CompTIA Network+ Exam Review - Question List

Select how would you like to study

56. Which of the following protocols provides best encryption in an IPsec VPN?
  1. HMAC-MD5
  2. DES
  3. 3DES
  4. AES
57. Which of the following examines and recognizes different known attacks, as compared to a list of common attack signatures?
  1. IDS
  2. VPN
  3. Firewall
  4. NAT
58. During a data transfer from one PC to another, which of the following accurately describes the order of how data will be encapsulated?
  1. Data, Frame, Segment, Packet, Bit
  2. Data, Packet, Frame, Segment, Bit
  3. Data, Packet, Segment, Frame, Bit
  4. Data, Segment, Packet, Frame, Bit
59. Which of the following is a technology that Catalyst switches utilize to identify and prevent topology loops and ensure that data flows properly through a single network path?
  1. VTP
  2. Cut-through
  3. 802.1Q
  4. STP
60. Identify the component that must be elected before the Spanning Tree Protocol can converge in a switched LAN?
  1. Duplex operating mode
  2. Fast mode ports
  3. Root bridge
  4. BDPU priority

Select how would you like to study