You are on page 1of 17

CompTIA N10-004

N10-004 Network+ (2009) Demo


Practice Test
Version:
CompTIA N10-004: Practice Exam
QUESTION NO: 1

Which of the following LAN connection technologies has a full duplex speed of 200Mbps and uses
a CAT5e cable?

A. 1000Base-X
B. 100Base-FX
C. 1000Base-TX
D. 100Base-T

Answer: D

Explanation:
Full duplexing are capable of transmitting and receiving simultaneously. This means that a 100
Mbps network card can transmit at a speed of 200 Mbps, if you are using full-duplex mode.

m
QUESTION NO: 2 .co
A technician must enable which of the following services to prevent broadcast storms?

A. DHCP
ng

B. Port mirroring
C. Spanning tree
D. Bonding
Ki

Answer: C
st-

Explanation:
In order to stop broadcast storms you need to enable spanning tree. The spanning-tree algorithm
Te

places every bridge or switch port into either a forwarding state or a blocking state. It ensures that
only one path is active between two network stations. It also permits redundant paths that are
automatically activated when the active path experiences problems.

References:
Wendell Odom, CCNA INTRO Exam Certification Guide , Cisco Press, Indianapolis , IN, 2004, pp.
249

QUESTION NO: 3

One end of a CAT5 cable is punched down following the 568B standard. The other end shouldbe
terminated using which standard to make a straight-through cable?

"Welcome to Certification's Main Event" - www.test-king.com 2


CompTIA N10-004: Practice Exam
A. 568B
B. RJ-45
C. 568A
D. RJ-11

Answer: A

Explanation:
The 568B standard will make a straight-through cable and the 568A standard will make a straight-
through cable. The RJ-11 and 45 uses a connector with UTP.

Reference:
David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp. 22.

m
QUESTION NO: 4 .co
Which of the following IPv4 address pairs would be able to share files on a network using a hub?

A. 10.192.2.220/16 and 10.254.2.222/16


B. 10.254.2.220/16 and 10.254.2.222/24
ng

C. 10.192.2.220/16 and 10.254.2.222/16


D. 10.254.2.220/16 and 10.254.2.222/16
Ki

Answer: D
st-

Explanation:
References:
Te

David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp 125-127

QUESTION NO: 5

Which of the following networks has the LEAST likelihood of collisions?

A. Ring
B. Mesh
C. Star
D. Bus

Answer: A

"Welcome to Certification's Main Event" - www.test-king.com 3


CompTIA N10-004: Practice Exam
Explanation:
The bus topology has the least collisions. With this topology, each computer is connected to two
other computers. Furthermore, the data moves a one way path.

Reference:
David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp. 13.

QUESTION NO: 6

A technician is configuring a router for a SOHO network. The technician has changed the IP
address scheme on the router and disabled DHCP service before the wireless was configured.
After the router updates the information, the PC can no longer connect to the router. Which of the
following would be the BEST solution to reestablish the connection while maintaining the routers
current configuration state?

m
A. Restart the PC so it obtains a new IP address from the router.
.co
B. Restart the router so that the PC obtains a new IP address.
C. Assign a static IP address on the PC that matches the router.
D. Use APIPA to connect the PC to the router.
ng

Answer: C
Ki

Explanation:
Your best option in this scenario would be to have a static IP address assigned on the workstation
st-

that matches the router. When planning to set up a web server, a VPN gateway, a mail server or
any other workstation that has to be accessible via the Internet your best option would be to make
Te

use of static IP addressing.

References:
Ed Bott, Carl Siechert, and Craig Stinson, Windows Vista Inside Out , MS Press, Richmond, WA,
2007, pp. 487

QUESTION NO: 7

Which of the following is the number of bits used for IPv6?

A. 128
B. 32
C. 64
D. 256

"Welcome to Certification's Main Event" - www.test-king.com 4


CompTIA N10-004: Practice Exam
Answer: A

Explanation:
In the scenario you should remember that the IPv6 standard makes use of a 128-bit addressing
scheme, it has more than 79 octillion which is 79,000,000,000,000,000,000,000,000,000 to all.

References:
David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp 128-129

QUESTION NO: 8

Which of the following network components would be used to create VLANs?

A. Routers
B. Gateways

m
C. Switches
.co
D. Bridges

Answer: C
ng

Explanation:
A switch filters and forwards traffic that is based on certain criteria. A bridge and a router is both
Ki

an example of a switch. A switch is able to manage multiple, simultaneous pairs of connections


between communicating systems. Switches can in many cases be used as a network concentrator
st-

that will split flat network segments into dedicated communication links. Switches are able to split
collision domains but can also provide a greater aggregate bandwidth between groups of
communicating devices. Switches can also improve the overall performance.
Te

Incorrect Answers:
A: A Router is a network device that can interconnect two or more network
segments.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition),
Sybex, Alameda CA, 2005, pp 32-33
B: A gateway is able to operate on all levels of the OSI model. It will interface between different
types of networks or protocols. It also executes conversions between the numbers of protocols at
the application layer.
D: A bridge will connect two networks. It will also pass traffic between them base only on the node
address. You can thus say that the main function of a bridge is to keep the traffic separated on
both sides of the bridge. Bridges operate on the Data Link Layer of the OSI model.

QUESTION NO: 9

"Welcome to Certification's Main Event" - www.test-king.com 5


CompTIA N10-004: Practice Exam
Which of the following protocols is the MOST susceptible to a packet sniffer?

A. SFTP
B. SSH
C. HTTPS
D. SNMPv2

Answer: D

Explanation:
SNMP is a network management protocol that collects information about network devices, such as
hubs, routers, and bridges and permits communications via network devices and a management
console. SNMP is upgraded to SNMPv2 to provide improved remote monitoring and security.
Incorrect Answers:
A: SFTP makes use of SSH technology. SFTP does not rely on FTP daemons. You make use of
SFTP to create a safe tunnel for file transfers whereas SCP permits the transfer of files in the
same manner as FTP.

m
B: SSH is a tunneling protocol. Secure Shell is like telnet in the sense that an administrator may
enter commands into a remote server, except that it uses an encrypted and authenticated
.co
connection [(RSA) cryptography for connection and authentication; and IDEA, Blowfish, or DES for
data stream encryption.] instead of Telnet's cleartext.
ng

C: Hypertext Transport Protocol Secure (HTTPS) is a more secure version of HTTP which is the
language of the World Wide Web. HTTPS is used to create a secure channel. This protocol makes
use of port 443 by default.References:Michael Pastore and Emmett Dulaney, Security+ Study
Ki

Guide (2nd Edition), Sybex, Alameda CA, 2004, pp. 120-131


st-

QUESTION NO: 10
Te

Which of the following WAN technologies uses fiber as a transmission medium?

A. T1
B. ADSL
C. E1
D. SONET

Answer: D

Explanation:
The SONET uses fiber as a transmission medium. The SONET transport a wide range of digital
telecommunication services over optical fiber.

Reference:
A. Anthony Bruno, Jacqueline Kim, CCDA Exam Certification Guide (2nd Edition), Cisco Press,

"Welcome to Certification's Main Event" - www.test-king.com 6


CompTIA N10-004: Practice Exam
Indianapolis , IN , 2004, pp. 639.

QUESTION NO: 11

Which of the following would be a correct statement about VLANs?

A. VLANs help isolate network traffic.


B. VLAN broadcasts are limited to the switch.
C. VLANs create physical segments.
D. VLANs help prevent overlapping.

Answer: A

Explanation:
VLAN's assists you in isolating network traffic. It is software technology that permits for the
grouping of network nodes that is connected to one or more network switches into a single logical

m
network. By permitting logical aggregation of devices into virtual network segments, VLAN's offer
simplified user management and network resource access controls for switched network .
.co
References:
Michael Pastore and Emmett Dulaney, Security+ Study Guide (2nd Edition), Sybex, Alameda CA
ng

, 2004, pp. 29
Ki

QUESTION NO: 12
st-

When configuring a wireless access point, which of the following principles should be used to
select a channel to operate on?
Te

A. Select the same channel as that configured on the neighboring access points.
B. Select the channel closest to that configured on neighboring access points.
C. Select the channel with the frequency range least used in the given area.
D. Select the channel farthest from that configured on neighboring access points.

Answer: C

QUESTION NO: 13

Which of the following protocols enables administrators to control network devices like routers and
switches?

A. NAT

"Welcome to Certification's Main Event" - www.test-king.com 7


CompTIA N10-004: Practice Exam
B. SNMP
C. DNS
D. NFS

Answer: B
Incorrect Answers:
A: You should not consider making use of NAT because NAT translates addresses that are legal
for an inside network but illegal for a corresponding outside network into addresses that are legal
for the outside network.
C: You should not consider making use of DNS because you use DNS to translate host names
and domain names to IP addresses and vice versa, using a standardized lookup table that the
network administrator defines and configures.
D: You should not consider making use of NFS because the Network File System (NFS)
Application layer protocol was originally designed to allow shared file systems on UNIX servers to
appear as local file systems on UNIX clients.References:David Groth and Toby Skandier,
Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 117, 138, 139, 470

m
.co
QUESTION NO: 14

Which of the following is used to test the operation of a NIC?


ng

A. Loopback
B. 568B
Ki

C. Rollover
D. Crossover
st-

Answer: A
Te

Explanation:
The Loopback is use to test the transmission and reception capabilities of the NIC.

Reference:
David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp. 437.

QUESTION NO: 15

Which of the following protocols are used for tunneling and encryption purposes?(Select TWO).

A. L2TP
B. PAP

"Welcome to Certification's Main Event" - www.test-king.com 8


CompTIA N10-004: Practice Exam
C. SLIP
D. PPPoE
E. IPSec

Answer: A,E

Explanation:
Your best option in this scenario would be to use identify IPSec and L2TP. IPSec is a tunneling
protocol that can be used between LANs. It is not secure. You should thus make use of IPSec with
this protocol to provide data security. L2TP is a tunneling protocol that will add functionality to
PPP. L2TP was created by Cisco and Microsoft. It is often used with virtual private networks.
Incorrect Answers:
B: Of all the authentication schemes in use today, the Password Authentication Protocol (PAP) is
arguably the simplest. In PAP, pairs of usernames and passwords are used. When a client wants
to authentication to a server, for example, the client will send the username and password to the
server over the network. The username and password are sent in clear text, that is to say,

m
unencrypted. The server receives the username and password and compares them to an
encrypted, locally stored table of username-password pairs. If the username and password are a
.co
match, the client is authenticated.
C: SLIP is an old protocol that was used in the early remote access environment. The main
function of SLIP was to connect UNIX systems together in a dial-up environment.
ng

D: PPPoE is used for broadband Internet connections.References:Michael Pastore and Emmett


Dulaney, Security+ Study Guide (2nd Edition), Sybex, Alameda CA, 2004, pp. 15, 119-120Guy
Hart-Davis, Mastering Microsoft Windows Vista Home Premium and Basic, Wiley Publishing,
Ki

Indianapolis, IN, 2007, pp 813


st-

QUESTION NO: 16
Te

Which of the following TCP connect scanners is always set for normal data flow once a connection
is established?

A. TCP
B. ACK
C. SYN
D. RSH

Answer: B

QUESTION NO: 17

A company has a wired bus topology and a client accidentally unplugs the network cabling to their
computer. Which of the following is true about the company's network?

"Welcome to Certification's Main Event" - www.test-king.com 9


CompTIA N10-004: Practice Exam
A. It will function properly once all affected PCs are rebooted and authenticateto the network.
B. It will function with no downtime.
C. It will function with minimal downtime.
D. It will not function properly until the wires are reconnected.

Answer: D

Explanation:
In a wired bus topology the computers are connected to a single cable. If one of the cables is
unplugged, the entire network will be down.

Reference:
David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp. 10-11.

m
QUESTION NO: 18 .co
Which of the following protocols is used to encrypt packets over the Internet? (Select TWO).

A. SIP
B. HTTPS
ng

C. SMTP
D. SMNP
Ki

E. SSH
st-

Answer: B,E

Explanation:
Te

In the scenario you should consider making use of HTTPS because HTTPS allows browsers and
servers to sign, authenticate, and encrypt an HTTP message. You additionally can also make use
of SSH because the Secure Shell (SSH) protocol is used to establish a secure Telnet session over
a standard TCP/ IP connection. You should keep in mind that SSH is also used to run programs
on remote systems, log in to other systems, and move files from one system to another whilst
maintaining a strong, encrypted connection.
Incorrect Answers:
A: You should not consider making use of SIP because all of the UM magic depends on SIP
communications between a PBX and the Exchange UM server. You should keep in mind when a
call comes in to the PBX that the recipient does not answer after a defined interval, the PBX
attempts to handle the call by routing it somewhere.
C: You should not consider making use of the SMTP protocol because the protocol is used to
allow for a simple e-mail service responsible for forwarding and receiving messages. SMTP
servers typically make use of the POP or IMAP protocol.
D: You should not consider making use of the Simple Network Management Protocol (SNMP)

"Welcome to Certification's Main Event" - www.test-king.com 10


CompTIA N10-004: Practice Exam
protocol because the protocol is used to allow network administrators to collect information about
the network. The protocol can additionally be used for collecting information about devices on the
network which includes hubs, routers, and bridges.References:Tony Redmond, Microsoft
Exchange Server 2007, Digital Press, Amsterdam, 2007, pp 749David Groth and Toby Skandier,
Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 115-117

QUESTION NO: 19

A user is able to access the network shares and their email, but is unable to connect to any
website.
Which of the following command line tools should a technician use on that users workstation to
begin troubleshooting?

A. Traceroute to any website to see where the disconnection is occurring.


B. Perform theipconfig command to verify settings on that workstation are correct.

m
C. Use the route add command to add static routes to see if the routes are an issue.
D. Use the ping command to see if the workstation can access the DHCP server.
.co
Answer: A

Explanation:
ng

Your best option would be to make use of the traceroute command. The traceroute command lists
the IP path that it takes to reach the targeted IP and how long it takes to reach every jump. It is
Ki

particularly useful when establishing where certain bottlenecks are at a particular router.
Incorrect Answers:
st-

B: The ipconfig command displays the current network configuration of the server and allows
changed to be made.
Te

C: You make use of the route command in order to set the route to a particular address. The route
add command is used to add static routes. This thus allows you to manually update the routing
table of the router.
D: Ping is used to test connectivity between two hosts.

QUESTION NO: 20

Users at a branch office have informed a technician that access to static web content is slow from
their location. It is determined that most users are visiting the same site repeatedly throughout the
day. Which of the following would improve WAN utilization?

A. A caching proxy server at the branch


B. A traffic shaper
C. A load balancer at the datacenter hosting the web servers

"Welcome to Certification's Main Event" - www.test-king.com 11


CompTIA N10-004: Practice Exam
D. An application level firewall

Answer: A

Explanation:
Your best option in this scenario would be to make use of a proxy server to enhance the WAN
usage at the branch office. Internet traffic will be reduced when you cache the proxy server.

References:
David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA , 2005,
pp. 136

QUESTION NO: 21

A technician is asked to verify available phone numbers at a telecommunication block. Which of


the following tools is required to verify the available numbers?

A. Multimeter
m
.co
B. Butt set
C. Punch down tool
D. Toner probe
ng

Answer: B
Ki

Incorrect Answers:
A: A multimeter is a device that is used to measure voltages and resistances in electronic
st-

components.
C: A punchdown tool is used to insert the wire in the IDC.References:David Groth and Toby
Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 270-272
Te

D: The tone generator is a small electronic device used to test network cables for breakages as
well as other problems by sending an electronic signal down one segment of UTP wires.

QUESTION NO: 22

When connecting two switches together, which of the following protocols would be used to trunk
multiple VLAN traffic across the same physical link?

A. Porttrunking
B. 802.1q
C. Port mirroring
D. 802.1x

Answer: B

"Welcome to Certification's Main Event" - www.test-king.com 12


CompTIA N10-004: Practice Exam

QUESTION NO: 23

Which of the following cables is used to connect multiple layer 2 switches?

A. Loopback
B. Crossover
C. Serial
D. Rollover

Answer: B

Explanation:
Your best option in this scenario would be to make use of a crossover cable. Crossover cables
allows for the direct connection of two devices without necessarily being part of a network. A
crossover cable is able to connect two switches or hubs together.

m
Incorrect Answers:
A: A loopback cable is a special connection for Ethernet 10Base-T NIC's. It can be attached to the
.co
network interface of the NIC and connects its outputs to its inputs in order to test the transmission
as well as reception capabilities of the NIC.
C: This is one of the oldest media used in networks. This type of cable is used in network wiring. It
ng

supports baseband as well as broadband signaling.


D: A rollover cable is a transmission medium that contains pairs of color coded insulated copper
Ki

wires that are twisted around each other. You get shielded twisted pair as well as an unshielded
twisted pair. This is the cheapest type of cabling as well as being easy to work
st-

with.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex,
Alameda CA, 2005, pp 20, 436-438
Te

QUESTION NO: 24

An active/passive server cluster in which only one server is active and handling requests, is an
example of which of the following network performance optimization?

A. Traffic shaping
B. QoS
C. High availability
D. Load balancing

Answer: C

Explanation:
The scenario sketched above is an example of High availability performance optimization. High
Availability refers to the capability of a server system to endure a software or hardware disaster
"Welcome to Certification's Main Event" - www.test-king.com 13
CompTIA N10-004: Practice Exam
and still being able to function. You need to incorporate some system duplication in order to
remove any single point of failure. Server clusters are equipped with high availability resolve for
systems that may require read and write admittance to data.
Incorrect Answers:
A: Traffic shaping delays the excess packets by holding them in buffers and releasing it at
preconfigured rates.
Anthony Bruno, Jacqueline Kim,CCDA Exam Certification Guide (2nd Edition), Cisco Press,
Indianapolis, IN, 2004, pp. 63, 149Michael Pastore and Emmett Dulaney, Security+ Study Guide
(2nd Edition), Sybex, Alameda CA, 2004, pp. 359
D: Network Load Balancing is used to provide horizontal scalability and high availability at the
TCP/IP level. Horizontal scalability is achieved by servers sharing the load between them

QUESTION NO: 25

A company needs the ability to run a network that can handle 30Mbps datatransfer speeds but

m
also needs to keep the cost of installing the network down. Which of the following cable types
would BEST meet the company's needs?
.co
A. CAT6
B. CAT3
ng

C. CAT5e
D. CAT1
Ki

Answer: C
st-

Explanation:
The best cable type to use is the Category 5e because it has a maximum speed of 100 Mbps.
Te

Incorrect Answers:
A: You should not use CAT1, because it is used for voice data only.
B: You should not use CAT3. It will only transmit 10Mbps of data.

QUESTION NO: 26

Which of the following data is included in a wireless access points beacon frame?

A. SSID and MAC address


B. IP and MAC address
C. SSID and WEP key
D. Channel and WEP key

Answer: A

"Welcome to Certification's Main Event" - www.test-king.com 14


CompTIA N10-004: Practice Exam

QUESTION NO: 27

Which of the following devices has a primary purpose of proactively detecting and reacting to
security threats?

A. SSL
B. IDS
C. IPS
D. VPN

Answer: C
Incorrect Answers:
A: SSL is a protocol that will secure messages by operating between the Application layer HTTP
and the Transport layer. The SSL protocol makes use of an encryption scheme between two
systems. SSL makes use of the handshake method in order to establish a session.

m
B: You make use of IDS to protect and report network abnormalities. IDS works with audit files and
.co
rule based processing in order to determine how to act in the event of an unusual situation on the
network.
D: A Virtual Private Network (VPN) makes use of the public Internet as a backbone for a private
ng

interconnection between locations. This technology supports reasonably secure, logical, private
network links and insecure public network infrastructure. It reduces the Public Switched Telephone
Network (PSTN) costs. VPNs are more secure that the traditional remote access as it can be
Ki

encrypted.References:Michael Pastore and Emmett Dulaney, Security+ Study Guide (2nd


Edition), Sybex, Alameda CA, 2004, pp. 112-115, 328
st-
Te

QUESTION NO: 28

Which of the following is the default port for telnet?

A. 21
B. 23
C. 20
D. 22

Answer: B

Explanation:
In the scenario you should remember that the Telnet protocol made use of port 23 and was
replaced by the SSH protocol as well as rsh and the rlogin utility.
Incorrect Answers:

"Welcome to Certification's Main Event" - www.test-king.com 15


CompTIA N10-004: Practice Exam
A: Port 21 is used by the FTP control protocol for communications.
C: Port 20 is used by the FTP protocol for data communications.
D: Port 22 is used by the SSH protocol for communications.References:David Groth and Toby
Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp 121-123

QUESTION NO: 29

A technician is resolving an issue where a computer is unable to connect to the Internet using a
wireless access point. The computer is able to transfer files locally to other machines, but cannot
successfully reach the Internet. When the technician examines the IP address and default
gateway they are both on the 192.168.1.0/24. Which of the following has occurred?

A. The computers gateway is not routing to a public IP address.


B. The computer is using an invalid IP address.
C. The computer and the gateway are not on the same network.

m
D. The computer is not using a private IP address. .co
Answer: A
ng

QUESTION NO: 30

In an office visitors need to be connected to the Internet without attaching to the company server.
Ki

Employees also need to connect to the company server and to the Internet. All the connections
are managed by the same switch. Which of the following should be used to meet these
st-

requirements?

A. RIP
Te

B. OSPF
C. Port trunking
D. VLAN

Answer: D

Explanation:
Your best option in this scenario would be to make use of a VLAN. VLAN's assists you in isolating
network traffic. It is software technology that permits for the grouping of network nodes that is
connected to one or more network switches into a single logical network. By permitting logical
aggregation of devices into virtual network segments, VLAN's offer simplified user management
and network resource access controls for switched network.
Incorrect Answers:
A: RIP is a protocol which is part of the TCP/IP protocol suite. Routers using RIP broadcast the
status as well as routing data of known routers. You can also make use of RIP to locate routes

"Welcome to Certification's Main Event" - www.test-king.com 16


CompTIA N10-004: Practice Exam
between the systems using the least amount of hops or connections.
Anthony Bruno, Jacqueline Kim,CCDA Exam Certification Guide (2nd Edition), Cisco Press,
Indianapolis, IN, 2004, pp. 425Michael Pastore and Emmett Dulaney, Security+ Study Guide (2nd
Edition), Sybex, Alameda CA, 2004, pp. 29, 60
B: OSPF is one of the popular link-state IP routing protocols. Link-state protocols advertise a large
amount of topological information about the network, and the routers perform some CPU-intensive
computation on the topological data.References:Wendell Odom, CCNA INTRO Exam Certification
Guide, Cisco Press, Indianapolis, IN, 2004, pp. 417
C: Trunking is a method to support multiple VLAN's that have members on more than one switch.

m
.co
ng
Ki
st-
Te

"Welcome to Certification's Main Event" - www.test-king.com 17

You might also like