N10-006 Premium Bundle

N10-006 Premium Bundle

CompTIA Network+ Certification Exam

4.5 
(2085 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 21, 2024Last update

CompTIA N10-006 Free Practice Questions

Q1. Which of the following describes a smurf attack? 

A. Attack on a target using spoofed ICMP packets to flood it 

B. Intercepting traffic intended for a target and redirecting it to another 

C. Spoofed VLAN tags used to bypass authentication 

D. Forging tags to bypass QoS policies in order to steal bandwidth 

Answer:

Q2. A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks? 

A. Does the printer have toner? 

B. Are there any errors on the printer display? 

C. Is the user able to access any network resources? 

D. Is the printer powered up? 

Answer:

Q3. A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem? 

A. Distance limitation 

B. Electromagnetic interference 

C. Cross talk 

D. Speed and duplex mismatch 

Answer:

Q4. HOTSPOT 

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. 

Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. 

Instructions: When the simulation is complete, please select the Done button to submit. 

All Networks have the range form /0 to/32 

Answer:  

Explanation:

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for 

subnet and broadcast IP) 

HR network - /27 – This will provide for up to 30 usable IP’s (32-2) 

IT - /28 – This will provide for up to 14 usable IP’s (16-2) 

Finance - /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and 

broadcast IP’s and can’t be used for hosts. 

Marketing - /28 

If we add up how many IP blocks are used that is 64+32+16+64+16=192. 

A /24 contains 256 IP addresses, so 256-192=64. 

So the last unused box should be a /26, which equates to 64 addresses

Q5. A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet? 

A. /24 

B. /32 

C. /28 

D. /29 

E. /30 

Answer:

Q6. When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement? 

A. Port mirroring 

B. 802.1w 

C. LACP 

D. VTP 

Answer:

Q7. A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design? 

A. 802.11g 

B. 802.11ac 

C. 802.11b 

D. 802.11a 

Answer:

Q8. Network segmentation provides which of the following benefits? 

A. Security through isolation 

B. Link aggregation 

C. Packet flooding through all ports 

D. High availability through redundancy 

Answer:

Q9. Which of the following protocols uses label-switching routers and label-edge routers to forward traffic? 

A. BGP 

B. OSPF 

C. IS-IS 

D. MPLS 

Answer:

Q10. Which of the following WAN technologies is associated with high latency? 

A. T1 

B. Satellite 

C. Cable 

D. OCx 

Answer:

Q11. When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting? 

A. Transport layer 

B. Physical layer 

C. Network layer 

D. Session layer 

Answer:

Q12. A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? 

A. 10.0.0.1 

B. 127.0.0.1 

C. 172.16.1.1 

D. 192.168.1.1 

Answer:

Q13. An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches? 

A. The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings. 

B. The administrator should configure each vSAN participant to have its own VLAN. 

C. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL). 

D. The administrator should set the MTU to 9000 on the each of the participants in the vSAN. 

Answer:

Q14. Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments? 

A. CSMA/CD 

B. OSPF 

C. DOCSIS 

D. BGP 

Answer:

Q15. A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages? 

A. Network analyzer 

B. Packet analyzer 

C. Protocol analyzer 

D. Network sniffer 

Answer:

START N10-006 EXAM