N10-006 CompTIA Network+ Certification Practice Test Set 9

A technician is tasked with connecting a router to a DWDM. The technician connects the router to the multiplexer and confirms that there is a good signal level. However, the interface on the router will not come up.  Which of the following is the MOST likely cause?  

Options are :

  • There is a dirty connector on the fiber optic cable.
  • The SFP in the multiplexer is malfunctioning.
  • The fiber optic cable is bent in the management tray
  • The wrong wavelength was demuxed from the multiplexer. (Correct)

Answer : The wrong wavelength was demuxed from the multiplexer.

A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility:  
Network  Destination  Netmask  GatewayInterface  eth0  eth0  On-Link  lo  On-Link  lo  eth0  
Which of the following is the reason for the computer issue, given the above output?  

Options are :

  • Wrong default gateway netmask
  • Incorrect default gateway address
  • Missing default gateway (Correct)
  • Default gateway on the wrong interface

Answer : Missing default gateway

A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices.  
Which of the following would be the appropriate wireless technology for this design?  

Options are :

  • 802.11ac (Correct)
  • 802.11g
  • 802.11a
  • 802.11b

Answer : 802.11ac

Before logging into the company network, users are required to sign a document that is to be stored in their personnel file.  
This standards and policies document is usually called which of the following?

Options are :

  • AUP (Correct)
  • BEP
  • SOP
  • SLA

Answer : AUP

The management team wants to set up a wireless network in their office but all of their phones operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at a higher frequency than their phones.  
Which of following standards should be used?  


Options are :

  • 802.1x
  • 802.11b
  • 802.11g
  • 802.11a (Correct)

Answer : 802.11a

When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?  

Options are :

  • Session layer
  • Physical layer (Correct)
  • Transport layer
  • Network layer

Answer : Physical layer

A customer has engaged a company to improve the availability of all of the customer's services and applications, enabling the customer to minimize downtime to a few hours per quarter.  
Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes? 

Options are :

  • MOU
  • SLA
  • SOW (Correct)
  • MLA

Answer : SOW

A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert: 
1 * * * Request timed out. 
2 * * * Request timed out. 
3 * * * Request timed out.  
The technician would like to see the results of the tracert command.  
Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network?  

Options are :

  • Install a backdoor to access the router to allow tracert messages to pass through
  • Configure the firewall to allow echo reply in and echo request out of the network (Correct)
  • Enable IGMP messages out and block IGMP messages into the network
  • Enable split horizon to allow internal tracert commands to pass through the firewall

Answer : Configure the firewall to allow echo reply in and echo request out of the network

Which of the following is the main difference between TCP and UDP?  

Options are :

  • TCP connections can be secured by stateful firewalls, while UDP connections cannot.
  • TCP data flows in two directions, while UDP data flows from server to client.
  • The TCP header implements flags, while the UDP header does not. (Correct)
  • The TCP header implements checksum, while the UDP header does not.

Answer : The TCP header implements flags, while the UDP header does not.

A technician has prolonged contact with a thermal compound.  Which of the following resources should be consulted?  

Options are :

  • HCL
  • MSDS (Correct)
  • SLA
  • HVAC

Answer : MSDS

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector.  Which of the following protocols was MOST likely used on this cable?  

Options are :

  • ATM
  • 802.3
  • RS-232 (Correct)
  • Tokenring

Answer : RS-232

Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN?  

Options are :

  • UC server
  • UC gateway
  • Access switch
  • Edge router (Correct)

Answer : Edge router

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly.  Which of the following was MOST likely installed that required an MX record to function properly?  

Options are :

  • FTP server
  • Load balancer
  • Firewall DMZ
  • Mail server (Correct)

Answer : Mail server

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals.  
Which of the following would BEST handle the rerouting caused by the disruption of service?  


Options are :

  • Layer 2 switch
  • Layer 3 switch (Correct)
  • Smart hub
  • Proxy server

Answer : Layer 3 switch

A VLAN with a gateway offers no security without the addition of:  

Options are :

  • A RADIUS server.
  • 802.1d.
  • An ACL. (Correct)
  • 802.1w.

Answer : An ACL.

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?  

Options are :

  • F-connector
  • 66 block
  • RJ-11
  • BNC (Correct)

Answer : BNC

A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database.  Which of the following devices would be the MOST cost efficient to use for this backup?  

Options are :

  • FCoE SAN
  • USB flash drive
  • NAS (Correct)

Answer : NAS

An administrator has a virtualization environment that includes a vSAN and iSCSI switching.  Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?  

Options are :

  • The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
  • The administrator should configure each vSAN participant to have its own VLAN.
  • The administrator should set the MTU to 9000 on the each of the participants in the vSAN. (Correct)
  • The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.

Answer : The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

When convergence on a routed network occurs, which of the following is true?  

Options are :

  • All routers have the same routing table
  • All routers learn the route to all connected networks (Correct)
  • All routers are using hop count as the metric
  • All routers use route summarization

Answer : All routers learn the route to all connected networks

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?  

Options are :

  • MAN
  • WLAN
  • LAN
  • PAN (Correct)

Answer : PAN

A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed.   Which of the following will mitigate production outages before the enhancements are deployed?  

Options are :

  • Deploy an IPS on the production network.
  • Implement ACLs that only allow management access to the enhancements.
  • Implement an environment to test the enhancements. (Correct)
  • Move the software team's workstations to the DMZ.

Answer : Implement an environment to test the enhancements.

Which of the following network topologies has a central, single point of failure?  

Options are :

  • Hybrid
  • Star (Correct)
  • Ring
  • Mesh

Answer : Star

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?  

Options are :

  • OSPF
  • BGP
  • MPLS (Correct)
  • IS-IS

Answer : MPLS

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers.  In order to conserve address space, which of the following subnet masks should Joe use for this subnet?  

Options are :

  • /30 (Correct)
  • /29
  • /28
  • /24
  • /32

Answer : /30

A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another.  
This is an example of which of the following?  

Options are :

  • Community IaaS
  • Private SaaS (Correct)
  • Public SaaS
  • Hybrid IaaS

Answer : Private SaaS

A technician would like to track the improvement of the network infrastructure after upgrades.  Which of the following should the technician implement to have an accurate comparison?  

Options are :

  • Regression test
  • Speed test
  • Statement of work
  • Baseline (Correct)

Answer : Baseline

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address.  Which of the following is a valid IPv4 loopback address?  

Options are :

  • (Correct)

Answer :

A company wants to create highly available datacenters.  Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?  

Options are :

  • OSPF
  • VRRP
  • Load balancer
  • BGP (Correct)

Answer : BGP

Which of the following is used to define how much bandwidth can be used by various protocols on the network?  

Options are :

  • Fault tolerance
  • Traffic shaping (Correct)
  • High availability
  • Load balancing

Answer : Traffic shaping

A network technician must utilize multimode fiber to uplink a new networking device.  Which of the following Ethernet standards could the technician utilize? (Select TWO).  

A. 1000Base-LR 
B. 1000Base-SR 
C. 1000Base-T 
D. 10GBase-LR 
E. 10GBase-SR 
F. 10GBase-T

Options are :

  • D,F
  • B,E (Correct)
  • A,F
  • D,E

Answer : B,E

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions