N10-006 Premium Bundle

N10-006 Premium Bundle

CompTIA Network+ Certification Exam

4.5 
(19575 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA N10-006 Free Practice Questions

Q1. HOTSPOT 

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. 

Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. 

Instructions: When the simulation is complete, please select the Done button to submit. 

All Networks have the range form /0 to/32 

Answer:  

Explanation:

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for 

subnet and broadcast IP) 

HR network - /27 – This will provide for up to 30 usable IP’s (32-2) 

IT - /28 – This will provide for up to 14 usable IP’s (16-2) 

Finance - /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and 

broadcast IP’s and can’t be used for hosts. 

Marketing - /28 

If we add up how many IP blocks are used that is 64+32+16+64+16=192. 

A /24 contains 256 IP addresses, so 256-192=64. 

So the last unused box should be a /26, which equates to 64 addresses

Q2. Which of the following is an example of an IPv4 address? 

A. 192:168:1:55 

B. 192.168.1.254 

C. 00:AB:FA:B1:07:34 

D. ::1 

Answer:

Q3. Which of the following requires the network administrator to schedule a maintenance window? 

A. When a company-wide email notification must be sent. 

B. A minor release upgrade of a production router. 

C. When the network administrator's laptop must be rebooted. 

D. A major release upgrade of a core switch in a test lab. 

Answer:

Q4. An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable? 

A. RS-232 

B. 802.3 

C. ATM 

D. Token ring 

Answer:

Q5. Which of the following refers to a network that spans several buildings that are within walking distance of each other? 

A. CAN 

B. WAN 

C. PAN 

D. MAN 

Answer:

Q6. A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? 

A. Star 

B. Ring 

C. Mesh 

D. Bus 

Answer:

Q7. A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks? 

A. Host-based intrusion detection systems 

B. Acceptable use policies 

C. Incident response team 

D. Patch management 

Answer:

Q8. Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? 

A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. 

B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. 

C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies. 

D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks. 

Answer:

Q9. A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need? 

A. 802.11ac with 2 spatial streams and an 80MHz bandwidth 

B. 802.11ac with 3 spatial streams and a 20MHz bandwidth 

C. 802.11ac with 3 spatial streams and a 40MHz bandwidth 

D. 802.11ac with 4 spatial streams and a 160MHz bandwidth 

Answer:

Q10. A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison? 

A. Regression test 

B. Speed test 

C. Baseline 

D. Statement of work 

Answer:

Q11. A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address? 

A. Configure NAT on the firewall 

B. Implement a split horizon DNS 

C. Place the server in the DMZ 

D. Adjust the proper internal ACL 

Answer:

Q12. A firewall ACL is configured as follows: 

10. Deny Any Trust to Any DMZ eq to TCP port 22 

11. Allow 10.200.0.0/16 to Any DMZ eq to Any 

12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443 

13. Deny Any Trust to Any DMZ eq to Any 

A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives? 

A. 11, 10, 12, 13 

B. 12, 10, 11, 13 

C. 13, 10, 12, 11 

D. 13, 12, 11, 10 

Answer:

Q13. In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO). 

A. Rack monitoring 

B. Device placement 

C. Wall plate labeling 

D. Room numbering 

E. Patch panel labeling 

Answer: CE 

Q14. The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service? 

A. Layer 3 switch 

B. Proxy server 

C. Layer 2 switch 

D. Smart hub 

Answer:

Q15. Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO). 

A. Redundancy 

B. Implementing acceptable use policy 

C. Offsite backups 

D. Uninterruptable power supplies 

E. Vulnerability scanning 

Answer: AC 

START N10-006 EXAM