N10-006 Premium Bundle

N10-006 Premium Bundle

CompTIA Network+ Certification Exam

4.5 
(5625 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA N10-006 Free Practice Questions

Q1. A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following? 

A. Star 

B. Ring 

C. Mesh 

D. Bus 

Answer:

Q2. Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following? 

A. SOP 

B. BEP 

C. AUP 

D. SLA 

Answer:

Q3. The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain? 

A. Vendor documentation 

B. Recent backups 

C. Physical IP address 

D. Physical network diagram 

Answer:

Q4. A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem? 

A. Distance limitation 

B. Electromagnetic interference 

C. Cross talk 

D. Speed and duplex mismatch 

Answer:

Q5. Which of the following refers to a network that spans several buildings that are within walking distance of each other? 

A. CAN 

B. WAN 

C. PAN 

D. MAN 

Answer:

Q6. A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition. 

myClient$ wificard --getinfo 

agrCtlRSSI: -72 

agrExtRSSI: 0 

state: running 

op mode: station 

lastTxRate: 178 

MaxRate: 300 

802.11 auth: open 

link auth: wpa2-psk 

BSSID: 0F:33:AE:F1:02:0A 

SSID: CafeWireless 

Channel: 149,1 

Given this output, which of the following has the technician learned about the wireless network? (Select TWO). 

A. The WAP is using RC4 encryption 

B. The WAP is using 802.11a 

C. The WAP is using AES encryption 

D. The WAP is using the 2.4GHz channel 

E. The WAP is using the 5GHz channel 

F. The WAP is using 802.11g 

Answer: CE 

Q7. Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line? 

A. Multilayer switch 

B. Access point 

C. Analog modem 

D. DOCSIS modem 

Answer:

Q8. A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility: 

Network DestinationNetmask Gateway Interface 

192.168.1.0  255.255.255.0 192.168.1.254 eth0 

192.168.1.10255.255.255.255 192.168.1.10 eth0 

127.0.0.1255.0.0.0 On-Link lo 

127.0.0.0255.0.0.0 On-Link lo 

255.255.255.255255.255.255.255 102.168.1.10 eth0 

Which of the following is the reason for the computer issue, given the above output? 

A. Wrong default gateway netmask 

B. Incorrect default gateway address 

C. Default gateway on the wrong interface 

D. Missing default gateway 

Answer:

Q9. Which of the following describes an IPv6 address of ::1? 

A. Broadcast 

B. Loopback 

C. Classless 

D. Multicast 

Answer:

Q10. A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform? 

A. Disable the network based firewall 

B. Implicit deny all traffic on network 

C. Configure a VLAN on Layer 2 switch 

D. Add the system to the DMZ 

Answer:

Q11. Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform? 

A. Erase the files created by the virus 

B. Stop and escalate to the proper authorities 

C. Check the remaining directories for more .mp4 files 

D. Copy the information to a network drive to preserve the evidence 

Answer:

Q12. HOTSPOT 

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. 

Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. 

Instructions: When the simulation is complete, please select the Done button to submit. 

All Networks have the range form /0 to/32 

Answer:  

Explanation:

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for 

subnet and broadcast IP) 

HR network - /27 – This will provide for up to 30 usable IP’s (32-2) 

IT - /28 – This will provide for up to 14 usable IP’s (16-2) 

Finance - /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and 

broadcast IP’s and can’t be used for hosts. 

Marketing - /28 

If we add up how many IP blocks are used that is 64+32+16+64+16=192. 

A /24 contains 256 IP addresses, so 256-192=64. 

So the last unused box should be a /26, which equates to 64 addresses

Q13. A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? 

A. 10.0.0.1 

B. 127.0.0.1 

C. 172.16.1.1 

D. 192.168.1.1 

Answer:

Q14. A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages? 

A. Network analyzer 

B. Packet analyzer 

C. Protocol analyzer 

D. Network sniffer 

Answer:

Q15. Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window? 

A. Configuration procedures 

B. Stakeholder notification 

C. Impact analysis 

D. Rollback procedure 

Answer:

START N10-006 EXAM