CompTIA N10-004 Network+ Certification Practice Test Set 4

A zone transfer occurs over which of the following ports?


Options are :

  • TCP 53 (Correct)
  • TCP 25
  • UDP67
  • UDP123

Answer : TCP 53

At which of the following layers does the ICMP protocol operate?


Options are :

  • Layer 3 (Correct)
  • Layer 1
  • Layer 4
  • Layer 5

Answer : Layer 3

A user reports sporadic connectivity with their wireless connection. A technician determines the wireless speed reported by the laptop to be 1Mbps. Which of the following is the MOST likely cause of this issue?


Options are :

  • The client does not support 802.11n.
  • Incorrect frequency on the client is being used.
  • The client distance from the AP. (Correct)
  • Incorrect encryption on the AP.

Answer : The client distance from the AP.

Which of the following can be an STP cable?


Options are :

  • CAT5e (Correct)
  • RG-59
  • Fibe
  • RG-6

Answer : CAT5e

Which of the following is MOST commonly powered using PoE?


Options are :

  • Switches
  • Routers
  • Access points (Correct)
  • Laptops

Answer : Access points

Which of the following is a performance optimization technology?


Options are :

  • QoS (Correct)
  • VoIP
  • Spanning
  • Trunking

Answer : QoS

A common technique used to prevent the unauthorized network devices from sending traffic across a network is port.


Options are :

  • address translation
  • spanning
  • authentication (Correct)
  • mirroring

Answer : authentication

Which of the following is a multifunction device in a SOHO network?


Options are :

  • Load balancer
  • Wireless route (Correct)
  • Bandwidth shaper
  • Proxy server

Answer : Wireless route

An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?


Options are :

  • NAT
  • Subnetting
  • Dynamic
  • Static (Correct)

Answer : Static

Which of the following interfaces is used to connect analog devices to the Internet?


Options are :

  • SDSL
  • ATM
  • POTS (Correct)
  • VDSL

Answer : POTS

An administrator only has one public IP address that must be shared among five employees. Which of the following network schemes should be used?


Options are :

  • SNAT (Correct)
  • SNAP
  • NAC
  • MPLS

Answer : SNAT

A standard installation for wireless will use which of the following antenna types?


Options are :

  • Patch
  • Yagi
  • Omni-Directional (Correct)
  • Sector

Answer : Omni-Directional

An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?


Options are :

  • Peer-to-peer
  • Unicast
  • Multicast (Correct)
  • Broadcast

Answer : Multicast

Which of the following is used to identify active hosts along with their network addresses?


Options are :

  • NIPS
  • Ping sweep (Correct)
  • IDS
  • Port scan

Answer : Ping sweep

Which of the following solutions will detect and disable a rogue access point?


Options are :

  • Packet sniffer
  • IPS (Correct)
  • IDS
  • Port scan

Answer : IPS

Which of the following is an EGP routing protocol?


Options are :

  • RIP
  • BGP (Correct)
  • IGP
  • OSPF

Answer : BGP

At which of the following layers does the TFTP protocol operate?


Options are :

  • Layer 4
  • Layer 7 (Correct)
  • Layer 5
  • Layer 1

Answer : Layer 7

Which of the following regulates the amount of network traffic a single node receives in a server cluster?


Options are :

  • Load balancer (Correct)
  • Proxy server
  • Quality of service
  • Content filter

Answer : Load balancer

A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80.Which of the following tools should be used to determine the listening port of the web server?


Options are :

  • Route
  • Ifconfig
  • Nslookup
  • Netstat (Correct)

Answer : Netstat

Which of the following should an administrator do after running a command from the console on the perimeter router?


Options are :

  • Compare the configuration with the baseline
  • Update the network configuration procedures
  • Update the configuration logs (Correct)
  • Update the network wiring schematics

Answer : Update the configuration logs

Which of the following is a correct IP ACL?


Options are :

  • DROP 00-12-34-56-78-9A
  • DENYO:::0:::0:::3
  • PERMIT 192.268.20.1
  • PERMIT 192.168 1.100 80 (Correct)
  • DENY ANY ANY (Correct)

Answer : PERMIT 192.168 1.100 80 DENY ANY ANY

Which of the following are valid MAC addresses?


Options are :

  • 001C.1G2F.1234
  • 00-1B-26-3F-B1-16-34
  • FFFF.FFFF.FFFF (Correct)
  • 00-1C-1F-2C-13-43 (Correct)
  • 00-01-1E-2F-B3-16-01

Answer : FFFF.FFFF.FFFF 00-1C-1F-2C-13-43

A client wants to improve the wireless coverage on the third floor of their house. The wireless router is located in the basement and there is no easy way to run a cable to the third floor. Which of the following devices should be installed to extend the wireless coverage to cover the entire third floor without running cables?


Options are :

  • Bridge
  • Switch
  • Repeater (Correct)
  • Router

Answer : Repeater

Which of the following utilities can be used to list the routing table?


Options are :

  • dig
  • netstat (Correct)
  • ipconficj
  • nslookup

Answer : netstat

An administrator needs to diagnose problems with a WINS server. Which of the following tools should be used? nslookup


Options are :

  • nbtstat
  • netstat
  • dig (Correct)

Answer : dig

Which of the following protocols requests membership to a multicast group?


Options are :

  • ICMP
  • SMTP
  • IGMP (Correct)
  • SNMP

Answer : IGMP

Which of the following features does SNMPv3 have over previous versions when remotely monitoring networking devices?


Options are :

  • HTTPS
  • Availability
  • Authentication (Correct)
  • Privacy (Correct)
  • Trap receivers

Answer : Authentication Privacy

A network technician arrives to work and discovers users are having a problem connecting the company server. The server operator was working on upgrades the night before. Which of the following documents should the technician use to attempt to discover the problem?


Options are :

  • Network maps
  • Baselines
  • Change management (Correct)
  • Cable management

Answer : Change management

Which of the following would contain information regarding network device alerts using SNMP?


Options are :

  • History log
  • Ping sweep reports
  • Syslog (Correct)
  • Audit log

Answer : Syslog

A Stateful firewall is MOST useful in protecting against which of the following network scans?


Options are :

  • PING
  • Xmas (Correct)
  • UDP
  • ACK

Answer : Xmas

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions