+ All Categories
Home > Documents > comptia Net+ lead2pass study guide

comptia Net+ lead2pass study guide

Date post: 02-Jun-2018
Category:
Upload: kyle-sahutske
View: 220 times
Download: 0 times
Share this document with a friend

of 165

Transcript
  • 8/10/2019 comptia Net+ lead2pass study guide

    1/165

    Copyright 2006-2011 Lead2pass.com , All Rights Reserved.

    http://www.lead2pass.com/
  • 8/10/2019 comptia Net+ lead2pass study guide

    2/165

    Vendor: CompTIA

    Exam Code: N10-005

    Exam Name: CompTIA Network+ Certification Exam

    Version: 12.99

  • 8/10/2019 comptia Net+ lead2pass study guide

    3/165

    Important Notice

    Product

    Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available

    within 150 days after your purchase.

    You can login member center and download the latest product anytime. (Product downloaded

    from member center is always the latest.)

    PS: Ensure you can pass the exam, please check the latest product in 2-3 days before the exam

    again.

    Feedback

    We devote to promote the product quality and the grade of service to ensure customers

    interest.

    If you have any suggestions, please feel free to contact us [email protected]

    If you have any questions about our product, please provide Exam Number, Version, Page

    Number, Question Number, and your Login Account to us, please contact us at

    [email protected] and our technical experts will provide support in 24 hours.

    CopyrightThe product of each order has its own encryption code, so you should use it independently. Anyunauthorized changes will be inflicted legal punishment. We reserve the right of final

    explanation for this statement.

    mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/10/2019 comptia Net+ lead2pass study guide

    4/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 1Which of the following would a technician do to monitor remote traffic through an access point?

    A. Enable an SNMP agent

    B. Enable network mapping

    C. Set monitoring SSIDD. Select WPA2

    Answer:AExplanation:Large networks with hundreds or thousands of nodes are difficult to managewithout a large staff to monitor every computer. SNMP, which is widely used in local areanetworks (LANs), lets you monitor network nodes from a management host. You can monitornetwork devices such as servers, workstations, printers, routers, bridges, and hubs, as well asservices such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet NameService (WINS).

    QUESTION 2

    Which of the following commands can a network technician use to check whether the DNS serverfor a given domain is reachable?

    A. nmap

    B. nbtstat

    C. dig

    D. arp

    Answer: CExplanation:The commanddigis a tool for querying DNS nameservers for information about host addresses,mail exchanges, nameservers, and related information. This tool can be used from any Linux(Unix) or Macintosh OS X operating system. The most typical use of dig is to simply query a

    single host.

    QUESTION 3Which of the following standards can operate at either 20MHz or 40MHz channel spacing?

    A. 802.11a

    B. 802.11b

    C. 802.11g

    D. 802.11n

    Answer: D

    Explanation:The 2.4 GHz ISM band is fairly congested. With 802.11n, there is the option to double thebandwidth per channel to 40 MHz which results in slightly more than double the data rate.However, when in 2.4 GHz, enabling this option takes up to 82%[10] of the unlicensed band,which in many areas may prove to be infeasible.The specification calls for requiring one primary 20 MHz channel as well as a secondary adjacentchannel spaced ?0 MHz away. The primary channel is used for communications with clientsincapable of 40 MHz mode. When in 40 MHz mode, the center frequency is actually the mean ofthe primary and secondary channels.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    5/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 4A client's computer is unable to access any network resources. Which of the following utilities cana technician use to determine the IP address of the client's machine?

    A. ipconfig

    B. nslookupC. dig

    D. tracert

    Answer:AExplanation:ipconfigis a commmand line utility available on all versions of Microsoft Windows starting withWindows NT. ipconfig is designed to be run from the Windows command prompt. This utilityallows you to get the IP address information of a Windows computer. It also allows some controlover active TCP/IP connections. ipconfig is an alternative to the older 'winipcfg' utility.

    QUESTION 5

    A user's computer is unable to access the Internet. Which of the following utilities can atechnician use to determine if DNS is working?

    A. nbstat

    B. arp

    C. nslookup

    D. ipconfig

    Answer: CExplanation:nslookupis a network utility program used to obtain information about Internet servers. As itsname suggests, the utility finds name server information for domains by querying DNS.

    QUESTION 6Which of the following can MOST likely cause intermittent connection problems with a CAT5network cable?

    A. Cable has been looped too many times.

    B. Cable has a twist tie attached too close to the connector.

    C. Cable is too warm.

    D. Cable is run too close to a fluorescent light.

    Answer: DExplanation:Cat 5is a twisted pair cablefor carrying signals. This type of cable is used in

    structured cabling for computer networks such as Ethernet. The cable standard providesperformance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and1000BASE-T (Gigabit Ethernet).

    QUESTION 7Given a subnet mask of 255.255.255.0, how many usable IP addresses would be in that subnet?

    A. 250

    B. 254

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    6/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    C. 255

    D. 256

    Answer: BExplanation:TheSubnet Maskhowever, determines the "class" of a Network. 255.255.255.0 is a "Class C"

    network.A class c network can host up to 254 pc's

    QUESTION 8On which of the following OSI model layers would a MAC address be used?

    A. Network

    B. Data Link

    C. Transport

    D. Physical

    Answer: BExplanation:

    The ITU-TG.hnstandard, which provides high-speed local area networking over existing wires(power lines, phone lines and coaxial cables), includes a complete data link layer which providesboth error correction and flow control by means of aselective repeatSliding Window Protocol.

    QUESTION 9Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all theequipment does not match the documentation from 2007. Which of the following configurationmanagement methods has been overlooked?

    A. Change management

    B. System logs

    C. Asset management

    D. Baselining

    Answer:AExplanation:Change management is the request for to change any configuration which is documented.

    QUESTION 10Which of the following TCP/IP model layers does the OSI model Presentation layer map to?

    A. Transport

    B. Internet

    C. ApplicationD. Network Interface

    Answer: CExplanation:TheApplication layerprovides applications the ability to access the services of the other layersand defines the protocols that applications use to exchange data. There are many Applicationlayer protocols and new protocols are always being developed.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    7/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 11Which of the following properties of DHCP would a technician use to ensure an IP address is notleased out from the active scope?

    A. Reservations

    B. Lease times

    C. Removing IPs from the active leasesD. Configuring the DNS options

    Answer:AExplanation:Reservationsare permanent lease assignments that are used to ensure that a specified client ona subnet can always use the same IP address. You can use DHCP reservations for hosts thatrequire a consistent IP address, but do not need to be statically configured.

    QUESTION 12A network technician needs to configure a port on a switch to provide connectivity and electricalsupport to a WAP being installed in a warehouse. Which of the following features needs to be

    configured on the switch?

    A. STP

    B. PoE

    C. VTP trunking

    D. Port forwarding

    Answer: BExplanation:Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which passelectrical power along with data on Ethernet cabling. This allows a single cable to provide bothdata connection and electrical power to devices such as wireless access points or IP cameras.

    QUESTION 13Which of the following reasons would MOST likely be used to implement QoS and traffic shapingsolutions?

    A. Redundancy

    B. Fault tolerance

    C. Unified communications

    D. Uptime requirements

    Answer: CExplanation:

    In unified communication video,voice,data have only one end gateway so to give priority to avoiddelay in voice and video we use Qos.

    QUESTION 14Which of the following uses SSL encryption?

    A. SMTP

    B. FTP

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    8/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    C. HTTPS

    D. SNMP

    Answer: CExplanation:HTTPSis the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the

    SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTPcommunications.

    QUESTION 15Users notice a problem with their network connectivity when additional lights are turned on.Which of the following would be the cause for this problem?

    A. DDOS

    B. Cross talk

    C. Open short

    D. EMI

    Answer: DExplanation:External Machine Interface (EMI), an extension to Universal Computer Protocol (UCP), is aprotocol primarily used to connect to short message service centres (SMSCs) for mobiletelephones.

    QUESTION 16Ann, a network technician, has been troubleshooting a connectivity problem in the LAN room.Ann has diagnosed the problem and implemented a solution. Which of the following would be theNEXT step?

    A. Test the theory

    B. Establish a plan of actionC. Establish a theory

    D. Document findings

    Answer: DExplanation:

    As to prove the cause of problem documents need to be attached so document finding is the firststep after we implemented and diagnosed that problem.

    QUESTION 17A network technician is troubleshooting a user's connectivity problem, and has determined aprobable cause. The technician is at which step in the troubleshooting methodology?

    A. Verify full system functionality

    B. Identify the problem

    C. Establish a theory

    D. Implement the solution

    Answer: CExplanation:Establish a theory means to correlate the finding and cause of a problem in order to fix the

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    9/165

  • 8/10/2019 comptia Net+ lead2pass study guide

    10/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A. VLAN

    B. Trunking

    C. Spanning tree

    D. Traffic filtering

    Answer:AExplanation:

    A VLAN is a group of end stations in a switched network that is logically segmented by function,project team, or application, without regard to the physical locations of the users. VLANs have thesame attributes as physical LANs, but you can group end stations even if they are not physicallylocated on the same LAN segment.

    QUESTION 22A user does not have network connectivity. While testing the cable the technician receives thebelow reading on the cable tester:

    1-----------1

    2-----------23-----------34-----------45-----------56-----------67-----------78-----------8

    Which of the following should the technician do NEXT?

    A. Cable is a crossover, continue troubleshooting

    B. Pin 3 is not used for data, continue troubleshooting

    C. Pin 3 is not used for data, replace the NIC

    D. Redo the cable's connectors

    Answer: D

    QUESTION 23A technician needs multiple networks, high speeds, and redundancy on a system. Which of thefollowing configurations should be considered for these requirements? (Select TWO).

    A. Routing table

    B. Next hop

    C. Port mirroring

    D. Port monitoring

    E. VLANs

    Answer: CEExplanation:Port mirroring is used on a network switch to send a copy of network packets seen on one switchport (or an entire VLAN) to a network monitoring connection on another switch port. This iscommonly used for network appliances that require monitoring of network traffic, such as anintrusion detection system, passive probe or real user monitoring (RUM) technology that is usedto support application performance management (APM).

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    11/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    In computer networking, a single layer-2 network may be partitioned to create multiple distinctbroadcast domains, which are mutually isolated so that packets can only pass between them viaone or more routers; such a domain is referred to as a Virtual Local Area Network, Virtual LAN orVLAN.

    QUESTION 24A technician decides to upgrade a router before leaving for vacation. While away, users begin toreport slow performance. Which of the following practices allows other technicians to quicklyreturn the network to normal speeds?

    A. Change management

    B. Baselines

    C. Asset management

    D. Cable management

    Answer:AExplanation:

    As soon as technician found a problem he generates a change management request to make

    changes to fast up the speed of router.

    QUESTION 25Which of the following would a network administrator recommend to satisfy fault tolerance needswithin the datacenter?

    A. Multimode fiber

    B. Setting up a new hot site

    C. Central KVM system

    D. Central UPS system

    Answer: D

    Explanation:For unintruppted power supply we need ups as from this no power issue will come and oursystems will remain safe.

    QUESTION 26During a disaster recovery test, several billing representatives need to be temporarily setup totake payments from customers. It has been determined that this will need to occur over a wirelessnetwork, with security being enforced where possible. Which of the following configurationsshould be used in this scenario?

    A. WPA2, SSID enabled, and 802.11n.

    B. WEP, SSID enabled, and 802.11b.

    C. WEP, SSID disabled, and 802.11g.

    D. WPA2, SSID disabled, and 802.11a.

    Answer: DExplanation:WPA2 is a security technology commonly used on Wi-Fi wireless networks. WPA2 (WirelessProtected Access 2) replaced the original WPA technology on all certified Wi-Fi hardware since2006 and is based on the IEEE 802.11i technology standard for data encryption.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    12/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 27Which of the following wiring distribution types, often found in company closets, is used toconnect wiring from individual offices to the main LAN cabling?

    A. MDF

    B. 66 blockC. IDF

    D. Patch panel

    Answer: DExplanation:

    A patch panel, patch bay, patch field or jack field is a number of circuits, usually of the same orsimilar type, which appear on jacks for monitoring, interconnecting, and testing circuits in aconvenient, flexible manner.

    QUESTION 28Which of the following network access security methods ensures communication occurs over a

    secured, encrypted channel, even if the data uses the Internet?

    A. MAC filtering

    B. RAS

    C. SSL VPN

    D. L2TP

    Answer: CExplanation:SSL VPN consists of one or more VPN devices to which the user connects by using his Webbrowser. The traffic between the Web browser and the SSL VPN device is encrypted with theSSL protocol or its successor, the Transport Layer Security (TLS) protocol.

    QUESTION 29Which of the following is the difference between 802.11b and 802.11g?

    A. Distance

    B. Frequency

    C. Speed

    D. Transmission power

    Answer: CExplanation:802.11b has a maximum speed of 11Mbps whereas 802.11g has a speed of 54Mbps.

    QUESTION 30Users are reporting that some Internet websites are not accessible anymore. Which of thefollowing will allow the network administrator to quickly isolate the remote router that is causingthe network communication issue, so that the problem can be reported to the appropriateresponsible party?

    A. Ping

    B. Protocol analyzer

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    13/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    C. Tracert

    D. Dig

    Answer: CExplanation:Tracet command will tell the administrator which route is not present or which is present so he will

    come to know whether he has appropriate route or not.

    QUESTION 31A network administrator is responding to a statement of direction made by senior management toimplement network protection that will inspect packets as they enter the network. Which of thefollowing technologies would be used?

    A. Packet sniffer

    B. Stateless firewall

    C. Packet filter

    D. Stateful firewall

    Answer: DExplanation:Stateful firewall keeps track of the state of network connections (such asTCP streams, UDPcommunication) traveling across it. The firewall is programmed to distinguish legitimate packetsfor different types of connections. Only packets matching a known active connection will beallowed by the firewall; others will be rejected.

    QUESTION 32In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna andchannelization properties used in 802.11n?

    A. MIMO, DSSS

    B. MIMO, OFDMC. CSMA, DSSS

    D. CSMA, CDMA

    Answer: BExplanation:802.11n builds upon previous 802.11 standards by adding multiple-input multiple- output (MIMO).The additional transmitter and receiver antennas allow for increased data throughput throughspatial multiplexing and increased range by exploiting the spatial diversity through codingschemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level)

    QUESTION 33

    A network administrator is looking to implement a solution allowing users to utilize a commonpassword to access most network resources for an organization. Which of the following wouldBEST provide this functionality?

    A. RADIUS

    B. Single sign on

    C. Multifactor authentication

    D. Two-factor authentication

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    14/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    Answer: BExplanation:Single sign-on (SSO)is a session/user authentication process that permits a user to enter onename and password in order to access multiple applications. The process authenticates the userfor all the applications they have been given rights to and eliminates further prompts when theyswitch applications during a particular session.

    QUESTION 34A strong network firewall would likely support which of the following security features forcontrolling access? (Select TWO).

    A. War driving

    B. War chalking

    C. MAC filtering

    D. FTP bouncing

    E. Port filtering

    Answer: CE

    Explanation:MAC filtering set the security level at layer 2 and port filtering will set the security level on layer 4so by filtering the traffic on both layers our network will get secure.

    QUESTION 35A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an officebuilding. Which of the following cable types would be BEST suited for such an installation?

    A. UTP

    B. Plenum

    C. Coaxial

    D. STP

    Answer: DExplanation:Shielded twisted pair is a special kind of copper telephone wiring used in some businessinstallations. An outer covering or shield is added to the ordinary twisted pair telephone wires; theshield functions as a ground.Twisted pair is the ordinary copper wire that connects home and many business computers to thetelephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, twoinsulated copper wires are twisted around each other. Each signal on twisted pair requires bothwires

    QUESTION 36

    Which of the following wireless standards provide speeds up to 150Mbps?

    A. 802.11a

    B. 802.11b

    C. 802.11g

    D. 802.11n

    Answer: DExplanation:

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    15/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    802.11n builds upon previous 802.11 standards by adding multiple-input multiple- output (MIMO).The additional transmitter and receiver antennas allow for increased data throughput throughspatial multiplexing and increased range by exploiting the spatial diversity through codingschemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level)

    QUESTION 37Which of the following defines a rack located in an office building between the main rack andother office equipment?

    A. DSU

    B. MDF

    C. CSU

    D. IDF

    Answer: DExplanation:

    An intermediate distribution frame (IDF) is a distribution frame in a central office or customerpremises, which cross-connects the user cable media to individual user line circuits and may

    serve as a distribution point for multipair cables from the main distribution frame (MDF) orcombined distribution frame (CDF) to individual cables connected to equipment in areas remotefrom these frames.IDFs are used for telephone exchange central office, customer-premise equipment, wide areanetwork (WAN), and local area network (LAN) environments, among others.

    QUESTION 38Which of the following connectors is usable in SFP modules?

    A. ST

    B. LC

    C. LX

    D. SX

    Answer: BExplanation:LC connector is used in SFP modules.

    QUESTION 39A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. Anetwork administrator is assigned to provide connectivity between the existing office and the newoffice. Which of the following solutions provides the MOST security from third party tampering?

    A. CAT5e connection between offices via the patch panel located in building's communication closet.

    B. CAT5e cable run through ceiling in the public space between offices.C. VPN between routers located in each office space.

    D. A WEP encrypted wireless bridge with directional antennae between offices.

    Answer: CExplanation:

    A VPN connection across the Internet is similar to a wide area network (WAN) link between thesites. From a user perspective, the extended network resources are accessed in the same wayas resources available from the private network.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    16/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 40Which of the following would MOST likely be used by a network administrator to test DNSresolution?

    A. digB. ipconfig

    C. netstat

    D. nbtstat

    Answer:AExplanation:The commanddigis a tool for querying DNS nameservers for information about host addresses,mail exchanges, nameservers, and related information. This tool can be used from any Linux(Unix) or Macintosh OS X operating system. The most typical use of dig is to simply query asingle host.

    QUESTION 41A technician is developing a shortcut sheet for the network to be able to assist in futuretroubleshooting scenarios. Which of the following should the network devices have to easemanageability efforts?

    A. MAC spoofing

    B. Dynamic IPs

    C. MAC filtering

    D. Static IPs

    Answer: DExplanation:To give every user same ip every time because we have to document that ip slot we use static ip

    configuration.

    QUESTION 42A technician is troubleshooting a computer that will not connect to the Internet. The PC isconnected to the network. Which of the following tools should the technician use FIRST tounderstand the NIC configuration?

    A. Protocol analyzer

    B. ipconfig

    C. nslookup

    D. tracert

    Answer: BExplanation:ipconfigis a commmand line utility available on all versions of Microsoft Windows starting withWindows NT. ipconfig is designed to be run from the Windows command prompt. This utilityallows you to get the IP address information of a Windows computer. It also allows some controlover active TCP/IP connections. ipconfig is an alternative to the older 'winipcfg' utility.

    QUESTION 43

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    17/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A user reports that several spots within the company's office have intermittent connectivity issueswith the newly installed wireless network. There are several WAPs located around the office toprovide a strong signal wherever the users are. Which of the following is the MOST likely causeof the problem?

    A. Incompatible network card

    B. Channel overlapC. Latency

    D. WEP encryption

    Answer: BExplanation:To reduce interference between wireless APs, ensure that wireless APs with overlapping signalsuse unique channel frequencies. The 802.11b standard reserves 14 frequency channels for usewith wireless APs.

    QUESTION 44Ann, a new user, has a workstation that has connectivity to the printer located in her department,

    but cannot access the Internet. The result of an ipconfig command on Ann's workstation is asfollows:

    IP address: 192.168.0.124Subnet Mask: 255.255.255.128Default Gateway: 192.168.0.254

    Which is MOST likely preventing the user from accessing the Internet?

    A. Duplicate IP address

    B. Incorrect gateway

    C. Incorrect VLAN

    D. Bad switch port

    Answer: BExplanation:We usually give default gateway as an end device which is directly connected with ISP so in thiscase user has lost his connectivity with due to wrong default gateway configured.

    QUESTION 45A customer is implementing a VoIP infrastructure using an existing network. The customercurrently has all network devices on the same subnet and would like the phones to be poweredwithout the use of an AC adapter. Which of the following features should be enabled andconfigured to allow for reliable performance of the VoIP system? (Select THREE).

    A. WEPB. PoE

    C. VLANs

    D. SSL VPN

    E. IDS

    F. QoS

    Answer: BCFExplanation:

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    18/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    As customer don't want to use Ac adapter so Power over Ethernet is best option (PoE) as in thisswitch provide power to phones.Phones will transfer their power requirement via cdp to vlanassigned.And Qos provide the voice packet priority over the data packets to avoid jitter.

    QUESTION 46A customer is having problems connecting to a wireless network in a shared office space. Thecustomer can detect several other wireless network signals. All of the wireless networks havedifferent SSIDs but several are using the same encryption type. Which of the following should beconfigured on the customer's wireless network to improve connectivity to the wireless network?

    A. Change the SSID to match other wireless networks for increased throughput.

    B. Change the encryption type to a different mechanism to avoid interference.

    C. Change the channel to a different channel than the other wireless networks.

    D. Change the WAP to a different manufacturer than the other wireless networks.

    Answer: CExplanation:To reduce interference between wireless APs, ensure that wireless APs with overlapping signals

    use unique channel frequencies. The 802.11b standard reserves 14 frequency channels for usewith wireless APs. You can use any other channel instead of the one that you are using.

    QUESTION 47Users at a remote site are unable to establish a VPN to the main office. At which of the followinglayers of the OSI model does the problem MOST likely reside?

    A. Presentation

    B. Application

    C. Physical

    D. Session

    Answer: DExplanation:In the above given layers only physical layer takes part in vpn as connectivity between offices sotechnician must have to check at that layer.

    QUESTION 48A network technician is setting up a wireless access point that would only allow a certain laptop tobe able to access the WAP. By using ACL, which of the following would be filtered to ensure onlythe authorized laptop can access the WAP?

    A. NetBIOS name filtering

    B. IP address filtering

    C. MAC address filtering

    D. Computer name filtering

    Answer: CExplanation:MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access controlmethod whereby the 48-bit address assigned to each network card is used to determine accessto the network.MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    19/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    and denies network access to specific devices through the use of blacklists and whitelists. Whilethe restriction of network access through the use of lists is straightforward, an individual person isnot identified by a MAC address, rather a device only, so an authorized person will need to havea whitelist entry for each device that he or she would use to access the network.

    QUESTION 49Which of the following is the common port used for IMAP?

    A. 25

    B. 53

    C. 143

    D. 443

    Answer: CExplanation:The Internet Message Access Protocol (commonly known as IMAP) is an Application LayerInternet protocol that allows an e-mail client to access e-mail on a remote mail server. The currentversion, IMAP version 4 revision 1 (IMAP4rev1), is defined by RFC 3501. An IMAP server

    typically listens on well-known port 143

    QUESTION 50A company has just installed a new network switch for an expanding department. The company isalso piloting the use of a VoIP phone system for this department. Which of the following shouldbe enabled on the new network switch?

    A. WINS

    B. QoS

    C. NAT

    D. DHCP

    Answer: BExplanation:Qos provide the voice packet priority over the data packets to avoid jitter and delay.

    QUESTION 51Which of the following network protocols is used to resolve FQDNs to IP addresses?

    A. DNS

    B. FTP

    C. DHCP

    D. APIPA

    Answer:AExplanation:

    An Internet service that translatesdomain namesinto IP addresses. Because domain names arealphabetic, they're easier to remember. The Internet however, is really based on IP addresses.Every time you use a domain name, therefore, a DNS service must translate the name into thecorresponding IP address. For example, the domain namewww.example.commight translateto198.105.232.4.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    20/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 52Which of the following network protocols is used for a secure command line interface formanagement of network devices?

    A. SSH

    B. TELNET

    C. IGMPD. HTTP

    Answer:AExplanation:Secure Shell is a cryptographic network protocol for secure data communication, remotecommand-line login, remote command execution, and other secure network services betweentwo networked computers.

    QUESTION 53Which of the following network protocols is used to transport email between servers?

    A. IMAP4B. POP3

    C. SNMP

    D. SMTP

    Answer: DExplanation:While electronic mail servers and other mail transfer agents use SMTP to send and receive mailmessages, user-level client mail applications typically use SMTP only for sending messages to amail server for relaying

    QUESTION 54

    A user is having difficulty connecting a laptop to the company's network via a wirelessconnection. The user can connect to the network via a wired NIC. The technician suspects thelaptop's wireless NIC has failed. The technician performs hardware diagnostics on the wirelessNIC and discovers the hardware is working fine. Which of the following network troubleshootingmethodology steps should the technician do NEXT?

    A. Establish a plan of action to resolve the problem.

    B. Test the theory to determine a cause.

    C. Re-establish a new theory or escalate.

    D. Implement the solution or escalate as necessary.

    Answer: C

    Explanation:As first theorey doesn't work he will establish a new theorey or escalate it to the vendor hardwarecompany to work on it.

    QUESTION 55Ann, a technician, installs a new WAP and users are able to connect; however, users cannotaccess the Internet. Which of the following is the MOST likely cause of the problem?

    A. The signal strength has been degraded and latency is increasing hop count.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    21/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    B. An incorrect subnet mask has been entered in the WAP configuration.

    C. The signal strength has been degraded and packets are being lost.

    D. Users have specified the wrong encryption type and routes are being rejected.

    Answer: BExplanation:

    Due to wrong subnet entered user is unable to communicate with anyone so to communicate heneeds to be in right subnet.

    QUESTION 56An administrator is using a packet sniffer to try to determine what is causing the traffic on thenetwork. The administrator sees a lot of packets on port 25. Which of the following traffic types isMOST likely using port 25?

    A. SMTP

    B. SSH

    C. DNS

    D. TELNET

    Answer:AExplanation:Port no. 25 is assigned to smtp as documented by iana.

    QUESTION 57Which of the following is the BEST way to prevent new users from connecting to a wirelessaccess point, but still allow already connected users to continue to connect?

    A. Create a MAC filter containing the current users.

    B. Turn off SSID broadcast.

    C. Change the encryption type to AES 256-bit for current users.

    D. Reduce the signal strength to 0 percent.

    Answer:AExplanation:MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access controlmethod whereby the 48-bit address assigned to each network card is used to determine accessto the network.MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permitsand denies network access to specific devices through the use of blacklists and whitelists. Whilethe restriction of network access through the use of lists is straightforward, an individual person isnot identified by a MAC address, rather a device only, so an authorized person will need to havea whitelist entry for each device that he or she would use to access the network.

    QUESTION 58Which of the following should be used when throughput to the destination network is a priority?

    A. MTU

    B. Hop count

    C. Reliability of the path

    D. Bandwidth

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    22/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    Answer: DExplanation:

    As throughput to destination network is must this can be achieved by reliability of path as we wantthe same amount of packets on destination transmitted from source without any packet loss.

    QUESTION 59Users have reported issues accessing an Internet website. The network technician wants to verifynetwork layer connectivity. Which of the following tools can provide the verification?

    A. ping

    B. netstat

    C. route

    D. arp

    Answer:AExplanation:Pingis a computer network administration utility used to test the reachability of a host on an

    Internet Protocol (IP) network and to measure the round-trip time for messages sent from theoriginating host to a destination computer.

    QUESTION 60A network technician is concerned that a user is utilizing a company PC for file sharing and usinga large amount of the bandwidth. Which of the following tools can be used to identify the IP andMAC address of the user's PC?

    A. System log

    B. History log

    C. Network sniffer

    D. Nslookup

    Answer: CExplanation:Network snifferis a computer program or a piece of computer hardware that can intercept and logtraffic passing over a digital network or part of a network. As data streams flow across thenetwork, the sniffer captures each packet and, if needed, decodes the packet's raw data, showingthe values of various fields in the packet, and analyzes its content according to the appropriateRFC or other specifications.

    QUESTION 61A network technician is concerned that an attacker is attempting to penetrate the network, andwants to set a rule on the firewall to prevent the attacker from learning which IP addresses are

    valid on the network. Which of the following protocols needs to be denied?

    A. TCP

    B. SMTP

    C. ICMP

    D. ARP

    Answer: CExplanation:

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    23/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    TheInternet Control Message Protocol(ICMP) is one of the core protocols of the Internet ProtocolSuite. It is used by network devices, like routers, to send error messages indicating, for example,that a requested service is not available or that a host or router could not be reached. ICMP canalso be used to relay query messages. It is assigned protocol number 1.

    QUESTION 62A network technician has configured a new firewall with a rule to deny UDP traffic. Users havereported that they are unable to access Internet websites. The technician verifies this using the IPaddress of a popular website. Which of the following is the MOST likely cause of the error?

    A. Implicit deny

    B. HTTP transports over UDP

    C. Website is down

    D. DNS server failure

    Answer:AExplanation:In a network firewall ruleset if a certain type of traffic isn't identified it will be denied or stopped by

    Implicit Deny.

    QUESTION 63The ISP needs to terminate the WAN connection. The connection should be located in thenetwork server room where the company LAN equipment resides. Which of the followingidentifies the location?

    A. Smart jack

    B. MDF

    C. VPN

    D. 66 block

    Answer: BExplanation:Short for main distribution frame, a cable rack that interconnects and manages thetelecommunications wiring between itself and any number of IDFs. Unlike an IDF, which connectsinternal lines to the MDF, the MDF connects private or public lines coming into a building with theinternal network.

    QUESTION 64A recent flood in the office caused a lot of equipment to be damaged and the manager of the ITdepartment would like a way to prevent such an incident in the future. Which of the following isthe BEST way to mitigate such an equipment failure?

    A. Reduce the power input on the replacement servers.B. Cover the servers with plastic tarps.

    C. Purchase twice as many servers to create high availability clusters.

    D. Transfer the replacement servers offsite to a data center.

    Answer: DExplanation:

    As we replace replacement servers offsite to datacenter this will cause lower traffic on over lanand will not cause failure of these server also.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    24/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 65Which of the following describes a single computer that is setup specifically to lure hackers intorevealing their methods, and preventing real attacks on the production network?

    A. Evil twinB. Honeypot

    C. DMZ

    D. Honeynet

    Answer: BExplanation:In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteractattempts at unauthorized use of information systems.

    QUESTION 66Which of the following is the FASTEST Ethernet technology?

    A. 10GBaseSR

    B. 10BaseT

    C. 100BaseFX

    D. 1000BaseT

    Answer:AExplanation:10GBASE-SR ("short range") is a port type for multi-mode fiber and uses 850 nm lasers. ItsPhysical Coding Sublayer 64b/66b PCS is defined in IEEE 802.3 Clause 49 and its PhysicalMedium Dependent PMD in Clause 52. It delivers serialized data at a line rate of 10.3125 Gbit/s.

    QUESTION 67A Chief Executive Officer (CEO) decided that only a limited number of authorized companyworkstations will be able to connect to the Internet. Which of the following would BESTaccomplish this goal?

    A. Use content filtering

    B. Install and configure IDS

    C. Enable MAC address filtering

    D. Enable RAS on the network firewall

    Answer: CExplanation:

    Most Wi-Fi access points and routers ship with a feature calledhardwareorMAC address filtering .This feature is normally turned "off" by the manufacturer, because it requires a bit of effort to setup properly. However, to improve the security of your Wi-Fi LAN (WLAN), strongly considerenabling and using MAC address filtering.

    QUESTION 68Network upgrades have been completed and the WINS server was shutdown. It was decided thatNetBIOS network traffic will no longer be permitted. Which of the following will accomplish thisobjective?

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    25/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A. Content filtering

    B. Port filtering

    C. MAC filtering

    D. IP filtering

    Answer: BExplanation:TCP/IPport filteringis the practice of selectively enabling or disabling Transmission ControlProtocol (TCP) ports and User Datagram Protocol (UDP) ports on computers or network devices.When used in conjunction with other security practices, such as deploying firewall software atyour Internet access point, applying port filters to intranet and Internet servers insulates thoseservers from many TCP/IP-based security attacks, including internal attacks by malicious users.

    QUESTION 69Companies trying to cut down on constant documentation of IP addresses could use which of thefollowing?

    A. Longer lease timesB. More reservations

    C. Larger scopes

    D. Dynamic IP addressing

    Answer: DExplanation:In Dynamic IP addressing all the hosts with private ip address will be patted to the same ip so theadministrator will not have to keep track of each and every host with private ip mapped to a staticpublic ip address.

    QUESTION 70

    Multiple computers are connected to a hub near a wall plate. In order to get to the computers,students step on and around the cable that connects the teacher's station, a few feet away, to thesame hub. The teacher is experiencing no network connectivity. Which of the following is MOSTlikely the problem?

    A. Cross-talk

    B. Split cables

    C. Distance

    D. EMI

    Answer: BExplanation:

    Asplit cableis invisible to wire maps and continuity testers, making it very difficult to troubleshoot.

    QUESTION 71A user has network connectivity per the link lights on the NIC, but cannot access any networkresources or the Internet. Which of the following commands should the technician run FIRST?

    A. arp

    B. ipconfig

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    26/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    C. tracert

    D. route

    Answer: BExplanation:

    As from ipconfig command technician will come to know wheather he has assigned right ip

    address to NIC or not.

    QUESTION 72In order to discover the currently unknown IP address of the next-hop router, a networkadministrator would begin by using which of the following tools?

    A. NMAP

    B. ping

    C. nslookup

    D. tracert

    Answer: D

    Explanation:nslookupis a network utility program used to obtain information about Internet servers. As itsname suggests, the utility finds name server information for domains by querying DNS.

    QUESTION 73A network administrator suspects that recent traffic problems could be caused by a high CPUload on company routers. Which of the following would BEST be used to monitor CPU cycles onthe routers?

    A. TACACS+

    B. SNMP

    C. Syslog

    D. DOCSIS

    Answer: BExplanation:SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes froma management host. You can monitor network devices such as servers, workstations, printers,routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol(DHCP) or Windows Internet Name Service (WINS).

    QUESTION 74Which of the following network topologies describes a network where each node is connected toevery other node?

    A. Bus

    B. Star

    C. Mesh

    D. Ring

    Answer: CExplanation:In a true mesh topology every node has a connection to every other node in the network.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    27/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 75Which of the following DHCP properties defines the size of the pool of available IP addresses?

    A. Options

    B. ScopeC. Leases

    D. Reservations

    Answer: BExplanation:

    A range of IP addresses that are available to be leased to DHCP clients by the DHCP Serverservice.

    QUESTION 76Which of the following supports faster wireless broadband speeds?

    A. SatelliteB. WiMAX

    C. ISDN

    D. OC-3

    Answer: BExplanation:Wi-MAX (Worldwide Interoperability for Microwave Access) is a wireless communicationsstandard designed to provide 30 to 40 megabit-per-second data rates with the 2011 updateproviding up to 1 G bit/s for fixed stations

    QUESTION 77

    A NAS appliance has had a failed NIC replaced. Now the NAS appliance is no longer visible onthe network. Which of the following is the MOST likely cause of the problem?

    A. The network cable connecting the NAS to the network switch is bad.

    B. The network port that the appliance is connected to is assigned to the wrong VLAN.

    C. Port security on the Ethernet switch has disabled the port.

    D. Firewall needs to be updated for the new NAS device.

    Answer: CExplanation:

    As by port security switch find the changes in mac address because nic is replaced so due tosecurity reason switch shut that port.

    QUESTION 78A network administrator must ensure that both the server and the client are authenticated to thewireless system before access is granted. Which of the following should be implemented to meetthis requirement?

    A. EAP-PEAP

    B. MAC ACL

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    28/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    C. EAP-TTLS

    D. MS-CHAPv2

    Answer: CExplanation:Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in

    wireless networks and Point-to-Point connections. EAP is an authentication framework providingfor the transport and usage of keying material and parameters generated by EAP methods.

    QUESTION 79A network administrator is implementing a wireless honeypot to detect wireless breach attempts.The honeypot must implement weak encryption to lure malicious users into easily breaking intothe network. Which of the following should the network administrator implement on the WAP?

    A. WPA

    B. WPA2

    C. WEP

    D. VPN

    Answer: CExplanation:Wired Equivalent Privacy(WEP) is a security algorithm for IEEE 802.11 wireless networks.Introduced as part of the original 802.11 standard ratified in September 1999, its intention was toprovide data confidentiality comparable to that of a traditional wired network.WEP, recognizableby the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choicepresented to users by router configuration tools

    QUESTION 80Which of the following protocols works at the LOWEST layer of the OSI model?

    A. L2TPB. PPTP

    C. ISAKMP

    D. IPSec

    Answer:AExplanation:Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol(PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual privatenetwork (VPN) over the Internet.

    QUESTION 81

    A network administrator is tasked with deploying a company-wide wireless system which allowsfor accurate tracking of employees' wireless device locations via WAP triangulation. Which of thefollowing is the MOST important aspect of the deployment?

    A. WAP placement

    B. TX/RX channel

    C. Signal strength

    D. Transmission power

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    29/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    Answer:AExplanation:Before going ahead with the deployment, the first thing that need to be check is where you aregoing to place your wireless router so that you can have internet connectivity from every locationthat you need.

    QUESTION 82A network administrator needs to implement a monitoring tool and be able to send log informationto a server and receive log information from other clients. Which of the following should beimplemented? (Select TWO).

    A. SNMP

    B. Network sniffer

    C. Syslog

    D. System log

    E. History log

    Answer:AC

    Explanation:Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managingdevices on IP networks". Devices that typically support SNMP include routers, switches, servers,workstations, printers, modem racks and more. It is used mostly in network management systemsto monitor network-attached devices for conditions that warrant administrative attention.Syslog is a standard for computer message logging. It permits separation of the software thatgenerates messages from the system that stores them and the software that reports andanalyzes them.

    QUESTION 83Which of the following network appliances will only detect and not prevent malicious networkactivity?

    A. IDS

    B. Network sniffer

    C. IPS

    D. Firewall

    Answer:AExplanation:

    Anintrusion detection system(IDS) is a device or software application that monitors network orsystem activities for malicious activities or policy violations and produces reports to amanagement station. Some systems may attempt to stop an intrusion attempt but this is neitherrequired nor expected of a monitoring system.

    QUESTION 84Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house.Which of the following will accomplish this?

    A. Decreasing radio strength

    B. MAC filtering

    C. WEP encryption

    D. SSID broadcast disable

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    30/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    Answer:AExplanation:Decreasing Radio Strength will reduce signal strength outside the house and will accomplishwhat she is intending to do.

    QUESTION 85A large company has experienced Internet slowdowns as users have increased their use of theInternet. Which of the following can the Network Administrator use to determine the amount ofbandwidth used by type of application?

    A. Network maps

    B. Traffic analysis

    C. Syslog

    D. ICMP

    Answer: BExplanation:

    By traffic analysis administrator will come to wheather user are using bandwidth for right purposeor not.

    QUESTION 86An employee connects to a work computer from home via the built-in Windows remote desktopconnection. Which of the following is MOST likely being used to establish the connection?

    A. RDP

    B. RTP

    C. RIP

    D. RAS

    Answer:AExplanation:Remote Desktop Protocol(RDP) is a proprietary protocol developed by Microsoft, which providesa user with a graphical interface to connect to another computer over a network connection. Theuser employs RDP client software for this purpose, while the other computer must run RDPserver software.

    QUESTION 87A user reports intermittent network connectivity. Which of the following should a technicianconfigure on the managed switch to help troubleshoot this issue?

    A. SMTP

    B. SNTPC. SNMP

    D. SNAT

    Answer: CExplanation:SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes froma management host. You can monitor network devices such as servers, workstations, printers,routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    31/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    (DHCP) or Windows Internet Name Service (WINS).

    QUESTION 88Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needsto quickly determine which workstation is infected with the virus. Which of the following wouldBEST help Joe?

    A. Web server

    B. Syslog

    C. Network sniffer

    D. SNMP

    Answer: CExplanation:Network sniffer is a tool to analyze packets that are being exchanged between the hosts andusing this Joe can understand whether there was traffic encountered to server or not which wasinfected.

    QUESTION 89When troubleshooting a connectivity issue, which of the following commands will give thetechnician a list of the host names connected to the network?

    A. ping

    B. nbstat

    C. arp

    D. msconfig

    Answer: BExplanation:TheNbstatcommand is a great command to use when you need to display the NetBIOS over

    TCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tablesfor both local and remote computers.

    QUESTION 90Which of the following WAN technologies has the HIGHEST latency?

    A. ADSL

    B. LTE

    C. Satellite

    D. WiMAX

    Answer: CExplanation:Satellite WAN latency is the delay caused by the physical distance a signal must travel fromearth, to the satellite, and back to earth to complete a round-trip transmission. Because of thephysics involved in the round-trip-time (RTT), end-to-end latency can take 600 milliseconds ormore due to geosynchronous satellites orbiting miles above the earth.

    QUESTION 91Which of the following connectors are MOST commonly used on a POTS line?

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    32/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A. RJ-45

    B. MTRJ

    C. DB-9

    D. RJ-11

    Answer: DExplanation:The six-position plug and jack commonly used for telephone line connections may be used forRJ11, RJ14 or even RJ25, all of which are actually names of interface standards that use thisphysical connector. The RJ11 standard dictates a 2-wire connection, while RJ14 uses a 4-wireconfiguration, and RJ25 uses all six wires. The RJ abbreviations, though, only pertain to thewiring of the jack (hence the name "registered jack"); it is commonplace but not strictly correct torefer to an unwired plug connector by any of these names. Typically you'll find the RJ-11 and RJ-14 on your Plain Old Telephone Service (POTS)

    QUESTION 92Which of the following cable types is required to run through an air duct?

    A. UTP

    B. Fiber

    C. PVC

    D. Plenum

    Answer: DExplanation:Plenum rated cable has a special insulation that has low smoke and low flame characteristics.Plenum cable is mandated to be installed in any "air handling" space. For example, most largeoffice buildings use the ceiling to return air to the AC unit. This qualifies this ceiling as a plenumceiling, and all the cables that go through that ceiling must be plenum rated.

    QUESTION 93Which of the following technologies can cause interference for 802.11g?

    A. RADAR

    B. 802.11a

    C. IrDA

    D. Bluetooth

    Answer: DExplanation:This wireless communication standard has a maximum transmission speed of 54 Mbits per

    second and a typical indoor range of 30 meters. It uses the 2.4 GHz band. This band may have todeal with interference from cordless telephones, Bluetooth devices, and various appliances.

    QUESTION 94A technician has low signal strength connecting two wireless bridges. Which of the followingcould be the problem?

    A. Low PoE wattage

    B. Opposing antenna polarizations

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    33/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    C. Short distance between antennas

    D. WPA 2 encryption

    Answer: BExplanation:The polarization of an antenna is the orientation of the electric field (E-plane) of the radio wave

    with respect to the Earth's surface and is determined by the physical structure of the antenna andby its orientation. It has nothing in common with antenna directionality terms: "horizontal","vertical", and "circular". Thus, a simple straight wire antenna will have one polarization whenmounted vertically, and a different polarization when mounted horizontally.

    QUESTION 95Which of the following reduces the deployment cost of a wireless LAN?

    A. WPA

    B. 802.1x

    C. MIMO

    D. PoE

    Answer: DExplanation:Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which passelectrical power along with data on Ethernet cabling. This allows a single cable to provide bothdata connection and electrical power to devices such as wireless access points or IP cameras.

    QUESTION 96Which of the following is a terminal emulator used to manage a network device?

    A. VPN

    B. IDS

    C. PuTTY

    D. IPS

    Answer: CExplanation:PuTTY is a free and open-source terminal emulator, serial console and network file transferapplication. It supports several network protocols, including SCP, SSH, Telnet and rlogin.

    QUESTION 97A network administrator suspects a broadcast storm is causing performance issues on thenetwork. Which of the following would be used to verify this situation?

    A. Environmental monitor

    B. Multimeter

    C. Toner probe

    D. Protocol analyzer

    Answer: DExplanation:

    A "Protocol analyzer" is a tool (hardware or software) used to capture and analyze signals anddata traffic over a communication channel.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    34/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 98Users are reporting that external web pages load slowly. The network administrator determinesthat the Internet connection is saturated. Which of the following is BEST used to decrease theimpact of web surfing?

    A. Caching

    B. Load balancing

    C. Port filtering

    D. Traffic analyzer

    Answer:AExplanation:In computer science, acacheis a component that transparently stores data so that future requestsfor that data can be served faster. The data that is stored within a cache might be values thathave been computed earlier or duplicates of original values that are stored elsewhere. Ifrequested data is contained in the cache (cache hit), this request can be served by simplyreading the cache, which is comparatively faster.

    QUESTION 99Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?

    A. DNS

    B. DOS

    C. DHCP

    D. DSL

    Answer: CExplanation:when we install a dhcp server into our network then dhcp server works on the basis of dora

    process first dhcp server sends a hello message in to the network to discover the clients pc andwhen any client pc found in the network then, dhcp server offers the IP to client pc. When clientpc selects any IP from dhcp server then client pc request for selected IP to dhcp server then dhcpserver provide that IP to client pc and both send ackonledgement to each other.

    QUESTION 100Which of the following commands displays the routing table on a server or workstation?

    A. nbtstat

    B. route

    C. traceroute

    D. nmap

    Answer: BExplanation:Theroute commandallows you to make manual entries into the network routing tables. Theroutecommanddistinguishes between routes to hosts ...

    QUESTION 101A network administrator wants to see what ports are open on a server. Which of the following

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    35/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    commands will show open ports?

    A. netstat

    B. tracert

    C. nbtstat

    D. nslookup

    Answer:AExplanation:Netstat command displays various network related information such as network connections,routing tables, interface statistics, masquerade connections, multicast memberships etc.

    QUESTION 102Which of the following would be the BEST solution for an IDS to monitor known attacks?

    A. Host-based

    B. Signature-based

    C. Network-based

    D. Behavior-based

    Answer: BExplanation:Signature detection involves searching network traffic for a series of bytes or packet sequencesknown to be malicious. A key advantage of this detection method is that signatures are easy todevelop and understand if you know what network behavior you're trying to identify.

    QUESTION 103At which of the following layers of the OSI model does ASCII work?

    A. Session

    B. Transport

    C. Presentation

    D. Application

    Answer: CExplanation:The presentation layer is responsible for the delivery and formatting of information to theapplication layer for further processing or display. It relieves the application layer of concernregarding syntactical differences in data representation within the end-user systems. An exampleof a presentation service would be the conversion of an EBCDIC-coded text computer file to an

    ASCII-coded file.

    QUESTION 104Users report that an internal file server is inaccessible. Of the following commands, which wouldbe the MOST useful in determining network-layer connectivity?

    A. dig

    B. nbtstat

    C. netstat

    D. ping

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    36/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    Answer: DExplanation:TheNbstatcommand is a great command to use when you need to display the NetBIOS overTCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tablesfor both local and remote computers.

    QUESTION 105Which of the following uses port 23 by default?

    A. TELNET

    B. IMAP

    C. FTP

    D. SNMP

    Answer:AExplanation:Telnetis a network protocol used on the Internet or local area networks to provide a bidirectional

    interactive text-oriented communication facility using a virtual terminal connection. User data isinterspersed in-band with Telnet control information in an 8-bit byte oriented data connection overthe Transmission Control Protocol (TCP).

    QUESTION 106Ann, a technician, is installing network cables for an office building. Some of the cables are notshowing active on the switch even when moved to different ports. Which of the following is MOSTlikely the cause?

    A. Port speed mismatch

    B. Faulty F-connectors

    C. Bad wiring

    D. Bad switch

    Answer: CExplanation:Bad wiring refers to the state when you do not follow a pattern and everything seems messed upand you are not able to figure out the cause.

    QUESTION 107Which of the following is the MAXIMUM rated speed for CAT5 cabling?

    A. 10Mbps

    B. 100Mbps

    C. 1000Mbps

    D. 10Gbps

    Answer: BExplanation:Category 5 cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used instructured cabling for computer networks such as Ethernet. The cable standard providesperformance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and1000BASE-T (Gigabit Ethernet)

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    37/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 108Which of the following is a specialized piece of hardware designed to encrypt and decrypt usertraffic?

    A. Proxy serverB. TDR

    C. Smart jack

    D. VPN concentrator

    Answer: DExplanation:The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPNallows users to use an encrypted tunnel to securely access a corporate or other network via theInternet.

    QUESTION 109

    Which of the following wireless security measures, although widely implemented, does notprovide strong security?

    A. IPSec

    B. WPA2

    C. MAC address filtering

    D. 802.1x

    Answer: CExplanation:By MAC address filtering you can only filter layer 2 traffic but in security system layer 4 and layer4 security is also essential.

    QUESTION 110After a new user moves furniture into a cubicle, the computer does not connect to the networkany longer. Which of the following would be the MOST likely reason? (Select TWO).

    A. Bad Ethernet switch port

    B. TX/RX reversed

    C. Bad connectors

    D. Bad patch cable

    E. Mismatched MTU

    Answer: CD

    Explanation:It could be problem with the bad connector because the user just moved furniture to the cubicleand it is quite possible that the movement of the furniture has created problem by disrupting thecabling and connections. These two are the important things which can be broken downwhenever there is a physical movement.

    QUESTION 111Which of the following connector types would be found with a VoIP system utilizing CAT6cabling?

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    38/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A. SC

    B. RJ-45

    C. RJ-11

    D. BNC

    Answer: BExplanation:The heavier wire in some Cat 6 cables makes them too thick to attach to standard 8P8C(RJ-45)connectors without a special modular piece

    QUESTION 112Which of the following performance benefits would multiple domain controllers BEST provide?

    A. Fault tolerance

    B. Caching engine

    C. Proxy server

    D. Quality of service

    Answer:AExplanation:Fault-tolerantdesign is a design that enables a system to continue its intended operation, possiblyat a reduced level, rather than failing completely, when some part of the system fails. The term ismost commonly used to describe computer-based systems designed to continue more or lessfully operational with, perhaps, a reduction in throughput or an increase in response time in theevent of some partial failure

    QUESTION 113A technician notices a newly installed CAT5 cable is longer than the standard maximum length.Which of the following problems would this MOST likely cause?

    A. Split cable

    B. EMI

    C. DB loss

    D. Crosstalk

    Answer: CExplanation:The maximum length for a cable segment is 100 m per TIA/EIA 568-5-A. If longer runs arerequired, the use of active hardware such as a repeater or switch is necessary. The specificationsfor 10BASE-T networking specify a 100metre length between active devices. This allows for90metres of solid-core permanent wiring, two connectors and two stranded patch cables of

    5metres, one at each end.

    QUESTION 114Assigning the same IP address to a network device is which of the following?

    A. SSID

    B. Scope

    C. Reservation

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    39/165

  • 8/10/2019 comptia Net+ lead2pass study guide

    40/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A. CNAME

    B. PTR

    C. MX

    D. A

    Answer: C

    Explanation:Amail exchanger record(MX record) is a type of resource record in the Domain Name System thatspecifies a mail server responsible for accepting email messages on behalf of a recipient'sdomain, and a preference value used to prioritize mail delivery if multiple mail servers areavailable. The set of MX records of a domain name specifies how email should be routed with theSimple Mail Transfer Protocol (SMTP).

    QUESTION 119Which of the following TCP ports are used by FTP? (Select TWO).

    A. 20

    B. 21

    C. 22D. 23

    E. 25

    F. 80

    Answer:ABExplanation:FTP uses two ports by default: 21 for sending commands, and 20 for sending data. For instance ifyou said "FTP " it would make the attempt using port 21. If the session wasestablished, port 20 would be using for the data. Note: These are the default ports which is what Iassume you were asking. A server administrator can however configure FTP to use whatever porthe defines.

    QUESTION 120Which of the following protocols is MOST commonly used for the transfer of router configurationfiles?

    A. SSL

    B. TFTP

    C. DNS

    D. IMAP

    Answer: BExplanation:

    Trivial File Transfer Protocol(TFTP) is a file transfer protocol notable for its simplicity. It isgenerally used for automated transfer of configuration or boot files between machines in a localenvironment. Compared to FTP, TFTP is extremely limited, providing no authentication, and israrely used interactively by a user.

    QUESTION 121Which of the following protocols resolves IP addresses to MAC addresses?

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    41/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    A. DNS

    B. ARP

    C. RARP

    D. NTP

    Answer: B

    Explanation:ARP is used to convert an IP address to a physical address such as an Ethernet address. ARPhas been implemented with many combinations of network and data link layer technologies, suchas IPv4,Chaosnet,DECnetand Xerox PARC Universal Packet (PUP) using IEEE 802 standards,FDDI, X.25, Frame Relay and Asynchronous Transfer Mode (ATM). IPv4 over IEEE 802.3 andIEEE 802.11 is the most common case.

    QUESTION 122Which of the following security methods is used to attract users attempting to gain unauthorizedaccess to various systems within a single network?

    A. Network based IDS

    B. FirewallC. Network based IPS

    D. Honeynet

    Answer: DExplanation:

    A network-based intrusion prevention system (NIPS) is a system used to monitor a network aswell as protect the confidentiality, integrity, and availability of a network. Its main functions includeprotecting the network from threats, such as denial of service (DoS) and unauthorized usage.

    QUESTION 123Some visitors are unable to access the wireless network. The network's wireless infrastructure is

    comprised of three different buildings with the configurations listed below. Wireless network inBuilding A and C is used exclusively for internal employees and Building B is used for visitors andrequires no additional configuration on their devices. Which of the following settings would needto be modified to provide wireless access to all visitors?

    Building A Building B Building CChannel: 2 Channel: 6 Channel: 11Encryption: WPA2 Encryption: WPA2 Encryption: WPA2

    A. Encryption set to Open in all Buildings

    B. Encryption set to Open in Building B

    C. Encryption set to WEP in Building B

    D. Channel set to 11 in Building B

    Answer: BExplanation:Because the building B is in the middle, the wireless access router will have reachability to thebuilding A and C. Now, the only thing that we need to do is to open theWireless access on B forthe guest users for the WAP in B so that the users coming to building A and C can get access tointernet using the open connection.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    42/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 124Some employees are unable to maintain a wireless network connection. The network's wirelessinfrastructure is comprised of three different buildings with the configurations listed below.Wireless network in Building A and C is used exclusively for internal employees and Building B isused for visitors and requires no additional configuration on their devices. Which of the followingsettings would need to be modified to provide the BEST wireless experience for all employees asthey move between buildings?

    Building A Building B Building CChannel: 1 Channel: 6 Channel: 11Encryption: WPA2 Encryption: Open Encryption: WPA2SSID. CorpSSID. GuestSSID. Sales

    A. Change Channel in Building B to 7

    B. Change Encryption in Building B to match A and C

    C. Change Channel in Building C to 1

    D. Change SSID in Building C to match Building A

    Answer: D

    Explanation:The configuration difference between users in building A and C is that they have same encryptionhowever the SSID is different so the user has to manually authenticate and connect to thenetwork whenever he will move between buildings. If the SSID's are same then he will not haveto authenticate himself again and he will get automatic connectivity.

    QUESTION 125Which of the following port numbers is used for SNMP?

    A. 61

    B. 151

    C. 161

    D. 1611

    Answer: CExplanation:Simple Network Management Protocol(SNMP) is an "Internet-standard protocol for managingdevices on IP networks". Devices that typically support SNMP include routers, switches, servers,workstations, printers, modem racks, UPSes and more. It is used mostly in network managementsystems to monitor network-attached devices for conditions that warrant administrative attention.

    QUESTION 126A technician has been given the task to install a wireless network in a user's home. Which of thefollowing should the technician consider when implementing the network? (Select TWO).

    A. That there is strong encryption enabled and configured on the access point.

    B. The user's home network has a correctly completed WHOIS entry.

    C. The access point is broadcasting the SSID based upon manufacturer's standards.

    D. There are no conflicts of channels in use by neighboring wireless networks.

    E. There are redundant internal DNS names set in the access point's settings.

    F. That the access point's MAC address is properly set in its configuration settings.

    Answer:AD

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    43/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    Explanation:Strong encryption is required to keep the user's internet safe and secure so as to avoid misuse ofthe internet connection and to ensure that channel conflicts are not there so that the signals donot compete with each other and user start to face intermittent connection.

    QUESTION 127Users are reporting wired connectivity drops in a new office with brand new CAT6 infrastructure.Which of the following tools should a technician use to BEST troubleshoot this issue?

    A. OTDR

    B. Protocol analyzer

    C. Toner probe

    D. Cable certifier

    Answer: DExplanation:

    A cable certifier is an electronic device used to verify the source of electric current, voltage and aswitching matrix used to connect the current source and the volt meter to all of the contact points

    in a cable.

    QUESTION 128Which of the following wireless technologies only uses the 5GHz spectrum but reaches atheoretical throughput of only 54Mbps?

    A. A

    B. B

    C. G

    D. N

    Answer:A

    Explanation:802.11a standard uses the same core protocol as the original standard, operates in 5 GHz band,and uses a 52-subcarrier orthogonal frequency-division multiplexing (OFDM) with a maximumraw data rate of 54 Mbit/s, which yields realistic net achievable throughput in the mid-20 Mbit/s.The data rate is reduced to 48, 36, 24, 18, 12, 9 then 6 Mbit/s if required.

    QUESTION 129Which of the following is the definition of a DNS server?

    A. Hosts proprietary business applications

    B. Translates FQDN's to IP addresses

    C. Provides network IDS/IPS security

    D. Assigns IP addresses to network devices

    Answer: BExplanation:Domain Name System (DNS) is the name resolution protocol for TCP/IP networks, such as theInternet. Client computers query a DNS server to resolve memorable, alphanumeric DNS namesto the IP addresses that computers use to communicate with each other.

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    44/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    QUESTION 130Which of the following features can BEST be used to facilitate authorized remote access to anetwork?

    A. VPN concentrator

    B. Proxy server

    C. Content filterD. Load balancer

    Answer:AExplanation:The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPNallows users to use an encrypted tunnel to securely access a corporate or other network via theInternet.

    QUESTION 131Which of the following WAN technology types has the GREATEST latency?

    A. ISDNB. Fiber

    C. Satellite

    D. Cable

    Answer: CExplanation:Becausesatellites provide a microwave radio relay technology complementary to that ofcommunication cables. They are also used for mobile applications such as communications toships, vehicles, planes and hand-held terminals, and for TV and radiobroadcasting.

    QUESTION 132

    Multiple networked devices running on the same physical hardware that provide central access toapplications and files, where each device runs as a piece of software are known as:

    A. virtual desktops.

    B. switches.

    C. PBXs.

    D. virtual servers.

    Answer: DExplanation:

    A Virtualserver, usually a Web server, that shares computer resources with other virtual servers.In this context, the virtual part simply means that it is not adedicated server -- that is, the entire

    computer is not dedicated to running the server software

    QUESTION 133Which of the following is a Class A IP address?

    A. 10.4.0.1

    B. 169.254.0.1

    C. 192.168.0.1

    http://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/n10-005.htmlhttp://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/http://www.lead2pass.com/n10-005.html
  • 8/10/2019 comptia Net+ lead2pass study guide

    45/165

    Get Complete Collection ofN10-005Exam's Question and Answers.

    http://www.lead2pass.com

    D. 254.200.0.1

    Answer:AExplanation:Class A ip address ranges from 10.0.0.0 to 10.255.255.255

    QUESTION 134A network where all traffic feeds through a centralized gateway uses which of the followingtopologies?

    A. Peer-to-peer

    B. Ring

    C. Bus

    D. Star

    Answer: DExplanation:

    A bus topology is a type of network setup where each computer and network device is connected

    to a single cable or backbone.

    QUESTION 135A technician working for a company with


Recommended