CompTIA Network+ N10-005 Exam Questions
A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment? A. WAP placement B. TX/RX channel C. Signal strength D. Transmission power
A
A network technician is troubleshooting signal problems with certain WAPs in an office and finds consistently high ping times across the units. Such an issue is called which of the following? A. Latency B. Attenuation C. Crosstalk D. Frequency hopping
A
A technician wants to separate networks on a switch. Which of the following should be configured to allow this? A. VLAN B. Trunking C. Spanning tree D. Traffic filtering
A
An administrator notices SMTP traffic is being blocked by the company firewall. Which of the following ports should be opened? A. 25 B. 53 C. 110 D. 443
A
An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection? A. RDP B. RTP C. RIP D. RAS
A
Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents? A. Logical network diagrams B. Physical network diagrams C. Wiring schematics D. Group security role assignments
A
If a NIC does not have a link light, there is a failure at which of the following OSI layers? A. Physical B. Session C. Data link D. Presentation
A
Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification? A. ping B. netstat C. route D. arp
A
Which of the following BEST describes the definition of DHCP? A. DHCP is utilized to dynamically lease IP addresses to hosts. B. DHCP is utilized to statically lease IP address to hosts. C. DHCP is utilized to permanently lease IP address dynamically to hosts. D. DHCP is utilized to permanently lease IP address statically to hosts.
A
Which of the following can function in an unsecure mode? A. SNMPv3 B. SSH C. SSL D. SCP
A
Which of the following defines the amount of time a host retains a specific IP address before it is renewed or released? A. DHCP lease B. DNS suffix C. Subnet mask D. DHCP reservation
A
Which of the following features can BEST be used to facilitate authorized remote access to a network? A. VPN concentrator B. Proxy server C. Content filter D. Load balancer
A
Which of the following is a Class A IP address? A. 10.4.0.1 B. 169.254.0.1 C. 192.168.0.1 D. 254.200.0.1
A
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect? A. Create a MAC filter containing the current users. B. Turn off SSID broadcast. C. Change the encryption type to AES 256-bit for current users. D. Reduce the signal strength to 0 percent.
A
Which of the following is the FASTEST Ethernet technology? A. 10GBaseSR B. 10BaseT C. 100BaseFX D. 1000BaseT
A
Which of the following network protocols is used to resolve FQDNs to IP addresses? A. DNS B. FTP C. DHCP D. APIPA
A
Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options
A
Which of the following protocols works at the LOWEST layer of the OSI model? A. L2TP B. PPTP C. ISAKMP D. IPSec
A
Which of the following routing protocols utilizes the DUAL algorithm for determining best path? A. EIGRP B. RIPv2 C. OSPF D. RIP
A
Which of the following uses port 23 by default? A. TELNET B. IMAP C. FTP D. SNMP
A
While working on a PC, a technician notices 0.0.0.0 in the routing table. Which of the following does this indicate A. It is the default route. B. This is the address for the DHCP server. C. The PC has not been assigned an IP address. D. The firewall is down.
A
Which of the following protocols resolves IP addresses to MAC addresses? A. DNS B. ARP C. RARP D. NTP
B
Which of the following switch features allows for both incoming and outgoing data across physical ports at the same time? A. Burst-frame B. Full-duplex C. Half-duplex D. VoIP
B
Which of the following uses classless subnet masks across a network? A. Subnetting B. CIDR C. Supernetting D. Summarization
B
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
B
Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links? A. VLAN B. MPLS C. VPN D. PSTN
B
Which of the following performance optimization techniques would be MOST beneficial for a network-wide VoIP setup? (Select TWO). A. Proxy server B. Traffic shaping C. Caching engines D. Load balancing E. Quality of service
BE
A customer has requested a solution using multiple WAPs for wireless access. Which of the following should be different on each WAP to prevent wireless problems? A. Firewalls B. VLANs C. Channels D. Antenna types
C
At which of the following layers do frames exist? (Select TWO). A. OSI model Data link layer B. TCP/IP model Network Interface layer C. OSI model Physical layer D. OSI model Network layer E. TCP/IP model Internet layer
AB
Which of the following TCP ports are used by FTP? (Select TWO). A. 20 B. 21 C. 22 D. 23 E. 25 F. 80
AB
A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO). A. SNMP B. Network sniffer C. Syslog D. System log E. History log
AC
Which of the following is the definition of a DNS server? A. Hosts proprietary business applications B. Translates FQDN's to IP addresses C. Provides network IDS/IPS security D. Assigns IP addresses to network devices
B
Which of the following is used to register and resolve IP addresses with their plain language equivalents? A. Proxy server B. DNS server C. Brouter equipment D. DHCP server
B
Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO). A. Switch B. Cable C. Repeater D. Router E. Bridge F. Hub
AD
A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch? A. STP B. PoE C. VTP trunking D. Port forwarding
B
A technician has low signal strength connecting two wireless bridges. Which of the following could be the problem? A. Low PoE wattage B. Opposing antenna polarizations C. Short distance between antennas D. WPA 2 encryption
B
A user reports that several spots within the company's office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem? A. Incompatible network card B. Channel overlap C. Latency D. WEP encryption
B
A user wants to connect seven PCs together for a game night. Which of the following should the user install to help with this task? A. Media convertor B. Switch C. Firewall D. Bridge
B
Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann's workstation is as follows: IP address: 192.168.0.124 Subnet Mask: 255.255.255.128 Default Gateway: 192.168.0.254 Which is MOST likely preventing the user from accessing the Internet? A. Duplicate IP address B. Incorrect gateway C. Incorrect VLAN D. Bad switch port
B
Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected.
B
Given a subnet mask of 255.255.255.0, How many usable IP addresses would be in that subnet? A. 250 B. 254 C. 255 D. 256
B
Network upgrades have been completed and the WINS server was shutdown. It was decided that NetBIOS network traffic will no longer be permitted. Which of the following will accomplish this objective? A. Content filtering B. Port filtering C. MAC filtering D. IP filtering
B
On which of the following OSI model layers would a MAC address be used? A. Network B. Data Link C. Transport D. Physical
B
The APIPA address 169.254.10.123 falls into which of the following class of addresses? A. A B. B C. C D. D
B
The network support team is constantly getting calls from users in a specific area of an office building. The users are able to connect to the office wireless network, but they sometimes disconnect or experience very slow download speeds. Which of the following is MOST likely the problem? A. Incorrect service set identifier B. Low signal strength or interference C. Incorrect encryption scheme D. Incorrect IP address or subnet mask
B
Which of the following DHCP properties defines the size of the pool of available IP addresses? A. Options B. Scope C. Leases D. Reservations
B
Which of the following commands displays the routing table on a server or workstation? A. nbtstat B. route C. traceroute D. nmap
B
Which of the following connectors is usable in SFP modules? A. ST B. LC C. LX D. SX
B
Which of the following protocols is MOST commonly used for the transfer of router configuration files? A. SSL B. TFTP C. DNS D. IMAP
B
A customer is having problems connecting to a wireless network in a shared office space. The customer can detect several other wireless network signals. All of the wireless networks have different SSIDs but several are using the same encryption type. Which of the following should be configured on the customer's wireless network to improve connectivity to the wireless network? A. Change the SSID to match other wireless networks for increased throughput. B. Change the encryption type to a different mechanism to avoid interference. C. Change the channel to a different channel than the other wireless networks. D. Change the WAP to a different manufacturer than the other wireless networks.
C
A customer wants to keep cost to a minimum and has only ordered a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address? A. VLANs B. PoE C. PAT D. VPN
C
A network administrator must ensure that both the server and the client are authenticated to the wireless system before access is granted. Which of the following should be implemented to meet this requirement? A. EAP-PEAP B. MAC ACL C. EAP-TTLS D. MS-CHAPv2
C
A network technician has just upgraded a switch. The new switch's IP range and subnet mask correctly match other network devices. The technician cannot ping any device outside of the switch's own IP subnet. The previous switch worked correctly with the same settings. Which of the following is MOST likely the problem? A. The proxy server is set incorrectly. B. The Ethernet cable is pinched. C. The network gateway is set incorrectly. D. The IP address is set incorrectly.
C
A network technician is setting up a wireless access point that would only allow a certain laptop to be able to access the WAP. By using ACL, which of the following would be filtered to ensure only the authorized laptop can access the WAP? A. NetBIOS name filtering B. IP address filtering C. MAC address filtering D. Computer name filtering
C
A technician needs to ensure that traffic from a specific department is separated within several switches. Which of the following needs to be configured on the switch to separate the traffic? A. Duplex settings B. SNMP string C. VLAN assignments D. Spanning tree
C
A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue? A. The DHCP lease pool was not large enough B. DHCP lease times were set too low C. The router is not the only DHCP server D. DHCP was not enabled on the replacement router
C
A user's laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured? A. SSID name B. WAP encryption strength C. WAP radio power D. Channel overlay
C
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause? A. Port speed mismatch B. Faulty F-connectors C. Bad wiring D. Bad switch
C
Assigning the same IP address to a network device is which of the following? A. SSID B. Scope C. Reservation D. Lease
C
At which of the following layers of the OSI model does ASCII work? A. Session B. Transport C. Presentation D. Application
C
Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols? A. DNS B. DOS C. DHCP D. DSL
C
In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented? A. Scope options B. Leases C. Reservations D. DNS suffixes
C
In which of the following layers of the OSI model would MAC addressing be found? A. Network B. Application C. Data Link D. Transport
C
Joe has a small office and is looking to replace his phone system with a lower cost solution that requires minimal in-house support. Which of the following is the BEST choice? A. Wide Area Network B. NAT C. Virtual PBX D. Virtual LAN
C
Several users from the finance department report that they are able to access the Internet, but unable to connect to their financial applications. The network technician is unable to ping the finance server. The technician decides to check the switch and determines that Internet access is working. Which of the following is a possible cause of the access issues? A. Faulty cable B. Remote management disabled C. Improper VLAN assignment D. Mismatched duplex
C
Spanning-Tree Protocol is used with which of the following network devices? A. Router B. NIC C. Switch D. DHCP server
C
Users are reporting that some Internet websites are not accessible anymore. Which of the following will allow the network administrator to quickly isolate the remote router that is causing the network communication issue, so that the problem can be reported to the appropriate responsible party? A. Ping B. Protocol analyzer C. Tracert D. Dig
C
Which of the following DNS records is used to identify a domain's SMTP server? A. CNAME B. PTR C. MX D. A
C
Which of the following TCP/IP model layers does the OSI model Presentation layer map to? A. Transport B. Internet C. Application D. Network Interface
C
Which of the following is a common physical network topology? A. Cross-over B. Loopback C. Star D. Straight
C
Which of the following is a terminal emulator used to manage a network device? A. VPN B. IDS C. PuTTY D. IPS
C
Which of the following is always true when a router selects a destination? A. The default gateway is selected over any other static or dynamic route. B. The shortest route is always selected. C. The most specific route is selected over the default gateway. D. A dynamic route is selected over a directly attached network.
C
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE? A. Layer 3 B. Layer 5 C. Layer 6 D. Layer 7
C
Which of the following is the common port used for IMAP? A. 25 B. 53 C. 143 D. 443
C
Which of the following is the difference between 802.11b and 802.11g? A. Distance B. Frequency C. Speed D. Transmission power
C
Which of the following network topologies would be separated into two networks if a client in the middle is removed or the cable is cut? A. Mesh B. Ring C. Bus D. Star
C
Which of the following port numbers is used for SNMP? A. 61 B. 151 C. 161 D. 1611
C
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO). A. Bad Ethernet switch port B. TX/RX reversed C. Bad connectors D. Bad patch cable E. Mismatched MTU
CD
A proxy server would MOST likely be installed to provide which of the following functions? (Select TWO). A. Combined DNS and DHCP hosting B. Encryption C. Content filtering D. Fault tolerance E. Website caching
CE
A technician needs multiple networks, high speeds, and redundancy on a system. Which of the following configurations should be considered for these requirements? (Select TWO). A. Routing table B. Next hop C. Port mirroring D. Port monitoring E. VLANs
CE
Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO). A. 200.200.100.0/28 B. 200.200.100.32/27 C. 200.200.100.63/27 D. 200.200.100.79/27 E. 200.200.100.95/27 F. 200.200.100.254/30
CE
A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation? A. Environmental monitor B. Multimeter C. Toner probe D. Protocol analyzer
D
A network where all traffic feeds through a centralized gateway uses which of the following topologies? A. Peer-to-peer B. Ring C. Bus D. Star
D
A user is unable to access any network resources. The IP configuration of the workstation is as follows: IP Address: 192.168.10.32 Subnet Mask: 255.255.255.240 Default Gateway: 192.168.10.46 Which of the following would allow the user to connect to network resources? A. Change the default gateway to 192.168.10.1 B. Change the default gateway to 192.168.10.254 C. Change the IP address to 192.168.10.31 D. Change the IP address to 192.168.10.33
D
A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause? A. VLAN tag mismatch B. Wrong subnet mask C. Smurf attack D. Faulty routing rule
D
Companies trying to cut down on constant documentation of IP addresses could use which of the following? A. Longer lease times B. More reservations C. Larger scopes D. Dynamic IP addressing
D
During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario? A. WPA2, SSID enabled, and 802.11n. B. WEP, SSID enabled, and 802.11b. C. WEP, SSID disabled, and 802.11g. D. WPA2, SSID disabled, and 802.11a.
D
Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause othis issue? A. Faulty GBIC B. Faulty SFP C. Cable is a crossover D. VLAN mismatch
D
Multiple servers' IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations? A. The administrator should create exclusions for the workstations IP addresses. B. The administrator should change the servers to utilize DHCP to obtain IP addresses. C. The administrator should change the workstations to utilize static IP addresses. D. The administrator should create exclusions for the servers IP addresses.
D
Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? A. 10GBaseLR B. 100BaseFX C. 100BaseTX D. 1000BaseX
D
Which of the following OSI layers allows users to access network services such as file sharing? A. Layer 1 B. Layer 3 C. Layer 4 D. Layer 7
D
Which of the following is an example of a Class C address? A. 10.19.0.79 B. 127.34.8.197 C. 176.96.1.222 D. 192.168.1.105
D
Which of the following network protocols is used to transport email between servers? A. IMAP4 B. POP3 C. SNMP D. SMTP
D
Which of the following provides secure access to a network device? A. SNMPv2 B. FTP C. RSH D. SSH
D
Which of the following standards can operate at either 20MHz or 40MHz channel spacing? A. 802.11a B. 802.11b C. 802.11g D. 802.11n
D
Which of the following uses distance vector algorithms to determine the BEST network route to a destination address? A. IS-IS B. OSPF C. BGP D. RIP
D
Which of the following wiring distribution types, often found in company closets, is used to connect wiring from individual offices to the main LAN cabling? A. MDF B. 66 block C. IDF D. Patch panel
D
The Network Interface Layer of the TCP/IP model corresponds to which of the following layers of the OSI model? (Select TWO). A. Network B. Session C. Transport D. Physical E. Data link
DE
The network interface layer of the TCP/IP model corresponds with which of the following layers of the OSI model? (Select TWO). A. Transport layer B. Network layer C. Session layer D. Physical layer E. Presentation layer F. Data link layer
DF
Which of the following is a path vector routing protocol? A. RIP B. EIGRP C. ISIS D. OSPF E. BGP
E