbps B. 5.0 GHz frequency band C. CSMA/CD network access method D. CSMA/CA network access method E. Multi-User Multiple Input / Multiple Output (MU-MIMO) F. 2.4 GHz frequency band 22. Frequency ranges used in 802.11 networks include: (Select 2 answers) A. 2.4 GHz B. 54 Mbps C. 11 GHz D. 2.4 MHz E. 5.0 GHz 23. Which of the following acronyms refers to a technology utilizing multiple antennas at both the transmitter and receiver to increase wireless bandwidth and range? A. OSPF B. MIMO C. ISAKMP D. MMF 24. A cloud computing infrastructure type where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers is called: A. Thick client B. SaaS C. Virtualization D. IaaS 25. Which of the following cloud service types would provide the best solution for a web developer intending to create a web app? A. SaaS B. API C. PaaS D. IaaS 26. In which of the cloud computing infrastructure types, clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment? A. IaaS B. SaaS C. P2P D. PaaS 27. DNS database AAAA record identifies: A. Mail server B. IPv4 address C. Canonical name D. IPv6 address 28. Which of the following DNS database records maps a domain name to a list of mail servers for that domain? A. AAAA B. MX C. PTR D. CNAME E. A 29. Which of the DNS database records listed below allows multiple domain names to resolve to the same IP address? A. MX B. CNAME C. AAAA D. PTR E. A 30. A range of IP addresses assigned to hosts requesting dynamic IP address from a DHCP server is known as: A. DHCP relay B. Lease C. Scope D. Reservation 31. The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as: A. Option B. Reservation C. Scope D. Lease 32. Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent. A. True B. False 33. UTP cabling falls into the category of: A. Multimode fiber-optic cabling B. Single-mode fiber-optic cabling C. Twisted-pair cabling D. Coaxial cabling 34. Which of the following cabling types are used in optical-fiber communication links? (Select 2 answers) A. Multimode B. RG-6 C. Shielded Twisted Pair (STP) D. RG-59 E. Unshielded Twisted Pair (UTP) F. Single-mode 35. A type of cabling coated with a fire-retardant jacket placed in the space between dropped ceiling and structural ceiling is called: A. UTP cabling B. Plenum C. Multimode cabling D. Non-plenum 36. Which of the statements listed below are true? (Select 2 answers) A. RJ-45 is used with twisted-pair cabling B. RJ-45 connects the cable to the phone outlet C. RJ-45 is used with fiber-optic cabling D. RJ-45 connects the cable to the network adapter 37. Which of the following connector types is used with coaxial cabling? A. MT-RJ B. LC C. BNC D. ST 38. Which of the following connectors are used with optical fiber cabling? (Select all that apply) A. ST B. SC C. DB-9 D. LC E. DB-25 39. The 66 block (used in telephone systems) and the 110 block (used in computer networks) are examples of punch-down blocks used for connecting sets of wires. A. True B. False 40. The maximum cable segment length for Cat 5e cable is: A. 25 meters B. 50 meters C. 100 meters D. 250 meters 41. What is the minimum cabling requirement for a 10 Gbps connection over copper twisted-pair? A. Cat 5 B. Cat 5e C. Cat 6 D. Cat 6a 42. The Category 6 (Cat 6) cabling supports 10 Gbps data transfer rate at a limited range of up to 55 meters, whereas Cat 6A (Augmented Category 6) cabling allows for 10 Gbps data transfer rate over a standard cable segment length of 100 meters. A. True B. False 43. Which of the answers listed below refer to copper cabling termination specifications? (Select 2 answers) A. T568A xxx B. IEEE 802.3ab C. T568B xxx D. IEEE 802.3af 44. Which of the following are the characteristics of 10GBaseT Ethernet? (Select all that apply) A. Cat 6a cabling B. RJ-45 connectors C. Multimode fiber D. CAT 5e cabling E. 802.3an 45. What type of device allows for connecting copper and fiber-optic cabling? A. Multilayer switch B. 56k modem C. Media converter D. TDR 46. A device that apart from the function of an ordinary Layer 2 network switch can also provide additional functions at higher levels of the OSI reference model (e.g. routing at Layer 3) is referred to as a multilayer switch. A. True B. False 47. In computer networks, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as: A. DHCP relay B. Web server C. VPN concentrator D. Proxy 48. Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection? A. MTU B. STP C. UTM D. XM 49. A software application used to manage multiple guest operating systems on a single host system is called: A. ICS server B. Hypervisor C. UC server D. Virtual switch 50. Which of the following acronyms refers to a dedicated storage appliance that can be added to a local network? A. SPS B. NAS C. SAN D. NFS 51. Which of the answers listed below refers to a dedicated local network consisting of devices providing data access? A. VLAN B. SAN C. iSCSI D. NAS 52. A single non-standard Ethernet frame that allows for larger maximum payload size is commonly referred to as: A. Magic packet B. Jumbo frame C. MTU black hole D. Ping of death 53. T1 lines support data transfer rates of up to: A. 1.544 Mbps B. 2.048 Mbps C. 34.368 Mbps D. 44.736 Mbps 54. What is the speed of an E3 line? A. 1.544 Mbps B. 2.048 Mbps C. 34.368 Mbps D. 44.736 Mbps 55. What is the most common type of a DSL Internet access? A. VDSL B. ADSL C. SDSL D. UDSL 56. What are the characteristic features of satellite Internet connections? (Select all that apply) A. Lack of signal interference B. Signal latency C. High connection speed D. Interference (weather dependent) E. Low connection speed 57.Which of the following solutions enables use of different types of network protocols on the same network? A. LWAPP B. MPLS C. MLPPP D. MIBS 58. A physical point where an ISP's network ends and connects with the customer's on-premises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is commonly referred to as demarcation point, or demarc in short. A. True B. False 59. A device providing remote line diagnostics capability placed at the joining point between an ISP's line and customer's premises wiring is known as: A. Smart jack B. UTM appliance C. Demarc D. Line tester 60. Logical network diagram is a document that describes the detailed layout of a building and the way devices are connected to the network through the actual cabling that transmits data. A. True B. False 61. A network device designed for managing the optimal distribution of workloads across multiple computing resources is called: A. Layer 3 switch B. Access Point (AP) C. Load balancer D. Domain controller 62. Which of the following backup site types allows for fastest disaster recovery? A. Cold site B. Warm site C. Alternate site D. Hot site 63. A cold site is the most expensive type of backup site for an organization to operate. A. True B. False 64. Restoring data from an incremental backup requires: (Select 2 answers) A. Copy of the last incremental backup B. All copies of differential backups made since the last full backup C. Copy of the last differential backup D. All copies of incremental backups made since the last full backup E. Copy of the last full backup 65. Which of the following terms is used to describe an average time required to repair a failed component or device? A. MTBF B. MTU C. MTTR D. MPLS 66. Vulnerability scanning: (Select all that apply) A. Identifies lack of security controls B. Actively tests security controls C. Identifies common misconfigurations D. Exploits vulnerabilities E. Passively tests security controls 67. Which of the acronyms listed below refers to a technology that allows for real-time analysis of security alerts generated by network hardware and applications? A. LACP B. DSCP C. SIEM D. LWAPP 68. A type of repository associated with SNMP used for storing and managing details about monitored devices is known as: A. KVM B. DMI C. MIB D. RDP 69. A system that uses public network (such as Internet) as a means for creating private encrypted connections between remote locations is called: A. Dialup B. WAN C. VPN D. SOHO 70. Which of the VPN connection types listed below typically doesn't require a dedicated VPN client application? (Select all that apply) A. SSL VPN B. Site-to-site C. PSTN D. Host-to-host 71. A network technician uses an RDP client on their Windows OS in order to remotely troubleshoot a problem on another Windows machine. Which of the following ports needs to be opened for the built-in Windows RDP server to allow this type of network connection? A. 1701 B. 139 C. 3389 D. 110 72. Apart from providing the ability to log in remotely and execute commands on a remote host, SSH is also used for secure file transfer through the SSH-based protocols such as SSH File Transfer Protocol (SFTP) or Secure Copy (SCP). A. True B. False 73. A software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of a corporate network are referred to as: A. AUP B. DLP C. UAT D. LTO 74. Which of the following acronyms refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices to access privileged company information and applications? A. BSOD B. BYOD C. JBOD D. BYOB 75. Which of the acronyms listed below refers to a set of rules enforced in a network that restrict the use to which the network may be put? A. OEM B. AUP C. UAT D. ARO 76. A set of physical characteristics of the human body that can be used for identification and access control purposes is known as: A. Biometrics B. Physical security C. RFID badge D. Physical token 77. Which of the following solutions provide(s) the AAA functionality? (Select all that apply) A. MSCHAP B. RADIUS C. PPTP D. TACACS+ 78. An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as: A. SSO B. TLS C. SSL D. WAP 79. Which of the following is an example of a multifactor authentication? A. Password and biometric scan B. User name and PIN C. Smart card and identification badge D. Iris and fingerprint scan 80. 802.1x is an IEEE standard defining: A. Token ring networks B. Port-based network access control C. VLAN tagging D. Wireless networking 81. A network access control method whereby the 48-bit address assigned to each network card is used to determine access to the network is known as: A. EMI shielding B. Hardware lock C. MAC filter D. Quality of Service (QoS) 82. Which of the following answers refers to a solution allowing administrators to block Internet access for users until they perform required action? A. Access logs B. Mantrap C. Post-admission NAC D. Captive portal 83. Which wireless encryption scheme offers the highest level of protection? A. WEP B. WPA2 C. WAP D. WPA 84. Which of the following attacks uses multiple compromised computer systems against its target? A. DoS B. Botnet C. Logic bomb D. DDoS 85. The practice of obtaining confidential information by manipulating or deceiving people is known as: A. Social engineering B. Authentication C. Spyware D. Hacking 86. Which of the terms listed below refers to a rogue access point? A. Computer worm B. Backdoor C. Evil twin D. Trojan horse 87. The term war driving refers to: A. Penetration test B. Scanning for unsecured wireless networks while driving in a car C. Vulnerability scan D. Marking unsecured wireless networks 88. An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack. A. True B. False 89. A protocol that provides protection against switching loops is called: A. UTP B. SSH C. STP D. HMAC 90. A lightly protected subnet placed on the outside of the company's firewall consisting of publicly available servers is known as: A. VPN B. Access Point (AP) C. VLAN D. DMZ 91. Which of the following provide the means for checking data integrity? (Select two answers) A. WEP B. CHAP C. SHA-1 D. WPA2 E. MD5 92. A monitored host or network specifically designed to detect unauthorized access attempts is known as: A. Botnet B. Rogue access point C. Honeypot D. Flood guard 93. Which of the following actions should be the first step in the troubleshooting process? A. Establishing a theory of probable cause B. Implementing the solution C. Identifying the problem D. Establishing a plan of action to resolve the problem 94. Once a plan of action to resolve a problem has been established, the next step in the troubleshooting methodology process is to: A. Test the theory to determine cause B. Question users C. Implement the solution D. Establish a theory of probable cause 95. According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed: A. After documenting findings, actions and outcomes B. As the first step of the troubleshooting process C. After implementing the solution D. As the last step of the troubleshooting process 96. The very last step of the troubleshooting process involves documenting findings, actions, and outcomes. This step comes after verification of full system functionality and implementation of applicable preventative measures. A. True B. False 97. Which of the following tools would be the best for attaching RJ-45 connector to the end of a twistedpair Ethernet cable? A. Punchdown tool B. Cable crimpers C. Cable certifier D. Needle-nose pliers 98. A type of tool used for attaching cables to a patch panel is known as: A. Crimper B. Toner probe C. Punchdown tool D. Cable tester 99. Which of the tools listed below would be used for locating faults and breaks in fiber-optic cabling? A. Loopback adapter B. OTDR C. Multimeter D. TDR 100. Netstat is a command-line utility used for: A. Testing the reachability of a remote host B. Displaying intermediary points on the packet route C. Checking the TCP/IP configuration details D. Displaying active TCP/IP connections ANSWERS 1. Answer: D. SSH Explanation: Secure Shell (SSH) is a tunneling protocol for secure remote login and other secure network services designed as a replacement for Telnet and other insecure remote shells. SSH is based on a clientserver model and runs by default on TCP port 22. 2. Answer: B. SNMP Explanation: Simple Network Management Protocol (SNMP) is a UDP-based, Application Layer protocol used in network management systems to monitor network-attached devices. SNMP is typically integrated into most modern network infrastructure devices such as routers, bridges, switches, servers, printers, copiers, fax machines, and other network-attached devices. An SNMP-managed network consists of three key components: a managed device, a network-management software module that resides on a managed device (Agent), and a network management system (NMS) which executes applications that monitor and control managed devices and collect SNMP information from Agents. The manager receives notifications (Traps and InformRequests) on UDP port 162. The SNMP Agent receives requests on UDP port 161. All SNMP-compliant devices include a virtual database called Management Information Base (MIB) containing information about configuration and state of the device that can be queried by the SNMP management station. 3. Answer: A. Physical layer Explanation: Network cabling, hubs, and repeaters can be found at the Physical layer (Layer 1) of the OSI model. 4. Answer: A. Data link layer Explanation: Switches handle network traffic based on Media Access Control (MAC) addresses. Both, switches and MAC addresses are terms that are defined at the Data link layer (Layer 2) of the OSI model. 5. Answer: C. Router Explanation: Routers operate at Layer 3 (Network layer) of the OSI model. Switches operate at Layer 2 (Data link layer) of the OSI model. Hubs operate at Layer 1 (Physical layer) of the OSI model. 6. Answer: D. MTU Explanation: The largest data unit expressed in bytes which may be sent over a network link is also referred to as Maximum Transmission Unit (MTU). MTU values may vary depending on the protocol used; an Ethernet frame for example has the MTU set to 1500 bytes. 7. Answers: B and C. Trunking and VLAN multiplexing Explanation: Data from multiple VLANs on a single switch is carried through a single network link between switches. This is often referred to as "trunking" or "VLAN multiplexing", and each of the switches has a special port (trunk port) configured to pass all the data, regardless of the VLAN number, between all switches on a LAN. To allow for multiple VLANs on one link, frames from individual VLANs must be identified. The most common and preferred method, IEEE 802.1Q, adds a tag to the Ethernet frame header labeling it as belonging to a certain VLAN. 8. Answer: C. Technology that allows for supplying electrical power over Ethernet cable Explanation: Technology that allows for supplying electrical power over Ethernet cable is also known as Power over Ethernet (PoE). 9. Answer: D. DMZ Explanation: In the context of computer security, the term Demilitarized Zone (DMZ) refers to a lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall. 10. Answer: D. 128 bits Explanation: An IPv6 address consists of 128 bits compared to 32 bits in IPv4. IPv6 addresses are written in eight groups of four hexadecimal digits separated by colons (IPv4 addresses are made of four groups of decimal digits separated by dots). 11. Answer: A. True Explanation: Double colon in an IPv6 address indicates that part of the address containing only zeroes has been compressed to help make the address shorter. 12. Answer: D. DHCP Explanation: An IP address in the range 169.254.0.1 through 169.254.255.254 indicates that a DHCP service is not available. IP address in the range 169.254.x.x is also known as Automatic Private IP Address (APIPA). Auto configuration with APIPA is a feature of Windows operating systems. Windows clients configured with APIPA can communicate only within a private network and cannot send data on the Internet. 13. Answer: C. 169.254.10.20 Explanation: Automatic Private IP Addressing (APIPA) allows a Windows host to self-configure an IP address and subnet mask when Dynamic Host Configuration Protocol (DHCP) is unavailable. APIPA uses an address block range between 169.254.0.0 and 169.254.254.255. APIPA-assigned addresses are valid only for communications within a network segment that a host is connected to (a host with APIPAassigned address cannot connect to the Internet). 14. Answer: C. WLANs Explanation: IEEE 802.11 is a set of standards for implementing Wireless Local Area Networks (WLANs). 15. Answer: A. True Explanation: In terms of size and reach, a Metropolitan Area Network (MAN) can be placed between a LAN (smaller type of network) and a WAN (larger type of network). 16. Answer: B. Piconet Explanation: Personal Area Network (PAN) over Bluetooth is known as piconet. 17. Answers: A, B and C. Maximum data signaling rate of 54 Mbps, 5.0 GHz frequency band, and CSMA/CA network access method Explanation: The characteristic features of the IEEE 802.11a wireless standard amendment include maximum data signaling rate of 54 Mbps, 5.0 GHz frequency band used by the 802.11a devices, and Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method. 18. Answers: D, E, and F. 2.4 GHz frequency range, Maximum data signaling rate of 11 Mbps, and CSMA/CA network access method Explanation: The IEEE 802.11b wireless standard amendment features 2.4 GHz frequency range available for 802.11b devices, maximum data signaling rate of 11 Mbps, and Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method. 19. Answers: B, C, and D. Maximum data signaling rate of 54 Mbps, CSMA/CA network access method, and 2.4 GHz frequency range Explanation: The characteristics of the IEEE 802.11g wireless standard amendment include maximum data signaling rate of 54 Mbps, Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method, and 2.4 GHz frequency range. 20. Answers: A, C, E, G, and H. Multiple Input / Multiple Output (MIMO), 2.4 GHz frequency band, 5.0 GHz frequency band, Maximum data signaling rate of 600 Mbps, and CSMA/CA network access method Explanation: The characteristic features of the IEEE 802.11n wireless standard amendment include the Multiple Input / Multiple Output (MIMO) technology, either 2.4 GHz or 5.0 GHz frequency band that can be used by 802.11n-compliant devices, maximum data signaling rate of 600 Mbps, and Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method. 21. Answers: B, D, and E. 5.0 GHz frequency band, CSMA/CA network access method, and Multi-User Multiple Input / Multiple Output (MU-MIMO) Explanation: The IEEE 802.11ac wireless standard amendment features 5.0 GHz frequency band for 802.11ac-compliant devices, Carrier Sense Multiple Access / Collision Avoidance (CSMA/CA) network access method, and the Multi-User Multiple Input / Multiple Output (MU-MIMO) technology. 22. Answers: A and E. 2.4 GHz and 5.0 GHz Explanation: 802.11 networks (WLANs) operate in 2.4 GHz and 5.0 GHz frequency ranges. 23. Answer: B. MIMO Explanation: Multiple-input and multiple-output (MIMO) is a technology utilizing multiple antennas at both the transmitter and receiver in order to increase wireless bandwidth and range. 24. Answer: B. SaaS Explanation: Software as a Service (SaaS) is a type of cloud computing infrastructure where applications are hosted over a network (typically Internet) eliminating the need to install and run the software on the customer's own computers and simplifying maintenance and support. Compared to conventional software deployment which requires licensing fee and often investment in additional hardware on the client side, SaaS can be delivered at a lower cost by providing remote access to applications and pricing based on monthly or annual subscription fee. 25. Answer: C. PaaS Explanation: Platform as a Service (PaaS) is a category of cloud computing services providing cloudbased application development tools, in addition to services for testing, deploying, collaborating on, hosting, and maintaining applications. 26. Answer: A. IaaS Explanation: Infrastructure as a Service (IaaS) is one of the cloud computing infrastructure types in which clients, instead of buying all the hardware and software, purchase computing resources as an outsourced service from suppliers who own and maintain all the necessary equipment. The clients usually pay for computational resources on a per-use basis. In IaaS, cost of the service depends on the amount of consumed resources. 27. Answer: D. IPv6 address Explanation: AAAA is one of the DNS record types and identifies an IPv6 address. 28. Answer: B. MX Explanation: A type of DNS database record that maps a domain name to a list of mail servers for that domain is called MX. 29. Answer: B. CNAME Explanation: The CNAME DNS database record allows for resolving multiple domain names to the same IP address. 30. Answer: C. Scope Explanation: A range of IP addresses assigned to hosts requesting dynamic IP address from a DHCP server is known as DHCP scope. The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as DHCP lease. Permanent IP address assignment from a DHCP server is known as reservation. 31. Answer: D. Lease Explanation: The duration of time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as DHCP lease. 32. Answer: A. True Explanation: Networked clients not residing on the same subnet as the DHCP server can still obtain an IP address from the server through a DHCP relay agent. 33. Answer: C. Twisted-pair cabling Explanation: Unshielded Twisted-Pair (UTP) cabling falls into the category of twisted-pair copper cabling. UTP cable consists of eight wires grouped into pairs. Each wire is covered by an insulating material, and wires in each pair are twisted around each other to reduce signal interference from adjacent wire pairs (effect known as crosstalk). The other type of twisted-pair copper cabling is Shielded Twisted Pair (STP). The difference between the two is that STP cables take advantage of additional protective cover that allows for reducing signal interference from outside sources. The general category of copper cabling used in computer networks also includes third type of copper cabling called coaxial cabling, or coax in short. 34. Answers: A and F. Multimode and Single-mode Explanation: Cabling types used in optical-fiber communication links include single-mode and multimode fiber-optic cabling. Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) are copper cabling types. RG-6 and RG-59 are two types of coaxial copper cabling. 35. Answer: B. Plenum Explanation: The term "Plenum" refers to an enclosed space used for airflow, such as the one between a dropped ceiling and the structural ceiling in a building. Cabling coated with a fire-retardant jacket placed in this space is called plenum-rated cabling. Plenum-rated cabling must meet special requirements so that it doesn't catch on fire easily. 36. Answers: A and D. RJ-45 is used with twisted-pair cabling and RJ-45 connects the cable to the network adapter Explanation: RJ-45 (Registered Jack 45) is a type of twisted-pair copper cabling connector used in Ethernet networks. Registered Jack is a series of standardized connectors and wiring patterns. RJ-45 is one of the two RJ connectors mentioned in the N10-007 exam objectives. Another one, called RJ-11, is smaller in size and can be found on telephones and telephone sockets. 37. Answer: C. BNC Explanation: Bayonet Neill–Concelman (BNC) is a common type of connector used with coaxial cabling. Mechanical Transfer Registered Jack (MT-RJ), Straight Tip (ST) connector, and Lucent Connector (LC) are connectors used for fiber-optic cabling. 38. Answers: A, B, and D. ST, SC, and LC Explanation: ST, SC, and LC are connectors types used with optical fiber cabling. 39. Answer: A. True Explanation: The 66 block (used in telephone systems) and the 110 block (used in computer networks) are examples of punch-down blocks used for connecting sets of wires. 40. Answer: C. 100 meters Explanation: The maximum cable segment length for Cat 5e cable is 100 meters. 41. Answer: C. Cat 6 Explanation: A Category 6 (Cat 6) cable meets the minimum cabling requirement for a 10 Gbps connection over copper twisted-pair. 42. Answer: A. True Explanation: Category 6 (Cat 6) cabling supports 10 Gbps data transfer rate at a limited range of up to 55 meters, whereas Cat 6A (Augmented Category 6) cabling allows for 10 Gbps data transfer rate over a standard cable segment length of 100 meters. 43. Answers: A and C. T568A and T568B Explanation: T568A and T568B are pinout specifications for copper cabling termination defined in the ANSI/TIA-568 (formerly known as TIA/EIA-568) family of standards. 44. Answers: A, B, and E. Cat 6a cabling, RJ-45 connectors, and 802.3an Explanation: 10GBaseT refers to 10 gigabit Ethernet over twisted-pair copper cable. 802.3an is the IEEE standard for implementing 10GBaseT. 10GBaseT requires Cat 6a cabling with RJ-45 connectors for transmissions over distances up to 100 meters (Cat 6 cabling can also be used although it shortens the available range). 45. Answer: C. Media converter Explanation: Media converters are devices that allow for connecting different types of incompatible media such as copper and fiber-optic cabling. 46. Answer: A. True Explanation: A device that apart from the function of an ordinary Layer 2 network switch can also provide additional functions at higher levels of the OSI reference model (e.g. routing at Layer 3) is referred to as a multilayer switch. 47. Answer: D. Proxy Explanation: In computer networks, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as a proxy. 48. Answer: C. UTM Explanation: The term "Unified Threat Management" (UTM) refers to a network security solution (commonly in the form of a dedicated device called UTM appliance) which combines the functionality of a firewall with additional safeguards such as URL filtering, spam filtering, gateway antivirus protection, intrusion detection or prevention, content inspection, or malware inspection. 49. Answer: B. Hypervisor Explanation: A software application used to manage multiple guest operating systems on a single host system is called hypervisor. 50. Answer: B. NAS Explanation: The term "Network Attached Storage" refers to a dedicated storage appliance that can be added to a network. 51. Answer: B. SAN Explanation: Storage Area Network (SAN) is a dedicated local network consisting of devices providing data access. 52. Answer: B. Jumbo frame Explanation: A single non-standard Ethernet frame that allows for larger maximum payload size is known as a jumbo frame. 53. Answer: A. 1.544 Mbps Explanation: T1 lines support data transfer rates of up to 1.544 Mbps. 44.736 Mbps is the data transfer rate of a T3 connection. E1 lines support data transfer rates of up to 2.048 Mbps. E3 lines support speeds of up to 34.368 Mbps. 53. Answer: A. 1.544 Mbps Explanation: T1 lines support data transfer rates of up to 1.544 Mbps. 44.736 Mbps is the data transfer rate of a T3 connection. E1 lines support data transfer rates of up to 2.048 Mbps. E3 lines support speeds of up to 34.368 Mbps. 54. Answer: C. 34.368 Mbps Explanation: E3 lines support data transfer rates of up to 34.368 Mbps. E1 lines support data transfer rates of up to 2.048 Mbps. 44.736 Mbps is the data transfer rate of a T3 connection. T1 lines support data transfer rates of up to 1.544 Mbps. 55. Answer: B. ADSL Explanation: Asynchronous Digital Subscriber Line (ADSL) is the most common type of DSL technology. ADSL download and upload speeds differ (ADSL download rates are much higher than upload rates). ADSL modems use RJ-11 connectors and share the regular telephone line (customer's telephone line requires special filtering device to pass both ADSL and voice communication over the same line). 56. Answers: B, D, and E. Signal latency, Interference (weather dependent), and Low connection speed Explanation: The characteristic features of satellite Internet connections include signal latency, low connection speed, and dependency on good weather conditions. 57. Answer: B. MPLS Explanation: A type of data-carrying technique that enables use of different types of network protocols on the same network is known as Multiprotocol Label Switching (MPLS). 58. Answer: A. True Explanation: A physical point where an ISP's network ends and connects with the customer's onpremises wiring (which also defines where the ISP's responsibility for maintenance ends and the consumer's responsibility begins) is commonly referred to as demarcation point, or demarc in short. 59. Answer: A. Smart jack Explanation: A device providing remote line diagnostics capability placed at the joining point between an ISP's line and customer's premises wiring is known as smart jack. 60. Answer: B. False Explanation. Physical network diagram is a document that describes the detailed layout of a building and the way devices are connected to the network through the actual cabling that transmits data. 61. Answer: C. Load balancer Explanation: Load balancers are physical network devices or software solutions designed for managing the optimal distribution of workloads across multiple computing resources. 62. Answer: D. Hot site Explanation: A hot site is a type of backup site that allows for fastest disaster recovery. Hot site constitutes a mirror copy of the original site, with all the facilities, equipment, and data readily available for use in case of emergency. 63. Answer: B. False Explanation: A cold site is the least expensive type of backup site for an organization to operate. It is a type of an alternate site that offers only the basic facilities, which means that in case of an emergency all the equipment and data must be moved to the site first to make it operational. 64. Answers: D and E. All copies of incremental backups made since the last full backup and Copy of the last full backup Explanation: Restoring data from an incremental backup requires a copy of the last full backup as well as all copies of incremental backups made since the last full backup. 65. Answer: C. MTTR Explanation: The term "Mean Time To Restore" (MTTR) is used to describe an average time required to repair a failed component or device. 66. Answers: A, C, and E. Identifies lack of security controls, Identifies common misconfigurations, and Passively tests security controls Explanation: Vulnerability scanning is used for passive checks on system security. It identifies missing security controls and common misconfigurations, but doesn't exploit detected security flaws. A type of security check which actively tests security controls and tries to exploit detected vulnerabilities is known as penetration test, or pentest in short. 67. Answer: C. SIEM Explanation: Security Information and Event Management (SIEM) solutions are used for real-time analysis of security alerts generated by network hardware and applications. 68. Answer: C. MIB Explanation: Management Information Base (MIB) is a type of repository most often associated with Simple Network Management Protocol (SNMP). The purpose of MIB is to store and manage information related to monitored devices. 69. Answer: C. VPN Explanation: Virtual Private Network (VPN) is a system that uses untrusted public network (such as Internet) as a means for creating private encrypted connections between remote locations. 70. Answers: A and B. SSL VPN and Site-to-site Explanation: The two Virtual Private Network (VPN) connection types that typically do not require a dedicated VPN client application are SSL VPNs and site-to-site VPN connections. In SSL VPNs, the functionality of a VPN client is provided by a web browser. In site-to-site VPNs, which are used to connect entire networks with each other, all tasks related to VPN traffic are handled by a VPN gateway. 71. Answer: C. 3389 Explanation: Remote Desktop Protocol (RDP) is a Microsoft-proprietary remote connection protocol that runs by default on TCP port 3389. 72. Answer: A. True Explanation: Apart from providing the ability to log in remotely and execute commands on a remote host, SSH is also used for secure file transfer through the SSH-based protocols such as SSH File Transfer Protocol (SFTP) or Secure Copy (SCP). 73. Answer: B. DLP Explanation: Data Loss Prevention (DLP) solutions are software or hardware-based security solutions designed to detect and prevent unauthorized use and transmission of confidential information outside of a corporate network. 74. Answer: B. BYOD Explanation: The term Bring Your Own Device (BYOD) refers to a policy of permitting employees to bring personally owned mobile devices and to use those devices to access privileged company information and applications. 75. Answer: B. AUP Explanation: Acceptable Use Policy (AUP) is a set of rules enforced in a network that restrict the use to which the network may be put. 76. Answer: A. Biometrics Explanation: In computer security, biometrics refers to physical characteristics of the human body that can be used for identification and access control purposes. 77. Answers: B and D. RADIUS and TACACS+ Explanation: Authentication, Authorization and Accounting (AAA) is a security architecture framework designed for verification of the identity of a person or process (authentication), granting or denying access to network resources (authorization), and tracking the services users are accessing as well as the amount of network resources they are consuming (accounting). Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) are examples of protocols providing the AAA functionality. 78. Answer: A. SSO Explanation: An authentication subsystem that enables a user to access multiple, connected system components (such as separate hosts on a network) after a single login at only one of the components is known as Single Sign-On (SSO). A single sign-on subsystem typically requires a user to log in once at the beginning of a session, and then during the session grants further access to multiple, separately protected hosts, applications, or other system resources without further login action by the user. 79. Answer: A. Password and biometric scan Explanation: Authentication is proving user identity to a system. Authentication process can be based on different categories of authentication factors, including unique physical traits of each individual such as fingerprints ("something you are"), physical tokens such as smart cards ("something you have"), or user names and passwords ("something you know"). Additional factors might include geolocation ("somewhere you are"), or user-specific activity patterns such as keyboard typing style ("something you do"). Multifactor authentication systems require implementation of authentication factors from two or more different categories. 80. Answer: B. Port-based network access control Explanation: 802.1x is an Institute Electrical and Electronics Engineers (IEEE) standard for port-based network access control. 802.1X provides mechanisms to authenticate devices connecting to a Local Area Network (LAN), or Wireless Local Area Network (WLAN). Due to a similar name, 802.1X is sometimes confused with 802.11x (a general term used in reference to a family of wireless networking standards). 81. Answer: C. MAC filter Explanation: Network Access Control (NAC) method based on the physical address (MAC address) of the Network Interface Card (NIC) is called MAC filtering or MAC address filtering. 48-bit MAC address is a unique number assigned to every network adapter. Devices acting as network access points can have certain MAC addresses blacklisted or whitelisted and based on the entry on either of the lists grant or deny access to the network. 82. Answer: D. Captive portal Explanation: Captive portals allow administrators to block Internet access for users until they perform required action. An example captive portal could be a web page requiring authentication and/or payment (e.g. at a public Wi-Fi hotpot) before a user is allowed to proceed and use the Internet access service. 83. Answer: B. WPA2 Explanation: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP) are encryption standards designed for securing wireless networks. WEP is an older standard and due to its vulnerabilities is not recommended. WPA was designed as an interim replacement for WEP, and WPA2 was introduced as the official standard offering the strongest security of the three. 84. Answer: D. DDoS Explanation: As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet. The goal of DoS and DDoS attacks is to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn't have time or resources to handle legitimate requests. 85. Answer: A. Social engineering Explanation: The practice of obtaining confidential information by manipulating or deceiving people is known as social engineering. 86. Answer: C. Evil twin Explanation: Evil twin is another term for a rogue access point. Rogue access point will have the same network name as the legitimate access point and can be set up by a hacker in order to steal user credentials or for the purpose of traffic eavesdropping. 87. Answer: B. Scanning for unsecured wireless networks while driving in a car Explanation: The term war driving refers to scanning for unsecured wireless networks while driving in a car. Marking symbols in public places that indicate the presence of an unsecured wireless connection is known as war chalking. 88. Answer: A. True Explanation: An attack against encrypted data that relies heavily on computing power in order to check all possible keys and passwords until the correct one is found is known as a brute-force attack. 89. Answer: C. STP Explanation: Spanning Tree Protocol (STP) is used to prevent switching loops. Switching loop occurs when there's more than one active link between two network switches, or when two ports on the same switch become connected to each other. 90. Answer: D. DMZ Explanation: In the context of computer security, the term Demilitarized Zone (DMZ) refers to a lightly protected subnet consisting of publicly available servers placed on the outside of the company's firewall. 91. Answers: C and E. SHA-1 and MD5 Explanation: Secure Hash Algorithm (SHA) and Message Digest (MD) are a series of hashing functions used for checking data integrity (SHA-1 and MD5 are the most popular versions). Taking hashes ensures that data retains its integrity. Hash functions allow for mapping large amounts of data content to small string of characters. The result of hash function provides the exact "content in a nutshell" (in the form of a string of characters) derived from the main content. In case there's any change to the data after the original hash was taken, the next time when hash function is applied the resulting hash value calculated after content modification will be different from the original hash. In computer forensics procedures comparing hashes taken at different stages of evidence handling process ensures that the evidence hasn't been tampered with and stays intact. 92. Answer: C. Honeypot Explanation: A monitored host or network specifically designed to detect unauthorized access attempts is known as a honeypot. This type of system contains no valuable data and is used to divert the attacker's attention from the corporate network. Multiple honeypots set up on a network are known as a honeynet. 93. Answer: C. Identifying the problem Explanation: Problem identification should be the very first step in the troubleshooting methodology recommended by CompTIA. This step involves questioning the user and identifying user changes to the computer. 94. Answer: C. Implement the solution Explanation: In troubleshooting methodology recommended by CompTIA, implementing the solution should come after establishing a plan of action to resolve problem and identifying potential effects. 95. Answer: C. After implementing the solution Explanation: According to the troubleshooting theory, verification of full system functionality and implementation of applicable preventative measures should be performed after implementing solution to the problem. 96. Answer: A. True Explanation: The very last step of the troubleshooting process involves documenting findings, actions, and outcomes. This step comes after verification of full system functionality and implementation of applicable preventative measures. 97. Answer: B. Cable crimpers Explanation: Cable crimpers are used for attaching RJ connectors to the end of a twisted-pair Ethernet cable. Most commonly, a crimp tool also allows for cutting and stripping the cable from the outer insulating cover. 98. Answer: C. Punchdown tool Explanation: Attaching a cable to a patch panel requires punchdown tool. 99. Answer: B. OTDR Explanation: A plain Time-Domain Reflectometer (TDR) allows for finding breaks in copper network cables. Faults and breaks in fiber-optic cabling can be located with the use of an Optical Time-Domain Reflectometer (OTDR). 100. Answer: D. Displaying active TCP/IP connections Explanation: Netstat is a command-line utility used for displaying active TCP/IP connections. Commandline program used for testing the reachability of a remote host is called ping. Windows command-line utility for displaying intermediary points on the packet route is called tracert. Windows command-line program for checking TCP/IP configuration details is called ipconfig.