Study sets, textbooks, questions
Upgrade to remove ads
CompTIA Network+ N10-005 2/11
Get Quizlet's official Network+ - 1 term, 1 practice question, 1 full practice test
Second chunk of questions.
Terms in this set (50)
Which of the following routing protocols utilizes the DUAL algorithm for determining best path?
The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO).
A. Transport layer
B. Network layer
C. Session layer
D. Physical layer
E. Presentation layer
F. Data link layer
Which of the following BEST describes the definition of DHCP?
A. DHCP is utilized to dynamically lease IP addresses to hosts.
B. DHCP is utilized to statically lease IP address to hosts.
C. DHCP is utilized to permanently lease IP address dynamically to hosts.
D. DHCP is utilized to permanently lease IP address statically to hosts.
Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations?
A. The administrator should create exclusions for the workstations IP addresses.
B. The administrator should change the servers to utilize DHCP to obtain IP addresses.
C. The administrator should change the workstations to utilize static IP addresses.
D. The administrator should create exclusions for the servers IP addresses.
The APIPA address 169.254.10.123 falls into which of the following class of addresses?
A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?
A. The DHCP lease pool was not large enough
B. DHCP lease times were set too low
C. The router is not the only DHCP server
D. DHCP was not enabled on the replacement router
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?
A. Layer 3
B. Layer 5
C. Layer 6
D. Layer 7
Which of the following provides secure access to a network device?
Which of the following uses distance vector algorithms to determine the BEST network route to a destination address?
Which of the following uses classless subnet masks across a network?
Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents?
A. Logical network diagrams
B. Physical network diagrams
C. Wiring schematics
D. Group security role assignments
While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate
A. It is the default route.
B. This is the address for the DHCP server.
C. The PC has not been assigned an IP address.
D. The firewall is down.
If a NIC does not have a link light, there is a failure at which of the following OSI layers?
C. Data link
Which of the following OSI layers allows users to access network services such as file sharing?
A. Layer 1
B. Layer 3
C. Layer 4
D. Layer 7
Which of the following can function in an unsecure mode?
Which of the following is used to register and resolve IP addresses with their plain language equivalents?
A. Proxy server
B. DNS server
C. Brouter equipment
D. DHCP server
Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time?
Which of the following is a common physical network topology?
Which of the following is always true when a router selects a destination?
A. The default gateway is selected over any other static or dynamic route.
B. The shortest route is always selected.
C. The most specific route is selected over the default gateway.
D. A dynamic route is selected over a directly attached network.
A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO).
A. Combined DNS and DHCP hosting
C. Content filtering
D. Fault tolerance
E. Website caching
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?
An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened?
Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut?
Which of the following is an example of a Class C address?
Which of the following standards can operate at either 20MHz or 40MHz channel spacing?
A network technician has just upgraded a switch. The new switch's IP range and subnet mask correctly match
other network devices. The technician cannot ping any device outside of the switch's own IP subnet. The previous switch worked correctly with the same settings. Which of the
following is MOST likely the problem?
A. The proxy server is set incorrectly.
B. The Ethernet cable is pinched.
C. The network gateway is set incorrectly.
D. The IP address is set incorrectly.
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice?
A. Wide Area Network
C. Virtual PBX
D. Virtual LAN
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO).
A. Proxy server
B. Traffic shaping
C. Caching engines
D. Load balancing
E. Quality of service
A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems?
D. Antenna types
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?
A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?
C. VTP trunking
D. Port forwarding
The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem?
A. Incorrect service set identifier
B. Low signal strength or interference
C. Incorrect encryption scheme
D. Incorrect IP address or subnet mask
A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO).
A. Routing table
B. Next hop
C. Port mirroring
D. Port monitoring
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?
A. VLAN tag mismatch
B. Wrong subnet mask
C. Smurf attack
D. Faulty routing rule
During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario?
A. WPA2, SSID enabled, and 802.11n.
B. WEP, SSID enabled, and 802.11b.
C. WEP, SSID disabled, and 802.11g.
D. WPA2, SSID disabled, and 802.11a.
Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling?
B. 66 block
D. Patch panel
Which of the following is the difference between 802.11b and 802.11g?
D. Transmission power
Which of the following connectors is usable in SFP modules?
A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem?
A. Incompatible network card
B. Channel overlap
D. WEP encryption
A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network?
A. Change the SSID to match other wireless networks for increased throughput.
B. Change the encryption type to a different mechanism to avoid interference.
C. Change the channel to a different channel than the other wireless networks.
D. Change the WAP to a different manufacturer than the other wireless networks.
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP?
A. NetBIOS name filtering
B. IP address filtering
C. MAC address filtering
D. Computer name filtering
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?
A. Create a MAC filter containing the current users.
B. Turn off SSID broadcast.
C. Change the encryption type to AES 256-bit for current users.
D. Reduce the signal strength to 0 percent.
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?
A. WAP placement
B. TX/RX channel
C. Signal strength
D. Transmission power
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).
B. Network sniffer
D. System log
E. History log
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement?
B. MAC ACL
A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem?
A. Low PoE wattage
B. Opposing antenna polarizations
C. Short distance between antennas
D. WPA 2 encryption
Which of the following is a terminal emulator used to manage a network device?
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?
A. Environmental monitor
C. Toner probe
D. Protocol analyzer
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?
A. Port speed mismatch
B. Faulty F-connectors
C. Bad wiring
D. Bad switch
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).
A. Bad Ethernet switch port
B. TX/RX reversed
C. Bad connectors
D. Bad patch cable
E. Mismatched MTU
Sets found in the same folder
CompTIA Network+ N10-005 10/11
CompTIA Network+ N10-005 11/11
CompTIA Network+ N10-005 9/11
CompTIA Network+ N10-005 8/11
Sets with similar terms
CompTIA Network+ (N10-006) Sample Questi…
Network + N10-005 Questions from Actual Tests
AT N10-004 1-50
Other sets by this creator
CompTIA Network+ N10-005 1/11
CompTIA Network+ N10-005 4/11
CompTIA Network+ N10-005 3/11
CompTIA Network+ N10-005 5/11