CompTIA N10-004 Network+ Certification Practice Test Set 12

Which of the following technologies facilitates the conversion of internal private IP addressing to external public IP addressing?


Options are :

  • TCP/IP
  • NAT (Correct)
  • DHCP
  • SNMP

Answer : NAT

Which of the following protocols is commonly used for VoIP technology?


Options are :

  • SNMP
  • SIP (Correct)
  • Telnet
  • SMTP

Answer : SIP

Which of the following LAN technologies is considered fast Ethernet and uses two pairs of cabling, one pair for sending and the other pair for receiving?


Options are :

  • 100BaseFX
  • 100BaseT4
  • 100BaseTX (Correct)
  • 100BaseX

Answer : 100BaseTX

Which of the following protocols requests membership to a multicast group?


Options are :

  • SMTP
  • SNMP
  • IGMP (Correct)
  • ICMP

Answer : IGMP

The administrator's ISP indicates that they will need an autonomous system number to begin routing external network traffic. Which of the following protocols should the ISP plan to use?


Options are :

  • BGP (Correct)
  • Is-Is
  • OSPF
  • RIPv2

Answer : BGP

Which of the following is a secure method of remote access via command line?


Options are :

  • Telnet
  • RSH
  • SSH (Correct)
  • RCP

Answer : SSH

An administrator is experiencing availability issues on a Linux server. The administrator decides to check the server for an IP address conflict on the server. Which of the following commands should the administrator use?


Options are :

  • ipconfig
  • traceroute
  • tracert
  • ifconfig (Correct)

Answer : ifconfig

A user reports being occasionally disconnected from the server. Which of the following tools could the technician use to determine if it is the client or the server that is dropping the connection?


Options are :

  • Multimeter
  • Packet sniffer (Correct)
  • Throughput tester
  • Load balancer

Answer : Packet sniffer

Which of the following commands provides similar information about the current configuration of active local Ethernet adapters?


Options are :

  • route
  • hostname
  • traceroute
  • ifconfig (Correct)
  • ipconfig (Correct)

Answer : ifconfig ipconfig

Arouter that takes the workstations internal IP address and changes it to another IP address when it sends the data outside of the network is an example of which of the following?


Options are :

  • NMAP
  • IDS
  • DMZ
  • NAT (Correct)

Answer : NAT

Which of the following operates in the 2.4GHz range and has a MAXIMUM distance of 10 meters (33 feet)?


Options are :

  • Bluetooth (Correct)
  • 802.11a
  • 802.11b
  • x-10

Answer : Bluetooth

Which of the following would provide a technician with a performance reference point to refer back to after hardware repair?


Options are :

  • Wire scheme
  • Baseline (Correct)
  • Asset management
  • Network map

Answer : Baseline

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?


Options are :

  • Traffic shaping
  • QoS
  • Caching engines
  • Load balancing (Correct)

Answer : Load balancing

Which of the following DNS record types provides the hostname to IP address mapping?


Options are :

  • CNAME record
  • MX record
  • NS record
  • A record (Correct)

Answer : A record

An administrator replaced a router with a switch. End users are able to access network shares but are not able to access the Internet. Which of the following is the BEST explanation why the users are unable to access the Internet?


Options are :

  • Router routes traffic between different networks and a switch does not (Correct)
  • The firewall needs to be setup to allow traffic to reach the Internet
  • The switch needs to be setup to forward data traffic to the Internet
  • The new switch is faulty and needs to be replaced and configured correctly

Answer : Router routes traffic between different networks and a switch does not

Which of the following would be used to optimize network performance and increase bandwidth availability?


Options are :

  • QoS
  • Traffic shaping (Correct)
  • Fault tolerance
  • Packet analysis

Answer : Traffic shaping

A technician is at a client's site to figure out an intermittent network problem. The technician has implemented the solution. Which of the following is the NEXT step in the troubleshooting methodology?


Options are :

  • Create an action plan and identify potential effects.
  • Determine if escalation is necessary.
  • Document the solution and the entire process. (Correct)
  • Determine if anything has changed

Answer : Document the solution and the entire process.

A wireless access point supports up to 20 clients. Which of the following describes this wireless network?


Options are :

  • Point to point
  • Ring
  • Point to multipoint (Correct)
  • Msh

Answer : Point to multipoint

After a baseline check was completed it was noted that the network was working far below the level of the last baseline. Which of the following should the technician do NEXT to determine where the network problems are occurring?


Options are :

  • Reboot the entire network one device at a time
  • Upgrade the firmware on all routers and switches
  • Conduct a network traffic analysis (Correct)
  • Rerun the baseline to ensure the results were correct

Answer : Conduct a network traffic analysis

Which of the following networks would MOST likely require EGP routing?


Options are :

  • Networks that use OSPF in addition to static routes
  • Networks that use encryption
  • Networks with classless Internet domain routing
  • Networks with multiple ISPs (Correct)

Answer : Networks with multiple ISPs

Which of the following should be updated when new computers are purchased?


Options are :

  • Baselines
  • Cable management
  • Change management
  • Asset management (Correct)

Answer : Asset management

Which of the following would MOST likely be used with multimode fiber?


Options are :

  • 10GBaseSR (Correct)
  • 10GBaseLR
  • 10GBaseT
  • 10GBaseER

Answer : 10GBaseSR

The network technician is troubleshooting a network issue by implementing a new security device. After installing and configuring the device, which of the following steps should the technician take NEXT?


Options are :

  • Document their findings, actions, and outcomes
  • Escalate the issue to upper management
  • Verity full system functionality (Correct)
  • Identify the main problem and question the user

Answer : Verity full system functionality

Which of the following logical network topologies is used to provide a secure connection across the Internet?


Options are :

  • VPN (Correct)
  • VTP
  • VLAN
  • Peer to Peer

Answer : VPN

When ordering switches for a new building, which of the following is the BEST way for the technician to determine the number of switches to put in each network closet?


Options are :

  • Count the number of phone ports and configure two network ports for each phone port.
  • Count the number of rooms near each closet and standardize eight drops per room.
  • Review the architectural plans to see how many drops go to each closet. (Correct)
  • Wireless is the new standard and no network switches will be needed in the building,

Answer : Review the architectural plans to see how many drops go to each closet.

Which of the following should be used to ensure that all packets are received by every connected device?


Options are :

  • Ruter
  • Firewall
  • Switch
  • Hub (Correct)

Answer : Hub

Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port?


Options are :

  • 143
  • 23
  • 161 (Correct)
  • 162 (Correct)
  • 8080
  • 22

Answer : 161 162

After a brownout, a user can connect to the internal network, but not the Internet. Which of the following is the company's DSL router experiencing that is causing this issue?


Options are :

  • Broadcast storm
  • Power failure (Correct)
  • Duplicate IP address
  • Switching loop

Answer : Power failure

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?


Options are :

  • Vulnerability scanner
  • Honeypot
  • Honeynet (Correct)
  • Network based IDS

Answer : Honeynet

Which of the following wireless technologies can support the GREATEST distance on either 2.4GHz or 5GHz frequencies?


Options are :

  • 802.11b
  • 802,11n (Correct)
  • 802.11g
  • 802.11a

Answer : 802,11n

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions