Sie sind auf Seite 1von 18

CompTIA Network+ N10-004

Proper exam questions and answers made simple 2010


 1Which of the following WAN layer two protocols would be BEST suited for a full
mesh topology?
MPLS

tracert
 2 Which of the following command line tools would BEST be used to verfiy DNS
functionality??
dig
 3After increasing the interface MTU of a branch router to 1600 bytes, a network
administrator is no longer able to send packets with a size of 1501 bytes. Which of the
following is the case??
The router at the other end of the WAN link is configured with an MTU of 1500
 Which of the following protocols are used in VoIP?

 RTP
 SIP

 Which of the following commands would allow a technician to see the DNS servers
that a computer is configured to use?
nslookup
 A technician needs to connect a laptop via the small office, home office (SOHO)
wireless access point. When the technician does a site survey using the laptop, the
wireless network is not discovered. Computers previously on the wireless network
were connected, and the wireless card appears to be working. Which of the following
could be causing the issue?
The SSID is set to not broadcast.
 A packet sniffer has been placed on a network and shows client A is sending TCP
SYN packets to server B. Which of the following packets should be sent from server
B in response?
SYN-ACK
 An automated application capable of infecting computers without user interaction
would be described as which of the following?
Worm
 Which of the following does a star ring topology use for data transfer?
Token passing
 A network technician has addressed an issue where many workstations have lost
network connectivity, but is not able to establish the most probable cause. Which of
the following steps should be taken next to resolve this issue?
Escalate the issue to a senior network associate.
 Which of the following protocols allows secure access to a VPN??
PPTP
 An administor is using a packet analyzer across a single switch but is only receiving
partial packet information. Which of the following would need to be implemented on
the switch for the administrator?
Port Mirroring
 A network technician has been asked to retrieve device statistics, information, and
errors. Which of the following tools would the technician likely use??
SNMP
 Which of the following IEEE standards describesd the power output of a standard
port?
802.3af
 Which of the following WAN technologies uses thirty 64Kbs channels?
E-1
 A technician is extending a data circuit to the other side of the building. Which of
the following would the technician set up at the new location?
IDF (intermediate distribution frame)
 Which of the following is a benefit of using dynamic routing as opposed to static
routing?
Scales to large networks
 Which of the following would be an appropriate use of an EGP?
Advertising a /24 to an upstream provider.
 All of the workstations at a company have a static IP address. A newly deployed
workstation is unable to connect to the company intranet server using an Internet
browser. The technician can ping the intranet servers IP adderss. The MOST likely
cause of this in an incorrect:
DNS server setting on the client.
 Which of the following is an example of a valid MAC address for a workstation?
00:08:38:05:B5:F4
 A technician wants to see how many server connections are open on a client
machine. Which of the following is the command to see these connections?
netstat
 Which of the following is a valid IP address in the public addressing scheme?
168.192.10.1
 Which of the following will have problems functioning if a firewall has been set up
to block all UDP traffic?
A VoIP device
 The difference between 10Base-T and 100Bse-T is:
shorter timing between Ethernet frames
 Which of the following is a part of the TCP/IP protocol suite?
UDP
 Which of the following BEST explains the purpose of a DMZ??
To create a security zone that allows public traffic but is isolated from the private network.
 How much bandwidth does an OC-12 provide?
622Mbps
 Which of the following protocols should be used to securely copy a file?

 SFTP
 SCP

 A mail server was recently placed in the network. The users report email is slow.
Upon closer inspection a technician notices that error counters on the error counters
on the interface are incrementing. Which of the following could be causing the
problems?
Duplex mismatch
 Which of the following equipment would allow for routing based on logical
addresses?
Layer 3 switch
 A client is using a device that allows them to synchronize their wireless device to
their computer, but the device must be within 3 feet (1 meter) in order for the
synchronization to complete. Which of the following BEST describes the type of
wireless device being used?
Infared
 A network administrator configured several network devices earlier today, but now
the Internet is no longer avialable to sever users. Which of the following logs should
the network administrator reference to help identify the problem?
History logs
 Which of the following items changes the encryption key on a users session after a
set period of time?
TKIP
 Which of the following is the maximum speed available from a full T1 line?
1.544Mbps
 According to the OSI model, which of the following layers is responsible for
providing reliable communication?
Transport
 A network technician is trying to find out the NETBIOS name of another
workstation using its IP address, which of the following commands would be used to
find this information?
nbstat
 Which of the following is the number of bits used for IPv6?
128
 Which of the following protocols would a multilayer switch use to learn the IP
address of a directly connected device?
ARP
 Which of the following remote access solutions allows the LEAST connection
overhead?
SSL VPN
 Which of the following is a utility that translates the IP address to its physical
network address?
arp
 Which of the following is the default port for SMTP?
25
 A network administrator is configuring a network with a dynamic routing protocol.
Which of the following would support equal cost load balancing and have all routers
contain the same topology view?
OSPF
 Which of the following protocols allows email to be viewed while remaining on the
email server?
IMAP4
 When creating a fault tolerant switched network, which of the following will allow
for loops in the switched topology while preventing a broadcast storm?
Spanning tree protocol
 Which of the following logical topologies uses centralized authentication?
Client/server
 A new virus was just released and has infected several workstations. A technician
receives a newly released patch. Which of the following troubleshooting steps should
the technician take FIRST?
Implement an action plan
 An administrator is implementing a new wireless network. Which of the following
is the highest level of wireless encryption that the administrator can run?
WPA2 AES
 When connecting two switches together, which of the following protocols would be
used to trunk multiple VLAN traffic across the same physical link?
802.1q
 A user reports that they cannot access any network resources. Which of the
following tools would a technician use to troubleshoot the problem?
Cable tester
 Which of the following layers of the OSI model does a network router perform
traffic routing at?
Layer 3
 How many DS0s are used in a T1?
24
 When connecting two devices for voice on a vertical connect, which of the
following cables would be used to connect the two devices?
25 pair cable
 After installing a new switch and connecting redundant uplinks to other switches, a
LAN experiences a broadcast storm causing severe throughput problems. Which of
the following is the MOST likely cause of the broadcast storm?
Spanning-tree protocol was not operational on the LAN.
 Which of the following is the maximum range of 10GBase-SR?
990 feet (302 meters)
 A technician is troubleshooting a switch and has identified the symptoms. Which of
the following steps should the technician take NEXT?
Determine the scope of the problem
 A network technician is installing a series of three access points to cover the entire
wing of a building. Only one access point has wired connection. 802.11g is being used
for the wireless transmission. Which of the following channels should be used for the
access points?
Channels 6-6-6
 Which of the following network topologies would BEST prevent downtime in a
WAN environment?
Mesh
 A technician can successfully remote into the company's server. However, the
technician cannot connect to any of the servers directories from the server itself, but
can ping them via an IP address. Which of the following could be the problem?
DNS is not correctly configured
 Which of the following protocols enables administrators to control network devices
like routers and switches?
SNMP
 Which of the following types of WAN technologies uses cell switching?
ATM
 Which of the following network devices routes packets over a wireless network?
WAP
 A corporate network has grown and manual monitoring of the network devices are
no longer feasible. Which of the following would provide central logging for all
devices with message priority levels?
Install a syslog server and configure the network devices to send log messages to it.
 Routing convergence time is which of the following?
Time required by protocols to update their forwarding tables after changes have occurred
 A users workstation is able to resolve IP addresses of any host, and can ping other
workstations on the local subnet, but is unable to ping addresses on other subnets.
Which of the following is the MOST likely cause of the problem?
The workstation is configured with the incorrect default gateway.
 Which of the following cables has a solid Kevlar center to restrict it from making a
90 degree bend?
CAT6
 Which of the following network media has the maximum segment length?
Single Mode Fiber
 Which of the following logs would let the network administrator know that there are
performance and network issues within the LAN?
System logs
 Which of the following logs would let the network administrator know that there are
performance and network issues within the LAN?
System logs
 A network administrator has been receiving work orders about poor voice quality
crossing a branch T1. The cause is determined to be users running high bandwidth file
sharing applications across the T1 sending large packets delaying the smaller voice
streams. Which of the following would improve voice quality?
Configure traffic shaping to reduce the bandwidth available to the file sharing application.
 Which of the following VPN protocols runs over port 1723 and allows encryption to
be done at teh data level?
PPTP
 Which of the following is implemented on multiple switches to allow alternate
paths?
Spanning tree
 Which of the following cables is used to connect multiple layer 2 switches?
Crossover
 Which of the following is the MOST secure wireless encryption?
WPA2
 Which of the following cable types transmits data over 100Mbps per direction?
10GBase-T
 Which of the following are forms of gigabet Ethernet that require the use of fiber
optic cables?

 1000Base-SX
 1000Base-LX
 1000Base-CX

 Which of the following authentication protocols uses plain text to transmit


passwords over the internet?
PAP
 Which of the following would be used to relocate a T1 closer to the switch for
connectivity?
Smart jack
 Which of the following punch down blocks is BEST suited for high-speed data
transmission?
110 block
 Which of the following outlines the purpose of using a proxy server in an enterprise
environment?
Allows granular control over the traffic between the local LAN and the Internet
 Which of the following network performance optimization methods slows or
restricts traffic to increase the performance of other types of traffic?
 Traffic shaping
 QoS

 Which of the following characteristics BEST describe SMF?

 Can be used for distances exceeding 2 kilometers (1.24 miles)


 Uses laser light for transmission

 Which of the following cable types allows for the maximum cable run distance?
Single-mode fiber
 Which of the following data is included in a wireless access points beacon frame?
A SSID and MAC address
 On a wireless network, a user is able to connect to local resources, but not to be the
Internet. Which of the following is the MOST likely cause?
The gateway is not configured on the router
 A technician received a call from a remote user who is having issues connecting to a
new VPN. Which of the following is the FIRST step the technician should take?
Identify the symptoms and potential causes
 Which of the following is an advantage of 100Base-FX over 100Base-TX?
Longer cable runs
 Which of the following devices allows segregation of collision domains but not
broadcasting domains?
Switch
 Which of the following is the function of a NIC?
It transceives digital data
 A network administrator is developing a solution that will allow a new remote site
with 400 users access to the Internet using only one public routable IP address. The
solution must allow for direct user access to the Internet. Which of the following
technologies is teh BEST to implement?
PAT (Port Address Translation)
 Which of the following IEEE standards has a maximum bandwidth of 54Mbps
operating at 5GHz?
802.11a
 Which of the following protocols is used for connecting clients to a news server?
NNTP (Network News Transfer Protocol)
 A company has installed a new 802.11g point-to-point connection between two
buildings and is experiencing low throughput across the link. The current setup
involves a wireless bridge on the roof with an omni-directional antenna.
Which of the following would BEST improve the link performance?
Replace the omni-directional antennas with Yagi antennas
 Which of the following technologies do the 802.11 networks utilize to prevent
packet collisions?
CSMA/CA
 Users on the network can no longer access a custom application that uses TCP 8090
hosted on the DMZ. A technician has verified that the firewall is permitting the TCP
port. Which of the following commands would verify the server is still accepting
connections on TCP 8090?
netstat
 A network technician is connecting through the console port to configure a switch.
Which of the following ports would be used to transfer configuration files from the
switch?
UDP 69
 A user states that they have decreased signal strength on their wireless connection.
They have been using the wireless network previously without problems and the
network configuration has not been changed. Which of the following is MOST likely
the cause of the degraded signal?
Environmental factors
 After a technician came out and installed a new wireless router, one of the wired
workstations began having problems connecting to the file server. This is only an
intermittent problem. Which of the following actions will the technician MOST likel
perform to resolve this problem?
Check the cable ends
 In the OSI model, which of the following layers would be the cause of a session
time-out while browsing the web?
Layer 5
 Which of the following network protocols allows for automated alerts and reports
on network devices?
SNMP
 An employee is having issues accessing shared resources on a file server. Which of
the following troubleshooting steps should the technician take FIRST?
Identify the symptoms
 Which of the following port numbers does SSH use?
22
 Which of the following protocols maps an IP address to a MAC address?
ARP
 Which of the following is the maximum CAT5 length acceptable for a horizontal
cross-connect?
328 feet (100 meters)
 Which of the following is the FIRST criterion used to select from the routing table?
Most precise matching prefix
 A network technician discovers that the phone company has installed the smart jack
in the wrong location. It needs to be moved 75 feet (23 meters) to the computer room.
Which of the following should be requested?
A demarc extension
 Which of the following protocols provides teh actual encryption used over VPN?
PPTP
 Which of the following documentation would a network administrator need to
update if they have just finished upgrading the firmware on all the switches within the
LAN?
Baseline and configuration documentation
 Which of the following WAN technologies would a technician find dense
wavelength division multiplexing (DWDM)?
SONET
 Which of the following network services is responsible for mapping names to IP
addresses?
DNS
 QoS is used to accomplish which of the following objectives?
Provide priority of one or more types of traffic over others
 Which of the following TCP connect scanners is always set for normal data flow
once a connection is established?
ACK
 Which of the following is required to pass traffic from one VLAN to another?
A layer three switch
 Which of the following protocols are used to transfer files between two systems?

 SCP
 FTP

 Which of the following LAN connection technologies has a full duplex speed of
200Mbps and uses and CAT5e cable?
100Base-T
 Which of the following connector types would a technician utilize with fiber lines
by pushing it directly into the port without twisting?
SC
 Which of the following is the BEST reason to implement QoS when real-time
applications are in use in the network?
Prioritize delay sensitive traffic
 Which of the following technologies is BEST suited for a point-to-point circuit that
is 6 kilometers (3.7 miles) in distance?
10GBase-LR
 In a network constructed using star topology, all the devices are connecting to one
central device known as the:
hub
 Which of the following is the maximum segment distance of a 100Base-FX
network?
2,000 meters (6,561 feet)
 Which of the following protocols is the MOST susceptible to a packet sniffer?
SNMPv2
 A user reports that the wireless network is slow and is able to see and access shared
folders taht are unknown to the user. Which of the following is the cause of the
problem?
The user is connecting to the wrong SSID
 Which of the following network protocols is needed to ensure that users can type in
a FQDN insteand of the IP address?
DNS
 Which of the following are features of a DHCP server?

 Dynamic IP addressing
 Static IP address reservations

 The data center power will not be restored for several hours. Which of the following
can be implemented in the future to allow the data center to keep running?
Connect the data centers power to a generator
 Which of the following is the length of a MAC address?
48bit
 Which of teh following cable types is typically used to connect a hub to a hub that
does not support MDI-X?
Crossover
 Which of the following wireless communication standards allows for
communication at both 2.4GHz and 5GHz frequencies?
802.11n
 Which of the following can an application layer firewall filter that a network layer
firewall cannot?
HTTP URLs
 Which of the following devices would administer routing in a network?
Multilayer switch
 A new segment needs to be added to a network to provide access for 64 servers.
Which of teh following subnets will provide the needed access and still conserve IP
addresses?
192.168.1.30/25
 Which of the following protocols allows usernames and passwords to be transmitted
asclear-text?
PAP (Password authentication protocol)
 A user has plugged a computer into a switch port and now is unable to access any
server resources on the network. Which of the following are the MOST likely reasons
for the access problem?

 The computer is connected to a port in teh wrong VLAN


 The appropriate credentials have not been supplied for network access

 Which of the following will allow certain ports to be part of the same group while
other ports within that switch are part of a different group?
Enabling VLANs
 A company is in the process of upgrading their network infrastructure to support
new VoIP telephony equipment. Which of the following is a primary feature to
consider when selecting a new switch to support the phones?
PoE
 A user has been transferred from the accounting team to the human resources team.
The user can only print to the accounting teams printer and cannot print to the human
resources teams printer. Which of the following is the cause of the problem?
Wrong VLAN
 Which of the following are the IEEE designations for the spanning tree protocol?

 802.1d
 802.1w

 At which of the following layers of the OSI model would a repeater operate?
Layer 1
 Which of the following commands would allow the technician to identify the
currently assigned DNS server?
nslookup
 To forward traffic from a host with the IP address of 10.0.0.100/25 to 10.0.0.200/25
which of the following devices will be required?
A router
 Which of the following software types would BEST be used for identyfying an
attack?
IDS
 Which of the following types would BEST be used at identifying and reacting to an
attack by shutting down a port or dropping certain types of packets?
IPS
 Which of the following properties describes a rate at which bits are transmitted over
a WAN link?
Transmission speed
 Which of the following is a secure method for file transfer to a network device?
SCP
 Which of the following frequency ranges does 802.11a operate at?
5GHz
 A company requires a hub and spoke WAN solution. Which of the following are
BEST suited to meet this need?

 MPLS
 Frame-relay
 ATM

 Which of the following OSI layers handles the routing of data across segments?
Network
 A client wants to extend the range of their wireless network without running wires
throughout the small office. Which of the following could be implemented with the
LEAST administrative effort?
Install a WAP in the middle of the office
 Which of the following components in a structured wiring system supports an
Ethernet network?
110 block
 Which of the following protocols is used to ensure consistent time across network
devices on teh domain?
NTP
 Which of the following cable types has the shortest maximum cable run length?
CAT3
 When would a technician use plenum-rated cable?
When installing cable in ceilings
 Which of the following protocols provides a secure method to remotely administer a
server?
SSH
 Which of the following traffic types would a network layer firewall be unable to
filter?
Email sender verification
 Which of the following mechanisms is used to calculate back-off time on an
Ethernet link after a collision?
CSMA/CD
 Which of the following features from the switch eliminates a delay in acquiring an
IP address?
Enable spanning tree on the interface
 Which of the following cable standards has teh highest effective range at a greater
expense?
1000Base-LX
 How many broadcast domains are created by a 24 port switch configured with 12
VLANs with all of the ports being actively used?
12
 A network device taht is used to connect multiple devices without segmenting a
network is a:
hub
 Which of the following is an advantage of 100Base-FX?
Uses a more flexible cable
 Which of the following could be installed to improve network performance when
accessing Internet websites?
Caching engine
 Users are reporting that they can access Internet web pages but cannot access the
internal company website. Which of the following is the MOST likely source of the
problem?
The intranet server is down
 Which of the following LAN types would utilize CAT5 UTP?
100Base-TX
 When troubleshooting a network error, a technician using a laptop as a network
sniffer can see all the communications on the network segment. Which of the
following network devices is the laptop plugged into?
Hub
 To support roaming across a wireless 802.11g network, each access point should be
configured to use which of the following?
The same SSID
 A new laptop has been purchased with an 802.11n wireless card. The laptop will not
connect to their existing 802.11a network. Which of the following is MOST likely the
reason teh laptop will not connect?
Standard mismatch
 Which of the following will allow an administrator to restrict communication
between network devices?
ACL
 Which of teh following is the strongest type of wireless encryption?
AES
 Which of the following routing protocols is a link state and uses a backbone called
area 0?
OSPF
 A user contacts a technician and states taht they are unable to access the network.
The technician discovers that the IP address of teh workstation is 169.123.142.34.
Which of the following has occurred?
The workstation has obtained an APIPA address
 The 66 block termination point is:
CAT3 compliant
 The role of intelligently forwarding frames from one broadcast domain to another
would be performed by which of the following network equipment?
Router
 Which of the following is the maximum transmission distance of 10GBase-LR?
6 miles (9.7 kilometers)
 Which of the following is teh maximum distance a 10GBase-EW connection can
transmit with one repeater?
80,000 meters (262,467 feet)
 Which of the following is the component in a wiring system designed to support
legacy phone systems?
66 block
 Remote users are having problems accessing files from a file server. Which of the
following should a technician check FIRST?
Connectivity
 Which of the following is a utility that translates the physical network address to its
IP address?
rarp
 Which of the following networks has the LEAST likelihood of collisions?
Ring
 Which of the following tools would be used to establish a connection on a wall jack
to connect to the desktop?
Punch down tool
 Which of the following network devices filters packets based on rules that have
been configured for it?
Firewal
 A network technician is implementing new wireless access pionts in an existing
wireless infrastructure. The security is the WPA2 standard. Which of the following
encryption methods may not be compatible with the previously installed access
points?
AES
 A technician is working on a new employees workstation in the accounting
department. The workstation needs access to the accounting server. Currently the
technician notices that the employee can only access the Internet. Which of the
following would the technician need to verify?
Connect VLAN setting
 Which of the following techniques would increase teh bandwidth for network
ttransmission by joining together multiple connections into one logical connection?
Bonding
 Which of the following protocols permits secure polling of network devices?
SNMPv3
 Which of the following routing protocols uses AS-Path as one of the methods
tobuild the routing table?
BGP
 Ensuring that data is transmitted securely over an IP network is the main purpose
of:
TLS
 Which of the following network segmetns is located outside the firewall?
DMZ
 A technician is troubleshooting connectivity issues on a clents machine. The
technician needs to see the current NetBIOS configuration and open connections,
which of teh following commands would allow this information to be displayed?
nbstat
 A technician has just finished implementing a solution for a network issue. Which
of the following steps in troubleshooting should the technician do NEXT?
Test if the solution works and identify other effects it may have.
 Which of the following address ranges should a netowrk administrator deny in teh
ACL to prevetn multicast packets from crossing the WAN interface?
224.0.0.0 - 239.255.255.255
 A company guest is requesting to use their personal laptop on the company wireless
network. DHCP is configured correctly for wireless and a temporary WEP key is
assigned. The laptop cannot connect to the network because:
MAC filtering is enabled on the WAP
 An active/passive server cluster in chich only one server is active and handling
requests, is an example of which of the following network performance optimization?
high availability
 Which of the following utilities shows the relationship between a MAC address and
the corresponding IP address?
arp
 Which of the following is teh recommended maximum distance CAT6 cable should
be run?
328 feet (100 meters)
 When configuring a wireless access point, which of the following principles should
be used to select a channel to operate on?
Select the channel with the frequency range least used in the given area
 Which of the following is the default port for HTTPS?
443
 Which of the following WAN layer two protocols would be BEST suited for a full
mesh topology?
MPLS
 When connecting two devices for data on a vertical cross connect, which of the
following cables would be used to connect those devices?
Fiber
 Which of the following authentication protocols uses certificates to negotiate access
to the network?
EAP-TLS
 A network using RIP has taken several minutes to begin routing traffic around a
failed piece of equipment. Which of the following could be implemented to imporove
convergence time?
Replace RIP with a link state routing protocol such as OSPF
 A technician is setting up a public server for their company. The IP address is
19.19.0.1. Which of the following is teh default subnet mask for the server?
255.0.0.0
 A user is trying to establish an FTP connection to a computer at home. The home
computer is turned on and has Internet connectivity. However, they are unable to
connect from the PC at work. The IP address that the user is trying to connect to is
192.168.1.125. Which of the following is the MOST likely problem?
The IP address of the home computer is not routable across the Internet
 A corporate office network has 40 computers all in teh same private IP subnet. The
corporate office has purchased an Internet connection from their local ISP. They were
assigned one static public IP address and all 40 computers will require access to the
Internet. How can this be accomplished?
PAT will allow access to the Internet
 A company has one headquarters location and ten remote sites. The remote sites do
not need to communicate with each other, just with headquarters. Which of the
following is the BEST topology to use?
Star
 Which of the following would limit the availability of the types of sites that users on
a LAN have access to?
A proxy server
 Which of the following BEST describes teh use of plenum cable?
Reduces toxic gas released during a fire
 When using the ping utility, which switch pings a network device until stopped?
ping-t
 A network administrator of a company has many branch locations each using a
subnet mask of 255.255.255.224. Which of the following dynamic routing protocols
should be used?
RIPv2
 Which of the following would be a correct statement about VLANs?
VLANs help isolate network traffic
 A user is experiencing slow connections. Which of the following commands would
be used to determine the delay time between the hops?
tracert
 Which of the following protocols uses port 22 by default?
SSH
 Which of the following devices can be remotely looped for troubleshooting
purposes?
A smart jack
 Which of the following authentication methods allows for domain level
authencation on a wireless network?
RADIUS
 An RJ-11 connector is capable of having up to how many pins?
6
 A network technician is installing a small wireless network. A requirement is that
individual users must authenticate using usernames and passwords. Which of the
following technologies would support users authenticating with encrypted usernames
and passwords?
WPA PEAP

Das könnte Ihnen auch gefallen