CompTIA Network+ N10-007

  1. Which connector type is this?


    Image Upload 2
    • MT-RJ
    • Media Transfer Registered Jack or Media Termination - Recommended Jack
  2. Which connector type is this?
    Image Upload 4
    • LC
    • Lucent connector
    • Local Connector
    • "Little connector"
  3. Which connector type is this?Image Upload 6
    • SC
    • subscriber connector
    • standard connector
    • square connector
  4. Which connector type is this?
    Image Upload 8
    • ST
    • straight tip
    • bayonet connector
  5. What are the two types of cable terminations standards?
    • EIA/T568A
    • EIA/T568B
  6. Which cable standard is this?
    Image Upload 10
    T568A
  7. Which cable standard is this?
    Image Upload 12
    T568B
  8. Place the pin colour in the correct order from 1 to 8 for a EIA/TIA 568A?
    • 1. White/Green
    • 2. Green
    • 3. White/Orange
    • 4. Blue
    • 5. White/Blue
    • 6. Orange
    • 7. White/Brown
    • 8. Brown
  9. Place the pin colour in the correct order from 1 to 8 for a EIA/TIA 568B?
    • 1. White/Orange
    • 2. Orange
    • 3. White/Green
    • 4. Blue
    • 5. White/Blue
    • 6. Green
    • 7. White/Brown
    • 8. Brown
  10. Which cable type is this?
    Image Upload 14
    10BASE-T or 100BASE-T straight-through
  11. Which cable type is this?
    Image Upload 16
    1000BASE-T straight-through
  12. Which devices uses MDI (Media Dependent Interface)?
    • Computers
    • Routers
    • AP
  13. Which devices uses MDI-X (Media Dependent Interface Crossover)?
    Network Switch
  14. Which pins are used for crossover cable?
    • 1 --> 3
    • 2 --> 6
    • 4 --> 7
    • 5 --> 8
  15. Which feature is available to eliminate the use of a crossover cable to connect two network switches?
    Auto-MDIX
  16. What is at the back of a patch panel in which the cables are punch down?
    • 110 block
    • Image Upload 18
  17. What is displayed in the image?
    Image Upload 20
    Fiber Distribution Panel
  18. What is the name of this transceiver?
    Image Upload 22
    Gigabit Interface Converter (GBIC)
  19. Which is the name of this transceiver?
    Image Upload 24
    Small Form-Factor Pluggable (SFP)
  20. What is the name of this transceiver?
    Image Upload 26
    Quad Small Form-Factor Pluggable (QSPF)
  21. Which cable standard has the following characteristics:
    - Gigabit Ethernet over fiber using NIR (near infrared) light wavelength
    - cover distance to 500 meters
    1000BASE-SX (Pneumonia use S for short)
  22. Which cable standard has the following characteristics:
    - Gigabit Ethernet over fiber using long wavelength laser
    - cover distance using multi-mode fiber to 500 meters or using single-mode fiber to 5 Kilometers
    1000BASE-LX (Pneumonia use L for Long)
  23. Which cable standard has the following characteristics:
    - it is Fast Ethernet
    - maximum cable length of 100 meters
    - Uses two pairs
    - Category 5 Twisted pair copper wires
    100BASE-TX
  24. Which cable standard has the following characteristics:
    - maximum cable length of 100 meters
    - Uses all four pairs 
    - it is Gigabit Ethernet over Category 5 twisted pair cable
    1000BASE-T
  25. Which cable standard has the following characteristics:
    - Use frequency of 500Mhz
    - It supports twisted pair copper cable type Cat 6, 6A and 7
    - 2006 Standard
    - speeds up to 10 Gigabit
    10GBASE-T
  26. Which layer of the OSI model does the following devices operate?
    Hub, Switch, Bridge, Router, Stateful Firewall, NGFW, WAP, Cable Modem, Media converter
    • Hub/Media Converter - Layer 1
    • WAP/Bridge/Switch/Cable Modem - Layer 2
    • Router - Layer 3
    • Stateful Firewall - Layer 4
    • NGFW - Layer 7
  27. Which system is used to what the network traffic and create an alert or alarm of intrusions?
    IDS - Intrusion Detection System
  28. Which system is used to monitor the network traffic and stop the intrusions detected?
    IPS - Intrusion Prevention System
  29. Which one describes the actions of the identification technology Signature-based:



    A.
  30. Which one describes the actions of the identification technology Anomaly-based:



    B.
  31. Which one describes the actions of the identification technology Behavior-based:



    C.
  32. Which one describes the actions of the identification technology Heuristics:



    C.
  33. Which technology does the following:
    - It sits between users and the external network
    - It receives the users requests and sends the request on their behalf
    - It is useful for caching information, access control, URL filtering and content scanning
    Proxy
  34. Which storage type has the following characteristics:
    - Connect to a shared storage devices across the network
    - File level access
    NAS
  35. Which storage type has the following characteristics:
    - looks and feels like a local storage device
    - it is block level access
    - very efficient reading and writing
    SAN
  36. What three functions does Routing Protocols performs?
    • Discovery: the process of identifying other routers on the network
    • Route Management: Keep track of all possible destinations along with data describing the pathway of each like distance and time.
    • Path Determination: it is determining the best path to reach a destination.
Author
wiztech
ID
351195
Card Set
CompTIA Network+ N10-007
Description
Questions relating to CompTIA Network+ N10-007
Updated