CompTIA N10-004 Network+ Certification Practice Test Set 10

An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?

Options are :

  • MAC filtering
  • WPA
  • RAS
  • Disable SSID (Correct)

Answer : Disable SSID

A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?

Options are :

  • Check their local Internet connection (Correct)
  • Verify the hostname of the server
  • Call their local ISP
  • Verify the IP information of the server

Answer : Check their local Internet connection

A stateless firewall requires a technician to:

Options are :

  • Purchase a license for states.
  • Upgrade definitions manually.
  • Write more packet filters. (Correct)
  • Write less packet filters.

Answer : Write more packet filters.

Which of the following is the MOST secure method to enable remote users to access a company's internal network resources?

Options are :

  • DMZ
  • Network-based firewall
  • VPN concentrator (Correct)
  • Stateful firewall

Answer : VPN concentrator

Which of the following denotes the FINAL point of responsibility for a service provider?

Options are :

  • Patch panel
  • Wiring closet
  • 66 block
  • Demarc (Correct)

Answer : Demarc

Which of the following cable types has a MAXIMUM transmission speed of 10Mbps?

Options are :

  • CHAT6
  • Single-mode fiber
  • CHAT5
  • CHAT3 (Correct)

Answer : CHAT3

Which of the following wireless standards has a MAXIMUM throughput, by default, of 11Mbps?

Options are :

  • 802.11a
  • 802.11g
  • 802.11b (Correct)
  • 802.1 n

Answer : 802.11b

Which of the following tools allows an administrator to determine the MAC address of another computer?

Options are :

  • ipconfig
  • ifconfig
  • ping
  • arp (Correct)

Answer : arp

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?

Options are :

  • VPN
  • WPA (Correct)
  • SSH
  • WEP

Answer : WPA

Physical and logical network diagrams are used for which of the following configuration management goals?

Options are :

  • Compare MAC and IP addresses
  • Identity network devices (Correct)
  • Document Internet access history
  • Track DHCP distribution

Answer : Identity network devices

When debugging a routing problem, the time-to-live (TTL) value can be used to determine:

Options are :

  • Number of routes available.
  • Number of router hops. (Correct)
  • Time that an advertised route is valid.
  • Time to make a round trip.

Answer : Number of router hops.

Which of the following is used to create multiple networks from one large network?

Options are :

  • PAT
  • NAT
  • Multicast
  • Subnetting (Correct)

Answer : Subnetting

Users are reporting problems connecting to servers in the remote domain. The administrator suspects this to be a DNS problem. Which of the following commands would the administrator run to identify the DNS server of the remote

Options are :

  • dig mx
  • ipconfig/all
  • ifconfig-a
  • dig ns (Correct)

Answer : dig ns

A technician wants to use an existing DHCP server for three additional VLANs. Which of the following features needs to be configured to allow for this addition?

Options are :

  • Repeater
  • DHCP relay (Correct)
  • DHCP server
  • Proxy server

Answer : DHCP relay

A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?

Options are :

  • IPX
  • PAT (Correct)
  • DHCP
  • Proxy

Answer : PAT

Computers on a small network are not able to receive new addresses from the DHCP server. However, the administrator has checked the server and ensured it is connected, responding, and functional. Which of the following is the MOST likely problem in this scenario?

Options are :

  • The DNS server is no longer functional and internal name-address resolution is down.
  • The DHCP server has an incorrect gateway configured.
  • The DHCP server was incorrectly configured with a six hour lease time on addresses.
  • The DHCP server was incorrectly configured with no-expiring lease time on addresses. (Correct)

Answer : The DHCP server was incorrectly configured with no-expiring lease time on addresses.

Which of the following routing protocols is strictly a distance vector protocol?

Options are :

  • OSPF
  • BGP (Correct)
  • IS-IS

Answer : BGP

Which of the following commands is used to display other computers running on the network?

Options are :

  • net view (Correct)
  • nslookup
  • ipconfig
  • hostname

Answer : net view

Which of the following wireless standards can be used to avoid the 2.4GHz range?

Options are :

  • 802.1 n (Correct)
  • 802.1X
  • 802.11a (Correct)
  • 802.11b
  • 802.11g

Answer : 802.1 n 802.11a

Which of the following mitigation techniques would an administrator apply to a device in order to restrict remote access?

Options are :

  • Disable TELNET (Correct)
  • Enable TELNET but not SSL
  • Disable IGMP snooping
  • Disable ICMP/ping on device

Answer : Disable TELNET

A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement?

Options are :

  • Address translation (Correct)
  • Load balancing
  • DHCP
  • Multicast addressing

Answer : Address translation

After 100 meters (328 feet), CAT6 cabling is known to experience which of the following symptoms?

Options are :

  • Crosstalk
  • Signal bleed
  • Data collision
  • Signal loss (Correct)

Answer : Signal loss

Which of the following OSI model layers is used for logical addressing?

Options are :

  • Physical
  • Network (Correct)
  • Transport
  • Data link

Answer : Network

When ordering aT1 line, the network technician tells the telecommunications company that a particular device is not needed since it is built-in to the router's T1 port. Which of the following devices is the technician referring to?

Options are :

  • DWDM
  • TDR
  • ATM
  • CSU/DSU (Correct)

Answer : CSU/DSU

A technician temporarily needs an additional network connection in their office to test a new workstation. Which of the following is the BEST solution to add a temporary network connection?

Options are :

  • Install a CSU/DSU
  • Install a small network switch (Correct)
  • Use port mirroring on the switch
  • Split the pairs of the existing jack

Answer : Install a small network switch

Which of the following devices allows multiple internal IP addresses to access an external website with minimal impact to the network bandwidth?

Options are :

  • Proxy (Correct)
  • Load balancer
  • Bandwidth shaper
  • Router

Answer : Proxy

Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time?

Options are :

  • Wireless encryption
  • Wireless bonding
  • CSMA/CA (Correct)

Answer : CSMA/CA

802.11g wireless signals operating at 24GHz has a maximum line of sight range of which of the following?

Options are :

  • 840 feet (256 meters)
  • 460 feet (140 meters) (Correct)
  • 40 feet (165 meters)
  • 560 feet (171 meters)

Answer : 460 feet (140 meters)

Web users are reporting issues downloading various types of media. Which of the following should the administrator do FIRST?

Options are :

  • Continue to gather information and see what other problems may exist. (Correct)
  • Determine the most probable cause.
  • Create an action plan and solution identifying potential effects.
  • Find out what has recently changed on the network

Answer : Continue to gather information and see what other problems may exist.

Which of the following is used to reduce the number of public IP addresses required?

Options are :

  • SNAT
  • NAT (Correct)
  • PAT

Answer : NAT

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions