N10-005

39 Questions | Attempts: 127
Share

SettingsSettingsSettings
N10-005 - Quiz

CompTIA N+ N10-005


Questions and Answers
  • 1. 

    Which of the following can be configured to restrict ports and IP address from Accessing The internal network?

    • A.

      Layer 2 switch

    • B.

      MAC Address Filtering

    • C.

      ACL's

    • D.

      IIS Server

    • E.

      Port Scanner

    • F.

      Firewall

    Correct Answer
    C. ACL's
  • 2. 

    Which of the following authentication solutions provides AAA and uses TCP?

    • A.

      TACACS+

    • B.

      Kerberos

    • C.

      RADIUS

    • D.

      RAS

    Correct Answer
    A. TACACS+
  • 3. 

    Which of the following would be used to test out the security of a specific security attacks?

    • A.

      Honeynet

    • B.

      Honeypot

    • C.

      Vulnerability Scanner

    • D.

      Network based IDS

    Correct Answer
    A. Honeynet
  • 4. 

    The protocols that uses a three way handshake to transfer information can be found within which layer of the OSI Model

    • A.

      Layer 2

    • B.

      Layer 3

    • C.

      Layer 4

    • D.

      Layer 5

    Correct Answer
    C. Layer 4
    Explanation
    TCP 3-Way Handshake (SYN,SYN-ACK,ACK)

    Rate this question:

  • 5. 

    Which of the following separates broadcast domains?

    • A.

      Port mirroring

    • B.

      Router

    • C.

      Convergence

    • D.

      Switch

    Correct Answer
    B. Router
    Explanation
    Router separates internal/external networks and therefor broadcast domains

    Rate this question:

  • 6. 

    Which of the following would Kim, a technician, do to monitor remote traffic through an access point?

    • A.

      Enable an SNMP agent

    • B.

      Enable network mapping

    • C.

      Set monitoring SSID

    • D.

      Select WPA2

    Correct Answer
    A. Enable an SNMP agent
  • 7. 

    Which of the following commands can Lisa, a technician, use on a server to display the default router settings?

    • A.

      Ping

    • B.

      Nslookup

    • C.

      Route

    • D.

      Arp

    Correct Answer
    C. Route
  • 8. 

    Which of the following commands can Lisa, a technician, use to check whether the DNS server for the given domain is reachable?

    • A.

      Nmap

    • B.

      Nbtstat

    • C.

      Dig

    • D.

      Arp

    Correct Answer
    C. Dig
  • 9. 

    Which of the following could KIM, a network technician , use to find the approximate location of a break in a long network cable?

    • A.

      Protocol analyzer

    • B.

      Time domain reflectometer

    • C.

      Toner probe

    • D.

      Multimeter

    Correct Answer
    B. Time domain reflectometer
  • 10. 

    Which of the following protocols is commonly used for VoIP technology?

    • A.

      Telnet

    • B.

      SMTP

    • C.

      SIP

    • D.

      SNMP

    Correct Answer
    C. SIP
  • 11. 

    Which of the following can Jeff, a technician , modify on an 802.11n  router that is not available as an option on an 802.11g device?

    • A.

      SSID

    • B.

      Encryption

    • C.

      Channels

    • D.

      Spectrum

    Correct Answer
    D. Spectrum
  • 12. 

    Which of the following technologies could be implemented to improve call clarity when using VoIP technology?

    • A.

      Static IP addressing

    • B.

      Caching engines

    • C.

      QoS

    • D.

      Port forwarding

    Correct Answer
    C. QoS
    Explanation
    QoS (Quality of Service) is a major issue in VOIP implementations. The issue is how to guarantee that packet traffic for a voice or other media connection will not be delayed or dropped due interference from other lower priority traffic.

    Things to consider are
    Latency: Delay for packet delivery
    Jitter: Variations in delay of packet delivery
    Packet loss: Too much traffic in the network causes the network to drop packets
    Burstiness of Loss and Jitter: Loss and Discards (due to jitter) tend to occur in bursts

    For the end user, large delays are burdensome and can cause bad echos. It's hard to have a working conversation with too large delays. You keep interrupting each other. Jitter causes strange sound effects, but can be handled to some degree with "jitter buffers" in the software. Packet loss causes interrupts. Some degree of packet loss won't be noticeable, but lots of packet loss will make sound lousy.

    Rate this question:

  • 13. 

    When using high bandwidth applications over WAN connections, which of the following should be used?

    • A.

      Static IP addressing

    • B.

      Half-duplex

    • C.

      PoE devices

    • D.

      Load balancing

    Correct Answer
    D. Load balancing
    Explanation
    Most commonly, the term load balancing refers to distributing incoming HTTP requests across Web servers in a server farm, to avoid overloading any one server. Because load balancing distributes the requests based on the actual load at each server, it is excellent for ensuring availability and defending against denial of service attacks.

    Rate this question:

  • 14. 

    When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying system functionality?

    • A.

      Establish a plan of action to resolve the problem and identify potential effescts

    • B.

      Implement the solution

    • C.

      Establish a theory of probable cause

    • D.

      Document findings, actions and outcomes

    Correct Answer
    D. Document findings, actions and outcomes
    Explanation
    Table 1-1. The Six-Step CompTIA A+ Troubleshooting Methodology

    Step Description
    Step 1 Identify the problem
    Step 2 Establish a theory of probable cause (question the obvious)
    Step 3 Test the theory to determine the cause
    Step 4 Establish a plan of action to resolve the problem and implement the solution
    Step 5 Verify full system functionality and, if applicable, implement preventative measures
    Step 6 Document findings, actions, and outcomes

    Rate this question:

  • 15. 

    Kim, a network technician, is troubleshooting a problem and has just established a plan of action to resolve the problem. Which of the following is the NEXT step in the troubleshooting methodology

    • A.

      Verify full system functionality and if applicable implement preventative measures

    • B.

      Implement the solution or escalate as necessary

    • C.

      Document findings, actions, and outcomes

    • D.

      Established a theory of probable cause (e.g. question the obvious).

    Correct Answer
    B. Implement the solution or escalate as necessary
  • 16. 

    Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis?

    • A.

      TDR

    • B.

      Protocol analyzer

    • C.

      Multimeter

    • D.

      Cable crimper

    Correct Answer
    A. TDR
    Explanation
    A time-domain reflectometer (TDR) is an electronic instrument used to characterize and locate faults in metallic cables (for example, twisted wire pairs, coaxial cables).[1] It can also be used to locate discontinuities in a connector, printed circuit board, or any other electrical path. The equivalent device for optical fiber is an optical time-domain reflectometer.

    Rate this question:

  • 17. 

    A switch in IDF3 has shutdown at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot the problem?

    • A.

      Environmental monitor

    • B.

      Cable Tester

    • C.

      TDR

    • D.

      Loopback plug

    Correct Answer
    A. Environmental monitor
  • 18. 

    Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?

    • A.

      20

    • B.

      21

    • C.

      22

    • D.

      23

    Correct Answer
    C. 22
    Explanation
    FTP= Port 20(data) / 21(cmd)
    Telnet= Port 23

    Rate this question:

  • 19. 

    Which of the following ports is the default telnet port?

    • A.

      20

    • B.

      21

    • C.

      22

    • D.

      23

    Correct Answer
    D. 23
    Explanation
    FTP = Port 20(data) / 21(cmd)
    SSH= 22

    Rate this question:

  • 20. 

    Which of the following tools would Lisa, a technician, BEST use to trace a wire through an area where multiple wires of the same color are twisted together 

    • A.

      Cable tester

    • B.

      Tone probe

    • C.

      Cable crimper

    • D.

      Punch down tool

    Correct Answer
    B. Tone probe
  • 21. 

    Which of the following DNS records would a web browser access to determine the IP address of an Internet web page?

    • A.

      CNAME

    • B.

      A

    • C.

      MC

    • D.

      PTR

    Correct Answer
    B. A
    Explanation
    CNAME: record is an abbreviation for Canonical Name record and is a type of resource record in the Domain Name System (DNS) that specifies that the domain name is an alias of another, canonical domain name
    MX: mail exchanger record (MX record) is a type of resource record in the Domain Name System that specifies a mail server responsible for accepting email messages on behalf of a recipient's domain, and a preference value used to prioritize mail delivery if multiple mail servers are available. The set of MX records of a domain name specifies how email should be routed with the Simple Mail Transfer Protocol (SMTP).
    PTR: The reverse DNS database of the Internet is rooted in the Address and Routing Parameter Area (arpa) top-level domain of the Internet. IPv4 uses the in-addr.arpa domain and the ip6.arpa domain is delegated for IPv6. The process of reverse resolving an IP address uses the pointer DNS record type (PTR record).

    Rate this question:

  • 22. 

    Which of the following is used to prevent Layer 2 switching loops within a local area network?

    • A.

      STP

    • B.

      MTU

    • C.

      EGP

    • D.

      IGP

    Correct Answer
    A. STP
    Explanation
    Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling/disabling of these backup links.
    Maximum Transmission Unit (MTU) of a communications protocol of a layer is the size (in bytes) of the largest protocol data unit that the layer can pass onwards.
    Exterior Gateway Protocol (EGP) is a protocol for exchanging routing information between two neighbor gateway hosts (each with its own router) in a network of autonomous systems.
    IGP (Interior Gateway Protocol) is a protocol for exchanging routing information betweengateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks). The routing information can then be used by the Internet Protocol (IP) or other network protocols to specify how to route transmissions.

    Rate this question:

  • 23. 

    A bridge handles frame at which of the following layers of the OSI model?

    • A.

      Network

    • B.

      Session

    • C.

      Transport

    • D.

      Data Link

    Correct Answer
    D. Data Link
    Explanation
    Network bridging - describes the action taken by network equipment to allow two or more communication networks, or two or more network segments,[1] to create an aggregate network. Bridging is distinct from routing which allows the networks to communicate independently as separate networks.[2] A network bridge is a network device that connects more than one network segment. In the OSI model bridging acts in the first two layers.

    Rate this question:

  • 24. 

    Which of the following is a method to prioritize network traffic coming from VoIP phones?

    • A.

      PAT

    • B.

      DNS

    • C.

      SIP

    • D.

      Qos

    Correct Answer
    D. Qos
    Explanation
    Quality of Service (QoS) refers to several related aspects of telephony and computer networks that allow the transport of traffic with special requirements. In particular, much technology has been developed to allow computer networks to become as useful as telephone networks for audio conversations, as well as supporting new applications with even stricter service demands.

    Port Address Translation (PAT), is an extension to network address translation (NAT) that permits multiple devices on a local area network (LAN) to be mapped to a single public IP address. The goal of PAT is to conserve IP addresses.
    Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.
    Session Initiation Protocol (SIP) is an IETF-defined signaling protocol widely used for controlling communication sessions such as voice and video calls over Internet Protocol (IP). The protocol can be used for creating, modifying and terminating two-party (unicast) or multiparty (multicast) sessions. Sessions may consist of one or several media streams.

    Rate this question:

  • 25. 

    Kim, a technician, is installing a switch that not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (select TWO)

    • A.

      MAC addressing

    • B.

      IP addressing

    • C.

      Port speed

    • D.

      IPv6 addressing

    • E.

      Duplex

    Correct Answer
    B. IP addressing
    Explanation
    Port speed and Duplex

    Rate this question:

  • 26. 

    Zach, a technician, is checking a newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?

    • A.

      Cable Tester

    • B.

      Tone probe

    • C.

      OTDR

    • D.

      Loopback plug

    Correct Answer
    A. Cable Tester
  • 27. 

    Which of the following technologies allows for redundant links within a Layer 2 segment?

    • A.

      OSPF

    • B.

      RIP

    • C.

      Port Mirroring

    • D.

      Spanning Tree

    Correct Answer
    D. Spanning Tree
  • 28. 

    A Company is about to install a second network connection with a new ISP. Which of the following routing protocols is the BEST choice?

    • A.

      IS-IS

    • B.

      BGP

    • C.

      OSPF

    • D.

      RIP

    Correct Answer
    B. BGP
    Explanation
    Border Gateway Protocol (BGP) is the protocol which is used to make core routing decisions on the Internet; it involves a table of IP networks or "prefixes" which designate network reachability among autonomous systems (AS). BGP is a path vector protocol or a variant of a Distance-vector routing protocol. BGP does not involve traditional Interior Gateway Protocol (IGP) metrics, but routing decisions are made based on path, network policies and/or rule-sets. For this reason, it is more appropriately termed a reachability protocol rather than routing protocol.

    Rate this question:

  • 29. 

    Which of the following BEST describes a switch port?

    • A.

      Broadcast domain

    • B.

      Distance vector

    • C.

      Link state

    • D.

      Collision domain

    Correct Answer
    D. Collision domain
    Explanation
    A collision domain is a section of a network where data packets can collide with one another when being sent on a shared medium or through repeaters, in particular, when using early versions of Ethernet. A network collision occurs when more than one device attempts to send a packet on a network segment at the same time. Collisions are resolved using carrier sense multiple access with collision detection in which the competing packets are discarded and re-sent one at a time. This becomes a source of inefficiency in the network.[1]

    Rate this question:

  • 30. 

    Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?

    • A.

      Loopback plugs

    • B.

      Butt set

    • C.

      Cable certifer

    • D.

      Tone probe

    Correct Answer
    B. Butt set
  • 31. 

    Which of the following can Jeff, a network technician, change to help limit war driving?

    • A.

      Signal strenght

    • B.

      SSID

    • C.

      Frequency

    • D.

      Channel

    Correct Answer
    A. Signal strenght
  • 32. 

    In which of the following wireless standards is MIMO used?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    D. 802.11n
  • 33. 

    Which of the following utilities would Kim, a technician, use to resolve the FQDN of web servers to its IP address? 

    • A.

      Netstat

    • B.

      Route

    • C.

      Nslookup

    • D.

      Arp

    Correct Answer
    C. Nslookup
    Explanation
    nslookup is a network administration command-line tool available for many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping or for any other specific DNS record. The Internet Systems Consortium has deprecated[1][2] nslookup in favor of host and dig.

    Rate this question:

  • 34. 

    Two WAP's are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?

    • A.

      WPA should be enabled

    • B.

      PKI should be turned off

    • C.

      WAP SSID's are matching

    • D.

      WAP's are transmitting on same channel

    Correct Answer
    C. WAP SSID's are matching
  • 35. 

    Which of the following is usual number of the host identifier part an IPv6 address

    • A.

      16

    • B.

      32

    • C.

      48

    • D.

      64

    Correct Answer
    D. 64
  • 36. 

    Which of the following is the prefix for a link-local IPv6 address?

    • A.

      FE80::/10

    • B.

      FF00::/8

    • C.

      2FFE::/16

    • D.

      FEEF:/12

    Correct Answer
    A. FE80::/10
  • 37. 

    Which of the following layers of the OSI model maps to the Network Interface Layer of the TCP stack? (select TWO)?

    • A.

      Physical

    • B.

      Session

    • C.

      Data Link

    • D.

      Transport

    • E.

      Network

    Correct Answer
    A. Physical
    Explanation
    Physical and Data Link

    Rate this question:

  • 38. 

    Which of the following could Kim, a network technician, use to inspect connection setup, request, and response headers for connecting to web server?

    • A.

      Nbtstat command

    • B.

      Dig command

    • C.

      Ipconfig command

    • D.

      Protocol analyzer

    Correct Answer
    D. Protocol analyzer
    Explanation
    A "Protocol analyzer" is a tool (hardware or software) used to capture and analyze signals and data traffic over a communication channel. Such a channel varies from a local computer bus to a satellite link, that provides a means of communication using a standard communication protocol (networked or point-to-point). Each type of communication protocol has a different tool to collect and analyze signals and data.

    Rate this question:

  • 39. 

    DNS lookups for a given host are intermittently failing. Which of the following would Jim, a technician, MOST likely use to verify this problem?

    • A.

      Arp

    • B.

      Nbstat

    • C.

      Traceroute

    • D.

      Dig

    Correct Answer
    D. Dig

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 29, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 27, 2013
    Quiz Created by
    Mocasan
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.