CompTIA Network+ Certification Exam

 

QUESTION 1

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

 

A.

OSPF

B.

VTP trunking

C.

Virtual PBX

D.

RADIUS

E.

802.1x

 

Correct Answer: DE

Explanation:

D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user accounts and passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISP’s to authenticate their customer’s Internet connections.

Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network.

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device,such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server is the RADIUS server.

 

 

QUESTION 2

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

 

A.

Load balancer

B.

FTP server

C.

Firewall DMZ

D.

Mail server

 

Correct Answer: D

Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsiblefor accepting email for the recipient’s domain.

For example a user sends an email to recipient@somedomain.com. The sending user’s email server will query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the hostnameof the email server responsible for accepting email for the somedomain.com domain, for example, mailserver.somedomain.com. The sending email server will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address. The sending mailserver will then forward the email to the destination mail server.

 

 

QUESTION 3

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).

 

A.

1000Base-LR

B.

1000Base-SR

C.

1000Base-T

D.

10GBase-LR

E.

10GBase-SR

F.

10GBase-T

 

Correct Answer: BE

Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiberwith a distance capability between 220 meters and 550 meters.

10Gbase-SRis a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short wavelength signaling.

 

 

QUESTION 4

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?

 

A.

RS-232

B.

802.3

C.

ATM

D.

Tokenring

 

Correct Answer: A

Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the functions of the 9 pins in a DB-9 connector. The RS-232 standard was around long before computers. It’s rare to see a new computer nowadays with a serial port but they were commonly used for connecting external analog modems, keyboards and mice to computers.

 

 

QUESTION 5

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

 

A.

Multilayer switch

B.

Access point

C.

Analog modem

D.

DOCSIS modem

 

Correct Answer: C

Explanation:

Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps.

An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.

An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.

 

 

 

 

QUESTION 6

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

 

A.

Add a router and enable OSPF.

B.

Add a layer 3 switch and create a VLAN.

C.

Add a bridge between two switches.

D.

Add a firewall and implement proper ACL.

 

Correct Answer: B

Explanation:

We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs.

A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.

Toallow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a `Layer 3′ switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

 

 

QUESTION 7

A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following?

 

A.

Public SaaS

B.

Private SaaS

C.

Hybrid IaaS

D.

Community IaaS

 

Correct Answer: B

Explanation:

SaaS stands for Software as a Service. This is a cloud model whereby a service provider provides asoftware service and makes the service available to customers over the Internet.

Examples of Saas include Microsoft Office 365, Microsoft Exchange Online, Microsoft Lync Online etc.

Advantages of Saas include ease of administration: no need to install andconfigure local servers, no need to configure backups, no need to keep the software patched, no need to worry about system recovery, lower costs: saving on the purchase of server hardware and software; with SaaS, you lease the service paying either monthlyor yearly and compatibility by ensuring that all users are using the same version of software.

There are two types of SaaS: public and private. With public Saas, multiple customers (usually companies) share the same servers running the software. Withprivate Saas, the servers running the software are dedicated to a single customer which provides the isolation and extra security required when dealing with sensitive information.

 

 

 

 

QUESTION 8

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

 

A.

Traffic shaping

B.

High availability

C.

Load balancing

D.

Fault tolerance

 

Correct Answer: A

Explanation:

If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially.

Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

 

 

QUESTION 9

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

 

A.

BGP

B.

OSPF

C.

IS-IS

D.

MPLS

 

Correct Answer: D

Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.

MPLS works by prefixing packets with an MPLS header, containing one or more labels.

An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labels used to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward.

A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it off the outgoing packet.

When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

 

 

QUESTION 10

A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?

 

A.

APIPA

B.

MAC

C.

Static

D.

Public

 

Correct Answer: A

Explanation:

APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable.

When a client computer configured to use DHCP boots up, it first looks for a DHCP ser
ver to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class Bsubnet mask of 255.255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …