CompTIA Network+ N10 006 Set 6

Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this?
  • A) Port Mirroring
  • B) VPN Client and Concentrator
  • C) Smart jacks installed for each network jack
  • D) Proxy server with content filter
Which of the following protocols is used by the ping command?
  • A) ARP
  • B) STP
  • C) ICMP
  • D) FTP
Philip, a technician, has been asked to configure the WAN interface connecting to the ISP's router. Which of the following interfaces on the router will be modified?
  • A) Console 0
  • B) Serial 0/0/0
  • C) AUX 0
  • D) FastEthernet 0/0
When configuring a wireless access point, Alex, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?
  • A) Ping
  • B) Dig
  • C) Arp
  • D) Mac-table
Which of the following commands could Philip, a network administrator, use to determine the IP address of a Linux server?
  • A) Ifconfig
  • B) Ipconfig
  • C) Nbtstat
  • D) Netstat
Which of the following network tools is used to identify running services on host devices?
  • A) IDS
  • B) IPS
  • C) NMAP
  • D) Firewall
Which of the following technologies would be used in a small office area that has a lot of 2.4GHz noise?
  • A) MIMO
  • B) 802.11a
  • C) 802.1q
  • D) 802.3af
Which of the following OSI model layers is between the Network and Session layers?
  • A) Transport
  • B) Data link
  • C) Physical
  • D) Presentation
Jennifer, a technician replaces a customer's router, and is now unable to ping the ISP's gateway. Which of the following should the technician check?
  • A) The route table of the next-hop router
  • B) The arp table of the ISP's gateway router.
  • C) The route table of the new customer's router
  • D) The arp table of the network user
Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
  • A) Router
  • B) Switch
  • C) VPN Concentrator
  • D) Hub
Which of the following is a Class A private IP address?
  • A)
  • B)
  • C)
  • D)
across a router?
  • A) Tracert
  • B) Dig
  • C) Uptime
  • D) Arp
Rachael, a network administrator, has disabled STP on the local network. Which of the following is MOST likely the cause of a recent spike in duplicate traffic?
  • A) VLAN mismatch
  • B) Incorrect subnet mask
  • C) Mismatch MTU
  • D) Switching loop
You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
  • A) Packet Scoping
  • B) OTDR
  • C) Toner Probe
  • D) Packet sniffer
Which of the following is the prefix for a link-local IPv6 address?
  • A) 2FFE::/16
  • B) FEEF:/12
  • C) FF00::/8
  • D) FE80::/10
Lin, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
  • A) VTP trunking
  • B) Port forwarding
  • C) PoE
  • D) VLAN tagging
In which of the following layers of the OSI model does the TCP protocol operate?
  • A) Session
  • B) Network
  • C) Transport
  • D) Data link
Lin, a network engineer, needs to troubleshoot a remote router within the WAN. Which of the following user authentications would be the BEST to implement?
  • A) TACACS+
  • B) MS-CHAP
  • C) PKI
  • D) Kerberos
Philip, an administrator, is responsible for one Linux and two Windows servers. He would like to review all server logs centrally. Which of the following services could Philip use in this scenario?
  • A) Baselines
  • B) Change Management
  • C) Event logs
  • D) Syslog
Managing a network device on a dedicated channel that is not used for regular network traffic is known as:
  • A) Out-of-band management
  • B) In-Band management
  • C) Man-in-the-middle
  • D) Backdoor access
A network device designed to manage the distribution of a network's workload between near-identical resources is called:
  • A) Router
  • B) Load Balancer
  • C) Firewall
  • D) DNS Server
In the OSI model, what layer is a router located?
  • A) Data-link Layer
  • B) Layer 5
  • C) Network Layer
  • D) Session Layer
Which communication medium is least susceptible to EMI?
  • A) STP
  • B) UTP
  • C) Coax
  • D) Fiber-Optic
What type of filtering allows for blocking or allowing access to specific domain names?
  • A) Port
  • B) URL
  • C) MAC
  • D) Program
Which port or ports does RDP use?
  • A) TCP 3389
  • B) UDP 3389
  • C) TCP 25
  • D) UDP 20,21
If you needed to attach an RJ-45 connector to a CAT-5e Ethernet cable, what tool would you use?
  • A) Punch down tool
  • B) Reflecto-meter
  • C) Crimp tool
  • D) None of the above
802.11 is a set of standards designed to implement what?
  • A) WLAN
  • B) Ethernet
  • C) Token Ring
  • D) IPXnet
You want to further secure your WAP so that your neighbors in your apartment building can not identify it. Which of the following options would achieve this?
  • A) Enable WPA2
  • B) Disable SSID Broadcast
  • C) Switch to Extended Service Set
  • D) Enable WEP
What kind of terminations would be used to create a crossover cable?
  • A) T568A -> T568A
  • B) T568B -> T568A
  • C) T568B -> T568B
  • D) None of the above
You need to run cable through the airspace between offices, what type of cable is required to do this safely?
  • A) EMI
  • B) STP
  • C) UTP
  • D) Plenum
True or False: It is possible for a CAT 5e cable to span a length of 200 meters without signal degradation or a device to amplify the signal.
  • A) True
  • B) False
You have been asked to install a new switch onto the network. This switch does not have routing capabilities, which OSI Model layer does this switch belong to?
  • A) Layer 3
  • B) Layer 4
  • C) Layer 2
  • D) Layer 5
Which device could cause disruption in wireless network communications?
  • A) Microwave oven
  • B) UTP cabling
  • C) IP Phone
  • D) Infrared TV remote
Which of the following options is capable of detecting malicious activity on a single machine, but will not attempt to stop said activity?
  • A) HIDS
  • B) NIPS
  • C) NIDS
  • D) HIPS
An E1 line supports how many Mbps?
  • A) 44.736 Mbps
  • B) 1.544 Mbps
  • C) 64 Mbps
  • D) 2 Mbps
Which of the following options could be used to describe OSPF and RIP?
  • A) Authentication scemes
  • B) Routing protocols
  • C) Encryption methods
  • D) Cisco router models
IPv6 addresses consist of how many bits?
  • A) 128
  • B) 256
  • C) 32
  • D) 48
A standard MAC Address consists of how many bits?
  • A) 8
  • B) 16
  • C) 32
  • D) 48
Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions