Ensurepass

CompTIA Network+ Certification Exam

 

QUESTION 31

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

 

A.

Multifactor authentication

B.

ISAKMP

C.

TACACS+

D.

Network access control

 

Correct Answer: C

Explanation:

TACACS+ (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

 

 

QUESTION 32

Which of the following describes an IPv6 address of ::1?

 

A.

Broadcast

B.

Loopback

C.

Classless

D.

Multicast

 

Correct Answer: B

Explanation:

The loopback address is a special IP address thatis designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sendingsystem. The loopback address allows client software to communicate with server software on t
he same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.

In IPv4, the loopback address is 127.0.0.1.

In IPv6, the loopback address is 0:0:0:0:0:0:0:1, which can be shortened to ::1

 

 

QUESTION 33

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.

 

clip_image002

 

After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled.

 

Instructions:

When the simulation is complete, please select the Done button to submit.

clip_image004

clip_image006

clip_image008

 

All Networks have the range from /0 to/32

 

Correct Answer:

clip_image010

 

Explanation:

An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines howmany bits form the network address and from that, we can calculate how many bits are used for the host addresses.

The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing.If we apply the formula (22 ?2), we can determine that the following subnets should be configured:

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP)

HR network – /27 – This will provide for up to 30usable IP’s (32-2)

IT – /28 – This will provide for up to 14 usable IP’s (16-2)

Finance – /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP’s and can’t be used for hosts.

Marketing – /28

If we add up howmany IP blocks are used that is 64+32+16+64+16=192.

A /24 contains 256 IP addresses, so 256-192=64.

So the last unused box should be a /26, which equates to 64 addresses

 

 

 

QUESTION 34

When convergence on a routed network occurs, which of the following is true?

 

A.

All routers are using hop count as the metric

B.

Allrouters have the same routing table

C.

All routers learn the route to all connected networks

D.

All routers use route summarization

 

Correct Answer: C

Explanation:

Routers exchange routing topology information with each other by using a routing protocol. Whenall routers have exchanged routing information with all other routers within a network, the routers are said to have converged. In other words: In a converged network all routers “agree” on what the network topology looks like.

 

 

QUESTION 35

Which of the following conne
ction types is used to terminate DS3 connections in a telecommunications facility?

 

A.

66 block

B.

BNC

C.

F-connector

D.

RJ-11

 

Correct Answer: B

Explanation:

A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s. DS3 uses 75 ohm coaxial cable and BNC connectors.

 

 

QUESTION 36

A network engineer needs
to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

 

A.

Star

B.

Bus

C.

Ring

D.

Mesh

 

Correct Answer: C

Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a `star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.

To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a `token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data b
eforereleasing the token. Only a computer in possession of the token can transmit data onto the network.

 

 

QUESTION 37

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

 

A.

Configure NAT on the firewall

B.

Implement a split horizon DNS

C.

Place the server in the DMZ

D.

Adjust the proper internal ACL

 

Correct Answer: B

Explanation:

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-basedseparation but is most commonly done in software.

In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. Forthe internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The external DNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.

 

 

QUESTION 38

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

 

A.

10.0.0.1

B.

127.0.0.1

C.

172.16.1.1

D.

192.168.1.1

 

Correct Answer: B

Explanation:

The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which willpoint back to the computer’s TCP/IP network configuration.

In IPv4, the loopback address is 127.0.0.1.

In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1

 

 

QUESTION 39

Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN?

 

A.

Access switch

B.

UC gateway

C.

UC server

D.

Edge router

 

Correct Answer: B

Explanation:

People use many methods of communication nowadays such as voice, email, video and instant messaging. People also use many different devices to communicate such as smart phones, PDAs, computers etc.Unified Communications (UC) enables people using different modes of communication, different media, and different devices to communicate with anyone, anywhere, at any time.

Many communication methods use digital signals. To send a digital signal over the analog PSTN, you need a gateway (in this case a UC Gateway) to convert the digital signals into an analog format that can be sent over the PSTN.

 

 

QUESTION 40

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?

 

A.

Username is misspelled is the device configuration file

B.

IDS is blocking RADIUS

C.

Shared secret key is mismatched

D.

Group policy has not propagated to the device

 

Correct Answer: C

Explanation:

AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems.

Authentication, authorization, and accounting (AAA) allows anetwork to have a single repository of user credentials. A network administrator can then, for example, supply the same credentials to log in to various network devices (for example, routers and switches). RADIUS and TACACS+ are protocols commonly used tocommunicate with an AAA server.

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …