CompTIA Exam Questions

Which of the following would the security engineer set as the subnet mask for the servers below to u

Which of the following would the security engineer set as the subnet mask for the servers below to utilize
host addresses on separate broadcast domains?Server 1: 192.168.100.6
Server 2: 192.168.100.9
Server 3: 192.169.100.20

A.
/24
B: Using these options results in all three servers using host addresses on the same broadcast domain.
C: Using this option results in two of the servers using host addresses on the same broadcast domain.
E: Using this option results in Server 3 not including a host.

http://www.subnetmask.info/
QUESTION 66
Which of the following is BEST used to break a group of IP addresses into smaller network segments or
blocks?
NAT

B.
/27
Virtualization

C.
/28
NAC

D.
/29
Subnetting

E.
/30

A.
/24
B: Using these options results in all three servers using host addresses on the same broadcast domain.
C: Using this option results in two of the servers using host addresses on the same broadcast domain.
E: Using this option results in Server 3 not including a host.

http://www.subnetmask.info/
QUESTION 66
Which of the following is BEST used to break a group of IP addresses into smaller network segments or
blocks?
NAT

A.
/24
B: Using these options results in all three servers using host addresses on the same broadcast domain.
C: Using this option results in two of the servers using host addresses on the same broadcast domain.
E: Using this option results in Server 3 not including a host.

http://www.subnetmask.info/
QUESTION 66
Which of the following is BEST used to break a group of IP addresses into smaller network segments or
blocks?
NAT

B.
/27
Virtualization

C.
/28
NAC

D.
/29
Subnetting

Explanation:
Using this option will result in all three servers using host addresses on different broadcast domains.
Incorrect Answers:

Subnetting is a dividing process used on networks to divide larger groups of hosts into smaller collections.
Incorrect Answers:
A: NAT serves as a basic firewall by only allowing incoming traffic that is in response to an internal
system’s request.
B: Virtualization allows a single set of hardware to host multiple virtual machines.
C: The goals of NAC are to prevent/reduce zero-day attacks, enforce security policy throughout the
network, and use identities to perform access control.

Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 39, 40