Repaso del examen Comptia Network Plus N10–008

Edgardo Trujillo
5 min readFeb 12, 2023

El examen solamente lo dan en ingles o en japones, para su beneficio dejare este repaso en ingles, a sabiendas que te familiarices mejor con el lenguaje.

  1. Will allow multiple Web Servers to act as one?:Load balancer
  2. A NIC that processes all packets, regardless of MAC address:Promiscuos mode
  3. TIA/EIA568A and TIA/EIA568B differs in:Green and Orange
  4. One end is a TIA/EIA568A and the other end is a TIA/EIA568B:Crossover cable
  5. Router maybe also know as:Layer 3 switch
  6. Whats is the minimum CAT level required for 100BaseTX?:CAT5
  7. How fast is a T1 line?:1.54Mbps
  8. 802.11a operates in the ______ and is capable of the speed_____:5GHz 54Mbps
  9. Also know as APIPA address:169.254.100.66
  10. Will allow a network admin to give priority to certain traffic vs other:QOS
  11. A cable that is terminated with a DB-9 connector: RS232
  12. This PBX provide a limit of 23 simultaneous connections :PRI
  13. Which network device operates at Layer 2?:A switch
  14. Eavesdrop on the wireless traffic?:Evil Twin
  15. What tool would a network technician use to troubleshoot a span of single-mode fiber cable?:OTDR
  16. Which of the following needs to be configured to allow jumbo frames on a network?:MTU
  17. Is addressed to a group of destination computers simultaneously: Multicast
  18. A IPv4 Private IP address is:192.168.5.10
  19. The local link address for IPv6 is ::1
  20. One of these is a MAC address: 00–15–5D-95-BD-FA
  21. The length of the MAC address is: 48bits
  22. The length of the Ipv4 address is: 32bits
  23. The length of the Ipv6 address is:128bits
  24. Hexadecimal is base on: 16 characters
  25. It is display on using hexadecimal characters: IPv6
  26. Used for the VOIP phones: SRTP/SIP
  27. Is a compact representation of an IP address: CIDR
  28. From one point in the network to another point:Unicast
  29. Routing protocol:EIGRP
  30. PoE and PoE+ also now as: 802.3af, 802.3at
  31. Is a method we can use to automatically configure IPv6 host addresses:EUI-64 (Extended Unique Identifier)
  32. Record must always point to another domain name, never directly to an IP address: CNAME
  33. All CAT cables inside a building are require by fire code to have:Plenum
  34. To improve network speed from the server, we can do:NIC Teaming
  35. The initial training a user is expected to get, to understand the organization policies or procedures: On-boarding
  36. How are the wires terminate in the IDF?110 block
  37. A developer is designing an application to use a fiber network-based remote storage: SAN
  38. During the initialization process, a desktop VoIP phone uses TFTP to receive a configuration file, so it will need the port ________ open:udp/69
  39. It will take a formidable amount of time to get your site back online due to this recovery policy of:Cold sites
  40. The user enable ________ on the BIOS, because he will be installing a OS using the LAN:(PXE)
  41. This building will require a 10 gigabits per second connection for 85 meters, so I will be using:CAT6A
  42. A network administrator needs to make some configuration changes to the organization’s core switches, it will probably use:SSH
  43. An insider threat has installed malware onto a server that will delete all operating system files on the first day of December:Logic bomb
  44. A IT Tech workstation believes that the access point is too far away:Attenuation
  45. Can’t play Fornite because there’s a excessive delays between individual packets:Jitter
  46. I will use ___________ to query the name servers: dig
  47. The new PBX use SIP and RTP, so the administrator will have to open ports __________ on the firewall.:SIP 5060, 5061
  48. Usually this transmission medium is the more reliable: Fiber
  49. The ISP is having issues with the line, I will have to use a Out-of-band management, to configure the domain controller: Modem
  50. A network engineer is concerned that nearby wireless networks may be interfering with internal wireless communication:Spectrum analyzer
  51. The email servers no longer work because, the junior administrator change: Record types MX
  52. What type of cable would you use to connect a PC to a PC?Crossover cable
  53. A technique used by hackers to perform a man-in-the-middle attack on a wireless network is:Evil Twin
  54. The network technician decides the company needs to view all the security logs in a single place. Which system should be used?:SIEM
  55. Which network device operates at Layer 2?:Switch
  56. Which of the following wireless characteristic does channel bonding improve?:Connection Speed
  57. The __________ will give the private ip address to the computers: DHCP server
  58. The BGP is used on the __________ to perform communication without user intervention. Routers
  59. Used to show all the current network connections on the PC.: netstat -an
  60. Used to show the MAC Address on the PC: ipconfig
  61. A ___________ device is a device with network interfaces that can originate and understand both IPv4 and IPv6 packets.:dual-stack
  62. It is a completely message-based protocol, and is used mainly in vehicles:CAN
  63. Communication between two electronic devices over a distance of 4 cm (11⁄2 in) or less.:NFC
  64. It is used in con-tactless payment: NFC
  65. A ____________ optical fiber holds advantages in terms of bandwidth and reach for longer distances: Single-mode
  66. _____________ is used for Packet/traffic analysis. :WireShark
  67. _____________ allowing maintenance of computers and other devices over a network.:RDP
  68. Is a a network diagnostic tool used to track in real-time the pathway taken by a packet on an IP network from source to destination:Tracert
  69. A single security appliance, that provides multiple security functions at a single point on the network:UTM
  70. Is a layer 3 encryption protocol that encrypts the entire payload and is required for IPv6, but not mandatory to use it.: IPSec
  71. The ___________ is the protocol used by the Internet for naming machines.:Dynamic Naming System
  72. Automatically configures DHCP clients that are unable to find a DHCP server.:APIPA
  73. 802.11a operates only on the 5GHZ frequency range, it is capable of speeds up to.:54Mbps
  74. Allow VLAN frames for traveling between switches: Trunking
  75. Disable the broadcast storm, when some made a bad network connection: Spanning Tree
  76. Bluetooth frequency range: 2.4Ghz — 2.485GHz
  77. Change the MTU value over 1500 bytes: Jumbo frame
  78. Can monitor almost any type of network devices: SNMP Agent
  79. Locate the fault on a fiber optic network: OTDR
  80. Email retrieval IMAP4 runs on port: 143
  81. Mirrors of the original site: hot sites
  82. Cisco router will be manage using: Rollover Cable or USB-C cable
  83. Using a ticket granting server: Kerberos
  84. In Linux will allow to configure a firewall: iptables
  85. VLAN trunking : 802.1q
  86. Spanning Tree Protocol: 802.1d
  87. Create a unique user/name password for every guest in the hotel: Captive Portal
  88. OSI Model Layer 7: Application Layer
  89. OSI Model Layer 4: Transport Layer
  90. Used to create a remote encrypted terminal connection with Linux: SSH

--

--