CompTIA Network+ N10-008 Mike Meyers - TOTAL: Network+ Certification N10-008 Udemy Course
Routers operate at Layer 3 (Network Layer) of the OSI model. This layer handles logical addressing (like IP addresses) and determines the best path for data to travel across networks.
At which Layer of the OSI Model do Routers Operate?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 3 (Network Layer)
Key Terms
At which Layer of the OSI Model do Routers Operate?
Layer 1
Layer 2
Layer 3
Layer 4
Layer 3 (Network Layer)
How many Bytes can a Frame hold?
Approximately 1500 Bytes
Approximately 1200 Bytes
Approximately 1000 Bytes
Approximately 600 Bytes
Approximately 1500 Bytes
Which of the following is an Example of a VALID MAC Address?
GG:00:45:ZC:00:4F
0A:24:D3:00:00:FF
Z0:4F:9H:6F:22:00
99:00:FF:FF:FH:11
0A:24:D3:00:00:FF
On which Layer of the OSI Model do NICs Operate?
Layer 1
Layer 2
Layer 7
Layer 6
Layer 2 (Data Link Layer)
Which device is used to connect two computers on two different networks?
Hub
Switch
Firewall
Router
Router
Which network topology uses a Central Device to connect All Hosts?
Star
Bus
Ring
Mesh
Star
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
| Term | Definition |
|---|---|
At which Layer of the OSI Model do Routers Operate? Layer 1 | Layer 3 (Network Layer) |
How many Bytes can a Frame hold? Approximately 1500 Bytes | Approximately 1500 Bytes |
Which of the following is an Example of a VALID MAC Address? GG:00:45:ZC:00:4F | 0A:24:D3:00:00:FF |
On which Layer of the OSI Model do NICs Operate? Layer 1 | Layer 2 (Data Link Layer) |
Which device is used to connect two computers on two different networks? Hub | Router |
Which network topology uses a Central Device to connect All Hosts? Star | Star |
Which type of Radio Grade (RG) is the most common for Coaxial Cable? RG-59 | RG-6 |
Which of the following BEST describes an advantage of Coaxial Cable? Very easy to work with when installing | Highly resistant to EMI |
Which is the main difference between Multimode and Single-mode Fiber? Multimode uses LED and Single-mode uses Laser | Multimode uses LED and Single-mode uses Laser |
There was recently a fire in the building in which you work and the UTP cabling was completely burned and gave off a very strong odor. Which grade of cabling was used? Plenum Grade | PVC Grade |
Which of the following is NOT part of the Basic Ethernet Frame? FCS | Source IP Address Explanation: FCS/CRC (Frame Check Sequence) > Data TYPE > DATA > MAC Address (Source & Destination) |
What type of Connector is used for Terminating a UTP Cable? RJ-11 | RJ-45 |
What is the order of Colors for the 568B standard? Orange/White + Orange + Green/White + Blue + Blue/White + Green + Brown/White + Brown Green/White + Green + Orange/White + Blue + Blue/White + Orange + Brown/White + Brown Green/White + Blue + Orange/White + Blue + Brown/White + Brown + Blue/White + Green Orange/Blue + Brown/White + Brown + Orange/White + Green + Blue/White | Orange/White + Orange + Green/White + Blue + Blue/White + Green + Brown/White + Brown Explanation: (My Take) The Greens are in the Front for 568A. |
What is the MAIN difference between a Hub and a Switch? A Hub puts all Hosts in their own Collision Domain | A Switch puts all Hosts in their own Collision Domain. Explanation: In contrast, with Switches, each Host belongs to it’s own Collision Domain, eliminates the possibility of Collisions on a Switch because of Point to Point Connections. The same is true for Bridges, Switches, and Routers. |
Which Technology is used for Devices to listen and see who is communicating? ARP | CSMA/CD Explanation: ARP is a Method used to get the MAC Address of Hosts. Full-Duplex is a Communication Mode where two devices can talk at the same time. CSMA/CA is for Collision Avoidance rather than Detection. |
Which of these would be an example of Full Duplex? Using a CB Radio | Talking on the Phone |
A Network Tech can connect two Switches with a Standard Straight-Through Cable. Why? Today’s Switches have Auto-Sensing Ports | Today’s Switches have Auto-Sensing Ports |
Which of the following standards uses Fiber Optic? 100Base-T | 1000Base-LX |
There is a Small Network in an office with Two Switches connected to each other. A New Network Tech installs a Third Switch and connects it to the Second Switch. After this, the whole Network Crashes. Why would this happen? The Network Tech created a Switching Loop | The Network Tech created a Switching Loop |
Which piece of hardware can be installed into a Switch to allow a Fiber Connection? RJ-11 Connector | SFP (Small Form-Factor Pluggable) Explanation: (My Take) Gigabit Interface Converter (GBIC) Bidirectional (BIDI) |
Which of the following is NOT part of the Structured Cabling System? Horizonal Runs | Wall Jacks |
Which Tool is used to connect UTP Cable to a 110-Block? Punchdown Tool | Punchdown Tool |
You are talking to a Network Tech. He mentions the MDF and the IDF. What is the difference between the two of them? The IDF is where the Main Equipment is stored for your Network. | The MDF is where the Main Equipment is stored for your Network Explanation: IDF = Intermediate Distribution Frame - Telecommunications Room, The room where all the horizontal runs from all the work areas on a given floor in a building come together. |
When troubleshooting Structured Cabling, you notice that you cannot access any Network resources or get on the Internet. You cannot even ping another Host on your Subnet. What would be the MOST logical thing to check first? The Horizonal Runs | If the NIC has a Link Light Explanation: Checking for an IP Address is an Earlier Step, it isn’t the MOST logical one based on the problem. |
How many inches is a "U"? 1.5" | 1.75" |
What would 239 be in Binary? 10101010 | 11101111 |
What is the Broadcast Address for ARP? FF:FF:FF:FF:FF:FF | FF:FF:FF:FF:FF:FF |
Which command will show the ARP Cache? arp -v | arp -a |
What would the Subnet Mask be for Network 172.16.3.0 /24? 255.255.0.0 | 255.255.255.0 |
When using Class Licenses, what is the Range for a Class A IP Address? 0 - 126 | 0 - 126 Explanation: |
What would the Subnet Mask be for a Network that is 194.55.4.3 /26? 255.255.255.0 | 255.255.255.192 |
Which Protocol uses UDP? TFTP | TFTP (Trivial File Transfer Protocol) Explanation: |
Many users are complaining that they cannot get on the Internet. You arrive at one user's computer and ping the company's Router and it's successful. What would be the next command you should type? netstat | tracert Explanation: |
Elliot is a new Network Tech at a company, and he is learning about Wireshark. He asks you the general purpose of the program. What would you say is the BEST description of Wireshark? It is a tool that captures packets and frames and examines them at a more granular level. | It is a tool that captures packets and frames and examines them at a more granular level. |
You are using netstat, and you want to show all Active Ports. What would you type? netstat -n | netstat -a Explanation: |
Which PORT does HTTP use? 20 | 80 |
What is the proper name for a DNS server that can respond to a query with their own DNS information? Authoritative | Authoritative |
Which type of record is used with IPv4? AAAA Record | A Record Explanation: |
You type www.google.com and you receive an error. However, if you type a known IP address for Google, it works. What might be the problem? DHCP Scope Issue | DNS (Domain Name System) Explanation: |
You are using DHCP on your home Network, but you cannot access a Web Site based on its Host Name. What is MOST likely the problem? You have an APIPA Address | You are not getting DNS Settings from DHCP |
Which tool is used for testing DNS using a third-party tool? dig | dig |
What is an example of Authentication? Accessing a Folder you were granted rights to? | Proving through Credentials that you have rights to a System. |
What are the 3 Methods of Security Access to a System? Identification, Authentication, Authorization | Identification, Authentication, Authorization |
A User needs to enter a high clearance area that requires a PIN on a touchpad and a retinal scan. What type of authentication is this? Multi-factor Authentication | Multi-factor Authentication |
Which would be an example of Role-Based Access control? Logging in with a Username and Password to Access a System | Assigning Rights to a Folder based on a User Explanation: Authentication is Logging in with a Username and Password Mandatory Access Control is Labeling a Resource with a Specific Name that would provide Access Discretionary Access Control is placing an "Owner" Label on a User Account |
Which of the following is a benefit of Virtualization? It allows you to create more efficient VPNs | Hardware consolidation |
What is meant by Network Function Virtualization (NFV)? It removes the control plane and replaces it with a Network Control that dictates how physical and virtual devices move traffic. | It is a Network Architecture that describes how physical network devices will be virtualized |
In Cloud Computing, what is meant by Elasticity? Increasing or decreasing application instances based on need. | Increasing or decreasing application instances based on need. |
You have an application that you are developing, but you don't want the hassle of setting up servers, ACLs, backups, and managing them. Which type of cloud service would you use? Software as a Service (SaaS) | Platform as a Service (PaaS) |
When discussing Infrastructure as Code (IaC), what does automation mean? Using code to provision and maintain systems in a consisten manner. | Using code to provision and maintain systems in a consisten manner. |
Which of the following data center implementations connects the access and core layers through the distribution layer? Spine-and-Leaf Architecture | Three-Tiered Architecture (Classic) |
Big Corp's data center has a fiber and cable ISP. What aspect of security does this represent? Active-Passive | Redundancy |
Which document contains details about all the hardware and software installed in a datacenter and provides the foundation for future upgrades? Baseline Configuration | Baseline Configuration |
What network type connects multiple networks within a city range? Wide Area Network (WAN) | Metropolitan Area Network (MAN) |
Which is an example of IoT using your wireless network to connect to IoT Services? Amazon Echo base connecting to your home router. | Amazon Echo base connecting to your home router. |
You have several devices connected to your network. You recently purchased cameras for your house. What would be the BEST way to secure your cameras so nobody can hack you and get the footage? Place a physical lock on the cameras | Place the cameras in a separate VLAN |
With VoIP, which Port does Session Initiation Protocol (SIP) use? 3389 | 5060/5061 |
Which policy describes what users can and cannot do with company equipment? Acceptable Use Policy (AUP) | Acceptable Use Policy (AUP) |
You work as a Network Tech for an advertising agency. The art departement is going to be going from local installation of Adobe products to the Adobe Creative Cloud. After the conversion, which document should you update? Statement of Work (SOW) | Change Management |
What would be the MOST efficient method of installing Windows 10 Updates on Host Systems that are on the Network? Configure a deployment server that will pass all updates down to hosts. | Test the updates first on a Virtual Machine to ensure their stability. Explanation: |
What would be an example of an external threat to Network Assets? Hackers | Hackers |
What would be the BEST example of a posture assessment? Assessing possible threats from threat actors | Assessing possible threats from threat actors |
The CIA Model is a basic model for security. What does CIA stand for? Confidentiality, Integrity, and Availability | Confidentiality, Integrity, and Availability |
Which would be an example of a Denial of Service (DoS) Attack? Masquerading | Ping Flood |
Which would be the BEST example of an On-Path Attack (Man-in-the-Middle)? Listening in on a conversation between two network administrators. | Connecting a laptop to an access point to sniff packets and intercept them. |
A standard user in a company receives an email from what looks like her bank. It requests that she click on a link to fix her account information. What type of social engineering is this? Phishing | Phishing |
Which type of Malware seems innocent until you perform a specific action? Trojan | Trojan |
When discussing end of life for a device, what is an important thing to have within your oganization? Asset Tags | Asset Tags |
Which tool allows Network admins to manage their Network remotely? ICMP | SNMP (Simple Network Management Protocol) |
Which is the most common tool used for Network Monitoring? Syslog | Syslog |
What might be an example of a Network metric? Memory Timings | Bandwidth Use Explanation: |
Which might be an example of an SNMP Agent? A computer that needs to manage a printer on the Network | A Printer that needs to be managed from another computer. |
What is the purpose of SIEM? It is a technology that handles all types of security monitoring and management. | It is a technology that handles all types of security monitoring and management. |
A user calls and says they cannot get onto the Internet. Based on the Troubelshooting Model, what would be the first question to ask? What is the error that is coming up? | What is the error that is coming up? |
A user calls and says that they are getting an error while loading the company web page. You go over and try to get onto www.totalsem.com, it doesn't work. However, you type a known IP Address for totalsem and it works. You realize it is a DNS Problem. What do you do next? Reboot the DNS Server | Establish a theory of why it is a DNS problem. |