[Free] February 2017(Feb) Ensurepass Pass4sure CompTIA N10-006 Practice Test 121-130

Ensurepass

CompTIA Network+ Certification Exam

 

QUESTION 121

A network engineer is troubleshooting an issue with a computer that is unable to connect to the Internet. The network engineer analyzes the following output from a command line utility:

 

Network DestinationNetmask GatewayInterface

 

192.168.1.0 255.255.255.0192.168.1.254eth0

 

192.168.1.10255.255.255.255192.168.1.10eth0

 

127.0.0.1255.0.0.0On-Linklo

 

127.0.0.0255.0.0.0On-Linklo

 

255.255.255.255255.255.255.255102.168.1.10eth0

 

Which of the following is the reason for the computer issue, given the above output?

 

A.

Wrong default gateway netmask

B.

Incorrect default gateway address

C.

Default gateway on the wrong interface

D.

Missing default gateway

 

Correct Answer: D

Explanation:

The output appears to be a result of running the netstat command. If the default gateway was present, the first line would show the Network Destination as 0.0.0.0 and the Netmaskas 0.0.0.0.

 

 

QUESTION 122

Which of the following helps prevent routing loops?

 

A.

Routing table

B.

Default gateway

C.

Route summarization

D.

Split horizon

Correct Answer: D

Explanation:

Routing loops occur when the routing tables on the routers are slow to update and a redundant communication cycle is created between routers. Split horizon, which prevents the router from advertising a route back to the other router from whichit was learned, can be used to resist routing loops. Poison reverse, also known as split horizon with poison reverse, is also used to resist routing loops.

 

 

QUESTION 123

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router. Which of the following should the technician do NEXT in the troubleshooting methodology?

 

A.

Document the findings and action taken.

B.

Establish a plan to locate the rogue DHCP server.

C.

Remove the rogue DHCP server from the network.

D.

Identify the root cause of the problem.

 

Correct Answer: B

Explanation:

By testing the behavior of rogue DHCP servers and determining that the issue is related to an unauthorized home router, thetechnician has completed the third step in the 7-step troubleshooting process. The next step is to establish a plan of action to resolve the problem and identify potential effects. Establishing a plan to locate the rogue DHCP server meets the requirementsof this step.

 

1. Identify the problem.

Information gathering.

Identify symptoms.

Question users.

Determine if anything has changed.

 

2. Establish a theory of probable cause.

Question the obvious.

 

3. Test the theory to determine cause:

When the theory isconfirmed, determine the next steps to resolve the problem.

If theory is not confirmed, re-establish a new theory or escalate.

 

4. Establish a plan of action to resolve the problem and identify potential effects.

 

5. Implement the solution or escalate as necessary.

 

6. Verify full system functionality and if applicable implement preventive measures.

 

7. Document findings, actions, and outcomes.

 

 

 

 

 

 

 

QUESTION 124

A technician is troubleshooting a wired device on the network. The technician notices that the link light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device connects successfully. Which of the following is causing this issue?

 

A.

EMI

B.

RFI

C.

Cross-talk

D.

Bad wiring

 

Correct Answer: D

Explanation:

The question states that the device worked on a different port. This indicates that the wiring is faulty.

 

 

QUESTION 125

A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central area on the production floor. Since the relocation, the helpdesk has received complaints about intermittent operation. During the troubleshooting process, the technician noticed that collisions are only observed on the switch port during production. Given this information, which of the following is the cause of the problem?

 

A.

Distance limitation

B.

Electromagnetic interference

C.

Cross talk

D.

Speed and duplex mismatch

 

Correct Answer: B

Explanation:

When cables are installed near electrical devices the signal within the cable might become corrupt. The cable connecting the control station to theswitch port is now surrounded by the production machinery. Electromagnetic interference could occur when the machinery is running, causing the intermittent operation.

 

 

QUESTION 126

Two weeks after installation, a network technic
ian is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches’ settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?

 

A.

Via SSH using the RADIUS shared secret

B.

Via HTTP using the default username and password

C.

Via console using the administrator’s password

D.

Via SNMP using the default RO community

 

Correct Answer: B

Explanation:

A new network switch is accessed via HTTP to perform the initial configuration. The username and password used is a factory default.

 

 

&n
bsp;

QUESTION 127

A technician is troubleshooting a client’s connection to a wireless network. The client is asked to run a “getinfo” command to list information about the existing condition.

 

myClient$ wificard –getinfo

 

agrCtlRSSI:-72

 

agrExtRSSI:0

 

state:running

 

op mode: station

 

lastTxRate:178

 

MaxRate:300

 

802.11 auth:open

 

link auth:wpa2-psk

 

BSSID:0F:33:AE:F1:02:0A

 

SSID:CafeWireless

 

Channel:149,1

 

Given this output, which of the following has the technician learned about the wireless network? (Select TWO).

 

A.

The WAP is using RC4 encryption

B.

The WAP is using 802.11a

C.

The WAP is using AES encryption

D.

The WAP isusing the 2.4GHz channel

E.

The WAP is using the 5GHz channel

F.

The WAP is using 802.11g

 

Correct Answer: CE

Explanation:

WPA2 makes use of the Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption protocol, which isan AES based protocol.

The output shows that the wireless network operates on channel 149, which is a channel in the 5GHz band.

 

 

QUESTION 128

A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity. Which of the following should the network technician do NEXT?

 

A.

Establish a theory of probable cause.

B.

B.Document actions and findings.

C.

Determine next steps to solvethe problem.

D.

Determine if anything has changed.

 

Correct Answer: D

Explanation:

The technician has already identified the symptom: Loss of connectivity on a specific network segment. The next step in identifying the problem is to “Determine if anything haschanged”.

 

Common troubleshooting steps and procedures:

 

1. Identify the problem.

Information gathering.

Identify symptoms.

Question users.

Determine if anything has changed.

 

2. Establish a theory of probable cause.

Question the obvious.

 

3. Test the theoryto determine cause:

When the theory is confirmed, determine the next steps to resolve the problem.

If theory is not confirmed, re-establish a new theory or escalate.

 

4. Establish a plan of action to resolve the problem and identify potential effects.

 

5. Implement the solution or escalate as necessary.

 

6. Verify full system functionality and if applicable implement preventive measures.

 

7. Document findings, actions, and outcomes.

 

 

QUESTION 129

Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?

 

A.

Firewall

B.

Router

C.

802.11 AP

D.

Switch

 

Correct Answer: C

Explanation:

802.11 AP is a Wireless Access Point used in a wireless network.

If two computers on a network send data frames at thesame time, a collision between the frames can occur. The frames are then discarded and the sending computers will attempt to send the data again.

Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless networks wherecomputers connected to the wireless network attempt to avoid collisions by transmitting data only when the channel is sensed to be “idle”. Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is unreliable in wireless networks because computers connected to the wireless network often cannot see each other so CSMA/CA is a better option for avoiding collisions.

Request to Send/Clear to Send (RTS/CTS) can also be used to mediate access to the wireless network. This goes some way to alleviating the problemof computers not being able to see each other because in a wireless network, the Wireless Access Point only issues a “Clear to Send” to one node at a time.

With RTS/CTS, a Request to Send (RTS) packet is sent by the sending computer, and a Clear to Send(CTS) packet is sent by the intended receiver. This will alert all computers within range of the sender, receiver or both, to not transmit for the duration of the transmission. This is known as the IEEE 802.11 RTS/CTS exchange.

 

 

QUESTION 130

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?

 

A.

Fire suppression

B.

Mantraps at the entry

C.

HVAC

D.

UPS and battery backups

 

Correct Answer: A

Explanation:

Firesuppression systems are often deployed in server rooms to prevent a fire destroying all the I.T. equipment. Different fire suppression systems work in different ways. Obviously a fire suppression system that sprays water onto the fire is no good for a server room as the water would do as much damage as the fire. A common fire suppression system used in server rooms is one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from the server room is to fill the server room withan inert gas such as carbon dioxide.

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …