Learn About CompTIA Network+ 2009 exam

The following are questions from MeasureUp’s Practice Test for the CompTIA N10-004: Network+ 2009 exam.

The audience for this exam includes individuals who are in the early stages of a career in information technology (IT) networking. This includes positions such as network technicians, network installers and help-desk and support staff. This exam not only includes the new technologies that you would expect in an updated exam, but it also requires quite a bit more technical knowledge in many areas than exam N10-003 (Network+ 2007) requires. CompTIA recommends that candidates for Network+ certification have nine to 12 months of experience in the IT networking field. Candidates should also have A+ certification or the equivalent knowledge.

Passing N10-004 earns a candidate one of the certifications required by the U.S. Department of Defense (DOD) Directive 8570.1. This directive mandates that both DOD employees and contractors who work with the DOD on any security-related initiative must receive proper training and earn one or more network-related and security-related certifications.

You may also use these questions to prepare for CompTIA’s Network+ Bridge Exam , BR0-002. If you passed the 2005 or 2007 version of Network+, you can take the shorter Bridge exam that focuses only on the new topics to update your certification.

Objective: Network media and topologies.
Sub-objective: Install components of wiring distribution.

Single answer, multiple-choice

In a telecommunication wiring distribution design, what type of device acts as the demarcation point (demark)?

A.    66 block
B.    Smart jack
C.    Main Distribution Frame (MDF)
D.    Intermediate Distribution Frame (IDF)

Answer:
B

Tutorial:
A smart jack acts as the demark in telecommunication distribution. The demark refers to the point where the telephone network ends and the customer equipment begins. A smart jack, also referred to as a network interface device (NID) or network interface unit (NIU), performs telephone network interface functions enabling the connection to the telephone company network.

A 66 block does not act as the demark. A 66 block is a component in the customer’s on-premise wiring. It is a punch-down block with 50 rows of 4 clips used for terminating telephone lines.

An MDF does not act as a demark. An MDF typically is found at the telephone company central office or local loop, but it also can be installed on the customer premises in a large installation. It is used as a termination point for trunk cables and a connection point for IDFs.

An IDF does not act as a demark. An IDF provides the intermediate connection to the customer telecommunication equipment and typically is connected to a punch-down block or patch panel that is then connected to the customer equipment.

For example, when wiring a large office building, you might have an MDF when the building connects to the telephone network. You could then have an IDF on each floor that connects to the MDF through vertical cross connects between floors. Finally, the patch panels used for the final wiring would connect to the IDFs.

References:
intermediate distribution frame
TechTarget.com
http://whatis.techtarget.com/definition/0,,sid9_gci213773,00.html

66 block
Wikipedia
http://en.wikipedia.org/wiki/66_block

Network interface device
Wikipedia
http://en.wikipedia.org/wiki/Network_interface_device

Main distribution frame
Wikipedia
http://en.wikipedia.org/wiki/Main_distribution_frame

Demarcation point
Wikipedia
http://en.wikipedia.org/wiki/Demarcation_point

Objective: Network devices.
Sub-objective: Identify the functions of specialized network devices.

Single answer, multiple-choice

You need to prioritize network traffic so you can control data transmission rates by port usage. What should you use?

A.    Multilayer switch
B.    Content switch
C.    Bandwidth shaper
D.    Load balancer

Answer:
C

Tutorial:
You should use a bandwidth shaper, also known as a traffic shaper, to prioritize network traffic so that you can control data transmission rates by port usage. A bandwidth shaper can delay packets, letting you control bandwidth usage, a process known as bandwidth throttling, effectively limiting the transmission rate for the data packets. Many bandwidth shapers can categorize traffic by protocol or port and control transmission rates based on these categories.

A bandwidth shaper usually is employed as one of multiple quality of service (QoS) mechanisms. QoS often is implemented through a set of control mechanisms used to ensure minimum service levels for critical or high-bandwidth applications.

You should not use a multilayer switch. A multilayer switch is a network switch that operates at different layers within the Open Systems Interconnect (OSI) model. The simplest type of multilayer switch is a layer 3 (Network layer) switch that also provides high-speed routing. Some multilayer switches can perform various functions, operating up through layer 7 (Application layer) of the OSI model.

You should not use a content switch. A content switch is a specific type of multilayer switch that is used to balance the load among network servers of the same type, such as a Web farm with multiple Web servers. A content switch often also performs network address translation (NAT) for the servers, hiding the server address from the clients accessing the servers.

You should not use a load balancer. A load balancer performs the same basic function as a content switch, balancing the traffic load among multiple servers.

References:
Traffic shaping
Wikipedia
http://en.wikipedia.org/wiki/Traffic_shaping

Multilayer switch
Wikipedia
http://en.wikipedia.org/wiki/Multilayer_switch

Quality of service
Wikipedia
http://en.wikipedia.org/wiki/Quality_of_service

Objective: Network management.
Sub-objective: Explain different methods and rationales for network performance optimization.

Single answer, multiple-choice

You are deploying voice over IP (VoIP) on your network. You need to be able to ensure VoIP is given priority so it has sufficient bandwidth. What should you do?

A.    Configure load balancing.
B.    Implement traffic shaping.
C.    Configure high availability features.
D.    Implement data caching.

Answer:
B

Tutorial:
You should implement traffic shaping, also known as bandwidth shaping, on the network. Traffic shaping lets you prioritize traffic based on various factors, including port and protocol usage. Lower-priority traffic can be delayed to provide sufficient bandwidth (throughput) for the higher-priority VoIP traffic. Traffic shaping is one of the technologies that can help ensure quality of service. QoS assures that minimum performance levels are provided to critical network services.

You should not configure load balancing. Load balancing refers to the resource load on network servers, not on network bandwidth requirements. Load balancing shares client requests among servers of the same kind, helping ensure that the resource loads on all of the servers are relatively equal.

You should not configure high availability features. High availability refers to whether or not a service is available, not how well it performs or the network bandwidth available to the service. Load balancing among redundant servers and fault tolerance are ways of providing high availability.

You should not implement data caching. Data caching is temporary storage of data. Data caching typically is used to make frequently requested data more readily available. It does nothing to ensure bandwidth priority for VoIP.

References:
traffic shaping
TechTarget.com
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci1310157,00.html

QoS
TechTarget.com
http://searchunifiedcommunications.techtarget.com/sDefinition/0,,sid186_gci213826,00.html

Quality of service
Wikipedia
http://en.wikipedia.org/wiki/Quality_of_service

High availability
Wikipedia
http://en.wikipedia.org/wiki/High_availability

Load balancing (computing)
Wikipedia
http://en.wikipedia.org/wiki/Load_balancing_(computing)

Cache
Wikipedia
http://en.wikipedia.org/wiki/Cache

Objective: Network tools.
Sub-objective: Explain the purpose of network scanners.

Single answer, multiple-choice

Your network is configured as a single Transmission Control Protocol/Internet Protocol (TCP/IP) subnet. A network switch is used to segment the network into virtual local area network (VLANs). You want to collect network traffic and generate activity reports. The reports should include traffic for all VLANs. What should you do?

A.    Deploy an intrusion detection system (IDS) on the internal LAN.
B.    Install network monitor software on a network client.
C.    Connect a packet sniffer to a mirrored port on the switch.
D.    Use a port scanner.

Answer:
C

Tutorial:
You should connect a packet sniffer to a mirrored port on the switch. Port mirroring redirects traffic through switch ports to a designated monitor, or mirror, port. By connecting the packet sniffer to this port, you are able to collect traffic forwarded from other switch ports, letting you gather statistics for the entire network.

You should not deploy an IDS on the internal LAN. An IDS is designed to monitor the network for malicious activity, not to report general network statistics.

You should not install network monitor software on a network client. This would collect network traffic and traffic statistics for the VLAN only to which the client belongs.

You should not use a port scanner. A port scanner does not collect or report on network activity. Instead, a port scanner tests for open TCP and User Datagram Protocol (UDP) ports.

References:
Packet analyzer
Wikipedia
http://en.wikipedia.org/wiki/Packet_analyzer

port mirroring
TechTarget.com
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci511650,00.html

Objective: Network security.
Sub-objective: Explain the function of hardware and software security devices.

Single answer, multiple-choice

You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What should you do?

A.    Deploy a proxy server.
B.    Deploy additional firewalls.
C.    Deploy an intrusion protection system (NIPS).
D.    Deploy an intrusion detection system (NIDS).

Answer:
D

Tutorial:
You should deploy an IDS. An IDS is a passive device that monitors and logs network activity and can send an alert if anomalous activity is detected. Specifically, you would use a protocol-based intrusion detection system (PIDS) because you are concerned about a specify type of traffic: Hypertext Transfer Protocol (HTTP) and secure HTTP (HTTPS) with the Web servers.

You should not deploy a proxy server. A proxy server is not designed to detect and report on network activity. Instead, a proxy server provides various support services to internal clients accessing the network, such as address translation (NAT) and content caching.

You should not deploy additional firewalls. A firewall can be configured to filter network traffic, such as by source, protocol or port, but it is not designed as a detection device.

You should not deploy an IPS. An IPS is similar to an IDS, but an IPS is an active system designed to react to network conditions and try to take appropriate actions in response, such as reconfiguring a firewall to block detected traffic.

References:
Intrusion detection system
Wikipedia
http://en.wikipedia.org/wiki/Intrusion_detection_system

intrusion detection
TechTarget.com
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci295031,00.html

Like what you see? Share it.Google+LinkedInFacebookRedditTwitterEmail
cmadmin

ABOUT THE AUTHOR

Posted in Archive|

Comment: