N10-006 Premium Bundle

N10-006 Premium Bundle

CompTIA Network+ Certification Exam

4.5 
(17160 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA N10-006 Free Practice Questions

Q1. A network technician has detected a personal computer that has been physically connected to the corporate network. Which of the following commands would the network technician use to locate this unauthorized computer and determine the interface it is connected to? 

A. nbtstat –a 

B. show mac address-table 

C. show interface status 

D. show ip access-list 

E. nslookup hostname 

Answer:

Q2. CORRECT TEXT 

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. 

Step 1: Select the tool that was used to create the cable test results. 

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button. 

Answer:  

Solution is pending. Please suggest your solution for this simulation question to us. 

Q3. A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this? 

A. 802.1x 

B. 802.1p 

C. Single sign-on 

D. Kerberos 

Answer:

Q4. A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO). 

A. 20 

B. 21 

C. 22 

D. 23 

E. 67 

F. 68 

G. 69 

Answer: AB 

Q5. A technician has been given a list of requirements for a LAN in an older building using CAT6 cabling. Which of the following environmental conditions should be considered when deciding whether or not to use plenum-rated cables? 

A. Workstation models 

B. Window placement 

C. Floor composition 

D. Ceiling airflow condition 

Answer:

Q6. Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones? 

A. PAN 

B. LAN 

C. WLAN 

D. MAN 

Answer:

Q7. Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting? 

A. The VoIP phone would request a new phone number from the unified communications server. 

B. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. 

C. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls. 

D. The VoIP phone would request a different configuration from the unified communications server. 

Answer:

Q8. A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert: 1 * * * Request timed out. 

2 * * * Request timed out. 

3 * * * Request timed out. 

The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network? 

A. Enable split horizon to allow internal tracert commands to pass through the firewall 

B. Enable IGMP messages out and block IGMP messages into the network 

C. Configure the firewall to allow echo reply in and echo request out of the network 

D. Install a backdoor to access the router to allow tracert messages to pass through 

Answer:

Q9. A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted? 

A. HCL 

B. MSDS 

C. SLA 

D. HVAC 

Answer:

Q10. A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based? 

A. A cloud-based antivirus system with a heuristic and signature based engine 

B. A network based firewall which blocks all inbound communication 

C. A host-based firewall which allows all outbound communication 

D. A HIDS to inspect both inbound and outbound network communication 

Answer:

Q11. A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks? 

A. Does the printer have toner? 

B. Are there any errors on the printer display? 

C. Is the user able to access any network resources? 

D. Is the printer powered up? 

Answer:

Q12. A host has been assigned the address 169.254.0.1. This is an example of which of the following address types? 

A. APIPA 

B. MAC 

C. Static 

D. Public 

Answer:

Q13. A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem? 

A. Damaged cable 

B. Duplex mismatch 

C. Incorrect VLAN assignment 

D. Speed mismatch 

Answer:

Q14. A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices? 

A. WPA2 

B. IPv6 

C. SNMPv3 

D. RIPv2 

Answer:

Q15. An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing? 

A. Fire suppression 

B. Mantraps at the entry 

C. HVAC 

D. UPS and battery backups 

Answer:

START N10-006 EXAM