PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



CompTIA N10 006 Practice Exam Killtest .pdf


Original filename: CompTIA N10-006 Practice Exam Killtest.pdf
Title: Microsoft Word - N10-006.doc
Author: Administrator

This PDF 1.5 document has been generated by PScript5.dll Version 5.2.2 / Acrobat Distiller 9.0.0 (Windows), and has been sent on pdf-archive.com on 16/09/2016 at 09:55, from IP address 107.148.x.x. The current document download page has been viewed 665 times.
File size: 578 KB (7 pages).
Privacy: public file




Download original PDF file









Document preview


CompTIA Network+ N10-006 Practice Exam
CompTIA Network+ certification
http://www.killtest.com/Network/N10-006.asp
The path you dreaded to take earlier will seem much spacious and open. You will feel even
more committed to your profession and will develop strategies to enhance it further along the
way by using Killtest CompTIA Network+ N10-006 Practice Exam. The CompTIA Network+
N10-006 Practice Exam you receive from your supervisor will confirm you to a job well done.
Your peers and clients will applaud you and give you the acknowledgement you deserve.

Now Subscribe Killtest Youtube, you can get $20 voucher.
Killtest Youtube Channel:
https://www.youtube.com/channel/UC9ayTw23VpfxWjYaYEeeW3A

The safer , easier way to help you pass any IT exams. 

Exam

: N10-006

Title

: CompTIA Network+
Certification

Version : Demo

1/5

The safer , easier way to help you pass any IT exams. 

1. Topic 1, Network architecture
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to
communicate with each other.
Which of the following options would satisfy these requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.
Answer: B
Explanation:
We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical
network segments called VLANs.
A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN
even if they are on separate IP subnets. These logical subnets are configured in the network switches.
Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive
broadcast traffic.
To allow different segments (VLAN) to communicate with each other, a router is required to establish a
connection between the systems. We can use a network router to route between the VLANs or we can
use a ‘Layer 3’ switch. Unlike layer 2 switches that can only read the contents of the data-link layer
protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network
layer protocol header as well.
Incorrect Answers:
A: OSPF (Open Shortest Path First) is a link-state IP routing protocol used for very large enterprise
networks. It is not used to limit broadcast traffic within networks. You could use a router and divide the
network into smaller subnets to limit broadcast traffic; however, you would not use OSPF as the routing
protocol.
C: A bridge is a layer 2 (data-link layer) device that splits a LAN into two separate collision domains and
filters the packets passing between them by using their hardware addresses. However, a bridge will
forward broadcast traffic between the collision domains so broadcast traffic will not be reduced.
D: A firewall is used to restrict traffic between networks or subnets (typically between the Internet and the
LAN) based on rules that specify source/destination IPs and port numbers. You would not use a firewall
within a network to limit broadcast traffic on the network.
References:
Zacker, Craig, CompTIA Network+ Exam N10-005 Training Kit, O’Reilly Media, Inc., Sebastopol, 2012, p
134
2.The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of
multicast and unicast signals.
Which of the following would BEST handle the rerouting caused by the disruption of service?
A. Layer 3 switch
B. Proxy server
C. Layer 2 switch
D. Smart hub

2/5

The safer , easier way to help you pass any IT exams. 

Answer: A
Explanation:
The question states that the traffic being transported is a mixture of multicast and unicast signals. There
are three basic types of network transmissions: broadcasts, which are packets transmitted to every node
on the network; unicasts, which are packets transmitted to just one node; and multicasts, which are
packets transmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would
need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2 switches that can only read the
contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the
(IP) addresses in the network layer protocol header as well.
Incorrect Answers:
B: There are different types of proxy server, the most common being a web proxy server. When a client
application such as a web browser requests a web page, the request is sent to the proxy server. The
proxy server will then fulfill the request either by serving a cached page or by requesting the web page
from the web server. This can improve performance (less web pages being downloaded over an Internet
connection) and improve security (web page requests can be blocked). A proxy server is not used to
reroute unicast and multicast traffic in the event of a network connectivity interruption.
C: A layer 2 switch that can only read the contents of the data-link layer (layer 2) protocol header in the
packets they process. A layer 2 switch cannot route multicast (layer 3) traffic.
D: Years ago, switches were very expensive compared to hubs. Nowadays, switches are much cheaper
so most people use switches rather than hubs. Computers connect to hubs in the same way they connect
to switches. However, traffic sent to one hub port will be forwarded out of all the other ports because hubs
do not maintain a MAC address table so they do not know which port a destination computer is connected
to. A smart hub has some added intelligence that enables it to detect and isolate network problems.
However, a smart hub does not reroute traffic.
References:
Zacker, Craig, CompTIA Network+ Exam N10-005 Training Kit, O’Reilly Media, Inc., Sebastopol, 2012, p
134
http://whatis.techtarget.com/definition/proxy-server
http://searchnetworking.techtarget.com/answer/
What-is-a-smart-hub-as-opposed-to-one-that-is-not-dumb-hub
3.Which of the following network devices use ACLs to prevent unauthorized access into company
systems?
A. IDS
B. Firewall
C. Content filter
D. Load balancer
Answer: B
Explanation:
A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls are
frequently used to prevent unauthorized Internet users from accessing private networks connected to the
Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is
allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which
examines each message and blocks or allows the message depending on rules specified in the ACL. The

3/5

The safer , easier way to help you pass any IT exams. 

rules in the ACL specify which combinations of source IP address, destination address in IP port numbers
are allowed.
Incorrect Answers:
A: An intrusion detection system (IDS) is a hardware device or software application that monitors network
or system activities for malicious activities or policy violations and produces reports to a management
station. An IDS does not use an ACL to prevent unauthorized access into company systems.
C: The most common type of content filter is a web content filter. A web content filter is a hardware device
or software application that examines web pages as they are downloaded. The page can then be blocked
if it does not comply with company web policy. A content filter does not use an ACL to prevent
unauthorized access into company systems.
D: A load balancer is a hardware device or software application that directs traffic between multiple
servers to balance the load between the servers. For example, if you have multiple web servers serving
the same content, a load balancer will evenly distribute requests for the web pages between the servers.
A load balancer does not use an ACL to prevent unauthorized access into company systems.
References:
http://www.webopedia.com/TERM/F/firewall.html
http://en.wikipedia.org/wiki/Intrusion_detection_system
4.Which of the following is used to define how much bandwidth can be used by various protocols on the
network?
A. Traffic shaping
B. High availability
C. Load balancing
D. Fault tolerance
Answer: A
Explanation:
If a network connection becomes saturated to the point where there is a significant level of contention,
network latency can rise substantially.
Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment,
business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports
used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic
has been sent.
Incorrect Answers:
B: High availability is a term used to describe a network or system that can remain operational in the
event of a component failure. For example, two servers in a cluster are a common high availability
solution. If one server fails, the other takes over. In networking terms, high availability would include
redundant network links and network devices such as switches and routers such that computers would
still be able to communicate in the event of a failure of any network device. High availability is not used to
define how much bandwidth can be used by various protocols on the network.
C: A load balancer is a hardware device or software application that directs traffic between multiple
servers to balance the load between the servers. For example, if you have multiple web servers serving
the same content, a load balancer can evenly distribute requests for the web pages between the servers.
Load balancing is the process of distributing a load between resources. Load balancing is not used to
define how much bandwidth can be used by various protocols on the network.

4/5

The safer , easier way to help you pass any IT exams. 

D: Fault tolerance is similar to high availability. It describes a systems ability to remain available in the
event of a component failure. Fault tolerance is not used to define how much bandwidth can be used by
various protocols on the network.
References:
http://searchnetworking.techtarget.com/definition/traffic-shaping
5.Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
A. OSPF
B. VTP trunking
C. Virtual PBX
D. RADIUS
E. 802.1x
Answer: D, E
Explanation:
D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of user
accounts and passwords used as a central authentication database for users requiring network access.
RADIUS servers are commonly used by ISP’s to authenticate their customer’s Internet connections.
Remote users connect to one or more Remote Access Servers. The remote access servers then forward
the authentication requests to the central RADIUS server.
E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an
authentication mechanism to devices wishing to attach to a network.
802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server.
The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such
as an Ethernet switch, wireless access point or in this case, a remote access server and the
authentication server is the RADIUS server.
Incorrect Answers:
A: OSPF (Open Shortest Path First) is a link-state IP routing protocol used for very large enterprise
networks. OSPF is not used for the authentication of remote users.
B: VTP trunking is used for the propagation of VLAN information between network switches. A VLAN is a
logical segmentation of the network performed by a layer 2 Ethernet switch. When a switch is configured
with one or more VLANs, VTP trunking can be used to propagate the VLAN configuration to the other
switches. VTP trunking is not used for the authentication of remote users.
C: A PBX (Private Branch eXchange) is a hardware system used in a telephone network. A PBX performs
the routing and switching of calls between a business location and the telephone network. A virtual PBX is
a software based PBX. A virtual PBX is not used for the authentication of remote users.
References:
http://en.wikipedia.org/wiki/IEEE_802.1X
http://www.techopedia.com/definition/26152/vlan-trunking-protocol-vtp

5/5

www.killtest.com

Killtest Exams Features:
High quality IT exams practice questions and answers
Hot Certifications: IBM, CompTIA, Avaya, Symantec, Oracle, Adobe
One year free update
Verified Answers Researched by Industry Experts and almost correct.
Multiple-choice questions (MCQs) like real exam
At least 96% coverage of real exam
Experts using industry experience to produce precise and logical products
If failed, 100% money back

More Hot Pages from Killtest shared:
Promotion Page:
http://www.killtest.com/promotion.asp
Bundles Page”
http://www.killtest.com/bundles.asp
How To Pay Page:
http://www.killtest.com/howtopay.asp
FAQs Page
http://www.killtest.com/faq.asp

All Certifications Exams :
IBM
CIW
Oracle
Adobe

CompTIA ISEB

SCO

EXIN EC-COUNCIL
VMware
OMG

www.killtest.com

EMC

Avaya Symantec Checkpoint
Juniper
LPI

Network Appliance

Novell

Nortel

Hitachi


Related documents


comptia n10 006 practice exam killtest
comptia network n10 006 dumps
comptia network n10 006 exam questions
introduction to cisco networking technologies
642 997 exam practice test
glossary


Related keywords