N10-006 CompTIA Network+ Certification Practice Test Set 5

A technician has attempted to optimize the network but some segments are still reporting poor performance.  Which of the following issues should the technician look at?  


Options are :

  • Switch incorrectly set to full duplex
  • IP address scope depletion
  • Conflicting IP addresses
  • Packet bottlenecks (Correct)

Answer : Packet bottlenecks

 Which of the following attacks utilizes a wireless access point which has been made to look as though it belongs to the network in order to eavesdrop on wireless traffic?  
 


Options are :

  • WEP attack
  • War driving
  • Evil twin (Correct)
  • Rogue access point

Answer : Evil twin

A company has just implemented VoIP. Prior to the implementation, all of the switches were upgraded to layer 3 capable in order to more adequately route packages.  This is an example of which of the following network segmentation techniques?  
 


Options are :

  • Honeypot implementation
  • Separate public/private newtorking
  • Performance optimization (Correct)
  • Compliance implementation

Answer : Performance optimization

A network manager wants a monthly report of the security posture of all the assets on the network (e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is associated with the missing update or patch.  Which of the following solutions would work BEST to present this data? 



Options are :

  • Penetration scan
  • Virus scan
  • Vulnerability scanner (Correct)
  • Security policy

Answer : Vulnerability scanner

A network technician has been asked to make the connections necessary to add video transported via fiber optics to the LAN within a building.  Which of the following is the MOST common connector that will be used on the switch to connect the media converter?



Options are :

  • ST (Correct)
  • MT-RJ
  • FDDI
  • Fiber coupler

Answer : ST

Which of the following is a logical host on the network where unauthorized users believe they are on the production network?  


Options are :

  • Virtual server
  • VLAN
  • Virtual Terminal
  • Honeypot (Correct)

Answer : Honeypot

Ann, a network technician is preparing to configure a company's network. She has installed a firewall to allow for an internal DMZ and external network. No hosts on the internal network should be directly accessible by IP address from the internet, but they should be able to communicate with remote networks after receiving a proper IP address.  Which of the following is an addressing scheme that will work in this situation?  


Options are :

  • Teredo tunneling
  • Private (Correct)
  • Classless
  • APIPA

Answer : Private

Coverage analysis for a new implementation of 802.11n WLAN involves which of the following? (Select TWO)  


A. Humidity 
B. Temperature 
C. Heatmap 
D. Building material 
E. Sight lines 


Options are :

  • D,E (Correct)
  • A,C
  • A,B
  • B,E

Answer : D,E

When troubleshooting a T1 connection, the support representative from the provider instructs a technician to place a special device into the CSU/DSU. Using this device the provider is able to verify that communications are reaching the CSU/DSU.  
Which of the following was MOST likely used by the technician?  

 


Options are :

  • Loopback plug (Correct)
  • Cable analyzer
  • OTDR
  • Toner probe

Answer : Loopback plug

A network technician responds to a customer reporting that a workstation keeps losing its network connection. The user explains that it occurs randomly and it happens several times throughout the day.  Which of the following troubleshooting methods should the technician perform FIRST?  
 


Options are :

  • Gather information (Correct)
  • Question the obvious
  • Establish a plan of action
  • Test the theory

Answer : Gather information

A network administrator wants to logically separate web function servers on the network.  Which of the following network devices will need to be configured?  


Options are :

  • Hub
  • Switch (Correct)
  • IPS
  • HIDS

Answer : Switch

A technician is concerned about security and is asked to set up a network management protocol.  Which of the following is the best option?  


Options are :

  • TKIP
  • SLIP
  • SNMPv2
  • SNMPv3 (Correct)

Answer : SNMPv3

Joe, a home user, would like to share music throughout the computers in his house using a USB drive connected to a router he purchased a year ago. The manufacturer states that the router is capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the network.  Which of the following should Joe perform in order to resolve this issue?  
 


Options are :

  • Install the latest OS on his computers
  • Download the latest playback software for his musicfiles
  • Load the latest hardware drivers for his USB drive
  • Flash the latest firmware for his router (Correct)

Answer : Flash the latest firmware for his router

A network topology in which all nodes have point to point connections to all other nodes is known as which of the following?  


Options are :

  • Star
  • Ring
  • Mesh (Correct)
  • Bus

Answer : Mesh

A home user is pairing a bluetooth gaming controller with the game console.  Which of the following is implemented between the console and the controller?  


Options are :

  • WAN
  • MAN
  • PAN (Correct)
  • LAN

Answer : PAN

A malicious student is blocking mobile devices from connecting to the internet when other students are in the classroom.  
Which of the following is the malicious student implementing?



Options are :

  • Removing the AP from the classroom
  • IPS
  • Jamming (Correct)
  • Firewall
  • ACL

Answer : Jamming

A network technician wants to allow HTTP traffic through a stateless firewall. The company uses the 192.168.0.0/24 network.  
Which of the following ACL should the technician configure? 



Options are :

  • PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80
  • PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
  • PERMIT SRCIP: ANYSPORT:80 DSTIP:192.168.0.0/24 DPORT:80
  • PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY
  • PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80 (Correct)

Answer : PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80

An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN.  Which of the following cloud services is the administrator using?  


Options are :

  • Hybrid Saas
  • Private Iaas
  • Community PaaS
  • Public Iaas (Correct)

Answer : Public Iaas

 A technician configures a firewall in the following manner in order to allow HTTP traffic 
Source IP  Zone  Dest IP  Zone  Port  Action 
Any  Untrust  Any  DMZ  80  Allow  
The organization should upgrade to which of the following technologies to prevent unauthorized traffic from traversing the firewall?  



Options are :

  • Stateless packet inspection
  • HTTPS
  • Intrusion detection system
  • Application aware firewall (Correct)

Answer : Application aware firewall

A technician has completed a survey of a wireless network and documented signal strengths.  This document is known as which of the following?  


Options are :

  • Heat map (Correct)
  • LogicalNetwork map
  • Bandwidth survey
  • Network baseline

Answer : Heat map

Which of the following protocols is considered a hybrid routing protocol?  
 


Options are :

  • EIGRP (Correct)
  • IS-IS
  • RIPv2
  • OSPF
  • BGP

Answer : EIGRP

Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor support technician to properly set up and configure the SAN on the network. In order to begin SAN I/O optimization, which of the following would Joe need to provide the vendor support technician?  


Options are :

  • Baseline documents
  • Access to the datacenter
  • Asset management document
  • Network diagrams (Correct)

Answer : Network diagrams

A network technician has downloaded the latest vendor switch O/S, which includes new features and enhancements.  Which of the following should the technician perform FIRST when updating the switches?  


Options are :

  • Backup the current configuration for each switch (Correct)
  • Power cycle the company's border router
  • Install during non-business hours to test the system
  • Test the O/S on one of the production switches

Answer : Backup the current configuration for each switch

When installing a network cable with multiple strands, a technician drags the cable past a sharp edge and exposes the copper conductor on several wires. These exposed wires come into contact with each other forming an electrical connection.  
This creates which of the following conditions?  



Options are :

  • Open
  • Electrostatic discharge
  • Short (Correct)
  • Twisted pair
  • Crosstalk

Answer : Short

A network technician determines that two dynamically assigned workstations have duplicate IP addresses.  Which of the following commands should the technician use to correct this problem?  
 


Options are :

  • ipconfig /all
  • ipconfig /renew
  • ipconfig /dhcp
  • ipconfig /release then ipconfig /renew (Correct)

Answer : ipconfig /release then ipconfig /renew

Which of the following is a connectionless protocol? (Select TWO)  


A. ICMP 
B. SSL 
C. TCP 
D. SSH 
E. HTTP 
F. UDP 


Options are :

  • A,F (Correct)
  • B,E
  • C,F
  • D,E
  • A,B

Answer : A,F

A technician needs to use SNMP to manage several legacy devices. The technician wants to ask the vendor for specification that will provide SNMP monitoring of the devices.  Which of the following will allow SNMP monitoring of the devices?  


Options are :

  • SYSLOG
  • MIMO
  • MIBS (Correct)
  • SSH

Answer : MIBS

A technician needs to install a server to authenticate remote users before they have access to corporate network resources when working from home.  Which of the following servers should the technician implement?  
 


Options are :

  • VLAN
  • PPP
  • DNSSEC
  • RAS (Correct)
  • NAT

Answer : RAS

Which of the following ports is used to provide secure sessions over the web by default?  


Options are :

  • 80
  • 25
  • 22 (Correct)
  • 5004

Answer : 22

A user reports slow computer performance. A technician troubleshooting the issue uses a performance monitoring tool and receives the following results: 
Avg % Processor Time =10% 
Avg Pages/Second = 0 
Avg Disk Queue Length = 3  
Based on the results, which of the following is causing a bottleneck?  

 


Options are :

  • Memory
  • Hard drive (Correct)
  • NIC
  • Processor

Answer : Hard drive

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions