Repaso del examen Comptia Network Plus N10–008
5 min readFeb 12, 2023
El examen solamente lo dan en ingles o en japones, para su beneficio dejare este repaso en ingles, a sabiendas que te familiarices mejor con el lenguaje.
- Will allow multiple Web Servers to act as one?:Load balancer
- A NIC that processes all packets, regardless of MAC address:Promiscuos mode
- TIA/EIA568A and TIA/EIA568B differs in:Green and Orange
- One end is a TIA/EIA568A and the other end is a TIA/EIA568B:Crossover cable
- Router maybe also know as:Layer 3 switch
- Whats is the minimum CAT level required for 100BaseTX?:CAT5
- How fast is a T1 line?:1.54Mbps
- 802.11a operates in the ______ and is capable of the speed_____:5GHz 54Mbps
- Also know as APIPA address:169.254.100.66
- Will allow a network admin to give priority to certain traffic vs other:QOS
- A cable that is terminated with a DB-9 connector: RS232
- This PBX provide a limit of 23 simultaneous connections :PRI
- Which network device operates at Layer 2?:A switch
- Eavesdrop on the wireless traffic?:Evil Twin
- What tool would a network technician use to troubleshoot a span of single-mode fiber cable?:OTDR
- Which of the following needs to be configured to allow jumbo frames on a network?:MTU
- Is addressed to a group of destination computers simultaneously: Multicast
- A IPv4 Private IP address is:192.168.5.10
- The local link address for IPv6 is ::1
- One of these is a MAC address: 00–15–5D-95-BD-FA
- The length of the MAC address is: 48bits
- The length of the Ipv4 address is: 32bits
- The length of the Ipv6 address is:128bits
- Hexadecimal is base on: 16 characters
- It is display on using hexadecimal characters: IPv6
- Used for the VOIP phones: SRTP/SIP
- Is a compact representation of an IP address: CIDR
- From one point in the network to another point:Unicast
- Routing protocol:EIGRP
- PoE and PoE+ also now as: 802.3af, 802.3at
- Is a method we can use to automatically configure IPv6 host addresses:EUI-64 (Extended Unique Identifier)
- Record must always point to another domain name, never directly to an IP address: CNAME
- All CAT cables inside a building are require by fire code to have:Plenum
- To improve network speed from the server, we can do:NIC Teaming
- The initial training a user is expected to get, to understand the organization policies or procedures: On-boarding
- How are the wires terminate in the IDF?110 block
- A developer is designing an application to use a fiber network-based remote storage: SAN
- During the initialization process, a desktop VoIP phone uses TFTP to receive a configuration file, so it will need the port ________ open:udp/69
- It will take a formidable amount of time to get your site back online due to this recovery policy of:Cold sites
- The user enable ________ on the BIOS, because he will be installing a OS using the LAN:(PXE)
- This building will require a 10 gigabits per second connection for 85 meters, so I will be using:CAT6A
- A network administrator needs to make some configuration changes to the organization’s core switches, it will probably use:SSH
- An insider threat has installed malware onto a server that will delete all operating system files on the first day of December:Logic bomb
- A IT Tech workstation believes that the access point is too far away:Attenuation
- Can’t play Fornite because there’s a excessive delays between individual packets:Jitter
- I will use ___________ to query the name servers: dig
- The new PBX use SIP and RTP, so the administrator will have to open ports __________ on the firewall.:SIP 5060, 5061
- Usually this transmission medium is the more reliable: Fiber
- The ISP is having issues with the line, I will have to use a Out-of-band management, to configure the domain controller: Modem
- A network engineer is concerned that nearby wireless networks may be interfering with internal wireless communication:Spectrum analyzer
- The email servers no longer work because, the junior administrator change: Record types MX
- What type of cable would you use to connect a PC to a PC?Crossover cable
- A technique used by hackers to perform a man-in-the-middle attack on a wireless network is:Evil Twin
- The network technician decides the company needs to view all the security logs in a single place. Which system should be used?:SIEM
- Which network device operates at Layer 2?:Switch
- Which of the following wireless characteristic does channel bonding improve?:Connection Speed
- The __________ will give the private ip address to the computers: DHCP server
- The BGP is used on the __________ to perform communication without user intervention. Routers
- Used to show all the current network connections on the PC.: netstat -an
- Used to show the MAC Address on the PC: ipconfig
- A ___________ device is a device with network interfaces that can originate and understand both IPv4 and IPv6 packets.:dual-stack
- It is a completely message-based protocol, and is used mainly in vehicles:CAN
- Communication between two electronic devices over a distance of 4 cm (11⁄2 in) or less.:NFC
- It is used in con-tactless payment: NFC
- A ____________ optical fiber holds advantages in terms of bandwidth and reach for longer distances: Single-mode
- _____________ is used for Packet/traffic analysis. :WireShark
- _____________ allowing maintenance of computers and other devices over a network.:RDP
- Is a a network diagnostic tool used to track in real-time the pathway taken by a packet on an IP network from source to destination:Tracert
- A single security appliance, that provides multiple security functions at a single point on the network:UTM
- Is a layer 3 encryption protocol that encrypts the entire payload and is required for IPv6, but not mandatory to use it.: IPSec
- The ___________ is the protocol used by the Internet for naming machines.:Dynamic Naming System
- Automatically configures DHCP clients that are unable to find a DHCP server.:APIPA
- 802.11a operates only on the 5GHZ frequency range, it is capable of speeds up to.:54Mbps
- Allow VLAN frames for traveling between switches: Trunking
- Disable the broadcast storm, when some made a bad network connection: Spanning Tree
- Bluetooth frequency range: 2.4Ghz — 2.485GHz
- Change the MTU value over 1500 bytes: Jumbo frame
- Can monitor almost any type of network devices: SNMP Agent
- Locate the fault on a fiber optic network: OTDR
- Email retrieval IMAP4 runs on port: 143
- Mirrors of the original site: hot sites
- Cisco router will be manage using: Rollover Cable or USB-C cable
- Using a ticket granting server: Kerberos
- In Linux will allow to configure a firewall: iptables
- VLAN trunking : 802.1q
- Spanning Tree Protocol: 802.1d
- Create a unique user/name password for every guest in the hotel: Captive Portal
- OSI Model Layer 7: Application Layer
- OSI Model Layer 4: Transport Layer
- Used to create a remote encrypted terminal connection with Linux: SSH