CompTIA Network+ Exam (N10-008) – Module 1 Posted byjay.ocampo11 September 4, 2021 Leave a comment on CompTIA Network+ Exam (N10-008) – Module 1 1. The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?2580110443 2. Which of the following components does the port number in a transport layer protocol header identify?A transport layer protocolAn applicationA gatewayA proxy server 3. What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?MSSWindowMMSWinMS 4. Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?110 and 25143 and 25110 and 14380 and 110 5. Which of the following protocols generate messages that are carried directly within Internet Protocol (IP) datagrams, with no intervening transport layer protocol? (Choose all correct answers.)ICMPIGMPSMTPSNMP 6. Which of the following protocols does the Ping utility use to exchange messages with another system?UDPTCPICMPIGMP 7. Which of the following server applications use two well-known port numbers during a typical transaction?NTPSNMPHTTPFTP 8. What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?SocketOUIWell-known portNetwork address 9. Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?SYNURGFINEND 10. Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?Institute for Electronic and Electrical Engineers (IEEE)Internet Assigned Numbers Authority (IANA)Internet Engineering Task Force (IETF)International Organization for Standardization (ISO) 11. Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?2220801720 12. A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages?SYN, ACK, SYN, ACKSYN, SYN, ACK, ACKSYN/ACK, SYN/ACKSYN, SYN/ACK, ACK 13. Which of the following protocols is used to exchange directory service information?RDPLDAPSNMPSMB 14. Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?DHCPBOOTPDNSSNMP 15. Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?The port number indicates to the receiver that the sender can activate a specific port only.The port number is used by both the sender and the receiver to identify the application that generated the information in the datagram.The port number is used only by the receiver to indicate the application process running on the sender.The port number is used by both the sender and the receiver to negotiate a well-known server port for the communicating processes. 16. Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?SynchronizationInitialization exchangeConnection establishmentThree-way handshake 17. What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?1023 through 655341 through 102449152 through 655351024 to 49151 18. Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all correct answers.)UDP does not use packet sequencing and acknowledgmentsUDP uses packet sequencing and acknowledgments.UDP is a connection-oriented protocol.UDP is a connectionless protocol.UDP has an 8-byte header. 19. Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all correct answers.)EthernetIPTCPUDP 20. Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?HTTPHTMLSMTPFTP 21. Which of the following TCP/IP parameters, configured on an end system, specifies the Internet Protocol (IP) address of a router on the local network that provides access to other networks?WINS Server AddressesDefault GatewayDNS Server AddressesSubnet Gateway 22. What is the native file sharing protocol used on all Microsoft Windows operating systems?Hypertext Transfer Protocol (HTTP)Network File System (NFS)File Transfer Protocol (FTP)Server Message Block (SMB) 23. Flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?PresentationSessionTransportNetwork 24. When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host’s data?ACKFINPSHSYN 25. Which of the following is a correct listing of the Open Systems Interconnection (OSI) model layers, in order, from top to bottom?Physical, data link, transport, network, session presentation, applicationApplication, session, presentation, transport, network, data link, physicalSession, application, presentation, transport, data link, network, physicalApplication, presentation, session, transport, network, data link, physical 26. Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?TCPHTTPUDPARP 27. Which of the OSI model layers is responsible for syntax translation and compression or encryption?Data linkNetworkSessionPresentation 28. Which of the following could be a valid MAC address for a network interface adapter?10.124.25.43FF:FF:FF:FF:FF:FF03:AE:16:3H:5B:1100:1A:6B:31:9A:4E 29. Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all correct answers.)21232053 30. Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.Network; connection-orientedNetwork; connectionlessTransport; connection-orientedTransport; connectionless 31. At which of the Open Systems Interconnection (OSI) model layers do switches and bridges perform their basic functions?PhysicalData linkNetworkTransport 32. An Ethernet network interface adapter provides functions that span which two layers of the Open Systems Interconnection (OSI) model?Physical and data linkData link and networkNetwork and transportTransport and application 33. Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?PhysicalData linkNetworkTransport 34. Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?PhysicalData LinkNetworkTransport 35. Which of the following protocols operates at the network layer of the OSI model but does not encapsulate data generated by an upper layer protocol for transmission over the network?IPUDPARPICMP 36. Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all correct answers.)6566676869 37. Which of the following protocols operate at the application layer of the Open Systems Interconnection (OSI) model? (Choose all correct answers.)HTTPSNMPICMPIGMP 38. Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all correct answers.)Bandwidth throttlingRate limitingBroadcast stormingNetwork address translation 39. Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?ApplicationPresentationSessionPhysical 40. Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?DHCPNATDNSNTP 41. Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?ApplicationPresentationSessionPhysical 42. An enterprise network has been designed with individual departmental switches because in most cases, the devices in a specific department exchange network traffic with other devices in the same department. Each of the departmental switches is also connected to a host switch, which enables devices to communicate with other departments. Which of the following terms describes this switching architecture?Distributed switchingPort forwardingTraffic shapingNeighbor discovery 43. Which of the following is a protocol that identifies VLANs by inserting a 32-bit field in the Ethernet frame?IEEE 802.1PIEEE 802.1QIEEE 802.1XIEEE 802.1Ab 44. Which of the following terms refers to methods by which network traffic is prioritized to prevent applications from suffering faults due to network congestion?Port forwardingDynamic routingVLANsQoS 45. Which of the following best defines the concept of the dual stack?A computer with two network interface adaptersA computer with two installed operating systemsA computer with two sets of networking protocolsA computer with connections to two different network segments 46. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?RIPSTPVLANNAT 47. Which of the following mechanisms for prioritizing network traffic uses a 6-bit classification identifier in the Internet Protocol (IP) header?DiffservCoSTraffic shapingQoS 48. Which of the following is an example of a circuit-switched network connection, as opposed to a packet-switched network connection?Two wireless computers using an ad hoc topologyA landline voice telephone callA smartphone connecting to a cellular towerComputers connected by a wired LAN 49. Which of the following is a network layer protocol that uses ICMPv6 messages to locate routers, DNS servers, and other nodes on an IPv6 network?BGPNDPOSPFPoE 50. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?RIPSTPVLANNAT Loading...