COMPTIA N EXAM QUESTIONS & ANSWERS

COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Number: N10-005 Passing Score: 720 Time Limit: 120 min File Version: 16.6 http://www.gratisexam.com/ COMPTI...
Author: Angel Chambers
5 downloads 2 Views 91KB Size
COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Number: N10-005 Passing Score: 720 Time Limit: 120 min File Version: 16.6

http://www.gratisexam.com/

COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA Network+ Certification Exam

Examsheets QUESTION 1 Which of the following would a technician do to monitor remote traffic through an access point? A. B. C. D.

Enable an SNMP agent Enable network mapping Set monitoring SSID Select WPA2

Correct Answer: A Section: (none) Explanation Explanation/Reference: Install an SNMP agent on AP and monitor traffice with SNMP software QUESTION 2 Which of the following is the only standard that can operate at either frequency ? A. B. C. D.

802.11a 802.11b 802.11g 802.11n

Correct Answer: D Section: (none) Explanation Explanation/Reference: Only 802.11n can operate at 2.4Ghz and 5Ghz QUESTION 3 A user's computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working? A. B. C. D.

nbstat arp nslookup ipconfig

Correct Answer: C Section: (none) Explanation Explanation/Reference: after using ipconfig to varifiy default gateway and dhcp address, nslookup is the one used to determine whether DNS is operational QUESTION 4 Which of the following uses SSL encryption? A. SMTP B. FTP C. HTTPS

D. SNMP Correct Answer: C Section: (none) Explanation Explanation/Reference: SSL secure socket layer used certificates to make make secure HTTP connection to be used for website such as banking etc where encryption of data is important QUESTION 5 A network technician is troubleshooting a user's connectivity problem, and has determined a probable cause. The technician is at which step in the troubleshooting methodology? A. B. C. D.

Verify full system functionality Identify the problem Establish a theory Implement the solution

Correct Answer: C Section: (none) Explanation Explanation/Reference: second step of Comptia's Troubleshooting theory is to Establish a theory of probable cause

http://www.gratisexam.com/

QUESTION 6 Which of the following wireless standards provide speed of 11Mbps? A. B. C. D.

802.11a 802.11b 802.11g 802.11n

Correct Answer: B Section: (none) Explanation Explanation/Reference: 802.11a - 54Mbps OFDM 802.11b - 11Mbps DSSS 802.11g - 54Mbps OFDM/DSSS 802.11n - 150/300Mbps (MIMO) - OFDM QUESTION 7 A computer's DNS has bad cach records.which tools can be used to clear the DNS record. A. netstat

B. ipconfig C. nslookup D. tracert Correct Answer: B Section: (none) Explanation Explanation/Reference: ipconfig/flushdns will flush/clear the old DNS record, which includes good and bad cached records QUESTION 8 A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP? A. B. C. D.

NetBIOS name filtering IP address filtering MAC address filtering Computer name filtering

Correct Answer: C Section: (none) Explanation Explanation/Reference: MAC address filtering will only allow Laptops listed in ACL ( access control List) . ACL has a record of either allowed or disallowed MACs, depend on configuration.. QUESTION 9 Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect? A. B. C. D.

Create a MAC filter containing the current users. Turn off SSID broadcast. Change the encryption type to AES 256-bit for current users. Reduce the signal strength to 0 percent.

Correct Answer: A Section: (none) Explanation Explanation/Reference: MAC filter will allows only certain devices listed in allow list of Wireless access point..which can be done by web interface, normally by typing 192.168.0.1 / 192.168.1.1 at the browser and using the credential QUESTION 10 A network technician has configured a new firewall with a rule to deny UDP traffic. Users have reported that they are unable to access Internet websites. The technician verifies this using the IP address of a popular website. Which of the following is the MOST likely cause of the error? A. B. C. D.

Implicit deny HTTP transports over UDP Website is down DNS server failure

Correct Answer: A Section: (none) Explanation Explanation/Reference: DNS uses UDP ( mostly ). Since UDP traffic is denied, FQDN to IP resolution wont happen, thus websites will not be accessible QUESTION 11 A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment? A. B. C. D.

WAP placement TX/RX channel Signal strength Transmission power

Correct Answer: A Section: (none) Explanation Explanation/Reference: WAP Triangulation is the most suited (and easiest) method for calculating the location of a device. Thus for the calculation to be accurate WAP Placement is important QUESTION 12 Which of the following network appliances will only detect and not prevent malicious network activity? A. B. C. D.

IDS Network sniffer IPS Firewall

Correct Answer: A Section: (none) Explanation Explanation/Reference: IDS - Intrusion detection System - as the name suggest, its used only for Detection..for prevention IPS intrusion prevention system is used. QUESTION 13 When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network? A. B. C. D.

ping nbstat arp msconfig

Correct Answer: B Section: (none) Explanation

Explanation/Reference: QUESTION 14 Which of the following is a terminal emulator used to manage a network device? A. B. C. D.

VPN IDS PuTTY IPS

Correct Answer: C Section: (none) Explanation Explanation/Reference: Putty is the only emulator listed....

http://en.wikipedia.org/wiki/PuTTY

QUESTION 15 A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation? A. B. C. D.

Environmental monitor Multimeter Toner probe Protocol analyzer

Correct Answer: D Section: (none) Explanation Explanation/Reference: protocol analyzer also known as traffic/network sniffer is used to analyse the activity on networks QUESTION 16 Which of the following performance benefits would multiple domain controllers BEST provide? A. B. C. D.

Fault tolerance Caching engine Proxy server Quality of service

Correct Answer: A Section: (none) Explanation Explanation/Reference: Having multiple Domain controller helps keep the server/system working if either one gives up. thus Fault tolerance is the benefit QUESTION 17 Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure. Which of the following tools should a technician use to BEST troubleshoot this issue? A. OTDR

B. Protocol analyzer C. Toner probe D. Cable certifier Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 18 Which of the following is the definition of a DNS server? A. B. C. D.

Hosts proprietary business applications Translates FQDN's to IP addresses Provides network IDS/IPS security Assigns IP addresses to network devices

Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 19 Which of the following is a Class A IP address? A. B. C. D.

10.4.0.1 169.254.0.1 192.168.0.1 254.200.0.1

Correct Answer: A Section: (none) Explanation Explanation/Reference: Class A B C D E

Start address 0.0.0.0 128.0.0.0 192.0.0.0 224.0.0.0 240.0.0.0

Finish address 127.255.255.255 191.255.255.255 223.255.255.255 239.255.255.255 255.255.255.255

QUESTION 20 Which of the following can be used to limit wireless network access to a single computer? A. B. C. D.

Configure PPP Packet sniffing MAC address filtering Omni-directional antennas

Correct Answer: C Section: (none) Explanation Explanation/Reference: QUESTION 21 Which of the following connector types are used in terminating singlemode fiber cables? (Select TWO). A. B. C. D. E. F.

LC F-connector DB-9 BNC RJ-11 SC

Correct Answer: AF Section: (none) Explanation Explanation/Reference: fiber connectors -- ST, SC, LC, MTRJ Ethernet --- RJ45, RJ11, Copper - BNC, F-connector, DB- 9 (RS 232) QUESTION 22 Which of the following is a path vector routing protocol? A. B. C. D. E.

RIP EIGRP ISIS OSPF BGP

Correct Answer: E Section: (none) Explanation Explanation/Reference: BGP - border Gatway Protocol - Path Vector RIP - Routing Information Protocol - DIstance vector -- hop count OSPF - Open shortest path first - Link State EIGRP - Enhanced Interior Gateway Routing Protocol - used Dual Algorithm QUESTION 23 Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links? A. B. C. D.

Access control list Load balancer Content filter Proxy server

Correct Answer: B

Section: (none) Explanation Explanation/Reference: Load balancer balances the load on a given servers for example to keep the traffic from congesting any one of the servers QUESTION 24 Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations? A. B. C. D.

The administrator should create exclusions for the workstations IP addresses. The administrator should change the servers to utilize DHCP to obtain IP addresses. The administrator should change the workstations to utilize static IP addresses. The administrator should create exclusions for the servers IP addresses.

Correct Answer: D Section: (none) Explanation Explanation/Reference: by creating exclusions for servers IP, admin can make sure that these address wont be available to be leased out to any workstation QUESTION 25 The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented? A. B. C. D.

DMZ Honeynet PAT Port security

Correct Answer: A Section: (none) Explanation Explanation/Reference: DMZ is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet for public access. QUESTION 26 A network administrator tests a multimode fiber cable from end-to-end on a new link that is down and notices that the dB loss is -.09. Which of the following is the MOST likely cause? A. B. C. D.

TXRX reversed dB loss too high dB loss too low Bad connectors

Correct Answer: A Section: (none) Explanation Explanation/Reference:

QUESTION 27 A technician has been dispatched to investigate an issue where several users in the same aisle have stated they have had no network connection for over an hour. When the technician gets there, the network seems to be up and running. Which of the following should the technician do NEXT? A. B. C. D.

Ask the users for more information, such as which applications were not functioning. Power-cycle the switch that the users share to clear out cached DNS records. Escalate the issue to the network administrator to have their domain credentials reset. Close and document the service call, as there was no actual issue affecting the users.

Correct Answer: A Section: (none) Explanation Explanation/Reference: As per Comptia's Troubleshooting theory. First step is to identify the problem, which could also be done by gathering more information by asking questions to user/s. QUESTION 28 Honeypots and honeynets are different in which of the following ways? A. B. C. D.

Honeynets are managed collections of honeypots. Honeypots only test software security, not hardware. Honeynets require specialized hardware to implement. Honeypots are usually servers and honeynets are routers and switches.

Correct Answer: A Section: (none) Explanation Explanation/Reference: as the answer suggests Honeynets are collections of honeypots. QUESTION 29 The APIPA address 169.254.10.123 falls into which of the following class of addresses? A. B. C. D.

A B C D

Correct Answer: B Section: (none) Explanation Explanation/Reference:

QUESTION 30 A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented? A. B. C. D.

Change management Asset management Network sniffer System logs

Correct Answer: B Section: (none) Explanation Explanation/Reference: Asset management will allow admin to identify the scope if impact to the network QUESTION 31 Users inform an administrator that the network is slow. The administrator notices the bulk of the traffic is SIP and RTP traffic. Which of the following could the administrator do to help BEST alleviate the traffic congestion for the users? A. B. C. D.

Create an ACL on the switches and routers that are dropping SIP and RTP packets. Create a QoS policy prioritizing users over RTP and SIP traffic. Create another VLAN for SIP and RTP traffic. Create a rule to throttle SIP and RTP to 10Kbps or less.

Correct Answer: C Section: (none) Explanation Explanation/Reference: Creating separate VLAN for SIP & RTP which is used for VoIP traffic will allow for the other traffic to flow

without making congestion QUESTION 32 Which of the following OSI layers allows users to access network services such as file sharing? A. B. C. D.

Layer 1 Layer 3 Layer 4 Layer 7

Correct Answer: D Section: (none) Explanation Explanation/Reference: Application layer has following protocols Remote login category Telnet SSH File transfer category FTP TFTP Electronic mail category SMTP IMAP POP Support services category DNS RARP BOOTP SNMP CMOT QUESTION 33 The security administrator needs to restrict specific devices from connecting to certain WAPs. Which of the following security measures would BEST fulfill this need? A. B. C. D.

WAP placement MAC address filtering Content filtering Encryption type and strength

Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 34 Which of the following copper cable types should be chosen to run gigabit speeds through a dropped ceiling that returns airflow? A. Non-Plenum CAT5 B. Non-Plenum CAT5e C. Plenum CAT5

D. Plenum CAT5e Correct Answer: D Section: (none) Explanation Explanation/Reference: Plenum rated cables should be used in Dropped ceiling that return airflow to give some protection incase of fire since plenum rated cable has a shield / jacket that releases less toxic fumes when burning and for gigabit speed, from the choices given only CAT5e support 1000 Mbps /gigabit speed. So answer is Plenum CAT5e QUESTION 35 Management wants to be sure that the existing wiring infrastructure conforms to CAT5e standards. Which of the following is the correct tool? A. B. C. D.

Cable certifier Cable tester OTDR Protocol analyzer

Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 36 The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is: A. B. C. D.

patch management. security limitations. documentation. social engineering.

Correct Answer: A Section: (none) Explanation Explanation/Reference: A patch is a piece of software designed to fix problems with, or update a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. QUESTION 37 Which of the following appliances creates and manages a large number of secure remote-access sessions, and also provides a high availability solution? A. B. C. D.

Media converter Proxy server VPN concentrator Load balancer

Correct Answer: C Section: (none)

Explanation Explanation/Reference: VPN concentrators typically come in one of two architectures: SSL VPNs and IPSec VPNs. VPN concentrators are ideal when you require a single device to handle a large number of incoming VPN tunnels. Some VPN concentrators only support one protocol or the other QUESTION 38 Which of the following monitoring devices are used only to recognize suspicious traffic from specific software? A. B. C. D.

Signature based IPS Application based IDS Anomaly based IDS Application based IPS

Correct Answer: B Section: (none) Explanation Explanation/Reference:

IDS -Intrusion detection system IPS - Intrusion prevention system Only to recognize suggest - IDS Software- suggests -- Application Therefore answer is Application based IDS.. QUESTION 39 Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? A. B. C. D.

10GBaseLR 100BaseFX 100BaseTX 1000BaseX

Correct Answer: D Section: (none) Explanation Explanation/Reference: among the given choices 1000BaseX is the only one which means 1Gbps QUESTION 40 A router operates at which of the following layers of the OSI model? A. B. C. D.

Layer 2 Layer 3 Layer 4 Layer 5

Correct Answer: B Section: (none) Explanation Explanation/Reference:

QUESTION 41 which of the following a network technician would use to reverse engineer malware and virus ? A. B. C. D.

IDS VLAN Virtual Machine Switch

Correct Answer: C Section: (none) Explanation Explanation/Reference: Virtual Machine --- even if the VM gets infected, host machine will run as normal

http://www.gratisexam.com/