CompTIA Network Certification
Question No: 21 – (Topic 1)
Which of the following is used to define how much bandwidth can be used by various protocols on the network?
Answer: A Explanation:
If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially.
Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.
Question No: 22 HOTSPOT – (Topic 1)
Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.
After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled.
Instructions: When the simu-lation is complete, please select the Done button to submit.
All Networks have the range from /0 to/32
An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines howmany bits form the network address and from that, we can calculate how many bits are used for the host addresses.
The formula to calculate the number of hosts in a subnet is 2n – 2. The quot;nquot; in the host#39;s formula represents the number of bits used for host addressing.If we apply the formula (22 – 2), we can determine that the following subnets should be configured:
Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP)
HR network – /27 – This will provide for up to 30usable IP’s (32-2) IT – /28 – This will provide for up to 14 usable IP’s (16-2)
Finance – /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP’s and can’t be used for hosts.
Marketing – /28
If we add up howmany IP blocks are used that is 64 32 16 64 16=192. A /24 contains 256 IP addresses, so 256-192=64.
So the last unused box should be a /26, which equates to 64 addresses
Question No: 23 – (Topic 1)
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IP addresses, to be able to access the Internet and internal company servers? (Select THREE).
Lease expiration time of 1 day
Answer: A,B,F Explanation:
The question statesthat the client computers need to access the Internet as well as internal company servers. To access the Internet, the client computers need to be configured with an IP address with a subnet mask (answer B) and the address of the router that connects thecompany network to the Internet. This is known as the ‘default gateway’ (answer A).
To be able to resolve web page URLs to web server IP addresses, the client computers need to be configured with the address of a DNS server (answer F).
Question No: 24 – (Topic 1)
Which of the following would be used in an IP-based video conferencing deployment? (Select TWO).
Answer: D,E Explanation:
The term quot;codecquot; is a concatenation of quot;encoderquot; and quot;decoder”. In video conferencing, a codec is software (or can be hardware) that compresses (encodes) raw video data before it is transmitted overthe network. A codec on the receiving video conferencing device will then decompress (decode) the video signal for display on the conferencing display.
The Session Initiation Protocol (SIP) is a protocol for initiating an interactive user session that involves multimedia elements such as voice, chat, gaming, or in this case video.
Question No: 25 – (Topic 1)
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?
Add a router and enable OSPF.
Add a layer 3 switch and create a VLAN.
Add a bridge between two switches.
Add a firewall and implement proper ACL.
Answer: B Explanation:
We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs.
A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.
Toallow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a ‘Layer 3’ switch. Unlike layer 2 switches that can only
read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.
Question No: 26 – (Topic 1)
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?
A. /24 B. /32 C. /28 D. /29 E. /30
Answer: E Explanation:
An IPv4 addressconsists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n – 2. The quot;nquot; in the host#39;s formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a
/30 subnet mask will provide 2 IP addresses.
Question No: 27 – (Topic 1)
Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?
Answer: A Explanation:
PAN stands for Personal Area Network. It is a network of devices in the area of a person typically within a range of 10 meters and commonly using a wirelesstechnology such as Bluetooth or IR (Infra-Red).
Question No: 28 – (Topic 1)
A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup?
USB flash drive
Answer: C Explanation:
A NAS is a Network Attached Storage device; typically a bunch of cheap hard disks, usually arranged in a Raid and consisting of either SAS (serial attached SCSI) or Sata disks just like the ones in most desktops.
A NAS is essentially a file server that connects to an Ethernet network and is configured with a TCP/IP address. A NAS supports Windows networking and works at the file level as opposedto a SAN (Storage Area Network) which works at the block level when dealing with data. You can access file shares on a NAS in the same way that you would access file shares on a file server.
A NAS is a much cheaper option than a SAN.
Question No: 29 – (Topic 1)
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?
Answer: C Explanation:
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.
Question No: 30 – (Topic 1)
A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?
Configure NAT on the firewall
Implement a split horizon DNS
Place the server in the DMZ
Adjust the proper internal ACL
Answer: B Explanation:
Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-basedseparation but is most commonly done in software.
In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. Forthe internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The external DNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.
|Lowest Price Guarantee||Yes||No||No|
|Free VCE Simulator||Yes||No||No|