Network+ N10-007 Practice Tests
What does this command do? Command: no shutdown A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface
A.) Administratively enables an interface
SPX (Sequence Packet Exchange) is a _____ protocol? A.) Connection-oriented B.) Connectionless
A.) Connection-oriented
What does this command do? Command: configure terminal A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain
A.) Enter configuration mode
Which of the answers listed below refers to a network protocol used for synchronizing clocks over a computer network? A.) NTP B.) VTP C.) NNTP D.) RTP
A.) NTP
What are the characteristic features of TFTP? (Select 2 answers) A.) Provides no security features B.) Typically used for exchanging files over the Internet C.) A very basic form of file sharing protocol D.) Provides authentication and encryption E.) Directory access protocol
A.) Provides no security features C.) A very basic form of file sharing protocol
A type of protocol used in network management systems for monitoring network-attached devices is called: A.) SMB B.) NTP C.) SNMP D.) RDP
A.) SMB
The SMTP protocol is used for: (Select 2 answers) A.) Sending email between mail servers B.) Name resolution C.) Serving of web pages D.) Retrieving email from mail servers E.) Sending email from a client device
A.) Sending email between mail servers E.) Sending email from a client device
You use a computer named Wkst1 on a TCP/IP network, which is installed with an application that uses UDP to send a file from your computer to a computer named Wkst2. Data collisions occur, and several data packets are lost during transmission. What will most likely occur as a result of losing the packets during transmission? (Choose two.) A.) The application will automatically retransmit the packets. B.) The application will drop the packets. C.) The protocol will automatically retransmit the packets. D.) The protocol will drop the packets.
A.) The application will automatically retransmit the packets. D.) The protocol will drop the packets.
Your company is deploying a VoIP system on its premises at three locations. The internal VoIP system must communicate with the existing PSTN network. Which device will be necessary to permit metwork-based calls to access the PSTN, and for PSTN-based calls to access the network? A.) VoIP-PSTN gateway B.) IP-ISDN adapter C.) IP-PBX adapter gateway D.) PBX system E.) Internet modem
A.) VoIP-PSTN gateway
Active hubs or multi port repeaters... _____
Amplify or regenerate signals to all other ports on the hub. Often used to extend the length of segments beyond their maximum specified lengths. Considered Physical layer devices (Layer 1) because they act on the data at the bit level.
What is a OTDR?
An Optical Time Domain Reflectometer which is a tool that analyzes the quality of a connection in a fiber optic cable.
What is an active/active cluster?
An active/active cluster is also known as a load-balancing cluster.
What does this command do? Command: ip address 67.83.45.3 255.255.255.240 A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface
B.) Applies an IP address to a layer 3 interface
IPX (Internetwork Packet Exchange) is a _____ protocol? A.) Connection-oriented B.) Connectionless
B.) Connectionless
What does this command do? Command: interface gig 0/0 A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain
B.) Enter interface configuration mode
Which of the answers listed below refers to a protocol used for managing VoIP and VTC services? A.) SMB B.) H.323 C.) SCP D.) IGP
B.) H.323
What is the name of a network protocol that secures web traffic via SSL/TLS encryption? A.) SFTP B.) HTTPS C.) FTPS D.) SNMP
B.) HTTPS
As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? A.) Session B.) Physical C.) Transport D.) Network
B.) Physical
A network protocol that allows for secure file transfer over Secure Shell (SSH) is called: A.) TFTP B.) SFTP C.) Telnet D.) FTPS
B.) SFTP
Information about previous connections is maintained in the _____. A.) connection table B.) state table C.) schema table D.) spooler table
B.) state table
Management has asked you to ensure that any traffic through the external firewall is allowed as long as it is the result of a previous connection. Which type of firewall performs this assessment when it first encounters traffic? A.) application-level proxy firewall B.) stateful firewall C.) circuit-level proxy firewall D.) packet-filtering firewall
B.) stateful firewall
What does the command do? Command: configure terminal A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface
C.) Allows configuration from the terminal
Which of these has helped reduce wiring, weight, and cost in industrial applications? A.) SAN B.) PAN C.) CAN D.) MAN
C.) CAN
Which type of VLAN assigns each communication port to a different VLAN? A.) Variable B.) Constant C.) Port based D.) Port switching
C.) Port based
Which of the following answers refers to a protocol used for managing real-time sessions that include voice, video, application sharing, or instant messaging services? A.) L2TP B.) BGP C.) RSTP D.) SIP
C.) RSTP
What does this command do? Command: switchport mode access A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain
C.) Specify the type of port
In PKI, what is the entity that signs a certificate? A.) a subject B.) a verifier C.) an issuer D.) a principal
C.) an issuer
What does CAN stand for?
Controller Area Network
Which of the following uses cells that are equally sized at 53 bytes each? A.) SIP trunk B.) PPPoE C.) DMVPN D.) ATM
D.) ATM
What does this command do? Command: switchport access vlan 100 A.) Enter configuration mode B.) Enter interface configuration mode C.) Specify the type of port D.) Assign port to a specific layer 2 broadcast domain
D.) Assign port to a specific layer 2 broadcast domain
What does the command do? Command: interface gig 1/0 A.) Administratively enables an interface B.) Applies an IP address to a layer 3 interface C.) Allows configuration from the terminal D.) Enters configuration mode for a specific interface
D.) Enters configuration mode for a specific interface
You have two Web servers, named WebSrv1 and WebSrv2. You need to configure the Web servers so that they share the Web request load equally. What should you do? A.) Implement traffic shaping B.) Implement Quality of Service (QoS) C.) Implement an active/passive cluster D.) Implement an active/active cluster
D.) Implement an active/active cluster
In your fiber network, some users are reporting connectivity issues, while others are not. You suspect a faulty or broken cable. Which tool would help you locate the fault? A.) Multimeter B.) Spectrum analyzer C.) Loopback adapter D.) OTDR
D.) OTDR
Secure Shell (SSH) protocol runs on: A.) TCP port 21 B.) UDP port 22 C.) TCP port 20 D.) TCP port 22
D.) TCP port 22
Which device or feature provides a bridge between the physical environment and the virtual environment? A.) Virtual router B.) Virtual firewall C.) Hypervisor D.) Virtual NIC
D.) Virtual NIC
What does a VoIP-PSTN gateway do?
Establish the routing of calls to the existing PSTN network. Such gateways connect to the PSTN network through T1/E1/J1, ISDN, or FXO interfaces.
What are the common network protocols and their associated ports?
FTP - 20, 21 SSH, SFTP - 22 TELNET - 23 SMTP - 25 DNS - 53 DHCP - 67, 68 TFTP - 69 HTTP - 80 POP3 - 110
What does the logical network diagram represent?
How the data will be logically transported through the network.
What does a physical network diagram include?
The actual network interfaces used & represents the physical locations of the network devices and how they are connected.
What do the wiring schematics include?
The flow of the network communication and symbols to indicate equipment function.