N10-006 CompTIA Network+ Certification Practice Test Set 8

Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?  


Options are :

  • MDF (Correct)
  • 110 block
  • DSU
  • CSU

Answer : MDF

A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall.  Which of the following tools can be used to locate its physical location within the wall?  


Options are :

  • Toner probe (Correct)
  • Cable tester
  • Multimeter
  • Cable certifier

Answer : Toner probe

A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition.  
Which of the following should the technician check to ensure the new host will connect?  



Options are :

  • Confirm the new host is using 10GBaseSR due to the manufacturing environment
  • Confirm the new host is compatible with 10BaseT Ethernet (Correct)
  • Confirm the existing 10Base2 equipment is using the proper frame type
  • Confirm that CSMA/CD is disabled on the Ethernet network

Answer : Confirm the new host is compatible with 10BaseT Ethernet

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation.  
Which of the following systems are they MOST likely discussing?




Options are :

  • Mantraps at the entry
  • HVAC
  • Fire suppression (Correct)
  • UPS and battery backups

Answer : Fire suppression

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output:  
SRC MAC  SRC IP  DST MAC  DST IP 
00:1D:1F:AB:10:7D  192.168.1.10:2000  15:BE:9F:AB:10:1D  192.168.1.14:1200 
05:DD:1F:AB:10:27  192.168.1.10:1000  22:C7:2F:AB:10:A2  192.168.1.15:1300  
Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring?  


Options are :

  • Network (Correct)
  • Data link
  • Application
  • Transport

Answer : Network

Which of the following PDUs is used by a connectionless protocol?  


Options are :

  • Datagram (Correct)
  • Frames
  • Segments
  • Streams

Answer : Datagram

A company is deploying a new wireless network and requires 800Mbps network throughput.  Which of the following is the MINIMUM configuration that would meet this need?  
 


Options are :

  • 802.11ac with 3 spatial streams and a 40MHz bandwidth
  • 802.11ac with 2 spatial streams and an 80MHz bandwidth (Correct)
  • 802.11ac with 4 spatial streams and a 160MHz bandwidth
  • 802.11ac with 3 spatial streams and a 20MHz bandwidth

Answer : 802.11ac with 2 spatial streams and an 80MHz bandwidth

Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443?  
 


Options are :

  • Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.
  • Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies.
  • Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates.
  • Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks. (Correct)

Answer : Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.

After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites.  Which of the following should be checked?  
 


Options are :

  • Subnet mask
  • Local hosts file (Correct)
  • Server host file
  • Duplex settings

Answer : Local hosts file

Which of the following helps prevent routing loops?  
 


Options are :

  • Route summarization
  • Split horizon (Correct)
  • Routing table
  • Default gateway

Answer : Split horizon

A network technician is performing a wireless survey in the office and discovers a device that was not installed by the networking team.  
This is an example of which of following threats?  



Options are :

  • Rogue AP (Correct)
  • Brute force
  • DDoS
  • Bluesnarfing

Answer : Rogue AP

After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password.  
Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation IP address is 192.168.0.10/23?  



Options are :

  • Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1
  • Use an SNMP tool to query the firewall properties and determine the correct management IP address
  • Run the following command on the administrator's workstation: arp s 192.168.1.200 01:4a:d1:fa:b1:0e (Correct)
  • Use the reset button on the back of the firewall to restore it to its factory default, and then log onto

Answer : Run the following command on the administrator's workstation: arp s 192.168.1.200 01:4a:d1:fa:b1:0e

The service provider could be in violation of the:  


Options are :

  • SOW.
  • MLA. .
  • SLA. (Correct)
  • MOU

Answer : SLA.

A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet
CompTIA N10-006 Exam
www.braindumps.com 96
connection. As a result, they have been given a new IP range. The ISP has assigned the company 10.10.150.16 /28. The company gateway router has the following interface configuration facing the ISP:  
Interface A: 
IP address: 10.10.150.16 
Subnet mask: 255.255.255.240 
Default gateway: 10.10.150.32 
Speed: 1000 Mbps 
Duplex: Auto 
State: No Shutdown  
None of the workstations at the company are able to access the Internet.  
Which of the following are the reasons? (Select TWO).  


A. There is a duplex mismatch between the router and ISP. 
B. The router interface is turned off. 
C. The interface is set to the incorrect speed. 
D. The router is configured with the incorrect subnet mask. 
E. The router interface is configured with the incorrect IP address. 
F. The default gateway is configured incorrectly.


Options are :

  • A,F
  • D,E
  • A,C
  • E,F (Correct)

Answer : E,F

A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength.  
Which of the following standards is implemented on the network?
  
 


Options are :

  • 802.11b
  • 802.11a
  • 802.11g (Correct)
  • 802.11ac

Answer : 802.11g

Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?  
 


Options are :

  • DOCSIS
  • BGP
  • OSPF
  • CSMA/CD (Correct)

Answer : CSMA/CD

 Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas.  
Which of the following is the MOST likely way in which the malicious user gained access to the switches?  

 


Options are :

  • Via console using the administrator's password
  • Via SSH using the RADIUS shared secret
  • Via SNMP using the default RO community
  • Via HTTP using the default username and password (Correct)

Answer : Via HTTP using the default username and password

When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors.  
In which of the following layers does the problem reside? (Select TWO).  


A. Layer 2 
B. Layer 3 
C. Layer 5 
D. Transport layer 
E. Data link 
F. Physical layer 


Options are :

  • E,F
  • B,E
  • A,E (Correct)
  • C,D

Answer : A,E

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?  
 


Options are :

  • Firewall
  • Switch
  • 802.11 AP (Correct)
  • Router

Answer : 802.11 AP

A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server.  Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).  
A. 20 
B. 21 
C. 22
D. 23 
E. 67 
F. 68 
G. 69 


Options are :

  • C,E
  • A,B (Correct)
  • D,F
  • D,F
  • A,F

Answer : A,B

An administrator only has telnet access to a remote workstation.  Which of the following utilities will identify if the workstation uses DHCP?  


Options are :

  • netstat
  • ipconfig (Correct)
  • dig
  • ping
  • tracert

Answer : ipconfig

 Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window?  



Options are :

  • Impact analysis
  • Stakeholder notification
  • Rollback procedure (Correct)
  • Configuration procedures

Answer : Rollback procedure

While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small service loop and suspects it might be the cause of the outage.  Which of the following is MOST likely the issue?  


Options are :

  • RF interference caused by impedance mismatch
  • Dirty connectors
  • Maximum cable length exceeded
  • Bend radius exceeded (Correct)

Answer : Bend radius exceeded

A network administrator recently installed a web proxy server at a customer's site. The following week, a system administrator replaced the DNS server overnight. The next day, customers began having issues accessing public websites.  Which of the following will resolve the issue?  
 


Options are :

  • Update the DNS server with the proxy server information. (Correct)
  • Implement a split horizon DNS server.
  • Reboot the web proxy and then reboot the DNS server.
  • Put the proxy server on the other side of the demarc.

Answer : Update the DNS server with the proxy server information.

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully.  Which of the following is causing this issue?  


Options are :

  • RFI
  • Cross-talk
  • Bad wiring (Correct)
  • EMI

Answer : Bad wiring

In an engineering office, all plotters are configured via static IP.  
Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO).  


A. Rack monitoring 
B. Device placement 
C. Wall plate labeling 
D. Room numbering 
E. Patch panel labeling 


Options are :

  • A,D
  • B,D
  • D,A
  • C,E (Correct)

Answer : C,E

While troubleshooting a connectivity issue, a network technician determines the IP address of a number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet.  Which of the following should the technician check to resolve the problem?  


 


Options are :

  • Misconfigured DNS
  • DHCP server (Correct)
  • NIC failure
  • Default gateway address

Answer : DHCP server

Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet the device indicates a strong signal.  Which of the following is the MOST likely cause of the issue?  


 


Options are :

  • Incorrect SSID
  • Signal-to-noise ratio
  • AP configuration
  • Bounce (Correct)

Answer : Bounce

A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram?  
 


Options are :

  • Packet sniffing
  • Patch panel labeling
  • Building layout
  • Naming conventions (Correct)

Answer : Naming conventions

A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface.  Which of the following would be the result of this action?  
  


Options are :

  • The traffic will flow, but with excessive errors.
  • The interface status will show line protocol down. (Correct)
  • The interface status will indicate that the port is administratively down.
  • The normal amount of errors and the connection problem has been resolved.

Answer : The interface status will show line protocol down.

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions