CompTIA N10-004 Network+ Certification Practice Test Set 7

A user is attempting to connect to the network remotely using a laptop and dial-up. The user plugs the cable into the only available laptop connection, but the connector is loose inside the port. The MOST likely reason the connector is loose is the:


Options are :

  • User has plugged into the laptop's NIC port (Correct)
  • User has plugged the wrong end of the cable into the port
  • RJ-11 connector needs to be replaced with an RJ-45 connector
  • RJ-11 connector needs to be re-crimped

Answer : User has plugged into the laptop's NIC port

Which of the following network devices would MOST likely be installed on a network to help reduce broadcast traffic and to allow individual virtual networks?


Options are :

  • WAP
  • Switch (Correct)
  • Repeater
  • Hub

Answer : Switch

Which of the following network cable types requires grounding?


Options are :

  • Fiber
  • UTP
  • Serial
  • STP (Correct)

Answer : STP

Which of the following would need to be implemented on a wireless router to allow network access based on a passphrase that the administrator would supply?


Options are :

  • WPA-PSK encryption (Correct)
  • Port forwarding
  • MAC filtering
  • SSID broadcast

Answer : WPA-PSK encryption

A computer is able to ping other devices on the same network but is unable to ping devices on another network. Which of the following needs to be configured?


Options are :

  • DNS primary server
  • Host route
  • Proxy ARP
  • Default gateway (Correct)

Answer : Default gateway

Which of the following WAN protocols is a packet switching technology?


Options are :

  • PSTN
  • ISDN
  • POTS
  • Frame Relay (Correct)

Answer : Frame Relay

Users are unable to access the Internet but the users are able to send/receive email from their desktops. Which of the following ports is MOST likely being blocked?


Options are :

  • 143
  • 110
  • 80 (Correct)
  • 25

Answer : 80

Which of the following networks are reserved for private IP addresses?


Options are :

  • 162.17.0.0/12
  • 168.129.00/24
  • 172.16.128.0/15
  • 192.168.0.0/16 (Correct)

Answer : 192.168.0.0/16

Which of the following protocols can be used to retrieve system and network performance information from a router?


Options are :

  • TFTP
  • SNMP (Correct)
  • IMAP
  • LDAP

Answer : SNMP

Which of the following protocols is commonly used by ping?


Options are :

  • SIP
  • ICMP (Correct)
  • ARP
  • TFTP

Answer : ICMP

A natural disaster has occurred and the administrator must return the network to a healthy status. Which of the following should the administrator do in this case?


Options are :

  • Follow the emergency action plan. (Correct)
  • Wait for an issue to be reported.
  • Determine if escalation is necessary.
  • Establish a new baseline.

Answer : Follow the emergency action plan.

A user receives a call from someone reporting to be from the help desk who asks for their password. The user discovers later that the caller did not work for the help desk. Which of the following describes this type of exploit?


Options are :

  • Phishing scam
  • Social engineering (Correct)
  • Shoulder surfing
  • Man-in-the-Middle

Answer : Social engineering

Which of the following utilities would be used to display a network's MX record?


Options are :

  • dig (Correct)
  • nbtstat
  • traceroute
  • route

Answer : dig

Which of the following wireless technologies can operate at only 5GHz?


Options are :

  • 802.11b/g
  • 802.11g
  • 802.11b
  • 802.11a (Correct)

Answer : 802.11a

Which of the following has a maximum data rate of 11Mbps?


Options are :

  • 802.11b (Correct)
  • 802.11n
  • 802.11g
  • 802.11a

Answer : 802.11b

Which of the following analyzes the entire subnet to identify all hosts that are active?


Options are :

  • Ping sweep (Correct)
  • Port scanner
  • Packet sniffer
  • Traceroute

Answer : Ping sweep

Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues?


Options are :

  • PAT
  • NAT (Correct)
  • CIDR
  • Multicast

Answer : NAT

Which of the following commands would allow a computer to acquire an IP address?


Options are :

  • ipconfig/release
  • ipconfig/renew (Correct)
  • ipconfig/all
  • ipconfig/help

Answer : ipconfig/renew

Which of the following troubleshooting steps should be performed NEXT after a core router has been reported down?


Options are :

  • Identify all affected areas. (Correct)
  • Test a solution.
  • Implement a solution.
  • Establish the outage cause.

Answer : Identify all affected areas.

Which of the following tools can be used to identify the location of a network outage?


Options are :

  • Ping
  • netstat
  • traceroute (Correct)
  • nslookup

Answer : traceroute

An administrator would like to know the name of the workstation that is being repaired. Which of the following commands, without parameters, will provide this information?


Options are :

  • Hostname (Correct)
  • Ipconfig
  • Netstat
  • Ping

Answer : Hostname

Which of the following metrics indentifies the number of connections that is between two devices?


Options are :

  • Latency
  • Bandwidth
  • Hop count (Correct)
  • MTU

Answer : Hop count

A technician at a company providing online, real-time media streaming to the Internet needs a network technology that will reduce bandwidth while delivering high throughput. Which of the following can the technician implement to fit these requirements?


Options are :

  • Multicast (Correct)
  • Subnetting
  • Broadcast
  • Unicast

Answer : Multicast

Which of the following address formats uses 32-bit addressing?


Options are :

  • MAC address
  • Ipv4 (Correct)
  • Ipv6
  • Host address

Answer : Ipv4

Which of the following would be used to lock all of the primary communication equipment of a building, including its demarcation point?


Options are :

  • Smartjack
  • MDF (Correct)
  • IDF
  • MTR

Answer : MDF

A user reports that their laptop does not have network connectivity, but was working fine last week. The technician executes IPCONFIG to see what the IP address is but it comes up with a 169.254.254.1 address. This address is not part of the company's subnet. Which of the following MOST likely identifies this address type?


Options are :

  • Broadcast
  • DHCP
  • APIPA (Correct)
  • Multicast

Answer : APIPA

Which of the following cables is the MOST susceptible to interference?


Options are :

  • UTP (Correct)
  • Coax
  • STP
  • Fiber

Answer : UTP

Which of the following allows a WAP to be installed in a location where there are no power outlets available?


Options are :

  • PoE (Correct)
  • PPTP
  • Port authentication
  • Trunking

Answer : PoE

Interior gateway protocols are used for resolving routes:


Options are :

  • Within routers
  • Between networks
  • Between WAPs
  • Within networks (Correct)

Answer : Within networks

Switch A is configured with VLAN 105 and 106. Switch Bis configured with VLAN 105 and 107. Both switches are connected with a fiber cable. In order for packets from all VLANs to cross the fiber cable, which of the following configurations MUST be present?


Options are :

  • 802.1q trunking (Correct)
  • Reverse ARP
  • Full duplex on the fiber link
  • PoE

Answer : 802.1q trunking

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions