Exam Cram 1: CompTIA Network+ N10-005

100 Questions | Total Attempts: 50

SettingsSettingsSettings
Exam Cram 1: CompTIA Network+ N10-005

Exam Cram Part 1 Network+ N10-005 4th edition by Mike Harwood


Questions and Answers
  • 1. 
    You suspect that someone is capturing the data sent on your network. You want to capture data to ensure that it is encrypted and cannot be read by intruders. Which of the following network utilities can both intruders and administrators use to capture network traffic?
    • A. 

      Port scanner

    • B. 

      Packet filter

    • C. 

      Data watcher

    • D. 

      Packet sniffer

  • 2. 
    You have been hired to review the security of a company’s network. Upon investigation, you notice that a wireless AP has been installed in a wiring closet without the consent of the administrator. The AP is actively used by remote users to access resources on the company’s network. Which security problem does this represent?
    • A. 

      Rogue protocol interception

    • B. 

      Rogue AP

    • C. 

      Network sniffing

    • D. 

      Social engineering

  • 3. 
    You have been employed by a small company to implement a fault-tolerant hard disk configuration. You have purchased four 4TB hard disks, and you plan to install RAID 5 on the server. What is the storage capacity of the RAID solution?
    • A. 

      12TB

    • B. 

      4TB

    • C. 

      8TB

    • D. 

      16TB

  • 4. 
    You have been called in to troubleshoot a small network. The network uses TCP/IP and statically assigned IPv4 information. You add a new workstation to the network. It can connect to the local network but not to a server on a remote network. Which of the following is most likely the cause of the problem?
    • A. 

      Incorrect IP address.

    • B. 

      Incorrect default gateway.

    • C. 

      The DHCP server is unavailable.

    • D. 

      Duplicate IP addresses are being used.

  • 5. 
    Under what circumstance would you change the default channel on an access point?
    • A. 

      When channel overlap occurs between access points

    • B. 

      To release and renew the SSID

    • C. 

      To increase the security settings

    • D. 

      To decrease the security settings

  • 6. 
    On several occasions your wireless router has been compromised, and intruders are logging onto it. Which of the following strategies could you use to increase the security of the wireless routers? (Choose the two best answers.)
    • A. 

      Use SSL

    • B. 

      Disable SSID broadcast

    • C. 

      Use MAC filtering

    • D. 

      Use wireless filtering

  • 7. 
    You have just purchased a new wireless access point. You change the security settings to use 128-bit encryption. How must the client systems be configured?
    • A. 

      All client systems must be set to 128-bit encryption.

    • B. 

      The client system inherits security settings from the AP.

    • C. 

      Wireless security does not support 128-bit encryption.

    • D. 

      The client wireless settings must be set to autodetect.

  • 8. 
    Which of the following topology type offers the greatest amount of redundancy?
    • A. 

      Star

    • B. 

      Bus

    • C. 

      Ring

    • D. 

      Mesh

  • 9. 
    You need to install a network printer, and you require the printer’s MAC address to finish the installation. Which of the following is a valid MAC address?
    • A. 

      192.168.2.13

    • B. 

      0x00007856

    • C. 

      00:04:e2:1c:7b:5a

    • D. 

      56g78:00h6:1415

  • 10. 
    You have been called in to replace a faulty ST connector. Which of the following media types are you working with?
    • A. 

      RG-58

    • B. 

      RG-62

    • C. 

      Single-mode fiber

    • D. 

      SCSI

  • 11. 
    Your manager asks you to recommend a secure way to copy files between a server on your network and a remote server in another location. Which of the following solutions are you most likely to recommend?
    • A. 

      TFTP

    • B. 

      FTP

    • C. 

      SFTP

    • D. 

      IGMP

  • 12. 
    You are setting up a wide area network between two school campuses, and you decide to use BRI ISDN. What is the maximum throughput of your connection?
    • A. 

      64Kbps

    • B. 

      128Kbps

    • C. 

      128Mbps

    • D. 

      64Mbps

  • 13. 
    You are troubleshooting an older 100BaseT network, and you suspect that the maximum cable length has been exceeded. What is the maximum length of a 100BaseT network segment?
    • A. 

      25 meters

    • B. 

      100 meters

    • C. 

      185 meters

    • D. 

      500 meters

  • 14. 
    Which of the following is a valid IPv6 address?
    • A. 

      42DE:7E55:63F2:21AA:CBD4:D773

    • B. 

      42CD:7E55:63F2:21GA:CBD4:D773:CC21:554F

    • C. 

      42DE:7E55:63F2:21AA

    • D. 

      42DE:7E55:63F2:21AA:CBD4:D773:CC21:554F

  • 15. 
    While troubleshooting a network connectivity problem on a Windows Server system, you need to view a list of the IP addresses that have been resolved to MAC addresses. What command would you use to do this?
    • A. 

      Arp -a

    • B. 

      Nbtstat -a

    • C. 

      Arp -d

    • D. 

      Arp -s

  • 16. 
    While troubleshooting a DNS issue from a UNIX server, you suspect that the DNS record for one of your other servers is incorrect. Which of the following utilities are you most likely to use to troubleshoot this problem?
    • A. 

      Ipconfig

    • B. 

      Dig

    • C. 

      Netstat

    • D. 

      Nbtstat

  • 17. 
    A miscreant has added a rogue access point to your wireless network. Users are mistakenly connecting to that access point instead of the legitimate one they should connect to. What is this type of attack which eavesdrops on the wireless network known as?
    • A. 

      Evil twin

    • B. 

      War driving

    • C. 

      WEP cracking

    • D. 

      DDoS

  • 18. 
    You are experiencing problems with the network connectivity of a Windows 7 system. You suspect that there might be a problem with an incorrect route in the routing table. Which of the following TCP/IP utilities can you use to view the routing table? (Choose two.)
    • A. 

      Tracert

    • B. 

      Nbstat

    • C. 

      Route

    • D. 

      Netstat

    • E. 

      Ping

  • 19. 
    Which of the following best describes the function of asymmetric key encryption?
    • A. 

      It uses both a private and public key to encrypt and decrypt messages.

    • B. 

      It uses two private keys to encrypt and decrypt messages.

    • C. 

      It uses a single key for both encryption and decryption.

    • D. 

      It uses three separate keys for both encryption and decryption.

  • 20. 
    Which of the following services provides name resolution services for FQDNs?
    • A. 

      DNS

    • B. 

      DHCP

    • C. 

      WINS

    • D. 

      ARP

    • E. 

      NTP

  • 21. 
    You are installing a 100BaseFX network, and you need to purchase connectors. Which of the following might you purchase? (Choose two.)
    • A. 

      RJ-45

    • B. 

      ST

    • C. 

      BNC

    • D. 

      SC

  • 22. 
    To increase wireless network security, you have decided to implement portbased security. Which of the following standards specifies port-based access control?
    • A. 

      802.11x

    • B. 

      802.1x

    • C. 

      802.11b

    • D. 

      802.1b

  • 23. 
    When designing a network, you have been asked to select a cable that offers the most resistance to crosstalk. Which of the following are you likely to choose?
    • A. 

      Multimode fiber-optic

    • B. 

      Shielded twisted pair

    • C. 

      UTP

    • D. 

      Shielded mesh

  • 24. 
    Which of the following are considered disaster recovery measures? (Choose two.)
    • A. 

      Backups

    • B. 

      UPS

    • C. 

      RAID 5

    • D. 

      Offsite data storage

  • 25. 
    Which command produces the following output?
    • A. 

      Arp

    • B. 

      Tracert

    • C. 

      Ipconfig

    • D. 

      Netinf

Related Topics
Back to Top Back to top