CompTIA Network+ Exam (N10-008) – Module 2

1. Which of the following devices can also be described as a multiport repeater?
2. Which of the following is the true definition of the term modem?
3. Which of the following best describes the function of a firewall?
4. Alice has a network that consists of three virtual LANs (VLANs) defined on all of the network’s switches. VLAN 10 is the Sales VLAN, VLAN 20 is the Marketing VLAN, and VLAN 30 is the Accounting VLAN. Users are reporting that they can’t communicate with anyone outside of their own VLAN. What is the problem, and what must Alice do?
5. Which of the following physical network devices can conceivably be implemented as software in a computer’s operating system? (Choose all correct answers.)
6. Which of the following statements about the Spanning Tree Protocol (STP) is not true?
7. Which of the following is something that only a firewall capable of stateful packet inspection can do?
8. VLANs create the administrative boundaries on a switched network that are otherwise provided by which of the following devices?
9. Which of the following devices can you use to connect two multimode fiber-optic Ethernet networks in different buildings 2,000 meters apart using a single-mode fiber-optic cable segment running at the same speed, while maintaining a single collision domain?
10. Ralph is a freelance network consultant installing a three-node small business network. The computers are all in the same room and use wired Ethernet to connect to the switched ports of a multifunction device. The device also functions as a network address translation (NAT) router for a cable modem connection to the Internet and uses DHCP to assign private IP addresses to the computers. Although NAT provides a measure of security, Ralph wants to be sure that the computers on the network are protected from unauthorized Internet traffic and attacks against open ports. Which of the following solutions would enable Ralph to accomplish this goal with the minimum cost to the client?
11. Which of the following is the correct term for the process by which the Spanning Tree Protocol (STP) on a switch evaluates the paths through the network and places each port in the forwarding or blocking state?
12. Which of the following devices can split a single network into two collision domains while maintaining a single broadcast domain?
13. Which of the following devices is used to physically connect computers in the same VLAN?
14. Which of the following is the term for the area between two firewalls, on which web and email servers are typically found? (Choose all correct answers.)
15. Which of the following bridging types has never been used on Ethernet local area networks (LANs)?
16. Which of the following is another term for a multiport bridge?
17. Which of the following technologies would you be less likely to find on the average home or small office network?
18. Which of the following statements about switches and routers are true? (Choose all correct answers.)
19. Which of the following problems is the Spanning Tree Protocol (STP) intended to prevent? (Choose all correct answers.)
20. Which of the following statements about hubs and switches are true? (Choose all correct answers.)
21. Which of the following functions is the multifunction device on a home or small office network known as a broadband router least likely to provide?
22. Which two of the following devices perform essentially the same function? (Choose two correct answers.)
23. Ralph is installing an Ethernet local area network (LAN) for a small business with two offices on opposite sides of a courtyard. Ralph plans to run a multimode fiber-optic cable across the courtyard, but the budget is limited, and he can’t use fiber for the whole network. Therefore, he installs unshielded twisted pair (UTP) cable in the two offices, which have ten and twelve workstations, respectively. Which of the following devices should Ralph use to join the two UTP installations together into one LAN using the fiber-optic run across the courtyard, while keeping the cost to a minimum?
24. Five computers are connected to the same switch, but only four are able to communicate with each other. Assuming that all of the hardware is functioning properly, which of the following could be a reason for the fifth computer’s communication problem?
25. Which of the following network devices are “dumb”—that is, purely electrical devices with no electronic intelligence?
26. Which of the options refer to the most important 4G standards?
27. Which of the following elements can be used to identify the devices in a particular VLAN? (Choose all correct answers.)
28. Which of the following is a feature that is not found in a traditional firewall product, but which might be found in a Next Generation Firewall (NGFW)?
29. It refers to a WLAN standard the uses MIMO and Channel bonding
30. Which of the following statements about VLANs are true? (Choose all correct answers.)
31. Which of the following tasks can you perform to split a large, switched local area network (LAN) into multiple broadcast domains? (Choose all correct answers.)
32. Which of the following statements about bridges and switches is true?
33. Which of the following is a correct term describing the function of a switch?
34. A VPN concentrator is an advanced type of which of the following devices?
35. Which of the following terms are used to describe the device used to place calls on a Voice over Internet Protocol (VoIP) installation? (Choose all correct answers.)
36. Which of the following statements about routers is not true?
37. Which of the following statements about routers are true? (Choose all correct answers.)
38. This encryption standard was designed to improve upon wireless security and fix some of the flaws found in WEP.
39. Which of the following devices enable users on private networks to access the Internet by substituting a registered IP address for their private addresses? (Choose all correct answers.)
40. Which of the following technologies is typically associated with virtual PBX services?
41. It refers to a local area network's pathway to any and all remote networks. Which of the options describes this?
42. It builds on EAP-TLS by having the capabilities to authenticate both the client and the server, although the client does not need to use certificates for authentication.
43. Which of the following is the primary reason why replacing hubs with switches on an Ethernet local area network (LAN) improves its performance?
44. It enables administrators to predict bandwidth use, monitor that use, and control it to ensure that bandwidth is available to the applications that need it. Which of the options refer to this?
45. Which cellular technology uses OFDM and BDMA ?
46. Which of the following devices enables you to use a standard analog telephone to place calls using the Internet instead of the Public Switched Telephone Network (PSTN)?
47. The network administrator for a small business is installing a computer to function as a firewall protecting their internetwork from Internet intrusion. At which of the following locations should the administrator install the firewall system?
48. If refers to a method of separation by coding enables conducting a large number of conversations simultaneously over the same range of frequencies, with no interference between them.
49. Which WLAN standard that can use both 2.4Ghz and 5Ghz band with the highest transmission speed?
50. Which type of routing protocol builds a map of the entire network and then holds that map in memory?

 

Leave a comment