CompTIA Network+ Exam (N10-008) – Module 1

1. The secured version of the Hypertext Transfer Protocol (HTTPS) uses a different well-known port from the unsecured version. Which of the following ports is used by HTTPS by default?
2. Which of the following components does the port number in a transport layer protocol header identify?
3. What field in the Transmission Control Protocol (TCP) Option subheader specifies the size of the largest segment a system can receive?
4. Which of the following pairs of well-known ports are the default values you would use to configure a POP3 email client?
5. Which of the following protocols generate messages that are carried directly within Internet Protocol (IP) datagrams, with no intervening transport layer protocol? (Choose all correct answers.)
6. Which of the following protocols does the Ping utility use to exchange messages with another system?
7. Which of the following server applications use two well-known port numbers during a typical transaction?
8. What is the term for the combination of an IPv4 address and a port number, as in the following example: 192.168.1.3:23?
9. Which of the following Transmission Control Protocol (TCP) control bits is set to 1 to initiate the termination of a session?
10. Which of the following organizations is responsible for assigning the well-known port numbers used in transport layer protocol headers?
11. Which of the following is the default well-known port number for the Hypertext Transfer Protocol (HTTP) used for web client/server communications?
12. A client on a TCP/IP network is attempting to establish a session with a server. Which of the following correctly lists the order of Transmission Control Protocol (TCP) session establishment messages?
13. Which of the following protocols is used to exchange directory service information?
14. Which of the following protocols appears on the network as a service that client computers use to resolve names into IP addresses?
15. Which of the following explanations best describes the function of a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number?
16. Which of the following terms describes the Transmission Control Protocol (TCP) exchange that establishes a connection prior to the transmission of any data?
17. What is the valid range of numbers for the ephemeral client ports used by the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?
18. Which of the following statements about the User Datagram Protocol (UDP) are true? (Choose all correct answers.)
19. Which of the following protocols use(s) the term datagram to describe the data transfer unit it creates? (Choose all correct answers.)
20. Which of the following is the primary application layer protocol used by web browsers to communicate with web servers?
21. Which of the following TCP/IP parameters, configured on an end system, specifies the Internet Protocol (IP) address of a router on the local network that provides access to other networks?
22. What is the native file sharing protocol used on all Microsoft Windows operating systems?
23. Flow control is a function implemented in protocols operating at which layer of the Open Systems Interconnection (OSI) model?
24. When analyzing captured TCP/IP packets, which of the following control bits must you look for in the Transmission Control Protocol (TCP) header to determine whether the receiving host has successfully received the sending host’s data?
25. Which of the following is a correct listing of the Open Systems Interconnection (OSI) model layers, in order, from top to bottom?
26. Which of the following protocols provides connectionless delivery service at the transport layer of the Open Systems Interconnection (OSI) model?
27. Which of the OSI model layers is responsible for syntax translation and compression or encryption?
28. Which of the following could be a valid MAC address for a network interface adapter?
29. Which of the following port values are used by the File Transfer Protocol (FTP)? (Choose all correct answers.)
30. Specify the layer of the Open Systems Interconnection (OSI) model at which the Internet Protocol (IP) operates and whether it is connection-oriented or connectionless.
31. At which of the Open Systems Interconnection (OSI) model layers do switches and bridges perform their basic functions?
32. An Ethernet network interface adapter provides functions that span which two layers of the Open Systems Interconnection (OSI) model?
33. Which layer of the Open Systems Interconnection (OSI) model defines the medium, network interfaces, connecting hardware, and signaling methods used on a network?
34. Which layer of the Open Systems Interconnection (OSI) model is responsible for transmitting signals over the network medium?
35. Which of the following protocols operates at the network layer of the OSI model but does not encapsulate data generated by an upper layer protocol for transmission over the network?
36. Alice has been instructed to install 100 Windows workstations, and she is working on automating the process by configuring the workstations to use PXE boots. Each workstation therefore must obtain an IP address from a DHCP server and download a boot image file from a TFTP server. Which of the following well-known ports must Alice open on the firewall separating the workstations from the servers? (Choose all correct answers.)
37. Which of the following protocols operate at the application layer of the Open Systems Interconnection (OSI) model? (Choose all correct answers.)
38. Which of the following are techniques used in traffic shaping to prevent networks from being overwhelmed by data transmissions? (Choose all correct answers.)
39. Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?
40. Which of the following services enables computers on a private IPv4 network to access the Internet using a registered IP address?
41. Which layer of the Open Systems Interconnection (OSI) model would be responsible for converting a text file encoded using EBCDIC on the sending system into ASCII code, when required by the receiving system?
42. An enterprise network has been designed with individual departmental switches because in most cases, the devices in a specific department exchange network traffic with other devices in the same department. Each of the departmental switches is also connected to a host switch, which enables devices to communicate with other departments. Which of the following terms describes this switching architecture?
43. Which of the following is a protocol that identifies VLANs by inserting a 32-bit field in the Ethernet frame?
44. Which of the following terms refers to methods by which network traffic is prioritized to prevent applications from suffering faults due to network congestion?
45. Which of the following best defines the concept of the dual stack?
46. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?
47. Which of the following mechanisms for prioritizing network traffic uses a 6-bit classification identifier in the Internet Protocol (IP) header?
48. Which of the following is an example of a circuit-switched network connection, as opposed to a packet-switched network connection?
49. Which of the following is a network layer protocol that uses ICMPv6 messages to locate routers, DNS servers, and other nodes on an IPv6 network?
50. Which of the following protocols prevents network switching loops from occurring by shutting down redundant links until they are needed?

 

Leave a comment