- (Topic 3)
A new office space is being designed. The network switches are up. but no services are running yet A network engineer plugs in a laptop configured as a DHCP client to a switch Which ol the following IP addresses should be assigned to the laptop?
Correct Answer:
B
When a DHCP client is connected to a network and no DHCP server is available, the client can automatically configure a link-local address in the 169.254.0.0/16 range using the Automatic Private IP Addressing (APIPA) feature. So, the correct answer is option B, 169.254.1.128. This is also known as an APIPA address.
Reference: CompTIA Network+ Study Guide, Exam N10-007, Fourth Edition, by Todd
Lammle (Chapter 4: IP Addressing)
- (Topic 3)
Which of the following routing protocols is hierarchal by nature and uses the router ID to control convergence?
Correct Answer:
B
OSPF stands for Open Shortest Path First, which is a link-state routing protocol that is hierarchal by nature and uses the router ID to control convergence. OSPF divides a large network into areas, which are logical groupings of routers that share the same topology information. Each area has a unique identifier and a designated router that connects it to the backbone area (area 0). OSPF uses the router ID, which is a 32-bit number that uniquely identifies each router in the network, to establish adjacencies and exchange routing information. OSPF also uses the router ID to break ties when choosing the best path to a destination. OSPF converges faster than distance-vector routing protocols such as RIP and EIGRP, as it uses the Dijkstra algorithm to calculate the shortest path based on the link cost. BGP, on the other hand, is a path-vector routing protocol that is used to exchange routing information between autonomous systems on the Internet. BGP does not use the router ID to control convergence, but rather uses attributes such as AS path, local preference, and MED to select the best route. BGP is not hierarchal by nature, as it does not divide the network into areas, but rather uses prefixes and policies to control the routing behavior.
References
✑ 1: OSPF – N10-008 CompTIA Network+ : 2.1
✑ 2: CompTIA Network+ N10-008 Certification Study Guide, page 146-149
✑ 3: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 19
✑ 4: CompTIA Network+ N10-008 Certification Practice Test, question 8
- (Topic 1)
A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?
Correct Answer:
B
The nslookup command should be run to confirm the server name for all Linux servers. Nslookup is a tool that queries DNS servers to resolve hostnames to IP addresses or vice versa. It can also provide other information about DNS records, such as MX, NS, SOA, etc. By running nslookup with the IP address of a Linux server, the technician can obtain its hostname. References: https://www.howtogeek.com/663056/how- to-use-the-nslookup-command-on-linux/
- (Topic 3)
A network administrator is connecting two Layer 2 switches in a network These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?
Correct Answer:
B
The technique that would fulfill the requirement of transferring data in multiple networks is 802.1Q tagging. 802.1Q tagging is a method of adding a tag or identifier to Ethernet frames that indicate which VLAN (Virtual Local Area Network) they belong to. VLANs are logical subdivisions of a network that allow devices in different physical locations or segments to communicate as if they were in the same network. VLANs improve network performance, security, and management by reducing broadcast traffic, isolating sensitive data, and grouping devices by function or department. By using 802.1Q tagging, two Layer 2 switches can exchange data from multiple VLANs over a single trunk link, without mixing or losing the VLAN information. References: CompTIA Network+ N10-008 Certification Study Guide, page 64; The Official CompTIA Network+ Student Guide (Exam N10-008), page 2-12.
- (Topic 2)
During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied'
Correct Answer:
B
Role separation is a security principle that involves dividing the tasks and privileges for a specific business process among multiple users. This reduces the risk of fraud and errors, as no one user has complete control over the process. In the scenario, there are three employees who perform very distinct functions on the server, which is an example of role separation. References: https://hyperproof.io/resource/segregation-of- duties/