CompTIA Network+ Question B-51

Which of the following is a security benefit gained from setting up a guest wireless network?

A. Optimized device bandwidth
B. Isolated corporate resources
C. Smaller ACL changes
D. Reduced password resets

Correct Answer: B

Explanation:
A wireless guest network could be set up so that it has limited access (no access to local resources) but does provide Internet access for guest users. The corporate resources would be inaccessible (isolated) from the guest network.

CompTIA Network+ Question B-50

Which of the following describes an IPv6 address of ::1?

A. Broadcast
B. Loopback
C. Classless
D. Multicast

Correct Answer: B

Explanation:
The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, which can be shortened to ::1

CompTIA Network+ Question B-49

A technician, Peter, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Peter use for this subnet?

A. /24
B. /32
C. /28
D. /29
E. /30

Correct Answer: E

Explanation:
An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.

CompTIA Network+ Question B-48

A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect?

A. Confirm the new host is using 10GBaseSR due to the manufacturing environment
B. Confirm the new host is compatible with 10BaseT Ethernet
C. Confirm the existing 10Base2 equipment is using the proper frame type
D. Confirm that CSMA/CD is disabled on the Ethernet network

Correct Answer: B

Explanation:
The question states that the equipment is old and that CAT3 cabling is being used.
10BaseT Ethernet networks are old and slow by today’s standards. 10BaseT Ethernet networks use CAT3 UTP cabling and offer a maximum bandwidth of just 10Mpbs.
A new host computer nowadays will have a network card that supports 1000Mpbs to be used with CAT5, CAT5e or CAT6 network cables in a 1000BaseT network. In this question, we need to check that the network card on the new host computer is backward-compatible with the old 10BaseT network.

CompTIA Network+ Question B-47

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings’ connectivity is performing as expected. Which of the following should be exchanged on the access points installed in the building with connectivity issues?

A. UTP patch cables
B. Antenna
C. Power adapter
D. Security standard

Correct Answer: B

CompTIA Network+ Question B-46

A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?

A. Regression test
B. Speed test
C. Baseline
D. Statement of work

Correct Answer: C

Explanation:
In networking, baseline can refer to the standard level of performance of a certain device or to the normal operating capacity for your whole network. High-quality documentation should include a baseline for network performance, because you and your client need to know what “normal” looks like in order to detect problems before they develop into disasters.
A network baseline delimits the amount of available bandwidth available and when. For networks and networked devices, baselines include information about four key components:
Processor Memory
Hard-disk (or other storage) subsystem Network adapter or subsystem

CompTIA Network+ Question B-45

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue?

A. EMI
B. RFI
C. Cross-talk
D. Bad wiring

Correct Answer: D

Explanation:
The question states that the device worked on a different port. This indicates that the wiring is faulty.

CompTIA Network+ Question B-44

Which of the following refers to a network that spans several buildings that are within walking distance of each other?

A. CAN
B. WAN
C. PAN
D. MAN

Correct Answer: A

Explanation:
CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often implement CANs to link the buildings in a network. The range of CAN is 1KM to 5KM. If multiple buildings have the same domain and they are connected with a network, then it will be considered as a CAN.

CompTIA Network+ Question B-42

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors. In which of the following layers does the problem reside? (Select TWO).

A. Layer 2
B. Layer 3
C. Layer 5
D. Transport layer
E. Data link
F. Physical layer

Correct Answer: AE

Explanation:
Layer 2 of the OSI reference model is the data-link layer. Components of the data-link layer include frame-format, Media Access Control (MAC) addressing, protocol identification and error detection.
When data is being sent, it is split into protocol data units (PDUs) as it passes through the layers of the OSI model. The PDUs have different names as they are passed through the layers of the OSI model. In layer 2, the PDU is called a ‘Frame’.
The most common protocol specified in the data-link layer is Ethernet and the most common network component in the data-link layer is a network switch.
In this question, problems are discovered with Ethernet frames by examining the logs in a network switch. Therefore, for this question, we are working in Layer 2, the data-link layer.