CompTIA N10-004 Network+ Certification Practice Test Set 3

Which of the following wireless standards has the highest maximum data rate?


Options are :

  • 802.11g
  • 802.11b
  • 802.11a
  • 802.11n (Correct)

Answer : 802.11n

Keyword and blacklist filtering would be handled at which level in a network?


Options are :

  • Hardware firewall (Correct)
  • Layer 2 managed switch
  • Bridge
  • DHCP server

Answer : Hardware firewall

In an enterprise setting, access switches providing network connectivity placed throughout a building are typically connected to a backbone called the:


Options are :

  • Demarcation point
  • MDF (Correct)
  • Proxy
  • Smart jack

Answer : MDF

Which of the following devices transmits timed broadcasts onto an active network?


Options are :

  • Unmanaged switch (Correct)
  • Firewall
  • Bridge
  • Which of the following devices transmits timed broadcasts onto an active network?
  • DHCP client

Answer : Unmanaged switch

A section of the building has been having intermittent connectivity problems lately. An action plan and solution has been created. Which of the following steps would an administrator perform NEXT?


Options are :

  • Implement and test the solution. (Correct)
  • Establish the most probable cause.
  • Document the solution and process.
  • Identify additional symptoms and problems

Answer : Implement and test the solution.

Which of the following describes the location where an administrator would terminate a bundle of CAT5e cables?


Options are :

  • Smart jack
  • Switch
  • Patch panel (Correct)
  • Router

Answer : Patch panel

A technician claims to have crimped a patch cable according to the T568A standard on one end and T568B on the other. Which of the following results is to be expected?


Options are :

  • The cable will only work at a maximum of 10Mbps. since 100/1000Mbps only works on T568B pure cables
  • Since only half the leads are used, the cable will only work at 100Mbps.
  • There will be no proper data continuity; the standards utilize two different wiring diagrams. (Correct)
  • The cable will only work at a maximum of 100Mbps. since 1Gbps only works on T568B cables.

Answer : There will be no proper data continuity; the standards utilize two different wiring diagrams.

Which of the following protocols should be used to monitor network performance?


Options are :

  • SNTP
  • SMTP
  • HTTP
  • SNMP (Correct)

Answer : SNMP

Which of the following are common VPN transports?


Options are :

  • SSL (Correct)
  • PPTP
  • VNC
  • RAS
  • RDP (Correct)

Answer : SSL RDP

Which of the following utilities would be used to display a NIC's cache of MAC addresses?


Options are :

  • dig
  • nslookup
  • netstat
  • arp (Correct)

Answer : arp

Which of the following WAN technologies uses a telephone cable?


Options are :

  • POTS (Correct)
  • FDDI
  • Cable modem
  • SONET

Answer : POTS

Which of the following connector types is used for coax cable?


Options are :

  • ST
  • BNC (Correct)
  • SC
  • LC

Answer : BNC

Which of the following tools would an administrator use to determine if a DNS server is answering authoritatively for a domain?


Options are :

  • netstat
  • hostname
  • dig (Correct)
  • nbtstat

Answer : dig

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?


Options are :

  • NIPS (Correct)
  • HIDS
  • VPN
  • IDS

Answer : NIPS

Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?


Options are :

  • Open pairs
  • A short
  • EMI (Correct)
  • ESD

Answer : EMI

A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used?


Options are :

  • VLAN (Correct)
  • Subnetting
  • VPN
  • Peer to peer

Answer : VLAN

A technician receives an urgent call that the switch in accounting is down. Which of the following should the technician do FIRST to troubleshoot this issue?


Options are :

  • Establish the most probable cause
  • Escalate if necessary.
  • Identity symptoms and problems (Correct)
  • Document the process and solutions

Answer : Identity symptoms and problems

Which of the following is used by RADIUS to encrypt messages between the server and the client?


Options are :

  • Public key
  • CSU/DSU
  • Private key
  • Shared secret (Correct)

Answer : Shared secret

Which of the following would help a new administrator quickly determine if a network had a VLAN for its publicly accessible servers?


Options are :

  • Wiring schematics
  • Logical network diagrams (Correct)
  • Baselines
  • Regulations

Answer : Logical network diagrams

Several users from the same location are reporting problems accessing the intranet server. An administrator has verified that no other remote areas are having issues connecting to the same server. Which of the following steps should the administrator perform NEXT?


Options are :

  • Establish the most probable cause
  • Escalate the problem to the right section
  • Test a solution.
  • Determine what has changed (Correct)

Answer : Determine what has changed

Which of the following is the name of the routing update process involved when a change occurs in the routing environment?


Options are :

  • Dynamic
  • Convergence (Correct)
  • Supernetting
  • Subletting

Answer : Convergence

When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference?


Options are :

  • 2 and 6
  • 1 and 6 (Correct)
  • 6 and 10
  • 5 and 6

Answer : 1 and 6

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port 53?


Options are :

  • Network layer firewall
  • Zone aware firewall
  • Application layer firewall (Correct)
  • Stateful inspection firewall

Answer : Application layer firewall

Which of the following authenticates a web server to the remote client in PKI?


Options are :

  • FQDN
  • Public key (Correct)
  • DNS name
  • Private key

Answer : Public key

Which of the following cable types is intended to be used on short distances and is immune to any type of interference?


Options are :

  • Singlemode fiber
  • Multimode fiber (Correct)
  • Unshielded twisted pair
  • Shielded twisted pair

Answer : Multimode fiber

A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?


Options are :

  • Phishing (Correct)
  • Man-in-the-middle
  • Smurf attack
  • Denial of service

Answer : Phishing

Which of the following is an example of a MAC address?


Options are :

  • 10.0.10.1
  • 1A-23-F9-CD-06-9L
  • 1A-23-F9-CD-06-9B-23-5C
  • 1A-23-F9-CD-06-9B (Correct)

Answer : 1A-23-F9-CD-06-9B

By default, which of the following ports would a network need to have opened to allow for the transmission of incoming and outgoing email?


Options are :

  • 80
  • 25 (Correct)
  • 123
  • 21
  • 110 (Correct)

Answer : 25 110

Which of the following features should an administrator configure to allow an IDS to watch the traffic on a switch?


Options are :

  • VLAN
  • ARP spoofing
  • Spanning tree
  • Mirroring (Correct)

Answer : Mirroring

Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the data link?


Options are :

  • Hub
  • Gateway
  • Router
  • Bridge (Correct)

Answer : Bridge

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions