N10-006 CompTIA Network+ Certification Practice Test Set 3

A contractor was hired to troubleshoot congestion issues on the network. After a few of the switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions increase.  Which of the following is the BEST action to alleviate the situation?  


Options are :

  • Check the cabling on all switches for improper crossover use
  • Downgrade firmware and restore backup configuration (Correct)
  • Document the changes that were made
  • Allow the contractor to reset switches to factory defaults

Answer : Downgrade firmware and restore backup configuration

An organization is involved in a civil court action and needs to ensure email messages are retained.  Which of the following describes the requirement to archive and retain email traffic and other correspondence?  


Options are :

  • Persistent agents
  • Chain of custody
  • Divide and conquer
  • Legal hold (Correct)

Answer : Legal hold

A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician notices that the STP cables pairs are not completely twisted near the connector.  Which of the following is the issue?  
 


Options are :

  • Cross-talk (Correct)
  • Tx/Rx reverse
  • 568A/568B mismatch
  • Split pairs

Answer : Cross-talk

Which of the following can be issued from the command line to find the layer 3 hops to a remote destination?  


Options are :

  • netstat
  • nslookup
  • ping
  • traceroute (Correct)

Answer : traceroute

A client reports that half of the office is unable to access a shared resource.  Which of the following should be used to troubleshoot the issue?  


Options are :

  • Vendor documentation
  • Data backups
  • Network diagrams (Correct)
  • Baseline information

Answer : Network diagrams

The administrator modifies a rule on the firewall, and now all the FTP users cannot access the server any longer. The manager calls the administrator and asks what caused the extreme downtime for the server.  In regards to the manager's inquiry, which of the following did the administrator forget to do FIRST?  


Options are :

  • Provide notification of change to users
  • Submit a change request (Correct)
  • Document the changes
  • Schedule a maintenance window

Answer : Submit a change request

Which of the following broadband WAN technologies would MOST likely be used to connect several remote branches that have no fiber or satellite connections?  



Options are :

  • OC3
  • POTS (Correct)
  • OC12
  • WiMax

Answer : POTS

Which of the following should be used to ensure a specific device always receives the same IP address?  


Options are :

  • DHCP scope
  • IP helper
  • Address lease
  • Reservation (Correct)
  • DHCP relay

Answer : Reservation

Users connecting to an SSID appear to be unable to authenticate to the captive portal.  Which of the following is the cause of this issue?  
 


Options are :

  • RADIUS (Correct)
  • SSL certificates
  • WPA2 security key
  • CSMA/CA

Answer : RADIUS

QoS operates at which of the following OSI model layers? (Select TWO)  


A. Layer 1 
B. Layer 2 
C. Layer 3 
D. Layer 5 
E. Layer 7 


Options are :

  • C,D
  • B,C (Correct)
  • B,E
  • A,E

Answer : B,C

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)  


A. Memorandum of understanding 
B. Data classification document 
C. Service level agreement 
D. Interconnection security agreement 
E. Consent to monitor 
F. Acceptable use policy 


Options are :

  • B,E
  • B,F
  • C,D
  • B,D
  • A,F (Correct)

Answer : A,F

A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations.  At which of the following OSI layers could the problem exist? (Select TWO)  

A. Presentation 
B. Transport 
C. Session 
D. Data link 
E. Application 
F. Physical 


Options are :

  • C,F
  • D,F (Correct)
  • A,C
  • A,E
  • B,D

Answer : D,F

Channel bonding will improve which of the following wireless characteristics?  


Options are :

  • Encryption strength
  • Coverage area
  • Signal strength
  • Connection speed (Correct)

Answer : Connection speed

Which of the following allows a telecommunication company to test circuits to customers remotely?  


Options are :

  • RDP
  • Smart Jack (Correct)
  • VPN
  • VLAN
  • Toner Probe

Answer : Smart Jack

A single mode fiber is no longer providing network connectivity to a remote site.  Which of the following would be used to identify the location of the break?  
 


Options are :

  • OTDR (Correct)
  • MT-RJ
  • Media converter
  • Cable certifier

Answer : OTDR

The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted, software threat solution is not agile enough. The CIO points to specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly.  Which of the following solutions would have the BEST chance of meeting these goals?  



Options are :

  • Host-based IDS
  • Cloud-based anti-malware
  • Stateful firewall (Correct)
  • Premise-based IDS

Answer : Stateful firewall

A company is having a new T1 line installed.  Which of the following will the connection MOST likely terminate to?  
 


Options are :

  • IDF
  • MDF (Correct)
  • Ethernet router
  • Core switch

Answer : MDF

A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised.  Which of the following should the network administrator have done previously to minimize the possibility of a network breach?  


Options are :

  • Provide end user awareness and training for employees (Correct)
  • Place a network sniffer on segments with new employees
  • Ensure best practices were implemented when creating new user accounts
  • Create VLANs to segment the network traffic

Answer : Provide end user awareness and training for employees

An administrator needs to set up a space in the office where co-workers can relax. The administrator sets up several TV's with interconnected gaming systems in the office.  Which of the following did the administrator set up?  


Options are :

  • CAN (Correct)
  • MAN
  • WAN
  • LAN

Answer : CAN

An administrator's network has OSPF for the internal routing protocol and has two interfaces that continue to flap. The administrator reviews the following output:  
Fast ethernet 0 is up, line protocol is up 
Int ip address is 10.20.130.5/25 
MTU 1500 bytes, BW10000 kbit, DLY 100 usec 
Reliability 255/255, Tx load 1/255, Rx load 1/255 
Encapsulation ospf, loopback not set 
Keep alive 10 
Full duplex, 100Mb/s, 100Base Tx/Fx 
Received 1052993 broadcasts 
1258 input errors 
983881 packet output, 768588 bytes 
1747 output errors, 0 collisions, 423 resets 
Which of the following problems would cause the interface flap?
  


Options are :

  • Bad wire
  • Incorrect encapsulation
  • Wrong IP address
  • Loopback not set
  • Duplex mismatch (Correct)

Answer : Duplex mismatch

A network technician was tasked to install a network printer and share it to a group of five human resource employees. The technician plugged the device into a LAN jack, but was unable to obtain an IP address automatically.  Which of the following is the cause of the problem?  


Options are :

  • DNS
  • Wrong TCP port
  • Split horizon
  • DHCP scope (Correct)

Answer : DHCP scope

A client reports that half of the marketing department is unable to access network resources. The technician determines that the switch has failed and needs to replace it.  Which of the following would be the MOST helpful in regaining connectivity?  


Options are :

  • Configuration backup (Correct)
  • Network diagram
  • Router image
  • VLAN configuration

Answer : Configuration backup

Users have reported poor network performance. A technician suspects a user may have maliciously flooded the network with ping request.  Which of the following should the technician implement to avoid potential occurrences from happening in the future?  


Options are :

  • Update all antivirus software
  • Remove all suspected users from the network
  • Block all ICMP request (Correct)
  • Upgrade firmware on all network cards

Answer : Block all ICMP request

A technician is configuring a computer lab at a school. The computers need to be able to communicate with each other, but students using the computers should not be able to access the internet.  Which of the following rules on the firewall should the technician configure for the lab computers?  
 


Options are :

  • Block all WAN to LAN traffic (Correct)
  • Block all WLAN to WAN traffic
  • Block all LAN to LAN traffic
  • Block all LAN to WAN traffic

Answer : Block all WAN to LAN traffic

While implementing wireless access points into the network, one building is having connectivity issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is performing as expected.  Which of the following should be exchanged on the access points installed in the building with connectivity issues?  
 


Options are :

  • Security standard
  • UTP patch cables
  • Power adapter
  • Antenna (Correct)

Answer : Antenna

While troubleshooting, a technician notices that some clients using FTP still work and that pings to the local router and servers are working. The technician tries to ping all known nodes on the network and they reply positively, except for one of the servers. The technician notices that ping works only when the host name is used but not when FQDN is used.  Which of the following servers is MOST likely down?  
 


Options are :

  • DHCP server
  • WINS server
  • Domain controller
  • DNS server (Correct)

Answer : DNS server

There has been an increased amount of successful social engineering attacks at a corporate office.  Which of the following will reduce this attack in the near future?  


Options are :

  • Personal Identifiable Information
  • Helpdesk training
  • Appropriate use policy
  • User awareness training (Correct)

Answer : User awareness training

The human resource department has been moved to an area which is more than 60 meters away from the nearest IDF.  In order to comply with the SLA which requires that 10Gb speeds be provided, which of the following media will need to utilized?  
 


Options are :

  • 802.11ac
  • 802.11n
  • CAT6e (Correct)
  • CAT5e

Answer : CAT6e

A user is unable to connect to a server in another building.  
A technician is troubleshooting the issue and determines the following:  
Client PC 1 has an IP address if 192.168.10.25/25 
PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A 
Server A is named 'BLDGBFILESRVR01' and has an IP address of 192.168.10.145/25 
PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A 
However, when PC 1 pings server A, it receives a destination host unreachable responds.  
Which of the following is the MOST likely cause? 

 


Options are :

  • Link from router A to PC 1 are on different subnets
  • Link from server A top PC 2 is down
  • Link from PC 1 to router A has duplex issues
  • Link from router A to server A is down (Correct)

Answer : Link from router A to server A is down

An administrator has a physical server with a single NIC. The server needs to deploy two virtual machines. Each virtual machine needs two NIC's, one that connects to the network, and a second that is a server to server heartbeat connection between the two virtual machines.  After deploying the virtual machines, which of the following should the administrator do to meet these requirements?  


 


Options are :

  • The administrator should create a virtual switch for each guest. The switches should be configured for inter-switch links and the primary NIC should have a NAT to the corporate network
  • The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range (Correct)
  • The administrator should create a virtual switch that is bridged to the corporate network and a second virtual switch that carries intra-VM communication only
  • The administrator should install a second physical NIC onto the host, and then connect each guest machine's NICs to a dedicated physical NIC

Answer : The administrator should create a virtual switch to bridge all of the connections to the network. The virtual heartbeat NICs should be set to addresses in an unused range

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions