N10-004 - CompTIA Network+ Certification Exam (2009)

Go back to CompTIA

Example Questions

Which of the following protocols should be used to monitor network performance? When installing two 802.11g access points in the same building, which of the following channels will MOST likely be used to minimize interference? Which of the following layers of the OSI model maps to the Network Interface layer of the TCP stack? (Select TWO). A technician wants to separate networks on a switch. Which of the following should be configured to allow this? Which of the following protocols is the LEAST secure and should be avoided on a wireless network? A user is able to connect to a distant wireless network then loses connection. This is an ongoing problem for the user and the only wireless network around. Which of the following is MOST likely causing this problem? Which of the following wireless standards has the highest maximum data rate? Which of the following commands is used to display other computers running on the network? Interior gateway protocols are used for resolving routes: A technician would like to separate the HR department's workstations from the other workstations at the company. Which of the following network topologies should be used? At which of the following does the telephone company's responsibility cease? Which of the following software security devices can be implemented on individual servers in order to solely identify abnormal behavior? A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server? Which of the following wireless technologies can operate at only 5GHz? The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information: #show run interface GigabitEthernet0/10 Switchport trunk encapsulation dot1q Switchport mode trunk Switchport trunk native VLAN 10 Which of the following is the MOST likely cause of the slow connections? Which of the following is equipment provided by the telephone company that provides remote diagnostic and loopback services for subscriber lines? Which of the following logical network topologies is used to provide a secure connection across the Internet? Which of the following is a correct IP ACL? (Select TWO). Which of the following would a network engineer use to ensure a statically addressed device would receive the same IP address, if it reverted to dynamic addressing? Which of the following features is essential in a firewall if it is to support RTP sessions? An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using? Which of the following can be used to record and save VoIP conversations? Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario? Measuring and recording network performance during normal operations to compare later changes is called: A user took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. The user can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? Which of the following would be used to optimize network performance and increase bandwidth availability? When verifying a new wireless installation the administrator is unable to see a wireless signal with any wireless laptop. The MOST likely problem is: In which of the following wireless standards is MIMO used? Which of the following connectivity issues is likely to occur within a token ring network? A user receives an email stating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring? A customer wants to network several computers within a large warehouse. The warehouse has one computer at the very far end of the warehouse that is 170 meters (557 feet) from the network switch. Which of the following cable types should a technician use for this computer? Which of the following standards is implemented in 802.1af? An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed? A crossover cable is MOST commonly associated with which of the following layers of the OSI model? Which of the following network scanners detects and sends out alerts for malicious network activity? Which of the following wireless standards was the FIRST standard to be ratified and is used to support legacy wireless devices? A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information? A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address (APIPA) will assign which of the following addresses? Two business partners have recently been connected via a dedicated extranet. It has been discovered that each of the companies are using the same private IP address space. Which of the following will help to resolve potential routing issues? A user reports being occasionally disconnected from the server. Which of the following tools could the technician use to determine if it is the client or the server that is dropping the connection? An administrator has been tasked with running cables from one office to another neighboring office by running cables over the light fixtures in the ceiling that connects them. To prevent interference, which of the following cable types should the administrator use? Which of the following methods can move files in clear text and can be easily intercepted? Which of the following is an example of a MAC address? An administrator is configuring IP on a legacy device that will only accept a classful address. Which of the following is the address that can be used in this scenario? A managed switch offers which of the following benefits over an unmanaged switch? (Select TWO). An administrator is using a punch-down tool to connect a cable. To which of the following is the administrator MOST likely connecting? A user accidentally unplugs a cable from the patch panel and plugs it into the switch stack. Now, all users are unable to access any network resources. Which of the following is the MOST likely cause? Which of the following components is typically used for voice transmissions and has a 10Mbps maximum transfer speed? If the goal is to minimize the amount of time it takes for other routers in the network to learn about a routing change, the network administrator should choose a routing protocol that has the shortest: A company has decided to increase wireless infrastructure security by moving from WEP encryption to WPA2. Technicians change each WAP to the new encryption standard and users are given the new passwords. Many users are able to reconnect using the new authentication, but several users report an inability to reconnect. Which of the following is the MOST likely cause of the problem?

Study Guides