ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 74

Question list
Search
Search

List of questions

Search

Related questions











Which of the following OSI model layers will ensure messages are transmitted to their destinations and no data is duplicated?

A.
Session
A.
Session
Answers
B.
Data link
B.
Data link
Answers
C.
Network
C.
Network
Answers
D.
Transport
D.
Transport
Answers
Suggested answer: D

Explanation:

The transport layer is the fourth layer of the OSI model, and it is responsible for end-to-end delivery of data over a network. It uses standard protocols such as TCP, UDP, and DCCP to enhance its functionalities. One of the main functions of the transport layer is to ensure that messages are transmitted to their destinations reliably and in the correct order.It also prevents data duplication by using sequence numbers, acknowledgments, and retransmission mechanisms

A firewall administrator observes log entries of traffic being allowed to a web server on port 80 and port 443. The policy for this server is to only allow traffic on port 443. The firewall administrator needs to investigate how this change occurred to prevent a reoccurrence. Which of the following should the firewall administrator do next?

A.
Consult the firewall audit logs.
A.
Consult the firewall audit logs.
Answers
B.
Change the policy to allow port 80.
B.
Change the policy to allow port 80.
Answers
C.
Remove the server object from the firewall policy.
C.
Remove the server object from the firewall policy.
Answers
D.
Check the network baseline.
D.
Check the network baseline.
Answers
Suggested answer: A

Explanation:

Firewall audit logs are records of the changes made to the firewall configuration, policies, and rules. They can help the firewall administrator to track who, when, and what changes were made to the firewall, and identify any unauthorized or erroneous modifications that could cause security issues or network outages.By consulting the firewall audit logs, the firewall administrator can investigate how the change that allowed traffic on port 80 to the web server occurred, and prevent it from happening again

A technician just validated a theory that resolved a network outage. The technician then verified that all users could access resources. Which of the following is the next step the technician should take in the network troubleshooting methodology?

A.
Verify the services are restored.
A.
Verify the services are restored.
Answers
B.
Test a new theory.
B.
Test a new theory.
Answers
C.
Write the lessons learned.
C.
Write the lessons learned.
Answers
D.
Identify where the network outage is occurring.
D.
Identify where the network outage is occurring.
Answers
Suggested answer: C

Explanation:

The network troubleshooting methodology is a systematic process of identifying and resolving network problems.It consists of eight steps:

1. Identify the problem.

2. Establish a theory of probable cause.

3. Test the theory to determine the cause.

4. Establish a plan of action to resolve the problem and identify potential effects.

5. Implement the solution or escalate as necessary.

6. Verify full system functionality and, if applicable, implement preventive measures.

7. Document findings, actions, and outcomes.

8. Write the lessons learned.

The last step, writing the lessons learned, is important for improving the network troubleshooting skills and knowledge. It involves reviewing the entire troubleshooting process, analyzing the root cause of the problem, evaluating the effectiveness of the solution, and identifying any best practices, tips, or tools that can be used for future reference.Writing the lessons learned can also help to update the network documentation, policies, and procedures, and share the experience and feedback with other network professionals

A network engineer is troubleshooting application connectivity issues between a server and a client. The network engineer needs to view the certificate exchange between the two hosts. Which of the following tools should the network engineer use?

A.
dig
A.
dig
Answers
B.
tcpdump
B.
tcpdump
Answers
C.
nmap
C.
nmap
Answers
D.
traceroute
D.
traceroute
Answers
Suggested answer: B

Explanation:

tcpdump is a tool that can capture and analyze network traffic, including the certificate exchange between two hosts. It can display the contents of packets, such as the SSL/TLS handshake, which involves the exchange of certificates. dig is a tool that can query DNS servers for domain name information. nmap is a tool that can scan ports and services on a network. traceroute is a tool that can show the path and hops between a source and a destination.

A security engineer wants to provide a secure, dedicated, alternate access method into an IT network infrastructure to administer connected devices and IT assets. Which of the following is the engineer most likely to implement?

A.
Remote desktop gateway
A.
Remote desktop gateway
Answers
B.
Authentication and authorization controls
B.
Authentication and authorization controls
Answers
C.
Out-of-band management
C.
Out-of-band management
Answers
D.
Secure Shell
D.
Secure Shell
Answers
Suggested answer: C

Explanation:

Out-of-band management is a method of accessing network devices and IT assets through a dedicated channel that is separate from the normal data traffic. This provides a secure and alternate way to administer the network infrastructure, especially in case of failures or emergencies. Remote desktop gateway is a service that allows remote access to desktops and applications on a network. Authentication and authorization controls are mechanisms that verify the identity and permissions of users and devices on a network. Secure Shell is a protocol that encrypts the communication between a client and a server on a network.

A network technician is troubleshooting a port channel issue. When logging in to one of the switches, the technician sees the following information displayed:

Native VLAN mismatch detected on interface g0/1

Which of the following layers of the OSI model is most likely to be where the issue resides?

A.
Layer 2
A.
Layer 2
Answers
B.
Layer 3
B.
Layer 3
Answers
C.
Layer 5
C.
Layer 5
Answers
D.
Layer 6
D.
Layer 6
Answers
Suggested answer: A

Explanation:

Layer 2 of the OSI model is the data link layer, which is responsible for transferring data between adjacent nodes on a network. It uses protocols such as Ethernet, PPP, and HDLC to encapsulate data into frames and add MAC addresses for source and destination identification.It also uses protocols such as STP, LACP, and CDP to manage the physical links and prevent loops, aggregate bandwidth, and discover neighboring devices12

A native VLAN mismatch is a common Layer 2 issue that occurs when two switches are connected by a trunk port, but have different native VLANs configured on their interfaces. A native VLAN is the VLAN that is assigned to untagged frames on a trunk port. If the native VLANs do not match, the switches will drop the untagged frames and generate an error message.This can cause connectivity problems and security risks on the network345

To resolve a native VLAN mismatch, the network technician should ensure that both switches have the same native VLAN configured on their trunk ports, or use a different port mode such as access or general.

A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers?

A.
Coaxial over Ethernet
A.
Coaxial over Ethernet
Answers
B.
Internet Small Computer Systems Interface
B.
Internet Small Computer Systems Interface
Answers
C.
Fibre Channel
C.
Fibre Channel
Answers
D.
Gigabit interface converter
D.
Gigabit interface converter
Answers
Suggested answer: C

Explanation:

Fibre Channel is a high-speed network technology that is mainly used for storage area networks (SANs). It provides reliable and secure data transfer between servers and storage devices, such as disk arrays, tape libraries, and optical jukeboxes.It uses protocols such as SCSI, FCP, and FICON to transport data over optical fiber or copper cables678

Fibre Channel transceivers are devices that convert electrical signals to optical signals and vice versa, and allow Fibre Channel devices to communicate over different media types and distances. They are usually pluggable modules that fit into standard ports on Fibre Channel switches, adapters, and storage devices. They have different specifications and standards, such as SFP, SFP+, QSFP, and CFP, depending on the data rate, wavelength, and cable type they support.

8 Gbps transceivers are Fibre Channel transceivers that support a data rate of 8 gigabits per second, which is also known as Fibre Channel-8G or 8GFC. They are typically SFP+ modules that use 850 nm wavelength and multimode fiber for short-reach applications, or 1310 nm wavelength and single-mode fiber for long-reach applications. They can support cable distances up to 10 km or 40 km, depending on the fiber type and quality.

Which of the following can be used to identify users after an action has occurred?

A.
Access control vestibule
A.
Access control vestibule
Answers
B.
Cameras
B.
Cameras
Answers
C.
Asset tag
C.
Asset tag
Answers
D.
Motion detectors
D.
Motion detectors
Answers
Suggested answer: C

Explanation:

Cameras can be used to identify users after an action has occurred by recording their faces, clothing, or other distinctive features. Cameras are often used as a deterrent and a forensic tool for security purposes. Access control vestibules, asset tags, and motion detectors are not effective in identifying users, but rather in controlling access, tracking assets, and detecting movement.

Collisions occur when two or more devices try to transmit signals on the same physical medium at the same time. This causes interference and data loss. Collisions can only happen at the physical layer of the OSI model, which is responsible for transmitting and receiving raw bits over a physical medium such as a cable or a wireless channel. The physical layer does not have any mechanism to prevent or resolve collisions. Therefore, higher layers of the OSI model, such as the data link layer, need to implement protocols to detect and recover from collisions, such as CSMA/CD for Ethernet networks.

Reference Collision in computer networking Data Link Layer | Layer 2 | The OSI-Model

A network engineer has added a new route on a border router and is trying to determine if traffic is using the new route. Which of the following commands should the engineer use?

ping

arp

tracert

route

The tracert command is a network diagnostic tool that traces the route of packets from the source host to the destination host. It displays the IP addresses and hostnames of the routers along the path, as well as the time taken for each hop. The tracert command can be used to determine if traffic is using the new route by comparing the output before and after adding the route. If the new route is effective, the tracert command should show a different or shorter path to the destination host.

Reference Networking Commands For Troubleshooting Windows - GeeksforGeeks Nine Switch Commands Every Cisco Network Engineer Needs to Know

A technician is configuring a wireless access point in a public space for guests to use. Which of the following should the technician configure so that only approved connections are allowed?

Geofencing

Captive portal

Secure SNMP

Private VLANs

A captive portal is a web page that requires users to authenticate or accept terms of service before they can access the internet through a wireless access point. A captive portal can be used to control who can use the wireless network, limit the bandwidth or time of usage, or display advertisements or information. A captive portal is a common feature of public wireless networks, such as those in hotels, airports, cafes, or libraries. A captive portal can prevent unauthorized or malicious users from accessing the network or consuming network resources.

Reference Public Wireless Access Points Definition | Law Insider Are Public Wi-Fi Networks Safe? What You Need To Know

A user cannot connect to the network, although others in the office are unaffected. The network technician sees that the link lights on the NIC are not on. The technician needs to check which switchport the user is connected to, but the cabling is not labeled. Which of the following is the best way for the technician to find where the computer is connected?

Look up the computer's IP address in the switch ARP table.

Use a cable tester to trace the cable.

Look up the computer's MAC address in the switch CAM table.

Use a tone generator to trace the cable.

A tone generator is a device that emits an audible signal on a wire. A tone probe is a device that detects the signal on the wire. By attaching the tone generator to one end of the cable and using the tone probe to scan the other end, the technician can identify which switchport the cable is connected to. This method does not require any knowledge of the computer's IP or MAC address, or access to the switch configuration. It is also faster and more reliable than physically tracing the cable or disconnecting the cable and looking for the link light to go out on the switch.

Reference How to find what port im connected to on a switch from my PC? Switch Port Monitoring Guide - Comparitech Finding Out Which Network Switch Port My Computer is Connected

A network administrator is creating a VLAN that will only allow executives to connect to a data source. Which of the following is this scenario an example of?

Availability

Confidentiality

Internal threat

External threat

Integrity

Confidentiality is the principle of preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information1. By creating a VLAN that will only allow executives to connect to a data source, the network administrator is implementing a form of network segmentation that enhances the confidentiality of the data. This prevents unauthorized users or processes from accessing or modifying the data, which could compromise its integrity or availability.Confidentiality is one of the components of the CIA triad, a widely used information security model that guides the efforts and policies aimed at keeping data secure234.

Reference Defending Your Network: A Comprehensive Guide to VLAN Hopping Attacks The CIA triad: Definition, components and examples | CSO Online Executive Summary --- NIST SP 1800-25 documentation The CIA Triad --- Confidentiality, Integrity, and Availability Explained Confidentiality, Integrity and Availability - DevQA.io

A network administrator walks into a data center and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

Evil twin

Tailgating

Piggybacking

Shoulder surfing

Tailgating is a type of physical security attack in which an unauthorized person follows an authorized person into a restricted area, such as a data center, without proper identification or authentication. Tailgating can allow attackers to access sensitive data, equipment, or network resources, or to plant malicious devices or software. The network administrator prevented tailgating by stopping and directing the unknown person to the security desk, where they would have to verify their identity and purpose.

Reference Digital Threats and Cyberattacks at the Network Level Network attacks and how to prevent them

Which of the following is most closely associated with attempting to actively prevent network intrusion?

IDS

Firewall

IPS

VPN

An intrusion prevention system (IPS) is a network security tool that continuously monitors network traffic for malicious activity and takes action to prevent it, such as reporting, blocking, or dropping it. An IPS is different from an intrusion detection system (IDS), which only detects and alerts about threats, but does not stop them. A firewall is a device or software that filters network traffic based on predefined rules, but it does not analyze the traffic for anomalies or signatures of known attacks. A VPN is a virtual private network that creates a secure tunnel between two endpoints, but it does not prevent intrusions from within the network or from compromised endpoints.

Reference What is an Intrusion Prevention System (IPS)? | Fortinet What is an Intrusion Prevention System? - Palo Alto Networks

An administrator needs to ensure an access switch is sending the appropriate logs to the network monitoring server. Which of the following logging levels is most appropriate for the access layer switch?

Level 0

Level 2

Level 5

Level 7

Logging levels are used to categorize the severity and importance of log messages generated by network devices. The lower the level, the higher the priority. Level 0 is the most critical, while level 7 is the most verbose and least important. Level 5 is the default logging level for most Cisco devices, and it corresponds to notifications. Notifications are messages that indicate normal but significant events, such as interface status changes, configuration changes, or system restarts. These messages are useful for monitoring the health and performance of the network, and they do not generate excessive traffic or consume too much memory or CPU resources. Therefore, level 5 is the most appropriate logging level for an access layer switch, which connects end devices to the network and does not need to log debug or informational messages.

Reference How to configure logging in Cisco IOS Cisco Guide to Harden Cisco IOS Devices Cisco Privilege Levels -- Explanation and Configuration

A network consultant is installing a new wireless network with the following specifications:

5GHz

1,300Mbps

20/40/80MHz

Which of the following standards should the network consultant use?

802.11a

802.11ac

802.11b

802.11n

Clients have reported slowness between a branch and a hub location. The senior engineer suspects asymmetrical routing is causing the issue. Which of the following should the engineer run on both the source and the destination network devices to validate this theory?

traceroute

ping

route

nslookup

Asymmetric routing occurs when traffic does not traverse the same path in both directions of a conversation. This can cause problems when there are stateful devices, such as firewalls or NAT devices, in the path that expect the traffic to be symmetrical.Asymmetric routing can also result in suboptimal TCP performance, as TCP assumes that the SYN and ACK packets take the same path1.

To validate the theory of asymmetric routing, the engineer should run the traceroute command on both the source and the destination network devices. The traceroute command shows the route that packets take to reach a destination, by displaying the IP addresses and hostnames of the routers along the path, as well as the time taken for each hop.By comparing the output of the traceroute command from both ends, the engineer can determine if the traffic is taking different paths in each direction, and identify where the asymmetry occurs2.

The ping command is not sufficient to validate the theory of asymmetric routing, as it only tests the connectivity and latency between two devices, but does not show the intermediate hops or the path taken by the packets. The route command shows the routing table of a device, but does not show the actual path taken by the packets. The nslookup command resolves a hostname to an IP address, or vice versa, but does not show the route or the connectivity between two devices.

Reference How to Find & Fix Asymmetric Routing Issues | Auvik Identifying and Troubleshooting Asymmetric Routing in WAAS - Cisco Community

After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do first?

Modify the device's MIB on the monitoring system.

Configure syslog to send events to the monitoring system.

Use port mirroring to redirect traffic to the monitoring system.

Deploy SMB to transfer data to the monitoring system.

SNMP (Simple Network Management Protocol) is a protocol that allows network devices to communicate with a monitoring system and provide information about their status, performance, and configuration.SNMP relies on MIBs (Management Information Bases), which are collections of objects that define the types of information that can be accessed or modified on a device1.

When a firewall replacement occurs, the new firewall may have a different MIB than the old one, which means that the monitoring system may not be able to recognize or interpret the data sent by the new firewall. This can cause some alarms and metrics related to network availability to stop updating on the monitoring system.To fix this, the network administrator should modify the device's MIB on the monitoring system, so that it matches the MIB of the new firewall and can correctly process the SNMP data2.

The other options are not relevant to the issue. Configuring syslog to send events to the monitoring system would not affect the SNMP data, as syslog is a different protocol that sends log messages from network devices to a central server. Using port mirroring to redirect traffic to the monitoring system would not help, as port mirroring is a technique that copies traffic from one port to another for analysis or troubleshooting purposes, but does not change the format or content of the traffic. Deploying SMB to transfer data to the monitoring system would not work, as SMB is a protocol that allows file sharing and access between network devices, but does not support SNMP data.

Reference Grafana & Prometheus SNMP: advanced network monitoring guide Configuring Windows Systems for Monitoring with SNMP - ScienceLogic

Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?

An increase in network security using encryption and packet encapsulation

A network expansion caused by an increase in the number of branch locations to the headquarters

A mandatory requirement to increase the deployment of an SDWAN network

An improvement in network efficiency by increasing the useful packet payload

mGRE (Multipoint GRE) is a type of GRE (Generic Routing Encapsulation) tunnel that allows a single interface to support multiple tunnel endpoints, instead of having to configure a separate point-to-point tunnel for each destination.mGRE simplifies the configuration and management of large-scale VPN networks, such as DMVPN (Dynamic Multipoint VPN), which is a Cisco technology that uses mGRE, NHRP (Next Hop Resolution Protocol), and IPsec to create secure and dynamic VPN connections between a hub and multiple spokes1.

A network expansion caused by an increase in the number of branch locations to the headquarters would justify the deployment of an mGRE hub-and-spoke topology, because it would reduce the complexity and overhead of configuring and maintaining multiple point-to-point tunnels between the hub and each spoke.mGRE would also enable spoke-to-spoke communication without having to go through the hub, which would improve the network performance and efficiency23.

The other options are not directly related to the use case of mGRE hub-and-spoke topology. An increase in network security using encryption and packet encapsulation can be achieved by using IPsec, which is a separate protocol that can be applied to any type of GRE tunnel, not just mGRE. A mandatory requirement to increase the deployment of an SDWAN network can be met by using various technologies and vendors, not necessarily mGRE or DMVPN. An improvement in network efficiency by increasing the useful packet payload can be achieved by using various techniques, such as compression, fragmentation, or QoS, not specifically mGRE.

Reference Understanding Cisco Dynamic Multipoint VPN - DMVPN, mGRE, NHRP MGRE Easy Steps - Cisco Community What is DMVPN (Dynamic Multipoint VPN), NHRP, mGRE and How to configu - Cisco Community

Users report they cannot reach any websites on the internet. An on-site network engineer is able to duplicate the issue on a different PC. The network engineer then tries to ping a website and receives the following message:

Ping request could not find host www.google.com. Please check the name and try again.

Which of the following is the next step the engineer should take?

Ping 127. 0. 0. 1 to test local hardware.

Test the website from outside the company.

Ping internal name server functionality.

Check internet firewall logs for blocked DNS traffic.

The error message ''Ping request could not find host www.google.com'' indicates that the network engineer's PC cannot resolve the hostname www.google.com to its corresponding IP address. This means that there is a problem with the DNS (Domain Name System) service, which is responsible for translating hostnames to IP addresses and vice versa. The DNS service can be provided by internal or external name servers, depending on the network configuration.

The next step the engineer should take is to ping the internal name server functionality, which means to test if the PC can communicate with the name server that is configured in its network settings, and if the name server can resolve internal hostnames, such as those of the company's servers or devices. To do this, the engineer can use the following commands:

To find out the IP address of the name server, useipconfig /alland look for the DNS Servers entry.

To ping the name server, useping <name server IP address>and check if the packets are sent and received successfully.

To test the name resolution, usenslookup <internal hostname>and check if the name server returns the correct IP address.

If the ping or the nslookup commands fail, it means that the internal name server is not working properly, and the engineer should troubleshoot the name server configuration or connectivity. If the ping and the nslookup commands succeed, it means that the internal name server is working properly, but there is a problem with the external name resolution, and the engineer should check the internet firewall logs for blocked DNS traffic, or test the website from outside the company.

Reference Windows 10 can't resolve hostnames - ping with IP works but not with hostname Ping request could not find host xyz.local. Please check the name and try again DNS problem, nslookup works, ping doesn't

Users are connected to a switch on an Ethernet interface of a campus router. The service provider is connected to the serial 1 interface on the router. The output of the interfaces is:

E1/0: 192.168.8.1/24

S1: 192.168.7.252/30

After router and device configurations are applied, internet access is not possible. Which of the following is the most likely cause?

The Ethernet interface was configured with an incorrect IP address.

The router was configured with an incorrect loopback address.

The router was configured with an incorrect default gateway.

The serial interface was configured with the incorrect subnet mask.

The default gateway is the IP address of the router that connects a network to the internet or another network. The default gateway is usually configured on the devices that need to access the internet or other networks, such as PCs, servers, or routers. If the router was configured with an incorrect default gateway, it would not be able to forward packets to the correct destination, and internet access would not be possible.

The other options are not the most likely causes of the issue. The Ethernet interface is the physical port that connects a device to a network using a cable. If the Ethernet interface was configured with an incorrect IP address, it would cause a problem with the local network connectivity, not the internet access. The loopback address is a special IP address that refers to the device itself, usually used for testing or troubleshooting purposes. If the router was configured with an incorrect loopback address, it would not affect the internet access, as the loopback address is not used for routing packets to other networks. The serial interface is another type of physical port that connects a device to a network using a serial cable, often used for WAN connections. If the serial interface was configured with the incorrect subnet mask, it would cause a problem with the WAN connectivity, not the internet access, as the subnet mask is used to determine the network and host portions of an IP address.

Reference What is a Default Gateway? | HowStuffWorks What is an Ethernet Interface? - Definition from Techopedia What is a Loopback Address? - Definition from Techopedia What is a Serial Interface? - Definition from Techopedia

A user wants to avoid using a password to access a third-party website. Which of the following does the user need in order to allow this type of access to the third-party website?

Multifactor

RADIUS

SSO

Local authentication

A junior network engineer is trying to change the native network ID to a non-default value that can then be applied consistently throughout the network environment. Which of the following issues is the engineer attempting to prevent?

DDoS

ARP spoofing

VLAN hopping

Rogue DHCP

VLAN hopping is a type of network attack where an attacker can send or receive traffic from a VLAN that they are not supposed to access. VLAN hopping can allow an attacker to bypass security policies, access sensitive data, or launch other attacks on the network.VLAN hopping can be performed using two methods: double tagging and switch spoofing1.

Double tagging is where the attacker sends a frame with two VLAN tags, one for the native VLAN and one for the target VLAN. The native VLAN is the VLAN that is used for untagged traffic on a trunk port. If the attacker's access port is in the same VLAN as the native VLAN, the switch will accept the frame and forward it on the trunk port. The switch will remove the first tag, which is the native VLAN, and send the frame with the second tag, which is the target VLAN. The frame will then reach the target VLAN and be processed by the devices in that VLAN.

Switch spoofing is where the attacker sends Dynamic Trunking Protocol (DTP) packets and tries to negotiate a trunk with the switch. DTP is a Cisco protocol that allows switches to automatically form trunks between them. If the switch's port is configured with the default dynamic auto or dynamic desirable mode, it will accept the DTP packets and form a trunk with the attacker. The attacker will then have access to all VLANs on the trunk.

To prevent VLAN hopping, the junior network engineer is trying to change the native network ID to a non-default value that can then be applied consistently throughout the network environment. This means that the engineer is changing the VLAN that is used for untagged traffic on the trunk ports to a different VLAN than the default VLAN 1. This will prevent double tagging attacks, as the attacker's access port will not be in the same VLAN as the native VLAN, and the switch will not accept the frames with two tags.The engineer should also disable DTP on the trunk ports and use the switchport nonegotiate command to prevent switch spoofing attacks2.

Reference VLAN Hopping - NetworkLessons.com VLAN Hopping on Native VLAN - Cisco Community

CompTIA Network+ N10-008 Certification Exam Objectives, Domain 5.0: Network Security, Subobjective 5.1: Summarize the importance of physical security controls, page 231

CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008), Chapter 18: Network Security, Section: Physical Security, page 7372

A technician reviews a network performance report and finds a high level of collisions happening on the network. At which of the following layers of the OSI model would these collisions be found?

Layer 1

Layer 3

Layer 4

Layer 7

A technician is configuring a bandwidth-monitoring tool that supports payloads of 1,600 bytes. Which of the following should the technician configure for this tool?

A.
LACP
A.
LACP
Answers
B.
Flow control
B.
Flow control
Answers
C.
Port mirroring
C.
Port mirroring
Answers
D.
Jumbo frames
D.
Jumbo frames
Answers
Suggested answer: D

Explanation:

Jumbo frames are Ethernet frames that can carry more than the standard 1,500 bytes of payload data. Jumbo frames can support payloads of up to 9,000 bytes, depending on the network device and configuration. Jumbo frames can improve network performance by reducing the overhead of packet headers and increasing the efficiency of data transmission. Jumbo frames can also reduce the CPU utilization of the sender and receiver devices, as they require fewer interrupts and processing cycles. However, jumbo frames also have some drawbacks, such as increased latency, fragmentation, and compatibility issues. Therefore, jumbo frames should be used with caution and only in networks that support them end-to-end.

A technician who is configuring a bandwidth-monitoring tool that supports payloads of 1,600 bytes should enable jumbo frames for this tool, as this would allow the tool to capture and analyze more data per frame and provide more accurate and detailed results. However, the technician should also ensure that the network devices and interfaces that the tool is connected to also support jumbo frames, and that the MTU (maximum transmission unit) is set to the same value across the network path.

Reference What are Jumbo Frames? How to Enable Jumbo Frames CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)

Users in a remote office report that corporate web server pages are taking a long time to load, whereas users in the main corporate office do not have any issues. Which of the following is the best metric for a network administrator to check?

A.
Jitter across the network
A.
Jitter across the network
Answers
B.
Hop-by-hop network latency
B.
Hop-by-hop network latency
Answers
C.
Server interface CRC errors
C.
Server interface CRC errors
Answers
D.
Server NetFlow data
D.
Server NetFlow data
Answers
Suggested answer: B

Explanation:

The best metric for a network administrator to check is hop-by-hop network latency. This is because network latency is the time it takes for a packet to travel from the source to the destination, and it affects the loading speed of web pages. Hop-by-hop network latency measures the latency between each pair of routers or switches along the network path, and it can help identify where the delay is occurring. By checking the hop-by-hop network latency, the network administrator can determine if the problem is caused by a slow or congested link, a misconfigured or faulty device, or a routing issue.

Jitter is the variation in latency over time, and it affects the quality of voice and video applications. Jitter does not directly affect the loading speed of web pages, and it is not a useful metric for troubleshooting this issue.

Server interface CRC errors are errors that occur when the cyclic redundancy check (CRC) of a packet does not match the expected value, indicating data corruption. Server interface CRC errors can affect the reliability and integrity of data transmission, and they can be caused by faulty cables, connectors, or interfaces. Server interface CRC errors do not necessarily affect the loading speed of web pages, unless they are severe enough to cause retransmissions or packet loss.

Server NetFlow data is data that is collected and analyzed by the NetFlow protocol, which monitors and reports on network traffic flows. Server NetFlow data can provide information on the volume, type, and direction of traffic that is sent or received by the server, as well as the source and destination IP addresses, ports, and protocols. Server NetFlow data can help identify network usage patterns, trends, and anomalies, but it does not measure the latency or performance of the network.

Reference What is Network Latency and How to Measure It How to Troubleshoot Network Latency Issues What is Jitter and How to Measure It What is CRC Error and How to Fix It What is NetFlow and How Does It Work CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)

Total 865 questions
Go to page: of 87