Certification : CompTIA Network+ (N10-007)

An administrator’s router with multiple interfaces uses OSPF. When looking at the router’s status, it is discovered that one interface is not passing traffic. Given the information below, what would resolve this issue?

Fast Ethernet 0 is up, line protocol is down
Int ip address is
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Full duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
0 input errors
0 packets output, 0 bytes
0 output errors, 0 collisions, 0 resets 

Options are :

  • Set the loopback address
  • Set OSPF to area 0
  • Replace the line card
  • Enable the connecting port (Correct)
  • Put the IP address in the right broadcast domain

Answer : Enable the connecting port

Explanation Since the line protocol is down, you will need to enable the connecting port to restore the connection.

A network administrator wants to implement a centralized monitoring solution that utilizes push alerts sent from the client to a server. What type of monitoring should be put in place?

Options are :

  • SMTP
  • SMS
  • NIDS
  • SNMP (Correct)

Answer : SNMP

Explanation The keyword is MONITORING. SNMP stands for Simple Network Management Protocol. SMTP is simple mail TRANSPORT protocol. NIDS is network intrusion detection system and SMS is short message service. So, knowing what all of them stand for helps you to understand if the goal is simply to manage the server and send alerts from client to server. Based on these information, SNMP is the best choice.

What is used to define how much bandwidth can be used by various protocols on the network?

Options are :

  • Fault tolerance
  • Traffic shaping (Correct)
  • High availability
  • Load balancing

Answer : Traffic shaping

Explanation Traffic shaping, also known as packet shaping, is the manipulation and prioritization of network traffic to reduce the impact of heavy users or machines from affecting other users.

An organization is required to implement a wireless network. The organization must implement wireless routers compatible with 802.11ac protocol that have maximum possible range. What wireless router frequency is a viable option?

Options are :

  • 5.0GHz (Correct)
  • 2.4GHz
  • 6.0GHz
  • 3.7GHz

Answer : 5.0GHz

Explanation Wireless AC uses 5.0 GHz for wireless transmission, whereas Wireless B/G uses 2.4 GHz.

An administrator needs to open the default port on the firewall for DNS. What port should they open?

Options are :

  • 110
  • 53 (Correct)
  • 67
  • 3389

Answer : 53

Explanation Port 53 is used for DNS.

When troubleshooting a T1 connection, the service provider’s technical support representative instructs a network technician to place a special device into the CSU/DSU. Using this device, the provider is able to verify that communications are reaching the CSU/DSU. What was used by the network technician?

Options are :

  • Toner probe
  • Loopback plug (Correct)
  • Cable analyzer
  • OTDR

Answer : Loopback plug

Explanation A loopback plug, also known as a loopback adaptor or a loopback cable, is a device used to test ports (such as serial, parallel USB, and network ports) to identify network and network interface card (NIC) issues. Loopback plug equipment facilitates the testing of simple networking issues and is available at very low costs.

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. What is the QUICKEST option to configure a replacement switch?

Options are :

  • Image (Correct)
  • Baseline
  • Archive
  • Syslog

Answer : Image

Explanation The baseline is only to give you an idea on how it works before any changes are made. The archive won’t explain much and syslog is a windows feature. Process of elimination shows that an image would work best. To image a switch, you can make a backup of the configuration and deploy it to a new/different switch.

A company suffers an outage due to a bad module in a core switch. What is the FIRST step to conduct in troubleshooting?

Options are :

  • Gather information, start at the top of the OSI model, and work down.
  • Establish a theory, identify the problem, duplicate the problem, test the theory, and repeat.
  • Gather information, start at the bottom of the OSI model, and work up.
  • Establish a plan of action to solve the problem. (Correct)

Answer : Establish a plan of action to solve the problem.

Explanation The first step is to establish a plan of action to resolve the problem and identify potential effects.

When a criminal or government investigation is underway, what describes the identification, recovery, or exchange of electronic information relevant to that investigation?

Options are :

  • Encryption
  • eDiscovery (Correct)
  • Data transport
  • First responder

Answer : eDiscovery

Explanation Process of elimination: Data transport is the transport of data while the First responder is the “first responder? and encryption is a method of putting data into a tunnel so it’s completely secured. That leaves us with eDiscovery.

A new OC3 experiencing intermittent connectivity and loss of signal alarms. A network administrator finds all the cables are properly connected. There is excess cable between the patch panel and the network node. The cables were forced into their storage compartments in the rack. What is the likely cause of the problem?

Options are :

  • The new OC3 cable is experiencing EMI
  • The cable was improperly crimped
  • The bend radius of the cable has been exceeded (Correct)
  • The OC3 was improperly provisioned

Answer : The bend radius of the cable has been exceeded

Explanation A fiber cable (like an OC3) should not be bent more than 45 degrees or it will break the connection.

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. What action could the administrator take to improve the performance of data transfers over iSCSI switches?

Options are :

  • The administrator should set the MTU to 9000 on each of the participants in the vSAN. (Correct)
  • The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
  • The administrator should configure each vSAN participant to have its own VLAN.
  • The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.

Answer : The administrator should set the MTU to 9000 on each of the participants in the vSAN.

Explanation When using an iSCSI SAN (with iSCSI switching), we can improve network performance by enabling ‘jumbo frames’. A jumbo frame is a frame with an MTU of more than 1500. By setting the MTU to 9000, there will be fewer but larger frames going over the network. Enabling jumbo frames can improve network performance by making data transmissions more efficient.

A network architect is designing a highly-redundant network with a distance vector routing protocol in order to prevent routing loops. The architect has configured the routers to advertise failed routes with the addition of an infinite metric. What method should the architect utilize?

Options are :

  • Spanning tree
  • Split horizon
  • Route poisoning (Correct)
  • Hold down timers

Answer : Route poisoning

Explanation The Route poisoning setting in Cisco's Split Horizon is what prevents routing loops and shows the failed routes.

A firewall technician configures a firewall in order to allow HTTP traffic as follows:

Source IP     Zone     Dest IP     Zone      Port      Action
Any              Untrust     Any       DMZ       80        Allow

The organization should upgrade to what technology to prevent unauthorized traffic from traversing the firewall?

Options are :

  • Stateless packet inspection
  • Application aware firewall (Correct)
  • Intrusion detection system

Answer : Application aware firewall

Explanation Application aware firewall can analyze and verify protocols all the way up to layer 7 of the OSI reference model. It has the advantage to be aware of the details at the application layer. Since we desired to allow HTTP traffic, we must deal with the traffic at the application layer.

A client is concerned about a hacker compromising a network in order to gain access to confidential research data. What could be implemented to redirect any attackers on the network?

Options are :

  • DMZ
  • Botnet
  • Content filter
  • Honeypot (Correct)

Answer : Honeypot

Explanation A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data that appears to be a legitimate part of the site, but is actually isolated and monitored, and seems to contain information or a resource of value to attackers, who are then blocked.

A technician is troubleshooting a newly-installed WAP that is sporadically dropping connections to devices on the network. What should the technician check FIRST during troubleshooting?

Options are :

  • Bandwidth saturation
  • WAP placement (Correct)
  • Encryption type

Answer : WAP placement

Explanation For optimal network performance, the placement of the Wireless Access Point (WAP) guidelines should be taken into consideration to ensure that the building's construction doesn't cause interference with the wireless signals.

A network administrator receives a call asking for assistance with connecting to the network. The person on the phone asks for the IP address, subnet class, and VLAN required to access the network. What type of attack might this be?

Options are :

  • Social engineering (Correct)
  • VLAN hopping
  • Spoofing
  • Zero-day attack

Answer : Social engineering

Explanation Social engineering is a type of attack on a network using confidence and gullibility of users to gain access. It is the only type of attack on a network that is directed towards the human element. The human interaction with the network administrator makes the other three answers incorrect.

A wireless technician wants to configure a wireless network to identify itself to visitors by including the word “Guest? in the name. This wireless network needs to provide coverage to the entire building and will require 3 wireless access points working together to accomplish this level of coverage. What would allow users to identify the wireless network by its displayed name as a single network? 

Options are :

  • ARP broadcast
  • BSSID broadcast
  • DHCP broadcast
  • ESSID broadcast (Correct)

Answer : ESSID broadcast

Explanation With an ESSID (Extended Service Set), a wireless network can utilize multiple wireless access points (WAPs) that can broadcast a single network name for access by the clients. A BSSID (Basic Service Set) can only utilize a single WAP in each wireless network.

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase. What is the BEST action to alleviate the situation?

Options are :

  • Document the changes that were made
  • Check the cabling on all switches for improper crossover use
  • Downgrade firmware and restore backup configuration (Correct)
  • Allow the contractor to reset switches to factory defaults

Answer : Downgrade firmware and restore backup configuration

Explanation When a condition worsens, it is best to downgrade back to the last known good configuration.

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building. What is the MOST common connector that will be used on the switch to connect the media converter?

Options are :

  • MT-RJ
  • Fiber coupler
  • FDDI
  • ST (Correct)

Answer : ST

Explanation Straight Tip (ST) fiber connections are the most common ones used in fiber optic connections in LAN networking applications, therefore this is most likely the correct answer.

A technician is troubleshooting a desktop connectivity issue. The technician believes a static ARP may be causing the problem. What should the technician do NEXT according to the network troubleshooting methodology?

Options are :

  • Identify a suitable time to resolve the issue on the affected desktop
  • Remove the ARP entry on the user’s desktop (Correct)
  • Document the findings and provide a plan of action
  • Duplicate the issue in a lab by removing the ARP entry

Answer : Remove the ARP entry on the user’s desktop

Explanation Based on the troubleshooting methodology, once you have come up with a probable cause (the static ARP entry), you should try to test your hypothesis. Since this issue has already cause the workstation to not be able to communicate, the best way to test your theory would be to remove the static ARP entry and see if the issue is resolved. If this doesn't fix the issue, you would need to then come up with a new hypothesis, a nd test it as well.

What should be used to ensure a specific device always receives the same IP address?

Options are :

  • DHCP scope
  • Address Lease
  • DHCP relay
  • Reservation (Correct)

Answer : Reservation

Explanation A DHCP reservation ensures that a device gets the same IP Address every time, based on its MAC address.

A client has combined the voice-data circuit from a provider and is getting the maximum download and upload speeds of 2.0Mbps. What service is MOST likely being used?

Options are :

  • ADSL
  • VDSL
  • E1 (Correct)
  • T1

Answer : E1

Explanation E1 service provides symmetric 2.0 Mbps of data service. It can handle voice and digital services (with a mix-n-match service). E1 is the European signal of DS1. E1 has higher bandwidth than T1 because T1 reserves bits for overhead.

A technician has responded to a security issue with an employee's computer. What basic forensic step should be taken NEXT?

Options are :

  • Verify the chain of custody
  • Create the forensics report
  • Secure the area (Correct)
  • Initiate data collection

Answer : Secure the area

Explanation The first step in forensics is to secure the area before you begin data collection, report writing, or verifying the chain of custody.

An organization is involved in a civil court action and needs to ensure their email messages are being retained in case they are needed as evidence in the trial. What describes the requirement to archive and retain email traffic and other correspondence?

Options are :

  • Chain of custody
  • Persistent agents
  • Divide and conquer
  • Legal hold (Correct)

Answer : Legal hold

Explanation Legal hold is a process used by an organization to preserve relevant information in anticipation of possible litigation. Chain of custody is chronological documentation of evidence through transfer and analysis. Persistent agents are used on network endpoints to deal with network intrusions and APIs.

A network administrator has determined that the ingress and egress traffic of a router’s interface are not being correctly reported to the monitoring server. What can be used to determine if the router interface uses 64b vs 32b counters?

Options are :

  • Port Scanner
  • SNMP walk (Correct)
  • Syslog server
  • Packet analyzer

Answer : SNMP walk

Explanation SNMP Walk can be used to determine if the counter is using 32 bits or 64 bits by querying the OID of the endpoint (router interface). This is a complex topic that is actually beyond the scope of the Network+ exam (how to use SNMP Walk), and usually serves as a type of in-depth question asked by CompTIA to ensure no one is getting 100% on the exam!

A technician installs a new WAP and users in the area begin to report poor performance. The technician uses a ping and only 3 of the 5 packets respond. When the technician tests the connection from a wired connection, it responds with 5 of 5 packets. What tool should the network technician use next?

Options are :

  • Packet capture tool
  • Spectrum Analyzer tool (Correct)
  • Interface monitoring tool
  • Port scanner tool

Answer : Spectrum Analyzer tool

Explanation A spectrum analyzer is a device that displays signal amplitude (strength) as it varies by signal frequency. Since the issue only occurs when connecting wirelessly, it is most like a spectrum interference issue.

Workers in a company branch office are required to click on an initial web page and agree to have web surfing mentioned. This is an example of:

Options are :

  • An AUP (Correct)
  • An SLA
  • An end-user license agreement
  • An MOU

Answer : An AUP

Explanation AUP stands for acceptable use policy. If you’re agreeing to what you can and can’t view, you’re agreeing to the policy. MOU is memo of understanding which typically contains an agreement on certain actions. SLA is service-level agreement which is usually made between two companies to state what level of service is expected if machines go down, etc., and when they can expect to be back up and running.

After upgrading a fiber link from 1Gbps, a network technician ran a speed test of the link. The test shows the link is not operating at full speed and connectivity is intermittent. The two buildings are 1.476ft (450m) apart and are connected using CM4 fiber and 10G SR SFPs. The fiber runs through the electrical and boiler rooms of each building. What is likely the cause of the connectivity issues?

Options are :

  • CM1 fiber should be used instead
  • The wrong SFPs are being used (Correct)
  • There is heat from the boiler room
  • There is interference from the electrical room

Answer : The wrong SFPs are being used

Explanation The process of elimination allows us to drop out interference from the electrical room and heat from the boiler room as the heat definitely doesn’t cause connectivity issues. There’s not much information on the CM1 fiber, however, SFPs will work but will not work in a GBIC port intended for SFP+.

An administrator has configured a new 100Mbps WAN circuit, but speed testing shows poor performance when downloading larger files. The download initially reaches close to 100Mbps but begins to drop and show spikes in the download speeds over time. The administrator checks the router interface and sees the following:

Router01# show interface eth 1/1
GigabitEthernet 1/1 is up, line is up
Hardware is GigabitEthernet, address is FF12.CDEA.1426 
Configured speed auto, actual 1Gbit, configured duplex fdx, actual fdx
Member of L2 VLAN 1, port is untagged, port state is forwarding 

What is the best solution to resolve this issue?

Options are :

  • Reset the statistics counter for this interface
  • Remove default 802.1q tag and set to server VLAN (Correct)
  • Apply egress port rate-shaping
  • Shutdown and then re-enable this interface

Answer : Remove default 802.1q tag and set to server VLAN

Explanation Since the VLAN port is untagged, it can be slowing down performance. It is recommended to remove the default VLAN tag and setup a server VLAN to increase performance.

A network technician at a warehouse must implement a solution that will allow a company to track shipments as they enter and leave the facility. The warehouse workers must be able to scan and concurrently upload large images of items to a centralized server. What solution should they choose?

Options are :

  • Bluetooth
  • P2P
  • 802.11ac (Correct)
  • IR

Answer : 802.11ac

Explanation 802.11ac is a very fast high-speed Wi-Fi network capable of 1 Gbps speeds over a 5 Ghz spectrum – perfect for uploading large image files quickly. Additionally, the warehouse might want to also utilize RFID to allow for the accurate scanning of items using radio frequency tracking tags.

A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure. What allows 802.11n to reach higher speeds?

Options are :

  • MIMO (Correct)
  • PoE

Answer : MIMO

Explanation One way 802.11n achieves superior throughput is through the use of a technology called multiple input, multiple output (MIMO). MIMO uses multiple antennas for transmission and reception.

An increased amount of web traffic to an e-commerce server is observed by a network administrator, but without an increase in the number of financial transactions. What kind of attack might the company be experiencing?

Options are :

  • ARP cache poisoning
  • DoS (Correct)
  • Bluejacking
  • Phishing

Answer : DoS

Explanation A DoS attack or Denial-of-Service attack works by overloading a server with multiple requests (more than it can handle), thus eventually knocking the server offline.

A technician is tasked with troubleshooting a network’s slowness. While troubleshooting, the technician is unable to ping any external websites. Users report they are able to access the sites using the web browsers. What is the MOST likely cause?

Options are :

  • TACACS misconfiguration
  • ICMP traffic being blocked by the firewall (Correct)
  • MTU black hole
  • VLAN hopping

Answer : ICMP traffic being blocked by the firewall

Explanation Many companies block ICMP at the firewall, causing PING to fail since it relies on ICMP. If the user can access the site in the web browser but not by PING, this is usually the cause.

A company that was previously running on a wired network is performing office-wide upgrades. A department with older desktop PCs that do not have wireless capabilities must be migrated to the new network, ensuring that all computers are operating on a single network. Assuming CAT5e cables are available, what device should a network technician use to connect all the devices to the wireless network?

Options are :

  • VPN concentrator
  • Wireless router (Correct)
  • Wireless bridge
  • Default WAP

Answer : Wireless router

Explanation Wireless bridge and WAP are both examples of wireless network extenders. They will not work without a wireless router. Also, a wireless router has physical Ethernet ports in order to connect the older desktop PCs using a NIC.

A company plan that establishes how to resume normal system operations following a disruption in business would be described as ____________.

Options are :

  • User awareness training
  • Disaster recovery
  • First responders
  • Business continuity (Correct)

Answer : Business continuity

Explanation Business Continuity (BC) is defined as the capability of the organization to continue the delivery of products or services at acceptable predefined levels following a disruptive incident. The keywords in this question are "disruption in business".

What refers to a network that spans several buildings that are within walking distance of each other?

Options are :

  • WAN
  • MAN
  • CAN (Correct)
  • PAN

Answer : CAN

Explanation A campus area network (CAN) is a network of multiple interconnected local area networks (LAN) in a limited geographical area.

A network administrator wants to logically separate web servers on the network. What network device will need to be configured?

Options are :

  • HIDS
  • IPS
  • Switch (Correct)
  • Hub

Answer : Switch

Explanation Logical separation of network devices is accomplished using VLANs, which is configured on the network switches.

What benefit does network segmentation provide?

Options are :

  • Link aggregation
  • Security through isolation (Correct)
  • High availability through redundancy
  • Packet flooding through all ports

Answer : Security through isolation

Explanation Network segmentation in computer networking is the act of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security through isolation.

What is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

Options are :

  • DOCSIS modem
  • Access point
  • Multilayer switch
  • Analog modem (Correct)

Answer : Analog modem

Explanation An analog modem is a device that converts the computer's digital pulses to tones that can be carried over analog telephone lines, and vice versa. The other type of Internet connection that occurs over an RJ-11 (phone line) is DSL.

A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and a minimal weight as it will be mounted on the outside of the building. What kind of antenna should they choose?

Options are :

  • Parabolic
  • Halo
  • Omni-directional
  • Patch (Correct)

Answer : Patch

Explanation A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern. A yagi antenna could also be used, but if the distance is smaller than about 300 feet between the buildings, using a Patch antenna would be sufficient. For longer distances, a Yagi would be utilized.

When installing a network cable with multiple strands, a network technician pulled the cable past a sharp edge and exposes the copper conductor on several of the wire strands. These exposed wires come into contact with each other forming an electrical connection. What condition is created?

Options are :

  • Open
  • Short (Correct)
  • Twisted Pair
  • Crosstalk
  • Electrostatic discharge

Answer : Short

Explanation A short in electrical terms is an abbreviation for a short circuit. This generally means that there is an unintended connection between two points allowing current to flow where it should not. In your particular case, it means that a cable is damaged and that two or more of the conductors are connected together causing the cable to fail.

A technician has attempted to optimize the network but some segments are still reporting poor performance. What issue should the technician look at?

Options are :

  • Switch incorrectly set to full duplex
  • Packet bottlenecks (Correct)
  • Conflicting IP addresses
  • IP address scope depletion

Answer : Packet bottlenecks

Explanation A bottleneck occurs when bandwidth is unable to accommodate large amounts of system data at designated data transfer rate speed, typically caused by TCP/IP data interruption or other performance issues.

An organization wants to improve its ability to detect infiltration of servers in a DMZ. IPS/IDS solutions are currently located on the edge between DMZ and Untrust, and DMZ and Trust. What can increase visibility inside the DMZ?

Options are :

  • Honeypot
  • NAC server
  • Layer 7 firewall (Correct)
  • Host-based firewalls in the DMZ

Answer : Layer 7 firewall

Explanation Layer 7 firewalls are at the application layer. They allow you to choose your security at a more granular (almost undetectable) level.

A network administrator is noticing slow response times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC. What should the network administrator do?

Options are :

  • Update the Ethernet drivers to use 802.3
  • Add additional network cards to the server (Correct)
  • Add a honeypot to reduce traffic to the server
  • Disable CSMA/CD on the network

Answer : Add additional network cards to the server

Explanation Adding dual NICs to the server can increase the bandwidth at the server and minimize congestion.

What needs to be configured to allow jumbo frames on a network?

Options are :

  • MTU (Correct)
  • MAC
  • MAC
  • MIBS

Answer : MTU

Explanation MTU is the largest unit that can be transmitted across a network.

What applies to data as it travels from Layer 1 to Layer 7 of the OSI model?

Options are :

  • Tunneling
  • De-encapsulation (Correct)
  • Encapsulation
  • Tagging

Answer : De-encapsulation

Explanation De-encapsulation occurs as the data travels up the OSI layers.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions