N10-006 CompTIA Network+ Certification Practice Test Set 4

Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?  
 


Options are :

  • Encapsulation
  • Tagging
  • Tunneling
  • De-encapsulation (Correct)

Answer : De-encapsulation

An area to which access is controlled by retina scan is protected by which of the following security measure types? 

 


Options are :

  • Optical reader
  • Proximity reader
  • Cipher locks
  • Biometric (Correct)
  • Two-factor authentication

Answer : Biometric

A network technician discovers an issue with spanning tree on the core switch.  Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue?  
 


Options are :

  • Identify the symptoms
  • Escalate to a senior technician
  • Test a theory to determine the cause
  • Establish a theory of probable cause (Correct)
  • Establish a plan of action

Answer : Establish a theory of probable cause

A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a loopback on a device connecting the T1 line to their central office.  On which of the following devices will the technician implement the loopback?  


Options are :

  • Digital subscriber line modem
  • Channel service unit (Correct)
  • Channel remote module
  • Fiber optic modem

Answer : Channel service unit

 Which of the following protocols were designed to avoid loops on a Layer 2 network? (SelectTWO)  


A. OSPF 
B. RIPv2 
C. 802.1q 
D. Spanning tree 
E. 802.1d 
F. QoS 


Options are :

  • C,E
  • D,E (Correct)
  • A,B
  • A,D
  • B,C

Answer : D,E

A network administrator is noticing slow responds times from the server to hosts on the network. After adding several new hosts, the administrator realizes that CSMA/CD results in network slowness due to congestion at the server NIC.  Which of the following should the network administrator do to correct the issue?  


Options are :

  • Disable CSMA/CD on the network
  • Update the Ethernet drivers to use 802.3
  • Add additional network cards to the server (Correct)
  • Add a honeypot to reduce traffic to the server

Answer : Add additional network cards to the server

Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet Registry (RIR) are known as which of the following?  
 


Options are :

  • Network handle
  • Autonomous system number (Correct)
  • Top level domain
  • Route aggregation

Answer : Autonomous system number

A technician wants to update the organization's disaster recovery plans.  Which of the following will allow network devices to be replaced quickly in the event of a device failure?  
 


Options are :

  • Proper asset tagging and labeling
  • Archives/backups (Correct)
  • Network Baseline
  • Vendor documentation

Answer : Archives/backups

Users are reporting extreme slowness across the network every Friday.  Which of the following should the network technician review first to narrow down the root cause of the problem?  
 


Options are :

  • Bottleneck
  • Baseline
  • Link status
  • Utilization (Correct)

Answer : Utilization

A company installs a new mail server.  Which of the following DNS records need to be configured to allow the organization to receive email?  
 


Options are :

  • A
  • MX (Correct)
  • CNAME
  • PTR

Answer : MX

A network administrator is following best practices to implement firewalls, patch management and policies on the network.  
Which of the following should be performed to verify the security controls in place?  



Options are :

  • Single point of failure testing
  • Disaster recovery testing
  • Penetration testing (Correct)
  • AAA authentication testing

Answer : Penetration testing

Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as which of the following?  
 


Options are :

  • Bluejacking (Correct)
  • Zero-day attack
  • Multiplexing
  • Smurfing

Answer : Bluejacking

A technician has responded to a security issue with an employee's computer.  Which of the following basic forensic steps should be taken NEXT?  


Options are :

  • Verify the chain of custody
  • Secure the area (Correct)
  • Initiate Data collection
  • Create the forensics report

Answer : Secure the area

As part of unified communications services, QoS must be implemented. DSCP and CoS map to which of the following OSI layers? (Select TWO)  


A. Layer 1 
B. Layer 2 
C. Layer 3 
D. Layer 4 
E. Layer 5 


Options are :

  • B,D
  • A,E
  • C,E
  • B,C (Correct)

Answer : B,C

Which of the following BEST describes the process of documenting everyone who has physical access or possession of evidence?  


Options are :

  • Secure copy protocol
  • Chain of custody (Correct)
  • Financial responsibility
  • Legal hold

Answer : Chain of custody

A customer is attempting to download a file from a remote FTP server, but receives an error that a connection cannot be opened.  
Which of the following should be one FIRST to resolve the problem?  



Options are :

  • Validate the security certificate from the host
  • Flush the DNS cache on the local workstation
  • Ensure that port 20 is open (Correct)
  • Ensure that port 161 is open

Answer : Ensure that port 20 is open

While monitoring the network, a technician notices that the network traffic to one of the servers is extremely high.  Which of the following should the technician use to verify if this is a concern?  


Options are :

  • Log management
  • Network diagram
  • Network baseline (Correct)
  • Real time monitor

Answer : Network baseline

A network administrator is tasked with building a wireless network in a new adjacent building. Wireless clients should not have visibility to one another but should have visibility to the wired users. Users must seamlessly migrate between the two buildings while maintaining a connection to the LAN. Which of the following is the BEST way to configure the new wireless network in the new building?  


Options are :

  • Use the same SSIDs on same channels with AP isolation
  • Use different SSIDs on different channels and VLANs
  • Use different SSIDs on the same channels with VLANs
  • Use the same SSIDs on different channels and AP isolation (Correct)

Answer : Use the same SSIDs on different channels and AP isolation

After an employee connected a switch port of a home router to the wall jack in the office, other employees in the office started losing connectivity.  Which of the following can be implemented on the company switch to prevent loss of connectivity in the future?  


Options are :

  • MAC address filtering
  • ARP inspections
  • DHCP snooping
  • Loop prevention (Correct)

Answer : Loop prevention

 A technician is in a large room that contains a large amount of industrial equipment. The technician would like to record the usable bandwidth between devices in a wireless network and the access point.  Which of the following should the technician document?  


Options are :

  • Goodput (Correct)
  • Jitter
  • EMI
  • Latency
  • Overhead

Answer : Goodput

 Which of the following protocols is used to send mail to another server on the Internet?  


Options are :

  • RTP
  • SMTP (Correct)
  • SNMP
  • POP

Answer : SMTP

A network technician must allow use of HTTP from the internet to an internal resource running HTTP.  This is an example of which of the following?  


Options are :

  • Virtual Private networking (VPN)
  • Dynamic DNS
  • Dynamic NAT
  • Port Forwarding (Correct)

Answer : Port Forwarding

Ann, an employee, has properly connected her personal wireless router to a network jack in her office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP address when connected to the same jack. Ann checks the router configuration to ensure it is configured to obtain a DCHP address.  Which of the following is the MOST likely reason why the router is not receiving a DHCP address?  


Options are :

  • The administrator is blocking DHCP requests that originate from access points
  • The Administrator has implemented a feature that only allows white-listed MAC addresses (Correct)
  • The administrator is blocking the wireless router's MAC address using MAC filtering
  • The administrator has enabled DHCP snooping on the network

Answer : The Administrator has implemented a feature that only allows white-listed MAC addresses

After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting. When the technician relocates the equipment back to the previous space, the phone functions properly. No other stations are being affected.  Which of the following is the MOST likely cause?  


Options are :

  • Cable short (Correct)
  • Bad UPS
  • Misconfigured DNS
  • Attenuation

Answer : Cable short

A network technician wants to create a network where consultants can go to access the Internet without disrupting the intranet of the office.  Which of the following should be created?  


Options are :

  • Guest network (Correct)
  • DMZ network
  • VLAN network
  • Security network

Answer : Guest network

The administrator would like to use the strongest encryption level possible using PSK without utilizing an additional authentication server.  Which of the following encryption types should be implemented?  
 


Options are :

  • WPA personal
  • WEP
  • MAC filtering
  • WPA2 Enterprise (Correct)

Answer : WPA2 Enterprise

An attack where the potential intruder tricks a user into providing sensitive information is known as which of the following?  


Options are :

  • Man-in-the-middle
  • Evil Twin
  • Bluesnarfing
  • Social engineering (Correct)

Answer : Social engineering

A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to devices on the network.  
Which of the following should the technician check FIRST?  

 


Options are :

  • WAP placement (Correct)
  • Encryption type
  • WAP SSID
  • Bandwidth saturation

Answer : WAP placement

A user has installed a new wireless printer. The user cannot get to the internet but can print. All other office users can reach the internet, but cannot connect to the new wireless printer. All users are wireless in this area of the office.  The used has MOST likely:



Options are :

  • installed the printer in ad-hoc mode (Correct)
  • misconfigured the gateway on the wireless printer
  • Installed the printer in the wrong subnet
  • Installed the printer in infrastructure mode

Answer : installed the printer in ad-hoc mode

OFDM, QAM and QPSK are all examples of which of the following wireless technologies?  


Options are :

  • Frequency
  • Modulation (Correct)
  • Spectrum
  • RF interference

Answer : Modulation

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions