N10 006

Download as pdf or txt
Download as pdf or txt
You are on page 1of 258
At a glance
Powered by AI
VLANs are logical network segments that limit broadcast traffic to within each VLAN. Layer 3 switches or routers are needed to allow communication between VLANs.

VLANs (virtual local area networks) are logical segments of the network that limit broadcast traffic to only computers within the same VLAN. Layer 3 switches can read IP addresses and route between VLANs, while layer 2 switches can only read data link layer headers.

Layer 2 switches operate at the data link layer and can only read layer 2 headers, while layer 3 switches can read network layer headers and route traffic based on IP addresses. Layer 3 switches perform the functions of both layer 2 switching and routing.

CompTIA N10-006

CompTIA Network+ Certification


Version: 6.1

CompTIA N10-006 Exam


Topic 1, Network architecture

QUESTION NO: 1
A technician needs to limit the amount of broadcast traffic on a network and allow different
segments to communicate with each other. Which of the following options would satisfy these
requirements?
A.
Add a router and enable OSPF.
B.
Add a layer 3 switch and create a VLAN.
C.
Add a bridge between two switches.
D.
Add a firewall and implement proper ACL.

Answer: B
Explanation:

We can limit the amount of broadcast traffic on a switched network by dividing the computers into
logical network segments called VLANs.
A virtual local area network (VLAN) is a logical group of computers that appear to be on the same
LAN even if they are on separate IP subnets. These logical subnets are configured in the network
switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN
will receive broadcast traffic.
To allow different segments (VLAN) to communicate with each other, a router is required to
establish a connection between the systems. We can use a network router to route between the
VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of
the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP)
addresses in the network layer protocol header as well.

"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


QUESTION NO: 2
The network install is failing redundancy testing at the MDF. The traffic being transported is a
mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting
caused by the disruption of service?
A.
Layer 3 switch
B.
Proxy server
C.
Layer 2 switch
D.
Smart hub

Answer: A
Explanation:

The question states that the traffic being transported is a mixture of multicast and unicast signals.
There are three basic types of network transmissions: broadcasts, which are packets transmitted
to every node on the network; unicasts, which are packets transmitted to just one node; and
multicasts, which are packets transmitted to a group of nodes. Multicast is a layer 3 feature of IPv4
& IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2
switches that can only read the contents of the data-link layer protocol header in the packets they
process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

QUESTION NO: 3
Which of the following network devices use ACLs to prevent unauthorized access into company
systems?
A.
IDS
B.
Firewall
"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


C.
Content filter
D.
Load balancer

Answer: B
Explanation:

A firewall is a system designed to prevent unauthorized access to or from a private network.


Firewalls are frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists)
to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet
passes through the firewall, which examines each message and blocks or allows the message
depending on rules specified in the ACL. The rules in the ACL specify which combinations of
source IP address, destination address in IP port numbers are allowed.

QUESTION NO: 4
Which of the following is used to define how much bandwidth can be used by various protocols on
the network?
A.
Traffic shaping
B.
High availability
C.
Load balancing
D.
Fault tolerance

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


If a network connection becomes saturated to the point where there is a significant level of
contention, network latency can rise substantially.
Traffic shaping is used to control the bandwidth used by network traffic. In a corporate
environment, business-related traffic may be given priority over other traffic. Traffic can be
prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored
in a buffer until the higher priority traffic has been sent.

QUESTION NO: 5
Which of the following is used to authenticate remote workers who connect from offsite? (Select
TWO).
A.
OSPF
B.
VTP trunking
C.
Virtual PBX
D.
RADIUS
E.
802.1x

Answer: D,E
Explanation:

D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of
user accounts and passwords used as a central authentication database for users requiring
network access. RADIUS servers are commonly used by ISPs to authenticate their customers
Internet connections.
Remote users connect to one or more Remote Access Servers. The remote access servers then
forward the authentication requests to the central RADIUS server.

"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an
authentication mechanism to devices wishing to attach to a network.
802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication
server. The supplicant is a client that wishes to attach to the network. The authenticator is a
network device, such as an Ethernet switch, wireless access point or in this case, a remote access
server and the authentication server is the RADIUS server.

QUESTION NO: 6
Which of the following provides accounting, authorization, and authentication via a centralized
privileged database, as well as, challenge/response and password encryption?
A.
Multifactor authentication
B.
ISAKMP
C.
TACACS+
D.
Network access control

Answer: C
Explanation:

TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that handles
authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a
centralized authentication solution used to provide access to network resources. TACACS+
separates the authentication, authorization, and accounting services enabling you to host each
service on a separate server if required.

"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


QUESTION NO: 7
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive
the same address. Which of the following should be configured?
A.
Leases
B.
Helper addresses
C.
Scopes
D.
Reservations

Answer: D
Explanation:

A reservation is used in DHCP to ensure that a computer always receives the same IP address.
To create a reservation, you need to know the hardware MAC address of the network interface
card that should receive the IP address.
For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always
get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address
to configure reservation.

QUESTION NO: 8
Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following
options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment
using dynamic IP addresses, to be able to access the Internet and internal company servers?
(Select THREE).
A.
Default gateway
B.
"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


Subnet mask
C.
Reservations
D.
TFTP server
E.
Lease expiration time of 1 day
F.
DNS servers
G.
Bootp

Answer: A,B,F
Explanation:

The question states that the client computers need to access the Internet as well as internal
company servers. To access the Internet, the client computers need to be configured with an IP
address with a subnet mask (answer B) and the address of the router that connects the company
network to the Internet. This is known as the default gateway (answer A).
To be able to resolve web page URLs to web server IP addresses, the client computers need to
be configured with the address of a DNS server (answer F).

QUESTION NO: 9
A technician just completed a new external website and setup access rules in the firewall. After
some testing, only users outside the internal network can reach the site. The website responds to
a ping from the internal network and resolves the proper public address. Which of the following
could the technician do to fix this issue while causing internal users to route to the website using
an internal address?
A.
Configure NAT on the firewall
B.
"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


Implement a split horizon DNS
C.
Place the server in the DMZ
D.
Adjust the proper internal ACL

Answer: B
Explanation:

Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply
different DNS query results depending on the source of the request. This can be done by
hardware-based separation but is most commonly done in software.
In this question, we want external users to be able to access the website by using a public IP
address. To do this, we would have an external facing DNS server hosting a DNS zone for the
website domain. For the internal users, we would have an internal facing DNS server hosting a
DNS zone for the website domain. The external DNS zone will resolve the website URL to an
external public IP address. The internal DNS server will resolve the website URL to an internal
private IP address.

QUESTION NO: 10
When configuring a new server, a technician requests that an MX record be created in DNS for the
new server, but the record was not entered properly. Which of the following was MOST likely
installed that required an MX record to function properly?
A.
Load balancer
B.
FTP server
C.
Firewall DMZ
D.
Mail server
"Pass Any Exam. Any Time." - www.actualtests.com

CompTIA N10-006 Exam


Answer: D
Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the
name of the email server responsible for accepting email for the recipients domain.
For example a user sends an email to [email protected]. The sending users email
server will query the somedomain.com DNS zone for an MX record for the domain. The MX record
will specify the hostname of the email server responsible for accepting email for the
somedomain.com domain, for example, mailserver.somedomain.com. The sending email server
will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address.
The sending mail server will then forward the email to the destination mail server.

QUESTION NO: 11
Which of the following protocols uses label-switching routers and label-edge routers to forward
traffic?
A.
BGP
B.
OSPF
C.
IS-IS
D.
MPLS

Answer: D
Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made
solely on the contents of this label, without the need to examine the packet itself.
"Pass Any Exam. Any Time." - www.actualtests.com

10

CompTIA N10-006 Exam


MPLS works by prefixing packets with an MPLS header, containing one or more labels.
An MPLS router that performs routing based only on the label is called a label switch router (LSR)
or transit router. This is a type of router located in the middle of a MPLS network. It is responsible
for switching the labels used to route packets. When an LSR receives a packet, it uses the label
included in the packet header as an index to determine the next hop on the label-switched path
(LSP) and a corresponding label for the packet from a lookup table. The old label is then removed
from the header and replaced with the new label before the packet is routed forward.
A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as
the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming
packet and remove it off the outgoing packet.
When forwarding IP datagrams into the MPLS domain, an LER uses routing information to
determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the
labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is
destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet
using normal IP forwarding rules.

QUESTION NO: 12
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP
using a POTS line?
A.
Multilayer switch
B.
Access point
C.
Analog modem
D.
DOCSIS modem

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

11

CompTIA N10-006 Exam


Before ADSL broadband connections became the standard for Internet connections, computers
used analog modems to connect to the Internet. By todays standards, analog modems are very
slow typically offering a maximum bandwidth of 56Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer
to an analog signal to be transmitted over a standard (POTS) phone line. The modem then
converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a
phone does.

QUESTION NO: 13
An administrator notices an unused cable behind a cabinet that is terminated with a DB-9
connector. Which of the following protocols was MOST likely used on this cable?
A.
RS-232
B.
802.3
C.
ATM
D.
Token ring

Answer: A
Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines
the functions of the 9 pins in a DB-9 connector. The RS-232 standard was around long before
computers. Its rare to see a new computer nowadays with a serial port but they were commonly
used for connecting external analog modems, keyboards and mice to computers.

"Pass Any Exam. Any Time." - www.actualtests.com

12

CompTIA N10-006 Exam

QUESTION NO: 14
Which of the following connection types is used to terminate DS3 connections in a
telecommunications facility?
A.
66 block
B.
BNC
C.
F-connector
D.
RJ-11

Answer: B
Explanation:

A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s.
DS3 uses 75 ohm coaxial cable and BNC connectors.

QUESTION NO: 15
An F-connector is used on which of the following types of cabling?
A.
CAT3
B.
Single mode fiber
C.
CAT5
D.
"Pass Any Exam. Any Time." - www.actualtests.com

13

CompTIA N10-006 Exam


RG6

Answer: D
Explanation:

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television
and universally for satellite television and cable modems, usually with RG-6/U cable or, in older
installations, with RG-59/U cable.

QUESTION NO: 16
A network technician must utilize multimode fiber to uplink a new networking device. Which of the
following Ethernet standards could the technician utilize? (Select TWO).
A.
1000Base-LR
B.
1000Base-SR
C.
1000Base-T
D.
10GBase-LR
E.
10GBase-SR
F.
10GBase-T

Answer: B,E
Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber with a
"Pass Any Exam. Any Time." - www.actualtests.com
14

CompTIA N10-006 Exam


distance capability between 220 meters and 550 meters.
10Gbase-SRis a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable
and short wavelength signaling.

QUESTION NO: 17 CORRECT TEXT


You have been tasked with testing a CAT5e cable. A summary of the test results can be found on
the screen.
Step 1: Select the tool that was used to create the cable test results.
Step 2: Interpret the test results and select the option that explains the results. After you are done
with your analysis, click the 'Submit Cable Test Analysis' button.

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

15

CompTIA N10-006 Exam

A Cable Certifier provides Pass or Fail information in accordance with industry standards but
can also show detailed information when a Fail occurs. This includes shorts, the wire pairs
involved and the distance to the short. When a short is identified, at the full length of the cable it
means the cable has not been crimped correctly.

QUESTION NO: 18
A network engineer needs to set up a topology that will not fail if there is an outage on a single
piece of the topology. However, the computers need to wait to talk on the network to avoid
congestions. Which of the following topologies would the engineer implement?
A.
Star
B.
Bus
C.
Ring
D.
Mesh
"Pass Any Exam. Any Time." - www.actualtests.com

16

CompTIA N10-006 Exam


Answer: C
Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite
being called a Ring topology, the ring is logical and the physical network structure often forms a
star topology with all computers on the network connecting to a central multistation access unit
(MAU). The MAU implements the logical ring by transmitting signals to each node in turn and
waiting for the node to send them back before it transmits to the next node. Therefore, although
the cables are physically connected in a star, the data path takes the form of a ring. If any
computer or network cable fails in a token ring network, the remainder of the network remains
functional. The MAU has the intelligence to isolate the failed segment.
To ensure that the computers need to wait to talk on the network to avoid congestions, a Token
Ring network uses a token. The token continually passes around the network until a computer
needs to send data. The computer then takes the token and transmits the data before releasing
the token. Only a computer in possession of the token can transmit data onto the network.

QUESTION NO: 19
A network topology that utilizes a central device with point-to-point connections to all other devices
is which of the following?
A.
Star
B.
Ring
C.
Mesh
D.
Bus

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

17

CompTIA N10-006 Exam


A Star network is the most common network in use today. Ethernet networks with computers
connected to a switch (or a less commonly a hub) form a star network.
The switch forms the central component of the star. All network devices connect to the switch. A
network switch has a MAC address table which it populates with the MAC address of every device
connected to the switch. When the switch receives data on one of its ports from a computer, it
looks in the MAC address table to discover which port the destination computer is connected to.
The switch then unicasts the data out through the port that the destination computer is connected
to.

QUESTION NO: 20
Which of the following network topologies has a central, single point of failure?
A.
Ring
B.
Star
C.
Hybrid
D.
Mesh

Answer: B
Explanation:

A Star network is the most common network in use today. Ethernet networks with computers
connected to a switch (or a less commonly a hub) form a star network.
The switch forms the central component of the star. All network devices connect to the switch. A
network switch has a MAC address table which it populates with the MAC address of every device
connected to the switch. When the switch receives data on one of its ports from a computer, it
looks in the MAC address table to discover which port the destination computer is connected to.
The switch then unicasts the data out through the port that the destination computer is connected
to.
"Pass Any Exam. Any Time." - www.actualtests.com

18

CompTIA N10-006 Exam


The switch that forms the central component of a star network is a single point of failure. If the
switch fails, no computers will be able to communicate with each other.

QUESTION NO: 21
Which of the following refers to a network that spans several buildings that are within walking
distance of each other?
A.
CAN
B.
WAN
C.
PAN
D.
MAN

Answer: A
Explanation:

CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often
implement CANs to link the buildings in a network. The range of CAN is 1KM to 5KM. If multiple
buildings have the same domain and they are connected with a network, then it will be considered
as a CAN.

QUESTION NO: 22
Which of the following network infrastructure implementations would be used to support files being
transferred between Bluetooth-enabled smartphones?
"Pass Any Exam. Any Time." - www.actualtests.com

19

CompTIA N10-006 Exam


A.
PAN
B.
LAN
C.
WLAN
D.
MAN

Answer: A
Explanation:

PAN stands for Personal Area Network. It is a network of devices in the area of a person typically
within a range of 10 meters and commonly using a wireless technology such as Bluetooth or IR
(Infra-Red).

QUESTION NO: 23
Which of the following describes an IPv6 address of ::1?
A.
Broadcast
B.
Loopback
C.
Classless
D.
Multicast

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

20

CompTIA N10-006 Exam


The loopback address is a special IP address that is designated for the software loopback
interface of a computer. The loopback interface has no hardware associated with it, and it is not
physically connected to a network. The loopback address causes any messages sent to it to be
returned to the sending system. The loopback address allows client software to communicate with
server software on the same computer. Users specify the loopback address which will point back
to the computer's TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, which can be shortened to ::1

QUESTION NO: 24
Which of the following is an example of an IPv4 address?
A.
192:168:1:55
B.
192.168.1.254
C.
00:AB:FA:B1:07:34
D.
::1

Answer: B
Explanation:

An IPv4 address is notated as four decimal numbers each between 0 and 255 separated by dots
(xxx.xxx.xxx.xxx). Each number is known as an octet as it represents eight binary bits. All four
octets make up a 32-bit binary IPv4 address.
In this question, 192.168.1.254 is a valid IPv4 address.

"Pass Any Exam. Any Time." - www.actualtests.com

21

CompTIA N10-006 Exam

QUESTION NO: 25
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local
loopback address. Which of the following is a valid IPv4 loopback address?
A.
10.0.0.1
B.
127.0.0.1
C.
172.16.1.1
D.
192.168.1.1

Answer: B
Explanation:

The loopback address is a special IP address that is designated for the software loopback
interface of a computer. The loopback interface has no hardware associated with it, and it is not
physically connected to a network. The loopback address causes any messages sent to it to be
returned to the sending system. The loopback address allows client software to communicate with
server software on the same computer. Users specify the loopback address which will point back
to the computer's TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1

QUESTION NO: 26
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on
connected routers. In order to conserve address space, which of the following subnet masks
should Joe use for this subnet?
"Pass Any Exam. Any Time." - www.actualtests.com

22

CompTIA N10-006 Exam


A.
/24
B.
/32
C.
/28
D.
/29
E.
/30

Answer: E
Explanation:

An IPv4 address consists of 32 bits. The first x number of bits in the address is the network
address and the remaining bits are used for the host addresses. The subnet mask defines how
many bits form the network address and from that, we can calculate how many bits are used for
the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for
network addressing and the remaining 2 bits are used for host addressing. The formula to
calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula represents the
number of bits used for host addressing. If we apply the formula (22 2), a /30 subnet mask will
provide 2 IP addresses.

QUESTION NO: 27 HOTSPOT


Corporate headquarters provided your office a portion of their class B subnet to use at a new
office location. Allocate the minimum number of addresses (using CIDR notation) needed to
accommodate each department.

"Pass Any Exam. Any Time." - www.actualtests.com

23

CompTIA N10-006 Exam

After accommodating each department, identify the unused portion of the subnet by responding to
the question on the graphic. All drop downs must be filled.
Instructions: When the simulation is complete, please select the Done button to submit.

"Pass Any Exam. Any Time." - www.actualtests.com

24

CompTIA N10-006 Exam

All Networks have the range from /0 to/32

Answer:
"Pass Any Exam. Any Time." - www.actualtests.com

25

CompTIA N10-006 Exam

Explanation:

An IPv4 address consists of 32 bits. The first x number of bits in the address is the network
address and the remaining bits are used for the host addresses. The subnet mask defines how
many bits form the network address and from that, we can calculate how many bits are used for
the host addresses.
The formula to calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula
represents the number of bits used for host addressing. If we apply the formula (22 2), we can
determine that the following subnets should be configured:
Sales network /26 This will provide up to 62 usable IP addresses (64-2 for subnet and
broadcast IP)
HR network - /27 This will provide for up to 30 usable IPs (32-2)
IT - /28 This will provide for up to 14 usable IPs (16-2)
Finance - /26 Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and
broadcast IPs and cant be used for hosts.
"Pass Any Exam. Any Time." - www.actualtests.com

26

CompTIA N10-006 Exam


Marketing - /28
If we add up how many IP blocks are used that is 64+32+16+64+16=192.
A /24 contains 256 IP addresses, so 256-192=64.
So the last unused box should be a /26, which equates to 64 addresses

QUESTION NO: 28
A host has been assigned the address 169.254.0.1. This is an example of which of the following
address types?
A.
APIPA
B.
MAC
C.
Static
D.
Public

Answer: A
Explanation:

APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems.
When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class
B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is
unavailable.
When a client computer configured to use DHCP boots up, it first looks for a DHCP server to
provide the client with IP address and subnet mask. If the client is unable to contact a DHCP
server, it uses APIPA to automatically configure itself with an IP address from a range that has
been reserved especially for Microsoft. The client also configures itself with a default class B
subnet mask of 255.255.0.0. The client will use the self-configured IP address until a DHCP server
becomes available.
"Pass Any Exam. Any Time." - www.actualtests.com

27

CompTIA N10-006 Exam

QUESTION NO: 29
A company wants to create highly available datacenters. Which of the following will allow the
company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at
one site goes down?
A.
Load balancer
B.
VRRP
C.
OSPF
D.
BGP

Answer: D
Explanation:

A collection of networks that fall within the same administrative domain is called an autonomous
system (AS). In this question, each datacenter will be an autonomous system.
The routers within an AS use an interior gateway protocol, such as the Routing Information
Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information
among themselves. At the edges of an AS are routers that communicate with the other ASs on
the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).
If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links
are available.

QUESTION NO: 30
An organization requires a second technician to verify changes before applying them to network
devices. When checking the configuration of a network device, a technician determines that a
coworker has improperly configured the AS number on the device. This would result in which of
"Pass Any Exam. Any Time." - www.actualtests.com

28

CompTIA N10-006 Exam


the following?
A.
The OSPF not-so-stubby area is misconfigured
B.
Reduced wireless network coverage
C.
Spanning tree ports in flooding mode
D.
BGP routing issues

Answer: D
Explanation:

BGP (Border Gateway Protocol) is used to route data between autonomous systems (ASs)
A collection of networks that fall within the same administrative domain is called an autonomous
system (AS).
The routers within an AS use an interior gateway protocol, such as the Routing Information
Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information
among themselves. At the edges of an AS are routers that communicate with the other ASs on
the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).

QUESTION NO: 31
When convergence on a routed network occurs, which of the following is true?
A.
All routers are using hop count as the metric
B.
All routers have the same routing table
C.
All routers learn the route to all connected networks
"Pass Any Exam. Any Time." - www.actualtests.com

29

CompTIA N10-006 Exam


D.
All routers use route summarization

Answer: C
Explanation:

Routers exchange routing topology information with each other by using a routing protocol. When
all routers have exchanged routing information with all other routers within a network, the routers
are said to have converged. In other words: In a converged network all routers "agree" on what the
network topology looks like.

QUESTION NO: 32
An administrator has a virtualization environment that includes a vSAN and iSCSI switching.
Which of the following actions could the administrator take to improve the performance of data
transfers over iSCSI switches?
A.
The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.
B.
The administrator should configure each vSAN participant to have its own VLAN.
C.
The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).
D.
The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

Answer: D
Explanation:

When using an iSCSI SAN (with iSCSI switching), we can improve network performance by
enabling jumbo frames. A jumbo frame is a frame with an MTU of more than 1500. By setting the
MTU to 9000, there will be fewer but larger frames going over the network. Enabling jumbo frames
"Pass Any Exam. Any Time." - www.actualtests.com

30

CompTIA N10-006 Exam


can improve network performance by making data transmissions more efficient. The CPUs on
switches and routers can only process one frame at a time. By putting a larger payload into each
frame, the CPUs have fewer frames to process.

QUESTION NO: 33
Which of the following would be used in an IP-based video conferencing deployment? (Select
TWO).
A.
RS-232
B.
56k modem
C.
Bluetooth
D.
Codec
E.
SIP

Answer: D,E
Explanation:

The term "codec" is a concatenation of "encoder" and "decoder. In video conferencing, a codec is
software (or can be hardware) that compresses (encodes) raw video data before it is transmitted
over the network. A codec on the receiving video conferencing device will then decompress
(decode) the video signal for display on the conferencing display.
The Session Initiation Protocol (SIP) is a protocol for initiating an interactive user session that
involves multimedia elements such as voice, chat, gaming, or in this case video.

"Pass Any Exam. Any Time." - www.actualtests.com

31

CompTIA N10-006 Exam


QUESTION NO: 34
Which of the following network elements enables unified communication devices to connect to and
traverse traffic onto the PSTN?
A.
Access switch
B.
UC gateway
C.
UC server
D.
Edge router

Answer: B
Explanation:

People use many methods of communication nowadays such as voice, email, video and instant
messaging. People also use many different devices to communicate such as smart phones, PDAs,
computers etc. Unified Communications (UC) enables people using different modes of
communication, different media, and different devices to communicate with anyone, anywhere, at
any time.
Many communication methods use digital signals. To send a digital signal over the analog PSTN,
you need a gateway (in this case a UC Gateway) to convert the digital signals into an analog
format that can be sent over the PSTN.

QUESTION NO: 35
A technician is connecting a NAS device to an Ethernet network. Which of the following
technologies will be used to encapsulate the frames?
A.
HTTPS
B.
"Pass Any Exam. Any Time." - www.actualtests.com

32

CompTIA N10-006 Exam


Fibre channel
C.
iSCSI
D.
MS-CHAP

Answer: C
Explanation:

A NAS or a SAN will use either iSCSI or Fiber Channel. In this question, the NAS is connected to
an Ethernet network. Therefore, iSCSI will most likely be used (Fiber Channel over Ethernet
(FCoE) can be used but is less common). ISCSI means Internet SCSI. ISCSI uses TCP
(Transmission Control Protocol) which enables it to be used over TCP/IP networks such as
Ethernet.
For Fiber channel, a separate Fiber Channel network would be required unless FCoE is used.

QUESTION NO: 36
A SQL server needs several terabytes of disk space available to do an uncompressed backup of a
database. Which of the following devices would be the MOST cost efficient to use for this backup?
A.
iSCSI SAN
B.
FCoE SAN
C.
NAS
D.
USB flash drive

Answer: C
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

33

CompTIA N10-006 Exam


A NAS is a Network Attached Storage device; typically a bunch of cheap hard disks, usually
arranged in a Raid and consisting of either SAS (serial attached SCSI) or Sata disks just like the
ones in most desktops.
A NAS is essentially a file server that connects to an Ethernet network and is configured with a
TCP/IP address. A NAS supports Windows networking and works at the file level as opposed to a
SAN (Storage Area Network) which works at the block level when dealing with data. You can
access file shares on a NAS in the same way that you would access file shares on a file server.
A NAS is a much cheaper option than a SAN.

QUESTION NO: 37
A company has a new offering to provide access to their product from a central location rather
than clients internally hosting the product on the client network. The product contains sensitive
corporate information that should not be accessible from one client to another. This is an example
of which of the following?
A.
Public SaaS
B.
Private SaaS
C.
Hybrid IaaS
D.
Community IaaS

Answer: B
Explanation:

SaaS stands for Software as a Service. This is a cloud model whereby a service provider provides
a software service and makes the service available to customers over the Internet.
Examples of Saas include Microsoft Office 365, Microsoft Exchange Online, Microsoft Lync Online
etc.
Advantages of Saas include ease of administration: no need to install and configure local servers,
"Pass Any Exam. Any Time." - www.actualtests.com
34

CompTIA N10-006 Exam


no need to configure backups, no need to keep the software patched, no need to worry about
system recovery, lower costs: saving on the purchase of server hardware and software; with
SaaS, you lease the service paying either monthly or yearly and compatibility by ensuring that all
users are using the same version of software.
There are two types of SaaS: public and private. With public Saas, multiple customers (usually
companies) share the same servers running the software. With private Saas, the servers running
the software are dedicated to a single customer which provides the isolation and extra security
required when dealing with sensitive information.

QUESTION NO: 38
A technician is helping a SOHO determine where to install the server. Which of the following
should be considered FIRST?
A.
Compatibility requirements
B.
Environment limitations
C.
Cable length
D.
Equipment limitations

Answer: B
Explanation:

SOHO stands for Small Office / Home Office. A SOHO network is typically a small network. Being
a small network, it is unlikely that it will have a datacenter or even a dedicated server room. Any
servers installed in the network will still have the same environmental requirements as servers in a
large network. The servers should be in a secure isolated area if required. The servers also need
to be kept cool and dry. Therefore, the first consideration in a SOHO office is Environment
limitations: where the servers and other network hardware will be located.

"Pass Any Exam. Any Time." - www.actualtests.com

35

CompTIA N10-006 Exam

QUESTION NO: 39
A technician has been given a list of requirements for a LAN in an older building using CAT6
cabling. Which of the following environmental conditions should be considered when deciding
whether or not to use plenum-rated cables?
A.
Workstation models
B.
Window placement
C.
Floor composition
D.
Ceiling airflow condition

Answer: D
Explanation:

In a large building, the plenum is the space between floors used to circulate air through the
building. This space is also an ideal place to run computer network cabling. However, in the event
of fire in the building, the network cables can be very hazardous because when they burn, the
cable insulation gives off a poisonous smoke that gets circulated around the building. Furthermore,
the burning cables help to spread the fire.
Plenum-rated cables are designed to be cabled through the plenum in a building. Plenum-rated
cables are covered in fire-retardant plastic jacket to avoid the risk of toxic smoke being circulated
around the building.

QUESTION NO: 40
A VLAN with a gateway offers no security without the addition of:
A.
"Pass Any Exam. Any Time." - www.actualtests.com

36

CompTIA N10-006 Exam


An ACL.
B.
802.1w.
C.
A RADIUS server.
D.
802.1d.

Answer: A
Explanation:

A gateway in a VLAN connects to another network. The other network can be the Internet, another
subnet on the network or another VLAN. The gateway will be a router and for security, it should
also be a firewall.
A firewall is a system designed to prevent unauthorized access to or from a private network.
Firewalls are frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists)
to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet
passes through the firewall, which examines each message and blocks or allows the message
depending on rules specified in the ACL. The rules in the ACL specify which combinations of
source IP address, destination address in IP port numbers are allowed.

Topic 2, Network operations

QUESTION NO: 41
A company is experiencing accessibility issues reaching services on a cloud-based system. Which
of the following monitoring tools should be used to locate possible outages?
A.
Network analyzer
"Pass Any Exam. Any Time." - www.actualtests.com

37

CompTIA N10-006 Exam


B.
Packet analyzer
C.
Protocol analyzer
D.
Network sniffer

Answer: A
Explanation:

A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on
the network.

QUESTION NO: 42
Company policies require that all network infrastructure devices send system level information to a
centralized server. Which of the following should be implemented to ensure the network
administrator can review device error information from one central location?
A.
TACACS+ server
B.
Single sign-on
C.
SYSLOG server
D.
Wi-Fi analyzer

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

38

CompTIA N10-006 Exam


Syslog is a protocol designed to send log entries generated by a device or process called a facility
across an IP network to a message collector, called a syslog server. A syslog message consists of
an error code and the severity of the error. A syslog server would enable the network administrator
to view device error information from a central location.

QUESTION NO: 43
After a recent breach, the security technician decides the company needs to analyze and
aggregate its security logs. Which of the following systems should be used?
A.
Event log
B.
Syslog
C.
SIEM
D.
SNMP

Answer: C
Explanation:

Using a Security information and event management (SIEM) product, the security logs can be
analyzed and aggregated.
SIEM is a term for software products and services combining security information management
(SIM) and security event management (SEM). SIEM technology provides real-time analysis of
security alerts generated by network hardware and applications. SIEM is sold as software,
appliances or managed services, and are also used to log security data and generate reports for
compliance purposes.
SIEM capabilities include Data aggregation; Log management aggregates data from many
sources, including network, security, servers, databases, applications, providing the ability to
consolidate monitored data to help avoid missing crucial events.

"Pass Any Exam. Any Time." - www.actualtests.com

39

CompTIA N10-006 Exam

QUESTION NO: 44
A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
A.
Regression test
B.
Speed test
C.
Baseline
D.
Statement of work

Answer: C
Explanation:

In networking, baseline can refer to the standard level of performance of a certain device or to the
normal operating capacity for your whole network. High-quality documentation should include a
baseline for network performance, because you and your client need to know what normal looks
like in order to detect problems before they develop into disasters.
A network baseline delimits the amount of available bandwidth available and when. For networks
and networked devices, baselines include information about four key components:
Processor
Memory
Hard-disk (or other storage) subsystem
Network adapter or subsystem

QUESTION NO: 45
"Pass Any Exam. Any Time." - www.actualtests.com

40

CompTIA N10-006 Exam


It has been determined by network operations that there is a severe bottleneck on the company's
mesh topology network. The field technician has chosen to use log management and found that
one router is making routing decisions slower than others on the network. This is an example of
which of the following?
A.
Network device power issues
B.
Network device CPU issues
C.
Storage area network issues
D.
Delayed responses from RADIUS

Answer: B
Explanation:

Network processors (CPUs) are used in the manufacture of many different types of network
equipment such as routers. Such a CPU on a router could become bottleneck for the network
traffic. The routing through that device would then slow down.

QUESTION NO: 46
A network technician receives the following alert from a network device:
"High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54"
Which of the following is being monitored to trigger the alarm?
A.
Speed and duplex mismatch
B.
Wireless channel utilization
"Pass Any Exam. Any Time." - www.actualtests.com

41

CompTIA N10-006 Exam


C.
Network device CPU
D.
Network device memory
E.
Interface link status

Answer: E
Explanation:

This is an error message that indicates that threshold of high utilization of network interface, in this
case interface gi1/0/24, has been exceeded. The message has been triggered on the interface link
status.
Note: gi1/0 would be a gigabyte interface.

QUESTION NO: 47
The administrator's network has OSPF for the internal routing protocol. One port going out to the
Internet is congested. The data is going out to the Internet, but queues up before sending. Which
of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts
"Pass Any Exam. Any Time." - www.actualtests.com

42

CompTIA N10-006 Exam


0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
A.
Set the loopback address
B.
Change the IP address
C.
Change the slash notation
D.
Change duplex to full

Answer: D
Explanation:

From the output we see that the half-duplex is configured. This would not use the full capacity of
ports on the network. By changing to full duplex the throughput would be doubled.
Note: All communications are either half-duplex or full-duplex. During half-duplex communication,
a device can either send communication or receive communication, but not both at the same time.
In full-duplex communication, both devices can send and receive communication at the same time.
This means that the effective throughput is doubled and communication is much more efficient.

QUESTION NO: 48
The RAID controller on a server failed and was replaced with a different brand. Which of the
following will be needed after the server has been rebuilt and joined to the domain?
A.
Vendor documentation
B.
Recent backups
"Pass Any Exam. Any Time." - www.actualtests.com

43

CompTIA N10-006 Exam


C.
Physical IP address
D.
Physical network diagram

Answer: B
Explanation:

If the RAID controller fails and is replaced with a RAID controller with a different brand the RAID
will break. We would have to rebuild a new RAID disk, access and restore the most recent backup
to the new RAID disk.
Note: RAID controller is a hardware device or software program used to manage hard disk drives
(HDDs) or solid-state drives (SSDs) in a computer or storage array so they work as a logical unit.
In hardware-based RAID, a physical controller is used to manage the RAID array.

QUESTION NO: 49
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop
to the new user, the administrator documents the new location, the user of the device and when
the device was reassigned. Which of the following BEST describes these actions?
A.
Network map
B.
Asset management
C.
Change management
D.
Baselines

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

44

CompTIA N10-006 Exam


Documenting the location, the user of the device and the date of the reassignment would be part
of the asset management.
The best way to keep track of your computers and their configurations is to document them
yourself. Large enterprise networks typically assign their own identification numbers to their
computers and other hardware purchases as part of an asset management process that controls
the entire life cycle of each device, from recognition of a need to retirement or disposal.

QUESTION NO: 50
A network technician is diligent about maintaining all system servers' at the most current service
pack level available. After performing upgrades, users experience issues with server-based
applications. Which of the following should be used to prevent issues in the future?
A.
Configure an automated patching server
B.
Virtualize the servers and take daily snapshots
C.
Configure a honeypot for application testing
D.
Configure a test lab for updates

Answer: D
Explanation:

To prevent the service pack issues make sure, before going ahead and applying a new Service
Pack in your production environment, to validate them in a test/lab environment first.

QUESTION NO: 51
"Pass Any Exam. Any Time." - www.actualtests.com

45

CompTIA N10-006 Exam


A system administrator has been tasked to ensure that the software team is not affecting the
production software when developing enhancements. The software that is being updated is on a
very short SDLC and enhancements must be developed rapidly. These enhancements must be
approved before being deployed. Which of the following will mitigate production outages before
the enhancements are deployed?
A.
Implement an environment to test the enhancements.
B.
Implement ACLs that only allow management access to the enhancements.
C.
Deploy an IPS on the production network.
D.
Move the software team's workstations to the DMZ.

Answer: A
Explanation:

Environments are controlled areas where systems developers can build, distribute, install,
configure, test, and execute systems that move through the Software Development Life Cycle
(SDLC). The enhancements can be deployed and tested in a test environment before they are
installed in the production environment.

QUESTION NO: 52
A system administrator wants to update a web-based application to the latest version. Which of
the following procedures should the system administrator perform FIRST?
A.
Remove all user accounts on the server
B.
Isolate the server logically on the network
C.
Block all HTTP traffic to the server
"Pass Any Exam. Any Time." - www.actualtests.com

46

CompTIA N10-006 Exam


D.
Install the software in a test environment

Answer: D
Explanation:

We should test the new version of the application in a test/lab environment first. This way any
potential issues with the new software would not affect the production environment.
Set up a test lab on an isolated network in your organization. Do not set up your test lab in your
production environment.

QUESTION NO: 53
Network segmentation provides which of the following benefits?
A.
Security through isolation
B.
Link aggregation
C.
Packet flooding through all ports
D.
High availability through redundancy

Answer: A
Explanation:

Network segmentation in computer networking is the act or profession of splitting a computer


network into subnetworks, each being a network segment. Advantages of such splitting are
primarily for boosting performance and improving security through isolation.
Advantages of network segmentation:
"Pass Any Exam. Any Time." - www.actualtests.com

47

CompTIA N10-006 Exam


Improved security: Broadcasts will be contained to local network. Internal network structure will not
be visible from outside
Reduced congestion: Improved performance is achieved because on a segmented network there
are fewer hosts per subnetwork, thus minimizing local traffic
Containing network problems: Limiting the effect of local failures on other parts of network

QUESTION NO: 54
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab
equipment connected to her PC. The technician contacts the vendor and determines there is an
incompatibility with the latest IO drivers. Which of the following should the technician perform so
that Ann can get back to work as quickly as possible?
A.
Reformat and install the compatible drivers.
B.
Reset Ann's equipment configuration from a backup.
C.
Downgrade the PC to a working patch level.
D.
Restore Ann's PC to the last known good configuration.
E.
Roll back the drivers to the previous version.

Answer: E
Explanation:

By rolling back the drivers Ann would be able to use her lab equipment again.
To roll back a driver in Windows means to return the driver to the version that was last installed for
the device. Rolling back a driver is an easy way to return a driver to a working version when a
driver update fails to fix a problem or maybe even causes a new problem. Think of rolling back a
driver as a quick and easy way to uninstall the latest driver and then reinstall the previous one, all
automatically.
"Pass Any Exam. Any Time." - www.actualtests.com
48

CompTIA N10-006 Exam

QUESTION NO: 55
Which of the following requires the network administrator to schedule a maintenance window?
A.
When a company-wide email notification must be sent.
B.
A minor release upgrade of a production router.
C.
When the network administrator's laptop must be rebooted.
D.
A major release upgrade of a core switch in a test lab.

Answer: B
Explanation:

During an update of a production router the router would not be able to route packages and the
network traffic would be affected. It would be necessary to announce a maintenance window.
In information technology and systems management, a maintenance window is a period of time
designated in advance by the technical staff, during which preventive maintenance that could
cause disruption of service may be performed.

QUESTION NO: 56
A company has implemented the capability to send all log files to a central location by utilizing an
encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit
has caused the company's encryption to become unsecure. Which of the following would be
required to resolve the exploit?
A.
Utilize a FTP service
"Pass Any Exam. Any Time." - www.actualtests.com

49

CompTIA N10-006 Exam


B.
Install recommended updates
C.
Send all log files through SMTP
D.
Configure the firewall to block port 22

Answer: B
Explanation:

If the encryption is unsecure then we must look for encryption software updates or patches. If they
are available we must install them.
As vulnerabilities are discovered, the vendors of the operating systems or applications often
respond by releasing a patch. A patch is designed to correct a known bug or fix a known
vulnerability in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one
or more features to the software being updated.

QUESTION NO: 57
An outside organization has completed a penetration test for a company. One of the items on the
report is reflecting the ability to read SSL traffic from the web server. Which of the following is the
MOST likely mitigation for this reported item?
A.
Ensure patches are deployed
B.
Install an IDS on the network
C.
Configure the firewall to block traffic on port 443
D.
Implement a VPN for employees
"Pass Any Exam. Any Time." - www.actualtests.com

50

CompTIA N10-006 Exam


Answer: A
Explanation:

As vulnerabilities are discovered, the vendors of the operating systems or applications often
respond by releasing a patch. A patch is designed to correct a known bug or fix a known
vulnerability, such as in this case to be able to read SSL traffic, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one
or more features to the software being updated.

QUESTION NO: 58
A company has had several virus infections over the past few months. The infections were caused
by vulnerabilities in the application versions that are being used. Which of the following should an
administrator implement to prevent future outbreaks?
A.
Host-based intrusion detection systems
B.
Acceptable use policies
C.
Incident response team
D.
Patch management

Answer: D
Explanation:

As vulnerabilities are discovered, the vendors of the operating systems or applications often
respond by releasing a patch. A patch is designed to correct a known bug or fix a known
vulnerability, such as in this case to be vulnerable to virus infections, in a piece of software.
A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one
"Pass Any Exam. Any Time." - www.actualtests.com

51

CompTIA N10-006 Exam


or more features to the software being updated.

QUESTION NO: 59
Which of the following protocols must be implemented in order for two switches to share VLAN
information?
A.
VTP
B.
MPLS
C.
STP
D.
PPTP

Answer: A
Explanation:

The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to
other switches in a group of switches (that is, a VTP domain).

QUESTION NO: 60
A technician is setting up a new network and wants to create redundant paths through the
network. Which of the following should be implemented to prevent performance degradation?
A.
Port mirroring
"Pass Any Exam. Any Time." - www.actualtests.com

52

CompTIA N10-006 Exam


B.
Spanning tree
C.
ARP inspection
D.
VLAN

Answer: B
Explanation:

The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any
bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the
broadcast radiation that results from them. Spanning tree also allows a network design to include
spare (redundant) links to provide automatic backup paths if an active link fails, without the danger
of bridge loops, or the need for manual enabling/disabling of these backup links.

QUESTION NO: 61
A training class is being held in an auditorium. Hard-wired connections are required for all laptops
that will be used. The network technician must add a switch to the room through which the laptops
will connect for full network access. Which of the following must the technician configure on a
switch port, for both switches, in order to create this setup?
A.
DHCP
B.
Split horizon
C.
CIDR
D.
TRUNK

Answer: D
"Pass Any Exam. Any Time." - www.actualtests.com

53

CompTIA N10-006 Exam


Explanation:

We should use trunk ports to set up a VLAN for the laptops that will be used in the auditorium.
A trunk port is a port that is assigned to carry traffic for all the VLANs that are accessible by a
specific switch, a process known as trunking. Trunk ports mark frames with unique identifying tags
either 802.1Q tags or Interswitch Link (ISL) tags as they move between switches. Therefore,
every single frame can be directed to its designated VLAN.

QUESTION NO: 62
A desktop computer is connected to the network and receives an APIPA address but is unable to
reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the
Internet. Which of the following is MOST likely the source of the problem?
A.
802.1q is not configured on the switch port
B.
APIPA has been misconfigured on the VLAN
C.
Bad SFP in the PC's 10/100 NIC
D.
OS updates have not been installed

Answer: A
Explanation:

APIPA addresses are self-configured and are used when the client is unable to get proper IP
configuration from a DHCP server. One possible source of this problem is that switch port, to
which the computer is connected, is misconfigured. The 802.1q protocol is used to configure
VLAN trunking on switch ports.

"Pass Any Exam. Any Time." - www.actualtests.com

54

CompTIA N10-006 Exam

QUESTION NO: 63
Which of the following communication technologies would MOST likely be used to increase
bandwidth over an existing fiber optic network by combining multiple signals at different
wavelengths?
A.
DWDM
B.
SONET
C.
ADSL
D.
LACP

Answer: A
Explanation:

Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly


used in MANs (metropolitan area networks). DWDM uses as many as 32 light wavelengths on a
single fiber, where each wavelength can support as many as 160 simultaneous transmissions
using more than eight active wavelengths per fiber.

QUESTION NO: 64
When two or more links need to pass traffic as if they were one physical link, which of the following
would be used to satisfy the requirement?
A.
Port mirroring
B.
802.1w
"Pass Any Exam. Any Time." - www.actualtests.com

55

CompTIA N10-006 Exam


C.
LACP
D.
VTP

Answer: C
Explanation:

The Link Aggregation Control Protocol (LACP) enables you to assign multiple physical links to a
logical interface, which appears as a single link to a route processor.

QUESTION NO: 65
A technician is configuring a managed switch and needs to enable 802.3af. Which of the following
should the technician enable?
A.
PoE
B.
Port bonding
C.
VLAN
D.
Trunking

Answer: A
Explanation:

Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards.
PoE allows an Ethernet switch to provide power to an attached device (for example, a wireless
access point, security camera, or IP phone) by applying power to the same wires in a UTP cable
"Pass Any Exam. Any Time." - www.actualtests.com
56

CompTIA N10-006 Exam


that are used to transmit and receive data.

QUESTION NO: 66
A technician has finished configuring AAA on a new network device. However, the technician is
unable to log into the device with LDAP credentials but is able to do so with a local user account.
Which of the following is the MOST likely reason for the problem?
A.
Username is misspelled is the device configuration file
B.
IDS is blocking RADIUS
C.
Shared secret key is mismatched
D.
Group policy has not propagated to the device

Answer: C
Explanation:

AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch
could cause login problems.
Authentication, authorization, and accounting (AAA) allows a network to have a single repository
of user credentials. A network administrator can then, for example, supply the same credentials to
log in to various network devices (for example, routers and switches). RADIUS and TACACS+ are
protocols commonly used to communicate with an AAA server.

QUESTION NO: 67
"Pass Any Exam. Any Time." - www.actualtests.com

57

CompTIA N10-006 Exam


Multiple students within a networking lab are required to simultaneously access a single switch
remotely. The administrator checks and confirms that the switch can be accessed using the
console, but currently only one student can log in at a time. Which of the following should be done
to correct this issue?
A.
Increase installed memory and install a larger flash module.
B.
Increase the number of VLANs configured on the switch.
C.
Decrease the number of VLANs configured on the switch.
D.
Increase the number of virtual terminals available.

Answer: D
Explanation:

You can set a limit of how many virtual terminals that can simultaneously be connected to a
switch. Here the limit is set to one, and we should increase it.
For a Cisco network device:
You can use virtual terminal lines to connect to your Cisco NX-OS device, for example a switch.
Secure Shell (SSH) and Telnet create virtual terminal sessions. You can configure an inactive
session timeout and a maximum sessions limit for virtual terminals.
session-limit sessions
Example:
switch(config-line)# session-limit 10
Configures the maximum number of virtual sessions for the Cisco NX-OS device. The range is
from 1 to 64.

QUESTION NO: 68
"Pass Any Exam. Any Time." - www.actualtests.com

58

CompTIA N10-006 Exam


A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to
perform an assessment on the existing wireless network. The technician has recommended an
802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?
A.
MU-MIMO
B.
LWAPP
C.
PoE
D.
MIMO

Answer: D
Explanation:

One way 802.11n achieves superior throughput is through the use of a technology called multiple
input, multiple output (MIMO). MIMO uses multiple antennas for transmission and reception.

QUESTION NO: 69
A network technician must create a wireless link between two buildings in an office park utilizing
the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal
weight as it will be mounted on the outside of the building. Which of the following antenna types is
BEST suited for this solution?
A.
Yagi
B.
Omni-directional
C.
Parabolic
D.
"Pass Any Exam. Any Time." - www.actualtests.com

59

CompTIA N10-006 Exam


Patch

Answer: D
Explanation:

A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat
surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a
limited angle pattern.

Topic 3, Network security

QUESTION NO: 70
Which of the following concepts are MOST important for a company's long term health in the event
of a disaster? (Select TWO).
A.
Redundancy
B.
Implementing acceptable use policy
C.
Offsite backups
D.
Uninterruptable power supplies
E.
Vulnerability scanning

Answer: A,C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

60

CompTIA N10-006 Exam


In case of disaster you must protect your data. Some of the most common strategies for data
protection include:
backups made to tape and sent off-site at regular intervals
backups made to disk on-site and automatically copied to off-site disk, or made directly to off-site
disk
the use of high availability systems which keep both the data and system replicated off-site
(making the main site redundant), enabling continuous access to systems and data, even after a
disaster.

QUESTION NO: 71
An organization notices a large amount of malware and virus incidents at one satellite office, but
hardly any at another. All users at both sites are running the same company image and receive
the same group policies. Which of the following has MOST likely been implemented at the site with
the fewest security issues?
A.
Consent to monitoring
B.
Business continuity measures
C.
Vulnerability scanning
D.
End-user awareness training

Answer: D
Explanation:

Users should have security awareness training and should have all accepted and signed
acceptable use policy (AUP) agreements. User awareness training is one of the most significant
countermeasures the company can implement.

"Pass Any Exam. Any Time." - www.actualtests.com

61

CompTIA N10-006 Exam

QUESTION NO: 72
Which of the following technologies is designed to keep systems uptime running in the event of a
disaster?
A.
High availability
B.
Load balancing
C.
Quality of service
D.
Caching engines

Answer: A
Explanation:

If a network switch or router stops operating correctly (meaning that a network fault occurs),
communication through the network could be disrupted, resulting in a network becoming
unavailable to its users. Therefore, network availability, called uptime, is a major design
consideration.

QUESTION NO: 73
A network technician is assisting the company with developing a new business continuity plan.
Which of the following would be an appropriate suggestion to add to the plan?
A.
Build redundant links between core devices
B.
Physically secure all network equipment
"Pass Any Exam. Any Time." - www.actualtests.com

62

CompTIA N10-006 Exam


C.
Maintain up-to-date configuration backups
D.
Perform reoccurring vulnerability scans

Answer: A
Explanation:

The business continuity plan focuses on the tasks carried out by an organization to ensure that
critical business functions continue to operate during and after a disaster.
By keeping redundant links between core devices critical business services can be kept running if
one link is unavailable during a disaster.

QUESTION NO: 74
Which of the following describes a smurf attack?
A.
Attack on a target using spoofed ICMP packets to flood it
B.
Intercepting traffic intended for a target and redirecting it to another
C.
Spoofed VLAN tags used to bypass authentication
D.
Forging tags to bypass QoS policies in order to steal bandwidth

Answer: A
Explanation:

The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet
Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are
"Pass Any Exam. Any Time." - www.actualtests.com

63

CompTIA N10-006 Exam


broadcast to a computer network using an IP Broadcast address.
Most devices on a network will, by default, respond to this by sending a reply to the source IP
address. If the number of machines on the network that receive and respond to these packets is
very large, the victim's computer will be flooded with traffic. This can slow down the victim's
computer to the point where it becomes impossible to work on.

QUESTION NO: 75
A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of
the following attacks is the user MOST likely using?
A.
DNS poisoning
B.
ARP poisoning
C.
Reflection
D.
SYN attack

Answer: B
Explanation:

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker
changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the
target computer's ARP cache with a forged ARP request and reply packets. This modifies the
layer -Ethernet MAC address into the hacker's known MAC address to monitor it. Because the
ARP replies are forged, the target computer unintentionally sends the frames to the hacker's
computer first instead of sending it to the original destination. As a result, both the user's data and
privacy are compromised.

"Pass Any Exam. Any Time." - www.actualtests.com

64

CompTIA N10-006 Exam

QUESTION NO: 76
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a
network. This is an example of which of the following attacks?
A.
Smurf attack
B.
VLAN hopping
C.
Bluesnarfing
D.
Spear phishing

Answer: B
Explanation:

The VoIP phone port can be used to attack a VLAN on the local network.
VLAN hopping is a computer security exploit, a method of attacking networked resources on a
Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host
on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

QUESTION NO: 77
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without
any response from the server. Which of the following is the BEST explanation that describes this
scenario?
A.
Compromised system
B.
"Pass Any Exam. Any Time." - www.actualtests.com

65

CompTIA N10-006 Exam


Smurf attack
C.
SQL injection attack
D.
Man-in-the-middle

Answer: A
Explanation:

As the extra unexplainable traffic comes from an internal host on your network we can assume
that this host has been compromised.
If your system has been compromised, somebody is probably using your machine--possibly to
scan and find other machines to compromise

QUESTION NO: 78
A technician needs to ensure that new systems are protected from electronic snooping of Radio
Frequency emanations. Which of the following standards should be consulted?
A.
DWDM
B.
MIMO
C.
TEMPEST
D.
DOCSIS

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

66

CompTIA N10-006 Exam


Tempest was the name of a government project to study the ability to understand the data over a
network by listening to the emanations. Tempest rooms are designed to keep emanations
contained in that room to increase security of data communications happening there.

QUESTION NO: 79
A company has decided to update their usage policy to allow employees to surf the web
unrestricted from their work computers. Which of the following actions should the IT security team
implement to help protect the network from attack as a result of this new policy?
A.
Install host-based anti-malware software
B.
Implement MAC filtering on all wireless access points
C.
Add an implicit deny to the core router ACL
D.
Block port 80 outbound on the company firewall
E.
Require users to utilize two-factor authentication

Answer: A
Explanation:

To protect the computers from employees installing malicious software they download on the
internet, antimalware should be run on all systems.
After a single machine in a company is compromised and is running malicious software (malware),
the attacker can then use that single computer to proceed further into the internal network using
the compromised host as a pivot point. The malware may have been implemented by an outside
attacker or by an inside disgruntled employee.

"Pass Any Exam. Any Time." - www.actualtests.com

67

CompTIA N10-006 Exam

QUESTION NO: 80
Which of the following would be the result of a user physically unplugging a VoIP phone and
connecting it into another interface with switch port security enabled as the default setting?
A.
The VoIP phone would request a new phone number from the unified communications server.
B.
The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
C.
The VoIP phone would be able to receive incoming calls but will not be able to make outgoing
calls.
D.
The VoIP phone would request a different configuration from the unified communications server.

Answer: B
Explanation:

Without configuring any other specific parameters, the switchport security feature will only permit
one MAC address to be learned per switchport (dynamically) and use the shutdown violation
mode; this means that if a second MAC address is seen on the switchport the port will be
shutdown and put into the err-disabled state.

QUESTION NO: 81
A network technician has been tasked to configure a new network monitoring tool that will examine
interface settings throughout various network devices. Which of the following would need to be
configured on each network device to provide that information in a secure manner?
A.
S/MIME
B.
"Pass Any Exam. Any Time." - www.actualtests.com

68

CompTIA N10-006 Exam


SYSLOG
C.
PGP
D.
SNMPv3
E.
RSH

Answer: D
Explanation:

The network monitoring need to use a network management protocol. SNMP has become the de
facto standard of network management protocols. The security weaknesses of SNMPv1 and
SNMPv2c are addressed in SNMPv3.

QUESTION NO: 82
A technician wants to securely manage several remote network devices. Which of the following
should be implemented to securely manage the devices?
A.
WPA2
B.
IPv6
C.
SNMPv3
D.
RIPv2

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

69

CompTIA N10-006 Exam


To manage the remote network devices we need to use a network management protocol. SNMP
has become the de facto standard of network management protocols. The security weaknesses of
SNMPv1 and SNMPv2c are addressed in SNMPv3.

QUESTION NO: 83
A technician needs to secure web traffic for a new e-commerce website. Which of the following will
secure traffic between a web browser and a website?
A.
SSL
B.
DNSSEC
C.
WPA2
D.
MTU

Answer: A
Explanation:

Secure Sockets Layer (SSL) provides cryptography and reliability for upper layers (Layers 57) of
the OSI model. SSL (and TLS) provide secure web browsing (web traffic) via Hypertext Transfer
Protocol Secure (HTTPS).

QUESTION NO: 84
A company has seen an increase in ransomware across the enterprise. Which of the following
should be implemented to reduce the occurrences?
"Pass Any Exam. Any Time." - www.actualtests.com

70

CompTIA N10-006 Exam


A.
ARP inspection
B.
Intrusion detection system
C.
Web content filtering
D.
Port filtering

Answer: C
Explanation:

Ransomware is a type of malware which restricts access to the computer system that it infects,
and demands a ransom paid to the creator(s) of the malware in order for the restriction to be
removed.
The best way to avoid ransomware include proactive measures like the following:
Dont click on any URL or open an attachment you are not expecting.
Implement an email content filtering service
Install a web content filtering service
Invest in leading end point security software solutions

QUESTION NO: 85
A company wants to make sure that users are required to authenticate prior to being allowed on
the network. Which of the following is the BEST way to accomplish this?
A.
802.1x
B.
802.1p
"Pass Any Exam. Any Time." - www.actualtests.com

71

CompTIA N10-006 Exam


C.
Single sign-on
D.
Kerberos

Answer: A
Explanation:

For security purposes, some switches require users to authenticate themselves (that is, provide
credentials, such as a username and password, to prove who they are) before gaining access to
the rest of the network. A standards-based method of enforcing user authentication is IEEE
802.1X.

QUESTION NO: 86
A wireless network technician for a local retail store is installing encrypted access points within the
store for real-time inventory verification, as well as remote price checking capabilities, while
employees are away from the registers. The store is in a fully occupied strip mall that has multiple
neighbors allowing guest access to the wireless networks. There are a finite known number of
approved handheld devices needing to access the store's wireless network. Which of the following
is the BEST security method to implement on the access points?
A.
Port forwarding
B.
MAC filtering
C.
TLS/TTLS
D.
IP ACL

Answer: B
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

72

CompTIA N10-006 Exam


MAC filtering allows traffic to be permitted or denied based on a devices MAC address. We make
a MAC filtering which contains the MAC addresses of all approved devices that need to access the
wireless network. This ensures that only approved devices are given access to the network.

QUESTION NO: 87
A network technician has set up an FTP server for the company to distribute software updates for
their products. Each vendor is provided with a unique username and password for security.
Several vendors have discovered a virus in one of the security updates. The company tested all
files before uploading them but retested the file and found the virus. Which of the following could
the technician do for vendors to validate the proper security patch?
A.
Use TFTP for tested and secure downloads
B.
Require biometric authentication for patch updates
C.
Provide an MD5 hash for each file
D.
Implement a RADIUS authentication

Answer: C
Explanation:

If we put an MD5 has for each file we can see if the file has been changed or not.
MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message
digest from data input (which may be a message of any length) that is claimed to be as unique to
that specific data as a fingerprint is to the specific individual.

"Pass Any Exam. Any Time." - www.actualtests.com

73

CompTIA N10-006 Exam


QUESTION NO: 88
During a check of the security control measures of the company network assets, a network
administrator is explaining the difference between the security controls at the company. Which of
the following would be identified as physical security controls? (Select THREE).
A.
RSA
B.
Passwords
C.
Man traps
D.
Biometrics
E.
Cipher locks
F.
VLANs
G.
3DES

Answer: C,D,E
Explanation:

Physical security is the protection of personnel, hardware, programs, networks, and data from
physical circumstances and events that could cause serious losses or damage to an enterprise,
agency, or institution. This includes protection from fire, natural disasters, burglary, theft,
vandalism, and terrorism.
C: A mantrap is a mechanical physical security devices for catching poachers and trespassers.
They have taken many forms, the most usual being like a large foothold trap, the steel springs
being armed with teeth which met in the victim's leg.
D: Biometric authentication is a type of system that relies on the unique biological characteristics
of individuals to verify identity for secure access to electronic systems. Biometric authentication is
a physical security device.
E: Cipher locks are used to control access to areas such as airport control towers, computer
rooms, corporate offices, embassies, areas within financial institutions, research and development
laboratories, and storage areas holding weapons, controlled substances, etc. Cipher locks are
"Pass Any Exam. Any Time." - www.actualtests.com

74

CompTIA N10-006 Exam


physical security devices.

QUESTION NO: 89
Which of the following physical security controls prevents an attacker from gaining access to a
network closet?
A.
CCTVs
B.
Proximity readers
C.
Motion sensors
D.
IP cameras

Answer: B
Explanation:

A proximity card is a physical card which used to get access to a physical area such as a network
closet.
It is a "contactless" smart card which can be read without inserting it into a reader device, as
required by earlier magnetic stripe cards such as credit cards and "contact" type smart cards. The
proximity cards are part of the Contactless card technologies. Held near an electronic reader for a
moment they enable the identification of an encoded number.
Note: Physical security is the protection of personnel, hardware, programs, networks, and data
from physical circumstances and events that could cause serious losses or damage to an
enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary,
theft, vandalism, and terrorism.

"Pass Any Exam. Any Time." - www.actualtests.com

75

CompTIA N10-006 Exam


QUESTION NO: 90
A technician needs to install software onto company laptops to protect local running services, from
external threats. Which of the following should the technician install and configure on the laptops if
the threat is network based?
A.
A cloud-based antivirus system with a heuristic and signature based engine
B.
A network based firewall which blocks all inbound communication
C.
A host-based firewall which allows all outbound communication
D.
A HIDS to inspect both inbound and outbound network communication

Answer: C
Explanation:

A host-based firewall is a computer running firewall software that can protect the computer itself.
For example, it can prevent incoming connections to the computer and allow outbound
communication only.

QUESTION NO: 91
A technician is setting up a computer lab. Computers on the same subnet need to communicate
with each other using peer to peer communication. Which of the following would the technician
MOST likely configure?
A.
Hardware firewall
B.
Proxy server
C.
Software firewall
"Pass Any Exam. Any Time." - www.actualtests.com

76

CompTIA N10-006 Exam


D.
GRE tunneling

Answer: C
Explanation:

A host-based firewall is a computer running firewall software that can protect the computer itself. A
software firewall would be the most cost effective in a lab scenario.

QUESTION NO: 92
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the
DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the
10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners
would meet the company's objectives?
A.
11, 10, 12, 13
B.
12, 10, 11, 13
C.
13, 10, 12, 11
D.
13, 12, 11, 10

"Pass Any Exam. Any Time." - www.actualtests.com

77

CompTIA N10-006 Exam


Answer: A
Explanation:

ACL are processed in TOP DOWN process in routers or switches. This means that when a
condition in the ACL is met, all processing is stopped.
We start by allowing any protocol on the 10.200.0.0/16 subnet:11. Allow 10.200.0.0/16 to Any
DMZ eq to Any
We then deny any traffic on TCP port 22:10. Deny Any Trust to Any DMZ eq to TCP port 22
We allow browsing (port 80 and 443) on the 10.0.0.0/8 subnet:Allow 10.0.0.0/8 to Any DMZ eq to
TCP ports 80, 443
Finally we deny all other traffic:13. Deny Any Trust to Any DMZ eq to Any

QUESTION NO: 93
A technician is installing a surveillance system for a home network. The technician is unsure which
ports need to be opened to allow remote access to the system. Which of the following should the
technician perform?
A.
Disable the network based firewall
B.
Implicit deny all traffic on network
C.
Configure a VLAN on Layer 2 switch
D.
Add the system to the DMZ

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

78

CompTIA N10-006 Exam


By putting the system in the DMZ (demilitarized zone) we increase the security, as the system
should be opened for remote access.
A DMZ is a computer host or small network inserted as a "neutral zone" between a company's
private network and the outside public network. It prevents outside users from getting direct
access to a server that has company data. A DMZ often contains servers that should be
accessible from the public Internet.

QUESTION NO: 94
The ability to make access decisions based on an examination of Windows registry settings,
antivirus software, and AD membership status is an example of which of the following NAC
features?
A.
Quarantine network
B.
Persistent agents
C.
Posture assessment
D.
Non-persistent agents

Answer: C
Explanation:

Network Admission Control (NAC) can permit or deny access to a network based on
characteristics of the device seeking admission, rather than just checking user credentials. For
example, a clients OS, Windows Registry settings, AD membership status, and version of
antivirus software could be checked against a set of requirements before allowing the client to
access a network.
This process of checking a clients characteristics is called posture assessment.

"Pass Any Exam. Any Time." - www.actualtests.com

79

CompTIA N10-006 Exam

QUESTION NO: 95
Which of the following types of network would be set up in an office so that customers could
access the Internet but not be given access to internal resources such as printers and servers?
A.
Quarantine network
B.
Core network
C.
Guest network
D.
Wireless network

Answer: C
Explanation:

A wireless guest network could be set up so that it has limited access (no access to local
resources) but does provide Internet access for guest users.

QUESTION NO: 96
Which of the following is a security benefit gained from setting up a guest wireless network?
A.
Optimized device bandwidth
B.
Isolated corporate resources
C.
Smaller ACL changes
D.
"Pass Any Exam. Any Time." - www.actualtests.com

80

CompTIA N10-006 Exam


Reduced password resets

Answer: B
Explanation:

A wireless guest network could be set up so that it has limited access (no access to local
resources) but does provide Internet access for guest users. The corporate resources would be
inaccessible (isolated) from the guest network.

QUESTION NO: 97
Ann, a network technician, was asked to remove a virus. Issues were found several levels deep
within the directory structure. To ensure the virus has not infected the .mp4 files in the directory,
she views one of the files and believes it contains illegal material. Which of the following forensics
actions should Ann perform?
A.
Erase the files created by the virus
B.
Stop and escalate to the proper authorities
C.
Check the remaining directories for more .mp4 files
D.
Copy the information to a network drive to preserve the evidence

Answer: B
Explanation:

Computer forensics is about legal evidence found in computers and digital storage.
A plan should include first responders securing the area and then escalating to senior
management and authorities when required by policy or law.
"Pass Any Exam. Any Time." - www.actualtests.com

81

CompTIA N10-006 Exam

QUESTION NO: 98
A network technician was tasked to respond to a compromised workstation. The technician
documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which
of the following steps of incident handling has been incorrectly performed?
A.
Document the scene
B.
Forensics report
C.
Evidence collection
D.
Chain of custody

Answer: D
Explanation:

To verify the integrity of data since a security incident occurred, you need to be able to show a
chain of custody.
A chain of custody documents who has been in possession of the data (evidence) since a security
breach occurred. A well-prepared organization will have process and procedures that are used
when an incident occurs.
A plan should include first responders securing the area and then escalating to senior
management and authorities when required by policy or law. The chain of custody also includes
documentation of the scene, collection of evidence, and maintenance, e-discovery (which is the
electronic aspect of identifying, collecting, and producing electronically stored information),
transportation of data, forensics reporting, and a process to preserve all forms of evidence and
data when litigation is expected. The preservation of the evidence, data, and details is referred to
as legal hold.

Topic 4, Troubleshooting
"Pass Any Exam. Any Time." - www.actualtests.com

82

CompTIA N10-006 Exam


QUESTION NO: 99
A network technician is using a network monitoring system and notices that every device on a
particular segment has lost connectivity. Which of the following should the network technician do
NEXT?
A.
Establish a theory of probable cause.
B.
Document actions and findings.
C.
Determine next steps to solve the problem.
D.
Determine if anything has changed.

Answer: D
Explanation:

The technician has already identified the symptom: Loss of connectivity on a specific network
segment. The next step in identifying the problem is to Determine if anything has changed.
Common troubleshooting steps and procedures:
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
Determine if anything has changed.
2. Establish a theory of probable cause.
Question the obvious.
3. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.
If theory is not confirmed, re-establish a new theory or escalate.
4. Establish a plan of action to resolve the problem and identify potential effects.
"Pass Any Exam. Any Time." - www.actualtests.com

83

CompTIA N10-006 Exam


5. Implement the solution or escalate as necessary.
6. Verify full system functionality and if applicable implement preventive measures.
7. Document findings, actions, and outcomes.

QUESTION NO: 100


A user calls the help desk and states that he was working on a spreadsheet and was unable to
print it. However, his colleagues are able to print their documents to the same shared printer.
Which of the following should be the FIRST question the helpdesk asks?
A.
Does the printer have toner?
B.
Are there any errors on the printer display?
C.
Is the user able to access any network resources?
D.
Is the printer powered up?

Answer: C
Explanation:

The user has already provided you with the information relevant to the first step in the 7-step
troubleshooting process. The next step is to Question the obvious. The user has stated: his
colleagues are able to print their documents to the same shared printer. The obvious question in
this instance is whether the user can access any network resources.
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
"Pass Any Exam. Any Time." - www.actualtests.com

84

CompTIA N10-006 Exam


Determine if anything has changed.
2. Establish a theory of probable cause.
Question the obvious.
3. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.
If theory is not confirmed, re-establish a new theory or escalate.
4. Establish a plan of action to resolve the problem and identify potential effects.
5. Implement the solution or escalate as necessary.
6. Verify full system functionality and if applicable implement preventive measures.
7. Document findings, actions, and outcomes.

QUESTION NO: 101


A network technician has detected duplicate IP addresses on the network. After testing the
behavior of rogue DHCP servers, the technician believes that the issue is related to an
unauthorized home router. Which of the following should the technician do NEXT in the
troubleshooting methodology?
A.
Document the findings and action taken.
B.
Establish a plan to locate the rogue DHCP server.
C.
Remove the rogue DHCP server from the network.
D.
Identify the root cause of the problem.

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

85

CompTIA N10-006 Exam


By testing the behavior of rogue DHCP servers and determining that the issue is related to an
unauthorized home router, the technician has completed the third step in the 7-step
troubleshooting process. The next step is to establish a plan of action to resolve the problem and
identify potential effects. Establishing a plan to locate the rogue DHCP server meets the
requirements of this step.
1. Identify the problem.
Information gathering.
Identify symptoms.
Question users.
Determine if anything has changed.
2. Establish a theory of probable cause.
Question the obvious.
3. Test the theory to determine cause:
When the theory is confirmed, determine the next steps to resolve the problem.
If theory is not confirmed, re-establish a new theory or escalate.
4. Establish a plan of action to resolve the problem and identify potential effects.
5. Implement the solution or escalate as necessary.
6. Verify full system functionality and if applicable implement preventive measures.
7. Document findings, actions, and outcomes.

QUESTION NO: 102


A technician is troubleshooting a client's connection to a wireless network. The client is asked to
run a "getinfo" command to list information about the existing condition.
myClient$ wificard --getinfo
agrCtlRSSI:-72
agrExtRSSI:0
state:running
"Pass Any Exam. Any Time." - www.actualtests.com

86

CompTIA N10-006 Exam


op mode: station
lastTxRate:178
MaxRate:300
802.11 auth:open
link auth:wpa2-psk
BSSID:0F:33:AE:F1:02:0A
SSID:CafeWireless
Channel:149,1
Given this output, which of the following has the technician learned about the wireless network?
(Select TWO).
A.
The WAP is using RC4 encryption
B.
The WAP is using 802.11a
C.
The WAP is using AES encryption
D.
The WAP is using the 2.4GHz channel
E.
The WAP is using the 5GHz channel
F.
The WAP is using 802.11g

Answer: C,E
Explanation:

WPA2 makes use of the Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol (CCMP) encryption protocol, which is an AES based protocol.
The output shows that the wireless network operates on channel 149, which is a channel in the
5GHz band.

"Pass Any Exam. Any Time." - www.actualtests.com

87

CompTIA N10-006 Exam

QUESTION NO: 103


An administrator only has telnet access to a remote workstation. Which of the following utilities will
identify if the workstation uses DHCP?
A.
tracert
B.
ping
C.
dig
D.
ipconfig
E.
netstat

Answer: D
Explanation:

The ipconfig command displays the TCP/IP configuration of a Windows system. The ipconfig /all
command displays the systems TCP/IP configuration in detail. This output includes whether
DHCP is enabled or not.

QUESTION NO: 104


A network technician is performing a tracert command to troubleshoot a website-related issue. The
following output is received for each hop in the tracert:
1 * * * Request timed out.
2 * * * Request timed out.
3 * * * Request timed out.
"Pass Any Exam. Any Time." - www.actualtests.com

88

CompTIA N10-006 Exam


The technician would like to see the results of the tracert command. Which of the following will
allow the technician to perform tracert on external sites but not allow outsiders to discover
information from inside the network?
A.
Enable split horizon to allow internal tracert commands to pass through the firewall
B.
Enable IGMP messages out and block IGMP messages into the network
C.
Configure the firewall to allow echo reply in and echo request out of the network
D.
Install a backdoor to access the router to allow tracert messages to pass through

Answer: C
Explanation:

Tracert makes use of ICMP echo packets to trace the route between two hosts. For the command
to be successful, the firewall has to allow incoming echo replies and outgoing echo requests.

QUESTION NO: 105


A network technician has received comments from several users that cannot reach a particular
website. Which of the following commands would provide the BEST information about the path
taken across the network to this website?
A.
ping
B.
netstat
C.
telnet
D.
tracert
"Pass Any Exam. Any Time." - www.actualtests.com

89

CompTIA N10-006 Exam


Answer: D
Explanation:

The tracert command is used to determine the amount of hops a packet takes to reach a
destination. It makes use of ICMP echo packets to report information at every step in the journey.
This is how the path taken across the network is obtained.

QUESTION NO: 106


After connecting a workstation directly to a small business firewall, a network administrator is
trying to manage it via HTTPS without losing its stored configuration. The only two pieces of
information that the network administrator knows about the firewall are the management interface
MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password. Which of the
following will allow the administrator to log onto the firewall via HTTPS if the management's IP
address is unknown and the administrator's workstation IP address is 192.168.0.10/23?
A.
Use the reset button on the back of the firewall to restore it to its factory default, and then log onto
B.
Run the following command on the administrator's workstation: arp s 192.168.1.200
01:4a:d1:fa:b1:0e
C.
Use an SNMP tool to query the firewall properties and determine the correct management IP
address
D.
Use a crossover cable to connect to the console port and reconfigure the firewall management IP
to 192.168.0.1

Answer: B
Explanation:

Address Resolution Protocol (ARP) is used to resolve IP addresses to MAC addresses. The arp
s command adds a static permanent address to the ARP cache. This will allow the administrator
"Pass Any Exam. Any Time." - www.actualtests.com
90

CompTIA N10-006 Exam


to access the firewall.

QUESTION NO: 107


A network technician has detected a personal computer that has been physically connected to the
corporate network. Which of the following commands would the network technician use to locate
this unauthorized computer and determine the interface it is connected to?
A.
nbtstat a
B.
show mac address-table
C.
show interface status
D.
show ip access-list
E.
nslookup hostname

Answer: B
Explanation:

The show mac address-table command is used to view the ageing timer, and also the unicast and
multicast MAC addresses stored in the MAC address table by the switch. Furthermore, you can
view all of the addresses in the table or only the addresses learned or specified on a particular port
or VLAN.

QUESTION NO: 108


"Pass Any Exam. Any Time." - www.actualtests.com

91

CompTIA N10-006 Exam


A technician has verified that a recent loss of network connectivity to multiple workstations is due
to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its
physical location within the wall?
A.
Cable certifier
B.
Multimeter
C.
Cable tester
D.
Toner probe

Answer: D
Explanation:

Toner probes are specifically used to trace cables hidden in floors, ceilings, or walls. They can
also be used to track cables from the patch panels to their destinations.

QUESTION NO: 109


A user connects to a wireless network at the office and is able to access unfamiliar SMB shares
and printers. Which of the following has happened to the user?
A.
The user is connected using the wrong channel.
B.
The user is connected to the wrong SSID.
C.
The user is experiencing an EMI issue.
D.
The user is connected to the wrong RADIUS server.
"Pass Any Exam. Any Time." - www.actualtests.com

92

CompTIA N10-006 Exam


Answer: B
Explanation:

The user is connecting to an SSID assigned to a different subnet. Therefore, the user has access
to SMB shares and printers that are not recognizable.

QUESTION NO: 110


A network technician is performing a wireless survey in the office and discovers a device that was
not installed by the networking team. This is an example of which of following threats?
A.
Bluesnarfing
B.
DDoS
C.
Brute force
D.
Rogue AP

Answer: D
Explanation:

A rogue access point is when a wireless access point is located on a network without the
administrator being aware of it. Therefore, if the device was not installed by the networking team,
the administrator would not know about it being there.

"Pass Any Exam. Any Time." - www.actualtests.com

93

CompTIA N10-006 Exam


QUESTION NO: 111
Ann, a user, is experiencing an issue with her wireless device. While in the conference area, the
wireless signal is steady and strong. However, at her desk the signal is consistently dropping, yet
the device indicates a strong signal. Which of the following is the MOST likely cause of the issue?
A.
Signal-to-noise ratio
B.
AP configuration
C.
Incorrect SSID
D.
Bounce

Answer: D
Explanation:

The signal between the access point and Anns wireless device is being bounced off walls,
windows, glass mirrors, carpeted floors, and many other objects. This results in the slow
connection. The radio waves are travelling at the same rate, but as a result of signal bounce, it's
taking longer to reach its destination.

QUESTION NO: 112 CORRECT TEXT


Wireless network users recently began experiencing speed and performance issues after access
point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to
a consultant's specifications and has always worked without a problem.
You, a network technician, have been tasked with evaluating the situation and resolving the issues
to improve both performance and connectivity. Refer to the following diagram and perform any
NECESSARY changes to the wireless and wired infrastructure by adjusting devices.
Note: Adjust the LEAST number of devices needed to fix the issue, all blue icons in the image are
clickable. When you feel the simulation is complete please select the Done button.

"Pass Any Exam. Any Time." - www.actualtests.com

94

CompTIA N10-006 Exam

"Pass Any Exam. Any Time." - www.actualtests.com

95

CompTIA N10-006 Exam

"Pass Any Exam. Any Time." - www.actualtests.com

96

CompTIA N10-006 Exam

Explanation:

Since we know that the network was running perfectly before replacing AP2 we should start by
looking at this new device that was used to replace the old one. Here we see that the other APs
"Pass Any Exam. Any Time." - www.actualtests.com

97

CompTIA N10-006 Exam


have hard coded the speed and duplex settings to 100/full, while AP2 is set to auto/auto.
Also, the other APs have been configured to use 802.11G, while AP2 is using 802.11B.
Finally the channel that AP2 is using overlaps with AP1 which can cause problems. Channels 1, 6,
and 11 are spaced far enough apart that they dont overlap. On a non-MIMO setup (i.e. 802.11 a,
b, or g) you should always try to use channel 1, 6, or 11. Since AP1 is using 1, and AP3 is using
11, AP2 should be using 6.
References:
Dulaney, Emmett and Mike Harwood, CompTIA Network+ Authorized Exam Cram, Fourth Edition,
Pearson, Indianapolis, 2012, p 269.
Lammle, Todd, CompTIA Network+ Deluxe Study Guide, Deluxe Edition, Wiley Publishing, Inc.,
Indianapolis, 2009, pp 676, 677.
http://en.wikipedia.org/wiki/List_of_WLAN_channels#2.4.C2.A0GHz_.28802.11b.2Fg.2Fn.29

QUESTION NO: 113


A network technician has received a help desk ticket indicating that after the new wireless access
point was installed, all of the media department's devices are experiencing sporadic wireless
connectivity. All other departments are connecting just fine and the settings on the new access
point were copied from the baseline. Which of the following is a reason why the media department
is not connecting?
A.
Wrong SSID
B.
Rogue access point
C.
Placement
D.
Channel mismatch

Answer: C

"Pass Any Exam. Any Time." - www.actualtests.com

98

CompTIA N10-006 Exam


Explanation:

The sporadic wireless connectivity is being caused by interference. Moving the access point to a
different location would solve the problem.

QUESTION NO: 114


A technician recently ran a 20-meter section of CAT6 to relocate a control station to a more central
area on the production floor. Since the relocation, the helpdesk has received complaints about
intermittent operation. During the troubleshooting process, the technician noticed that collisions
are only observed on the switch port during production. Given this information, which of the
following is the cause of the problem?
A.
Distance limitation
B.
Electromagnetic interference
C.
Cross talk
D.
Speed and duplex mismatch

Answer: B
Explanation:

When cables are installed near electrical devices the signal within the cable might become corrupt.
The cable connecting the control station to the switch port is now surrounded by the production
machinery. Electromagnetic interference could occur when the machinery is running, causing the
intermittent operation.

"Pass Any Exam. Any Time." - www.actualtests.com

99

CompTIA N10-006 Exam

QUESTION NO: 115


A technician is troubleshooting a wired device on the network. The technician notices that the link
light on the NIC does not illuminate. After testing the device on a different RJ-45 port, the device
connects successfully. Which of the following is causing this issue?
A.
EMI
B.
RFI
C.
Cross-talk
D.
Bad wiring

Answer: D
Explanation:

The question states that the device worked on a different port. This indicates that the wiring is
faulty.

QUESTION NO: 116


A technician is tasked with connecting a router to a DWDM. The technician connects the router to
the multiplexer and confirms that there is a good signal level. However, the interface on the router
will not come up. Which of the following is the MOST likely cause?
A.
The wrong wavelength was demuxed from the multiplexer.
B.
The SFP in the multiplexer is malfunctioning.
"Pass Any Exam. Any Time." - www.actualtests.com

100

CompTIA N10-006 Exam


C.
There is a dirty connector on the fiber optic cable.
D.
The fiber optic cable is bent in the management tray.

Answer: A
Explanation:

A multiplexer (or mux) is a device that selects one of several analog or digital input signals and
forwards the selected input into a single line. A demultiplexer (or demux) is a device taking a
single input signal and selecting one of many data-output-lines, which is connected to the single
input. Since the signal going in is good, the problem must be with the signal output. If the correct
wavelength was demultiplexed, the interface will be displayed on the router.

QUESTION NO: 117


While troubleshooting a network outage, a technician finds a 100-meter fiber cable with a small
service loop and suspects it might be the cause of the outage. Which of the following is MOST
likely the issue?
A.
Maximum cable length exceeded
B.
Dirty connectors
C.
RF interference caused by impedance mismatch
D.
Bend radius exceeded

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

101

CompTIA N10-006 Exam


The excessive bending of fiber-optic cables can increase microbending and macrobending losses.
Microbending causes light attenuation induced by deformation of the fiber, while macrobending
causes the leakage of light through the fiber cladding and this is more likely to happen where the
fiber is excessively bent.

QUESTION NO: 118


A network technician has been assigned to install an additional router on a wireless network. The
router has a different SSID and frequency. All users on the new access point and the main
network can ping each other and utilize the network printer, but all users on the new router cannot
get to the Internet. Which of the following is the MOST likely cause of this issue?
A.
The gateway is misconfigured on the new router.
B.
The subnet mask is incorrect on the new router.
C.
The gateway is misconfigured on the edge router.
D.
The SSID is incorrect on the new router.

Answer: A
Explanation:

A missing or incorrect default gateway parameter limits communication to the local segment.
The question states: All users on the new access point and the main network can ping each other
and utilize the network printer, but all users on the new router cannot get to the Internet.

QUESTION NO: 119


"Pass Any Exam. Any Time." - www.actualtests.com

102

CompTIA N10-006 Exam


While troubleshooting a connectivity issue, a network technician determines the IP address of a
number of workstations is 169.254.0.0/16 and the workstations cannot access the Internet. Which
of the following should the technician check to resolve the problem?
A.
Default gateway address
B.
Misconfigured DNS
C.
DHCP server
D.
NIC failure

Answer: C
Explanation:

If a DHCP server fails, the workstations are assigned an address from the 169.254.0.0 address
range by Automatic Private IP Addressing (APIPA). APIPA also configures a suitable subnet
mask, but it doesnt configure the system with a default gateway address. This allows
communication on the local network, but not externally.

QUESTION NO: 120


A network engineer is troubleshooting an issue with a computer that is unable to connect to the
Internet. The network engineer analyzes the following output from a command line utility:
Network DestinationNetmaskGatewayInterface
192.168.1.0 255.255.255.0192.168.1.254eth0
192.168.1.10255.255.255.255192.168.1.10eth0
127.0.0.1255.0.0.0On-Linlo
127.0.0.0255.0.0.0On-Linklo
"Pass Any Exam. Any Time." - www.actualtests.com

103

CompTIA N10-006 Exam


255.255.255.255255.255.255.255102.168.1.10eth0
Which of the following is the reason for the computer issue, given the above output?
A.
Wrong default gateway netmask
B.
Incorrect default gateway address
C.
Default gateway on the wrong interface
D.
Missing default gateway

Answer: D
Explanation:

The output appears to be a result of running the netstat r command. If the default gateway was
present, the first line would show the Network Destination as 0.0.0.0 and the Netmask as 0.0.0.0.

QUESTION NO: 121


A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet
connection. As a result, they have been given a new IP range. The ISP has assigned the company
10.10.150.16 /28. The company gateway router has the following interface configuration facing the
ISP:
Interface A:
IP address: 10.10.150.16
Subnet mask: 255.255.255.240
Default gateway: 10.10.150.32
Speed: 1000 Mbps
"Pass Any Exam. Any Time." - www.actualtests.com

104

CompTIA N10-006 Exam


Duplex: Auto
State: No Shutdown
None of the workstations at the company are able to access the Internet. Which of the following
are the reasons? (Select TWO).
A.
There is a duplex mismatch between the router and ISP.
B.
The router interface is turned off.
C.
The interface is set to the incorrect speed.
D.
The router is configured with the incorrect subnet mask.
E.
The router interface is configured with the incorrect IP address.
F.
The default gateway is configured incorrectly.

Answer: E,F
Explanation:

According to the IP Address Range Calculator, for the given subnet mask and the IP range
address range assigned by the ISP, the first host address should be 10.10.150.17 and the
broadcast address should be 10.10.150.31. Therefore, the router interface is configured with the
incorrect IP address and the default gateway is configured incorrectly.

QUESTION NO: 122 CORRECT TEXT


After recent changes to the pictured network, several users are unable to access the servers. Only
PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the
adapter configuration tabs.
"Pass Any Exam. Any Time." - www.actualtests.com

105

CompTIA N10-006 Exam


Instructions: Verify the settings by using the command prompt, after making any system changes.
Next, restore connectivity by making the appropriate changes to the infrastructure. When you have
completed these steps, select the Done button to submit.

"Pass Any Exam. Any Time." - www.actualtests.com

106

CompTIA N10-006 Exam

"Pass Any Exam. Any Time." - www.actualtests.com

107

CompTIA N10-006 Exam

"Pass Any Exam. Any Time." - www.actualtests.com

108

CompTIA N10-006 Exam

"Pass Any Exam. Any Time." - www.actualtests.com

109

CompTIA N10-006 Exam

Explanation:

The default gateway must be on the same network as the nodes that use it. Therefore, the subnet
on PC3 and the default gateway on PC4 must be modified.
References:
Dulaney, Emmett and Mike Harwood, CompTIA Network+ Authorized Exam Cram, Fourth Edition,
Pearson, Indianapolis, 2012, p 101.
http://www.subnetonline.com/pages/subnet-calculators/ip-subnet-calculator.php
"Pass Any Exam. Any Time." - www.actualtests.com

110

CompTIA N10-006 Exam

QUESTION NO: 123


A PC technician has installed a new network printer that was preconfigured with the correct static
IP address, subnet mask, and default gateway. The printer was installed with a new cable and
appears to have link activity, but the printer will not respond to any network communication
attempts. Which of the following is MOST likely the cause of the problem?
A.
Damaged cable
B.
Duplex mismatch
C.
Incorrect VLAN assignment
D.
Speed mismatch

Answer: C
Explanation:

If a port is accidentally assigned to the wrong VLAN in a switch, its as if that client was magically
transported to another place in the network. This would explain the inability to communication with
the printer, as it is on a different VLAN.

QUESTION NO: 124


A network administrator recently installed a web proxy server at a customer's site. The following
week, a system administrator replaced the DNS server overnight. The next day, customers began
having issues accessing public websites. Which of the following will resolve the issue?
A.
Update the DNS server with the proxy server information.
B.
"Pass Any Exam. Any Time." - www.actualtests.com

111

CompTIA N10-006 Exam


Implement a split horizon DNS server.
C.
Reboot the web proxy and then reboot the DNS server.
D.
Put the proxy server on the other side of the demarc.

Answer: A
Explanation:

Proxy servers act as an intermediary for requests from clients seeking resources from other
servers. If the DNS server is not communicating with the proxy server, these requests are not
forwarded. Therefore, updating the DNS server with the proxy server information will solve the
problem.

QUESTION NO: 125


Two weeks after installation, a network technician is now unable to log onto any of the newly
installed company switches. The technician suspects that a malicious user may have changed the
switches' settings before they were installed in secure areas. Which of the following is the MOST
likely way in which the malicious user gained access to the switches?
A.
Via SSH using the RADIUS shared secret
B.
Via HTTP using the default username and password
C.
Via console using the administrator's password
D.
Via SNMP using the default RO community

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

112

CompTIA N10-006 Exam


A new network switch is accessed via HTTP to perform the initial configuration. The username and
password used is a factory default.

QUESTION NO: 126


A network technician is troubleshooting a problem at a remote site. It has been determined that
the connection from router A to router B is down. The technician at the remote site re-terminates
the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested
and is plugged into the correct interface. Which of the following would be the result of this action?
A.
The normal amount of errors and the connection problem has been resolved.
B.
The interface status will indicate that the port is administratively down.
C.
The traffic will flow, but with excessive errors.
D.
The interface status will show line protocol down.

Answer: D
Explanation:

Devices of different types are connected with a straight through cable (patch cable). In this case, it
is used to connect two devices of the same type. It is for this reason that the interface will display
the line protocol down status.

QUESTION NO: 127


Which of the following helps prevent routing loops?

"Pass Any Exam. Any Time." - www.actualtests.com

113

CompTIA N10-006 Exam


A.
Routing table
B.
Default gateway
C.
Route summarization
D.
Split horizon

Answer: D
Explanation:

Routing loops occur when the routing tables on the routers are slow to update and a redundant
communication cycle is created between routers. Split horizon, which prevents the router from
advertising a route back to the other router from which it was learned, can be used to resist routing
loops. Poison reverse, also known as split horizon with poison reverse, is also used to resist
routing loops.

QUESTION NO: 128


After repairing a computer infected with malware, a technician determines that the web browser
fails to go to the proper address for some sites. Which of the following should be checked?
A.
Server host file
B.
Subnet mask
C.
Local hosts file
D.
Duplex settings

Answer: C
"Pass Any Exam. Any Time." - www.actualtests.com

114

CompTIA N10-006 Exam


Explanation:

The local hosts file is a text file that contains hostname-to-IP address mappings. By default, host
to IP address mappings that are configured in the Hosts file supersede the information in DNS. If
there is an entry for a domain name in the Hosts file, then the server will not attempt to query DNS
servers for that name. Instead, the IP address that is configured in the Hosts file will be used. If the
IP address corresponding to a name changes and the Hosts file is not updated, you may be
unable to connect to the host.

QUESTION NO: 129


Which of the following WAN technologies is associated with high latency?
A.
T1
B.
Satellite
C.
Cable
D.
OCx

Answer: B
Explanation:

Latency in this instance is the time it takes for the signal to and from the satellite. Since signal has
to travel to the satellite, then from the satellite to the ground station, and then out to the Internet (or
IP WAN). Not forgetting the return trip, and processing delays.

"Pass Any Exam. Any Time." - www.actualtests.com

115

CompTIA N10-006 Exam

Topic 5, Industry standards, practices, and network theory

QUESTION NO: 130


When a client calls and describes a problem with a computer not being able to reach the Internet,
in which of the following places of the OSI model would a technician begin troubleshooting?
A.
Transport layer
B.
Physical layer
C.
Network layer
D.
Session layer

Answer: B
Explanation:

The bottom layer of the OSI reference model is Layer 1, the physical layer.
The physical layer is the layer that defines the hardware elements of a network.
These elements include:
Network Interface Cards
Network topology
Network cabling
The type of signals used for data transmissions
When troubleshooting a network connectivity issue, the first thing you would check is the
computers network cabling, the network card etc. In other words, the computers physical
connection to the network.

"Pass Any Exam. Any Time." - www.actualtests.com

116

CompTIA N10-006 Exam

QUESTION NO: 131


A network engineer is dispatched to an employee office to troubleshoot an issue with the
employee's laptop. The employee is unable to connect to local and remote resources. The
network engineer flips the laptop's wireless switch on to resolve the issue. At which of the
following layers of the OSI model was the issue resolved?
A.
Layer 1
B.
Layer 2
C.
Layer 3
D.
Layer 4
E.
Layer 7

Answer: A
Explanation:

The bottom layer of the OSI reference model is Layer 1, the physical layer.
The physical layer is the layer that defines the hardware elements of a network.
These elements include:
Network Interface Cards
Network topology
Network cabling
The type of signals used for data transmittions
In this question, the network engineer flipped the laptop's wireless switch on to resolve the issue.
The laptop was unable to connect to the wireless network because the wireless network interface
card was switched off. Switching the wireless network interface card on enabled the laptop to
connect to the wireless network. The wireless network interface card is a physical layer device.
"Pass Any Exam. Any Time." - www.actualtests.com

117

CompTIA N10-006 Exam

QUESTION NO: 132


When troubleshooting a network problem, browsing through the log of a switch, it is discovered
that multiple frames contain errors. In which of the following layers does the problem reside?
(Select TWO).
A.
Layer 2
B.
Layer 3
C.
Layer 5
D.
Transport layer
E.
Data link
F.
Physical layer

Answer: A,E
Explanation:

Layer 2 of the OSI reference model is the data-link layer. Components of the data-link layer
include frame-format, Media Access Control (MAC) addressing, protocol identification and error
detection.
When data is being sent, it is split into protocol data units (PDUs) as it passes through the layers
of the OSI model. The PDUs have different names as they are passed through the layers of the
OSI model. In layer 2, the PDU is called a Frame.
The most common protocol specified in the data-link layer is Ethernet and the most common
network component in the data-link layer is a network switch.
In this question, problems are discovered with Ethernet frames by examining the logs in a network
switch. Therefore, for this question, we are working in Layer 2, the data-link layer.

"Pass Any Exam. Any Time." - www.actualtests.com

118

CompTIA N10-006 Exam

QUESTION NO: 133


A network administrator is using a packet analyzer to determine an issue on the local LAN. Two
separate computers are showing an error message on the screen and are unable to communicate
with other computers in the same lab. The network administrator looks at the following output:
SRC MACSRC IPDST MACDST IP
00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:1200
05:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not
using any virtualization technology, at which of the following layers of the OSI model is the
problem occurring?
A.
Network
B.
Application
C.
Data link
D.
Transport

Answer: A
Explanation:

If we look at the Source Mac column, we can see two different MAC addresses. Every network
interface card has a unique MAC address. These are the network cards in the two separate
computers.
If we look in the Source IP column, we can see that the two network cards have been assigned the
same IP address (192.168.1.10). This is the problem in this question. The error message on the
screens will be saying that An IP conflict exists. Every network card connected to the network
needs to be configured with a different IP address.
As the problem is with the IP address configuration of the two computers, we know that the
problem is occurring at the Network layer (layer 3) of the OSI model. The network layer is
"Pass Any Exam. Any Time." - www.actualtests.com

119

CompTIA N10-006 Exam


responsible for Internet Protocol (IP) addressing and routing.

QUESTION NO: 134


Which of the following will negotiate standoff timers to allow multiple devices to communicate on
congested network segments?
A.
CSMA/CD
B.
OSPF
C.
DOCSIS
D.
BGP

Answer: A
Explanation:

Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is used by devices in an Ethernet


network for transmitting data on the network.
Any device on an Ethernet network can send data at any time. The network devices sense when
the line is idle and therefore available for the transmission of data. The network device then
transmits a data frame onto the network. If another device sends a frame at exactly the same time,
a collision occurs and the frames are discarded. The network devices will then wait for a random
period of time before attempting to send the frame again.

QUESTION NO: 135


"Pass Any Exam. Any Time." - www.actualtests.com

120

CompTIA N10-006 Exam


Which of the following devices implements CSMA/CA virtually through the RTS/CTS protocols?
A.
Firewall
B.
Router
C.
802.11 AP
D.
Switch

Answer: C
Explanation:

802.11 AP is a Wireless Access Point used in a wireless network.


If two computers on a network send data frames at the same time, a collision between the frames
can occur. The frames are then discarded and the sending computers will attempt to send the data
again.
Carrier sense multiple access with collision avoidance (CSMA/CA) is a protocol used in wireless
networks where computers connected to the wireless network attempt to avoid collisions by
transmitting data only when the channel is sensed to be "idle". Carrier Sense Multiple
Access/Collision Detect (CSMA/CD) is unreliable in wireless networks because computers
connected to the wireless network often cannot see each other so CSMA/CA is a better option for
avoiding collisions.
Request to Send/Clear to Send (RTS/CTS) can also be used to mediate access to the wireless
network. This goes some way to alleviating the problem of computers not being able to see each
other because in a wireless network, the Wireless Access Point only issues a Clear to Send to
one node at a time.
With RTS/CTS, a Request to Send (RTS) packet is sent by the sending computer, and a Clear to
Send (CTS) packet is sent by the intended receiver. This will alert all computers within range of
the sender, receiver or both, to not transmit for the duration of the transmission. This is known as
the IEEE 802.11 RTS/CTS exchange.

"Pass Any Exam. Any Time." - www.actualtests.com

121

CompTIA N10-006 Exam


QUESTION NO: 136
The management team wants to set up a wireless network in their office but all of their phones
operate at the 2.4 GHz frequency. They need a wireless network that would be able to operate at
a higher frequency than their phones. Which of following standards should be used?
A.
802.11a
B.
802.11b
C.
802.11g
D.
802.1x

Answer: A
Explanation:

In this question, we need a wireless network that operates at a frequency higher than the 2.4GHz
frequency.
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The
802.11 standards commonly used today to provide wireless connectivity in home or office wireless
networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
The 802.11a standard supports speeds up to 54Mbps and uses the 5-GHz band.

QUESTION NO: 137


A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect
at 11 Mbps with full signal strength. Which of the following standards is implemented on the
network?
A.
802.11a
"Pass Any Exam. Any Time." - www.actualtests.com

122

CompTIA N10-006 Exam


B.
802.11ac
C.
802.11b
D.
802.11g

Answer: C
Explanation:

802.11 is a set of IEEE standards that govern wireless networking transmission methods. The
802.11 standards commonly used today to provide wireless connectivity in home or office wireless
networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
802.11b supports speeds up to 11Mbps and uses the 2.4GHz frequency.
In this question, the user is using an 802.11n WLAN card. Although the 802.11n WLAN card can
support speeds up to 300Mbps, the user is only able to connect at 11Mbps because the user is
connected to a wireless network configured to use 802.11b.

QUESTION NO: 138


A network technician has been tasked with designing a WLAN for a small office. One of the
requirements of this design is that it is capable of supporting HD video streaming to multiple
devices. Which of the following would be the appropriate wireless technology for this design?
A.
802.11g
B.
802.11ac
C.
802.11b
D.
802.11a
"Pass Any Exam. Any Time." - www.actualtests.com

123

CompTIA N10-006 Exam


Answer: B
Explanation:

In this question, we need a wireless network capable of supporting HD video streaming to multiple
devices. We therefore need the fastest wireless network speed available.
802.11 is a set of IEEE standards that govern wireless networking transmission methods. The
802.11 standards commonly used today to provide wireless connectivity in home or office wireless
networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.
The 802.11ac standard is the fastest wireless network supporting speeds of over 3Gbps and uses
the 5-GHz band.

QUESTION NO: 139


A company is deploying a new wireless network and requires 800Mbps network throughput. Which
of the following is the MINIMUM configuration that would meet this need?
A.
802.11ac with 2 spatial streams and an 80MHz bandwidth
B.
802.11ac with 3 spatial streams and a 20MHz bandwidth
C.
802.11ac with 3 spatial streams and a 40MHz bandwidth
D.
802.11ac with 4 spatial streams and a 160MHz bandwidth

Answer: A
Explanation:

Spatial streaming is used in wireless communications where multiple-input-multiple-output (MIMO)


is being used. With MIMO, multiple antennas are used for transmission and reception. MIMO was
available in 802.11n but its capabilities have been extended in 802.11ac.
"Pass Any Exam. Any Time." - www.actualtests.com

124

CompTIA N10-006 Exam


802.11ac supports a mandatory 80 MHz channel bandwidth for stations (vs. 40 MHz maximum in
802.11n), 160 MHz available optionally and more (up to 8) special streams.
A single antenna and 80 MHz channel bandwidth provides a bandwidth of 433Mbps. In this
question, we need a minimum bandwidth of 800Mbps. Two antennas and 80 MHz channel
bandwidth provides a bandwidth of 867Mbps and therefore meets the requirement.

QUESTION NO: 140


A network technician is attempting to connect a new host to existing manufacturing equipment on
an Ethernet network. The technician is having issues trying to establish communication between
the old equipment and the new host. The technician checks the cabling for breaks and finds that
the CAT3 cable in use is in perfect condition. Which of the following should the technician check to
ensure the new host will connect?
A.
Confirm the new host is using 10GBaseSR due to the manufacturing environment
B.
Confirm the new host is compatible with 10BaseT Ethernet
C.
Confirm the existing 10Base2 equipment is using the proper frame type
D.
Confirm that CSMA/CD is disabled on the Ethernet network

Answer: B
Explanation:

The question states that the equipment is old and that CAT3 cabling is being used.
10BaseT Ethernet networks are old and slow by todays standards. 10BaseT Ethernet networks
use CAT3 UTP cabling and offer a maximum bandwidth of just 10Mpbs.
A new host computer nowadays will have a network card that supports 1000Mpbs to be used with
CAT5, CAT5e or CAT6 network cables in a 1000BaseT network. In this question, we need to
check that the network card on the new host computer is backward-compatible with the old
10BaseT network.
"Pass Any Exam. Any Time." - www.actualtests.com

125

CompTIA N10-006 Exam

QUESTION NO: 141


Before logging into the company network, users are required to sign a document that is to be
stored in their personnel file. This standards and policies document is usually called which of the
following?
A.
SOP
B.
BEP
C.
AUP
D.
SLA

Answer: C
Explanation:

AUP stands for Acceptable Use Policy. An Acceptable Use Policy defines what a user can or
cannot do with his or her computer during business hours. For example, using the companys
Internet connection to look at the sports scores on a sports website may be deemed inappropriate
or unacceptable during business hours. Other examples include the use of social media websites
such as Facebook or using Instant Messaging clients to chat to your friends.

QUESTION NO: 142


A service provider is unable to maintain connectivity to several remote sites at predetermined
speeds. The service provider could be in violation of the:
A.
MLA.
B.
"Pass Any Exam. Any Time." - www.actualtests.com

126

CompTIA N10-006 Exam


SLA.
C.
SOW.
D.
MOU.

Answer: B
Explanation:

SLA stands for Service Level Agreement. This is a common document in business used to define
a minimum standard of service that a customer can expect from a supplier. SLAs are particularly
common in the I.T. sector where a service provider is offering a service to a customer. As a
customer, you want your hosted services and Internet or WAN connections to be available all the
time. SLAs often guarantee 99.9% uptime for a service.
In this question, the service provider is providing WAN links to remote sites with a guaranteed
bandwidth on the WAN links. A failure to maintain the connectivity to the remote sites would be a
violation of the Service Level Agreement (SLA).

QUESTION NO: 143


A customer has engaged a company to improve the availability of all of the customer's services
and applications, enabling the customer to minimize downtime to a few hours per quarter. Which
of the following will document the scope of the activities the company will provide to the customer,
including the intended outcomes?
A.
MLA
B.
MOU
C.
SOW
D.
SLA
"Pass Any Exam. Any Time." - www.actualtests.com

127

CompTIA N10-006 Exam


Answer: C
Explanation:

SOW stands for Statement of Work. When a company has been hired for a project that involves
many tasks, a statement of work is often issued at the start of the project.
The SOW will outline the tasks or activities in a project, their costs and the timelines for
deliverables within the project. In an IT project, the SOW would define what tasks will be
performed (hardware and software upgrades etc.), why the work is being done and how long each
stage of the project will take.

QUESTION NO: 144


A technician has prolonged contact with a thermal compound. Which of the following resources
should be consulted?
A.
HCL
B.
MSDS
C.
SLA
D.
HVAC

Answer: B
Explanation:

MSDS stands for Material Safety Data Sheet. An MSDS is a health and safety document that
contains information on the potential hazards of working with a chemical product and how to work
safely with the chemical product.
In this question, the thermal compound is a chemical product so the MSDS will provide information
"Pass Any Exam. Any Time." - www.actualtests.com

128

CompTIA N10-006 Exam


about the effects of prolonged contact with the thermal compound.

QUESTION NO: 145


An organization is moving to a new datacenter. During the move, several technicians raise
concerns about a system that could potentially remove oxygen from the server room and result in
suffocation. Which of the following systems are they MOST likely discussing?
A.
Fire suppression
B.
Mantraps at the entry
C.
HVAC
D.
UPS and battery backups

Answer: A
Explanation:

Fire suppression systems are often deployed in server rooms to prevent a fire destroying all the
I.T. equipment. Different fire suppression systems work in different ways. Obviously a fire
suppression system that sprays water onto the fire is no good for a server room as the water
would do as much damage as the fire. A common fire suppression system used in server rooms is
one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from
the server room is to fill the server room with an inert gas such as carbon dioxide.

QUESTION NO: 146


Which of the following describes an area containing a rack that is used to connect customer
"Pass Any Exam. Any Time." - www.actualtests.com

129

CompTIA N10-006 Exam


equipment to a service provider?
A.
110 block
B.
MDF
C.
DSU
D.
CSU

Answer: B
Explanation:

MDF stands for Main Distribution Frame. A Main Distribution Frame is a commonly a long steel
rack accessible from both sides. On one side of the rack is cabling that connects the service
providers network. The other side of the rack is for the connections to the customers equipment.

QUESTION NO: 147


In an engineering office, all plotters are configured via static IP. Which of the following best
practices will alleviate many issues if equipment moves are required? (Select TWO).
A.
Rack monitoring
B.
Device placement
C.
Wall plate labeling
D.
Room numbering
E.
"Pass Any Exam. Any Time." - www.actualtests.com

130

CompTIA N10-006 Exam


Patch panel labeling

Answer: C,E
Explanation:

By labeling each wall plate (where the plotters network cables plug in to) and the patch panel
ports (where the cables connecting to each wall plate terminate), well be able to see which device
is connected to which port. If equipment moves are required, we will be able to easily see which
patch cables need to be moved in the patch panel.

QUESTION NO: 148


A network technician is attempting to locate a switch connected to the fourth floor west side of the
building. Which of the following will allow quick identification of the switch, when looking at a
logical diagram?
A.
Building layout
B.
Patch panel labeling
C.
Packet sniffing
D.
Naming conventions

Answer: D
Explanation:

The building in this question has several floors and the floors are large enough to be identified by
area such as west side etc. It is likely that a logical diagram of the network in such a building
would be quite complicated and the network is likely to have several switches.
"Pass Any Exam. Any Time." - www.actualtests.com

131

CompTIA N10-006 Exam


A naming convention is a standard for naming items, in this case, networking components. When
it comes to naming switches, using names like Switch1, Switch2 etc. for example wont help when
you need to know where the switches are located.
In a building with multiple floors with each floor large enough to be defined by area names, you
could a naming convention like SW1-FL4-WS where SW1 identifies the item as a Switch with the
number 1, FL4 identifies the location as Floor 4 and WS further identifies the location as West
Side. Using this convention, switch number 2 on the third floor east side would be named SW2FL3-ES.

QUESTION NO: 149


Which of the following does a network technician need to implement if a change is unsuccessful
within the approved maintenance window?
A.
Configuration procedures
B.
Stakeholder notification
C.
Impact analysis
D.
Rollback procedure

Answer: D
Explanation:

A rollback procedure is something that should be documented in a change management


document. In this question, the network technician has made a change during a maintenance
window. The change has not worked so the technician needs to undo the change he made to
revert the system back to its previous state. The network technician can then investigate why the
change has not worked as expected.
The rollback procedure is the list of steps required to undo the changes made to the system.

"Pass Any Exam. Any Time." - www.actualtests.com

132

CompTIA N10-006 Exam

QUESTION NO: 150


Which of the following is true about the main difference between a web session that uses port 80
and one that uses port 443?
A.
Port 80 web sessions often use application-level encryption, while port 443 sessions often use
transport-level encryption.
B.
Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web
certificates.
C.
Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse
web application proxies.
D.
Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune
from man-in-the-middle attacks.

Answer: D
Explanation:

HTTPS stands for HTTP over SSL or HTTP Secure. It is used for secure access to websites. Port
80 web sessions are HTTP (HyperText Transfer Protocol) sessions which offers no security. Port
443 web sessions use HTTPS. HTTPS uses SSL or TLS to encrypt the HTTP traffic.
HTTPS provides authentication of the website and associated web server that you are
communicating with, which protects against man-in-the-middle attacks. Additionally, it provides
bidirectional encryption of communications between a client and server, which protects against
eavesdropping and tampering with and/or forging the contents of the communication.

QUESTION NO: 151


Which of the following is the main difference between TCP and UDP?
"Pass Any Exam. Any Time." - www.actualtests.com

133

CompTIA N10-006 Exam


A.
TCP data flows in two directions, while UDP data flows from server to client.
B.
The TCP header implements flags, while the UDP header does not.
C.
The TCP header implements checksum, while the UDP header does not.
D.
TCP connections can be secured by stateful firewalls, while UDP connections cannot.

Answer: B
Explanation:

Transmission Control Protocol (TCP) is a connection-oriented transport protocol. Connectionoriented transport protocols provide reliable transport. When a computer wants to send data to
another computer, TCP will first establish a connection between the two computers. When a
sending computer sends data segments, the receiving computer acknowledges receipt of the
segments. If the receiving computer does not receive an expected segment, the sending computer
will send it again.
User Datagram Protocol (UDP) is a connectionless transport protocol. Connectionless transport
protocols provide unreliable transport. With UDP, there is no connection establishment between
the sending and receiving computers. If a data segment is lost in transit, the sending computer will
not know about it so it will not resend the segment.
TCP uses control messages to manage the process of contact and communication. TCP uses a
set of control flags in the TCP header to indicate whether a segment is being used for control
purposes or just to carry data.

QUESTION NO: 152


Which of the following PDUs is used by a connectionless protocol?
A.
Frames
B.
"Pass Any Exam. Any Time." - www.actualtests.com

134

CompTIA N10-006 Exam


Segments
C.
Streams
D.
Datagram

Answer: D
Explanation:

UDP is a connectionless transport protocol that operates in the transport layer of the OSI model.
UDP stands for User Datagram Protocol. PDUs (Protocol Data Units) used by UDP are known as
Datagrams.

QUESTION NO: 153


A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has
been experiencing when uploading work to the internal FTP server. Which of the following default
port numbers should the technician set the analyzer to highlight when creating a report? (Select
TWO).
A.
20
B.
21
C.
22
D.
23
E.
67
F.
68
"Pass Any Exam. Any Time." - www.actualtests.com

135

CompTIA N10-006 Exam


G.
69

Answer: A,B
Explanation:

FTP (File Transfer Protocol) is used for transferring files between an FTP client and an FTP
server. FTP uses TCP Ports 20 and 21.

QUESTION NO: 154


A network technician has just installed a TFTP server on the administrative segment of the
network to store router and switch configurations. After a transfer attempt to the server is made,
the process errors out. Which of the following is a cause of the error?
A.
Only FTP can be used to copy configurations from switches
B.
Anonymous users were not used to log into the TFTP server
C.
An incorrect password was used and the account is now locked
D.
Port 69 is blocked on a router between the network segments

Answer: D
Explanation:

The question states that the TFTP server is installed on the administrative segment of the
network. This implies that the network has multiple segments (subnets) and TFTP server is on a
different network segment to other computers.
For a computer on one subnet to connect to a computer on a different subnet, a router is required
"Pass Any Exam. Any Time." - www.actualtests.com

136

CompTIA N10-006 Exam


to route traffic between the two subnets. Routers often include firewalls so they can be configured
to allow specific traffic to be routed between the subnets and block unwanted traffic.
TFTP uses UDP port 69. The most likely cause of the connection timeout error in the question is
that the firewall has not been configured to allow traffic using UDP port 69.

QUESTION NO: 155


A network administrator has created a virtual machine in the cloud. The technician would like to
connect to the server remotely using RDP. Which of the following default ports needs to be
opened?
A.
445
B.
3389
C.
5004
D.
5060

Answer: B
Explanation:

RDP (Remote Desktop Protocol) is used for connecting to a remote Windows computer. When
using RDP to connect to a remote Windows computer, you can view and control the desktop of the
remote computer. RDP uses TCP port 3389.

Topic 6, . Mix questions


"Pass Any Exam. Any Time." - www.actualtests.com

137

CompTIA N10-006 Exam


QUESTION NO: 156 CORRECT TEXT
SIMULATION
After recent changes to the pictured network, several users are unable to access the servers. Only
PC1, PC2, PC3, and PC4 are configurable. You can only change the adapter configurations to
each PC.

"Pass Any Exam. Any Time." - www.actualtests.com

138

CompTIA N10-006 Exam

QUESTION NO: 157 DRAG DROP


DRAG DROP
Your company recently purchased a new building down the street from the existing office.
For each of the tasks below, select the appropriate antenna type and encryption object for all
wireless access point (AP).
1. Create an encrypted wireless connection between the two buildings that BEST controls signal
propagation, while maximizing security.
"Pass Any Exam. Any Time." - www.actualtests.com

139

CompTIA N10-006 Exam


2. Restrict the wireless signal generated by the access points (AP's) inside Building 1, so that it
minimizes broadcast beyond the building.
3. Maximize wireless coverage inside Building 1.
4. Building 1's internal wireless network is for visitors only and must not require any special
configuration on the visitor's device to connect.

Answer:

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

140

CompTIA N10-006 Exam

QUESTION NO: 158 DRAG DROP


DRAG DROP
Wireless network users recently began experiencing speed and performance issues after access
point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to
a consultant's specifications and has always worked without a problem.
You a network technician, have been tasked with evaluating the situation and resolving the issues
to improve both performance and connectivity. Refer to the following exhibits and perform any
necessary changes to the wireless and wired infrastructure by adjusting devices. Note: Adjust the
LEAST number of devices needed to fix the issue.

"Pass Any Exam. Any Time." - www.actualtests.com

141

CompTIA N10-006 Exam

Answer:

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

142

CompTIA N10-006 Exam

After you fix AP2, you must click on the switch, which will bring up the switch interface. Type in the
two commands that they show there, to prove the fix. Do not worry that interface 4 is down, there
is no interface 4 for you to do

QUESTION NO: 159 DRAG DROP


DRAG DROP
A customer's email server is not sending emails. Arrange the troubleshooting steps in the order
the technician should perform them:

"Pass Any Exam. Any Time." - www.actualtests.com

143

CompTIA N10-006 Exam

Answer:

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

144

CompTIA N10-006 Exam

QUESTION NO: 160 DRAG DROP


DRAG DROP
Drag and drop the fiber cable connection types to the appropriate image.

"Pass Any Exam. Any Time." - www.actualtests.com

145

CompTIA N10-006 Exam

Answer:

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

146

CompTIA N10-006 Exam

QUESTION NO: 161 DRAG DROP


DRAG DROP
Build a T-658A Connection

Answer:

"Pass Any Exam. Any Time." - www.actualtests.com

147

CompTIA N10-006 Exam


Explanation:

Cat5/6 Cable Pinouts

QUESTION NO: 162 DRAG DROP


DRAG DROP
Build a T-658B Connection

Answer:

"Pass Any Exam. Any Time." - www.actualtests.com

148

CompTIA N10-006 Exam

Explanation:

Cat5/6 Cable Pinouts

QUESTION NO: 163 DRAG DROP


DRAG DROP

"Pass Any Exam. Any Time." - www.actualtests.com

149

CompTIA N10-006 Exam

Answer:

"Pass Any Exam. Any Time." - www.actualtests.com

150

CompTIA N10-006 Exam

Explanation:

QUESTION NO: 164 DRAG DROP


DRAG DROP

"Pass Any Exam. Any Time." - www.actualtests.com

151

CompTIA N10-006 Exam

Answer:

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

152

CompTIA N10-006 Exam

QUESTION NO: 165 DRAG DROP


DRAG DROP
You are tasked with creating a network that will accomplish the following requirements
Requirements:
1) The remote sales team must be able to connect to the corporate network
2) Each department must have ONLY two PCs and a server
3) Each department must be segmented from each other
4) The following VLANs have been designated:
a) VLAN 2- Finance
b) VLAN 12- Sales
c) VLAN 22- Human Resources (HR)

Complete the network by dragging the required objects into the diagram
"Pass Any Exam. Any Time." - www.actualtests.com

153

CompTIA N10-006 Exam


INSTRUCTIONS: Objects can be used multiple times and not all placeholders need to be filled

Answer:

Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

154

CompTIA N10-006 Exam

QUESTION NO: 166 CORRECT TEXT


SIMULATION
You have been tasked with setting up a wireless network in an office. The network will consist of 3
access points and a single switch. The network must meet the following parameters.
The SSIDs need to be configured as corpnet with a key of S3cr3t!
The wireless signals should not interfere with each other
The subnet the Access points and Switch are on should only support 30 devices maximum
The access Points should be configured to only support TKIP clients at a maximum speed
Instructions: Click on the devices to review their information and adjust the setting of the APs to
meet the given requirements.

"Pass Any Exam. Any Time." - www.actualtests.com

155

CompTIA N10-006 Exam

Explanation:

This simulation is still under construction. On the first exhibit, the layout should be as follows
Access Point Name AP1
IP Address 192.168.1.3
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes
Mode G
Channel 1
Speed Auto
Duplex Auto
WPA
Passphrase S3cr3t!
"Pass Any Exam. Any Time." - www.actualtests.com

156

CompTIA N10-006 Exam


Exhibit 2 as follows
Access Point Name AP2
IP Address 192.168.1.4
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes
Mode G
Channel 6
Speed Auto
Duplex Auto
WPA
Passphrase S3cr3t!
Exhibit 3 as follows
Access Point Name AP3
IP Address 192.168.1.5
Gateway 192.168.1.2
SSID corpnet
SSID Broadcast yes
Mode G
Channel 11
Speed Auto
Duplex Auto
WPA
Passphrase S3cr3t!
"Pass Any Exam. Any Time." - www.actualtests.com

157

CompTIA N10-006 Exam

QUESTION NO: 167


A company installs a new mail server. Which of the following DNS records need to be configured
to allow the organization to receive email?
A.
CNAME
B.
MX
C.
PTR
D.
A

Answer: B
Explanation:

QUESTION NO: 168


The administrator modifies a rule on the firewall, and now all the FTP users cannot access the
server any longer. The manager calls the administrator and asks what caused the extreme
downtime for the server. In regards to the manager's inquiry, which of the following did the
administrator forget to do FIRST?
A.
Submit a change request
B.
Schedule a maintenance window
C.
Provide notification of change to users
"Pass Any Exam. Any Time." - www.actualtests.com

158

CompTIA N10-006 Exam


D.
Document the changes

Answer: A
Explanation:

QUESTION NO: 169


A network administrator noticed that when one computer goes down, all the other computers in the
office will not work. Which of the following topologies is in use?
A.
Star
B.
Ring
C.
Hybrid
D.
Bus
E.
Mesh

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

159

CompTIA N10-006 Exam


QUESTION NO: 170
There has been an increased amount of successful social engineering attacks at a corporate
office. Which of the following will reduce this attack in the near future?
A.
Helpdesk training
B.
Appropriate use policy
C.
User awareness training
D.
Personal Identifiable Information

Answer: C
Explanation:

QUESTION NO: 171


The human resource department has been moved to an area which is more than 60 meters away
from the nearest IDF. In order to comply with the SLA which requires that 10Gb speeds be
provided, which of the following media will need to utilized?
A.
CAT6e
B.
CAT5e
C.
802.11n
D.
802.11ac

"Pass Any Exam. Any Time." - www.actualtests.com

160

CompTIA N10-006 Exam


Answer: A
Explanation:

QUESTION NO: 172


While troubleshooting, a technician notices that some clients using FTP still work and that pings to
the local router and servers are working. The technician tries to ping all known nodes on the
network and they reply positively, except for one of the servers. The technician notices that ping
works only when the host name is used but not when FQDN is used. Which of the following
servers is MOST likely down?
A.
WINS server
B.
Domain controller
C.
DHCP server
D.
DNS server

Answer: D
Explanation:

QUESTION NO: 173


An area to which access is controlled by retina scan is protected by which of the following security
"Pass Any Exam. Any Time." - www.actualtests.com

161

CompTIA N10-006 Exam


measure types?
A.
Two-factor authentication
B.
Biometric
C.
Cipher locks
D.
Optical reader
E.
Proximity reader

Answer: B
Explanation:

QUESTION NO: 174


Which of the following ports should be allowed to provide access to certain VoIP applications?
A.
110
B.
139
C.
1720
D.
5060

Answer: D

"Pass Any Exam. Any Time." - www.actualtests.com

162

CompTIA N10-006 Exam


Explanation:

QUESTION NO: 175


Which of the following should be used to ensure a specific device always receives the same IP
address?
A.
IP helper
B.
Reservation
C.
Address lease
D.
DHCP scope
E.
DHCP relay

Answer: B
Explanation:

QUESTION NO: 176


Users connecting to an SSID appear to be unable to authenticate to the captive portal. Which of
the following is the cause of this issue?
"Pass Any Exam. Any Time." - www.actualtests.com

163

CompTIA N10-006 Exam


A.
WPA2 security key
B.
SSL certificates
C.
CSMA/CA
D.
RADIUS

Answer: D
Explanation:

QUESTION NO: 177


A company owns four kiosks that are in close proximity within a shopping center. The owner is
concerned about someone accessing the internet via the kiosk's wireless network. Which of the
following should be implemented to provide wireless access only to the employees working at the
kiosk?
A.
Firewall
B.
Web filtering
C.
MAC filtering
D.
Host-based antivirus

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

164

CompTIA N10-006 Exam

QUESTION NO: 178


Which of the following applies to data as it travels from Layer 1 to Layer 7 of the OSI model?
A.
Tagging
B.
Encapsulation
C.
Tunneling
D.
De-encapsulation

Answer: D
Explanation:

QUESTION NO: 179


A T1 line has lost connectivity to the ISP. The ISP has instructed the technician to place a
loopback on a device connecting the T1 line to their central office. On which of the following
devices will the technician implement the loopback?
A.
Channel remote module
B.
Fiber optic modem
C.
Channel service unit
D.
Digital subscriber line modem
"Pass Any Exam. Any Time." - www.actualtests.com

165

CompTIA N10-006 Exam


Answer: C
Explanation:

QUESTION NO: 180


Routing prefixes which are assigned in blocks by IANA and distributed by the Regional Internet
Registry (RIR) are known as which of the following?
A.
Network handle
B.
Autonomous system number
C.
Route aggregation
D.
Top level domain

Answer: B
Explanation:

QUESTION NO: 181


QoS operates at which of the following OSI model layers? (Select TWO)
A.
Layer 1
"Pass Any Exam. Any Time." - www.actualtests.com

166

CompTIA N10-006 Exam


B.
Layer 2
C.
Layer 3
D.
Layer 5
E.
Layer 7

Answer: B,C
Explanation:

QUESTION NO: 182


A client reports that half of the marketing department is unable to access network resources. The
technician determines that the switch has failed and needs to replace it. Which of the following
would be the MOST helpful in regaining connectivity?
A.
VLAN configuration
B.
Network diagram
C.
Configuration backup
D.
Router image

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

167

CompTIA N10-006 Exam

QUESTION NO: 183


Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the
security logs have filled up and that they need to be cleared from the event viewer. She recalls this
being a daily occurrence. Which of the following solutions would BEST resolve this problem?
A.
Increase the maximum log size
B.
Log into the DNS server every hour to check if the logs are full
C.
Install an event management tool
D.
Delete the logs when full

Answer: C
Explanation:

QUESTION NO: 184


Which of the following protocols were designed to avoid loops on a Layer 2 network? (Select
TWO)
A.
OSPF
B.
RIPv2
C.
802.1q
D.
"Pass Any Exam. Any Time." - www.actualtests.com

168

CompTIA N10-006 Exam


Spanning tree
E.
802.1d
F.
QoS

Answer: D,E
Explanation:

QUESTION NO: 185


While implementing wireless access points into the network, one building is having connectivity
issues due to light fixtures being replaced in the ceiling, while all other buildings' connectivity is
performing as expected. Which of the following should be exchanged on the access points
installed in the building with connectivity issues?
A.
UTP patch cables
B.
Antenna
C.
Power adapter
D.
Security standard

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

169

CompTIA N10-006 Exam

QUESTION NO: 186


A technician is attempting to resolve an issue with users on the network not being able to access
websites. The technician pings the default gateway and DNS servers successfully. Pinging a
website by URL is unsuccessful but using a known IP address is successful. Which of the
following will resolve the issue?
A.
Update the HOST file with the URLs for all websites
B.
Use NSLOOKUP to resolve URLs
C.
Ensure ICMP messages can pass through the firewall
D.
Enable port 53 on the firewall

Answer: D
Explanation:

QUESTION NO: 187


The Chief Information Officer (CIO) of an organization is concerned that the current locally-hosted,
software threat solution is not agile enough. The CIO points to specific examples of zero-day
threats that have recently taken a day or more to receive patches. The IT team is tasked with
finding a solution that has a better chance of stopping emerging threats and stopping zero-day
threats more quickly. Which of the following solutions would have the BEST chance of meeting
these goals?
A.
Stateful firewall
B.
Premise-based IDS
"Pass Any Exam. Any Time." - www.actualtests.com

170

CompTIA N10-006 Exam


C.
Host-based IDS
D.
Cloud-based anti-malware

Answer: A
Explanation:

QUESTION NO: 188


A network technician was tasked to install a network printer and share it to a group of five human
resource employees. The technician plugged the device into a LAN jack, but was unable to obtain
an IP address automatically. Which of the following is the cause of the problem?
A.
DNS
B.
Wrong TCP port
C.
Split horizon
D.
DHCP scope

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

171

CompTIA N10-006 Exam


QUESTION NO: 189
A technician is configuring a computer lab at a school. The computers need to be able to
communicate with each other, but students using the computers should not be able to access the
internet. Which of the following rules on the firewall should the technician configure for the lab
computers?
A.
Block all LAN to LAN traffic
B.
Block all LAN to WAN traffic
C.
Block all WAN to LAN traffic
D.
Block all WLAN to WAN traffic

Answer: C
Explanation:

QUESTION NO: 190


A network administrator is noticing slow responds times from the server to hosts on the network.
After adding several new hosts, the administrator realizes that CSMA/CD results in network
slowness due to congestion at the server NIC. Which of the following should the network
administrator do to correct the issue?
A.
Add a honeypot to reduce traffic to the server
B.
Update the Ethernet drivers to use 802.3
C.
Add additional network cards to the server
D.
"Pass Any Exam. Any Time." - www.actualtests.com

172

CompTIA N10-006 Exam


Disable CSMA/CD on the network

Answer: C
Explanation:

QUESTION NO: 191


A technician wants to update the organization's disaster recovery plans. Which of the following will
allow network devices to be replaced quickly in the event of a device failure?
A.
Vendor documentation
B.
Archives/backups
C.
Proper asset tagging and labeling
D.
Network Baseline

Answer: B
Explanation:

QUESTION NO: 192


A user is unable to connect to a server in another building. A technician is troubleshooting the
issue and determines the following:
"Pass Any Exam. Any Time." - www.actualtests.com

173

CompTIA N10-006 Exam


1)Client PC 1 has an IP address if 192.168.10.25/25
2)PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A
3)Server A is named 'BLDGBFILESRVR01' and has an IP address of 192.168.10.145/25
4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A
However, when PC 1 pings server A, it receives a destination host unreachable responds. Which
of the following is the MOST likely cause?
A.
Link from touter A to PC 1 are on different subnets
B.
Link from router A to server A is down
C.
Link from PC 1 to router A has duplex issues
D.
Link from server A top PC 2 is down

Answer: B
Explanation:

PC 1 cannot connect to Server A. PC 1 and Server A are on different subnets that are connected
by Router A. PC 1 can connect to Router A; therefore there is no problem with the link or IP
address configuration between PC 1 and Router A.
PC 2, which is on the same subnet as Server A, can connect to Server A; therefore Server A is up.
As PC 1 can connect to Router A but cannot connect to Server A, and Server A is up; the problem
must be the connection (link) between Router A and Server A.

QUESTION NO: 193


A company is having a new T1 line installed. Which of the following will the connection MOST
likely terminate to?

"Pass Any Exam. Any Time." - www.actualtests.com

174

CompTIA N10-006 Exam


A.
Core switch
B.
MDF
C.
Ethernet router
D.
IDF

Answer: B
Explanation:

QUESTION NO: 194


A technician wants to implement a network for testing remote devices before allowing them to
connect to the corporate network. Which of the following could the technician implement?
A.
High availability
B.
MAN network
C.
Quarantine
D.
Honeynet

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

175

CompTIA N10-006 Exam

QUESTION NO: 195


Which of the following broadband WAN technologies would MOST likely be used to connect
several remote branches that have no fiber or satellite connections?
A.
OC12
B.
POTS
C.
WiMax
D.
OC3

Answer: B
Explanation:

QUESTION NO: 196


A technician is troubleshooting a PC that is having intermittent connectivity issues. The technician
notices that the STP cables pairs are not completely twisted near the connector. Which of the
following is the issue?
A.
Cross-talk
B.
568A/568B mismatch
C.
Tx/Rx reverse
D.
"Pass Any Exam. Any Time." - www.actualtests.com

176

CompTIA N10-006 Exam


Split pairs

Answer: A
Explanation:

QUESTION NO: 197


Which of the following can be issued from the command line to find the layer 3 hops to a remote
destination?
A.
traceroute
B.
nslookup
C.
ping
D.
netstat

Answer: A
Explanation:

QUESTION NO: 198


A administrator's network has OSPF for the internal routing protocol and has two interfaces that
continue to flap. The administrator reviews the following output:
"Pass Any Exam. Any Time." - www.actualtests.com

177

CompTIA N10-006 Exam


Fast ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10
Full duplex, 100Mb/s, 100Base Tx/Fx
Received 1052993 broadcasts
1258 input errors
983881 packet output, 768588 bytes
1747 output errors, 0 collisions, 423 resets
Which of the following problems would cause the interface flap?
A.
Wrong IP address
B.
Loopback not set
C.
Bad wire
D.
Incorrect encapsulation
E.
Duplex mismatch

Answer: E
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

178

CompTIA N10-006 Exam


QUESTION NO: 199
Which of the following allows a telecommunication company to test circuits to customers
remotely?
A.
VLAN
B.
Toner Probe
C.
RDP
D.
Smart Jack
E.
VPN

Answer: D
Explanation:

QUESTION NO: 200


A single mode fiber is no longer providing network connectivity to a remote site. Which of the
following would be used to identify the location of the break?
A.
MT-RJ
B.
OTDR
C.
Media converter
D.
Cable certifier
"Pass Any Exam. Any Time." - www.actualtests.com

179

CompTIA N10-006 Exam


Answer: B
Explanation:

QUESTION NO: 201


Users are reporting extreme slowness across the network every Friday. Which of the following
should the network technician review first to narrow down the root cause of the problem?
A.
Baseline
B.
Bottleneck
C.
Utilization
D.
Link status

Answer: C
Explanation:

QUESTION NO: 202


A contractor was hired to troubleshoot congestion issues on the network. After a few of the
switches have been reconfigured/upgraded by the contractor, congestion worsens and collisions
increase. Which of the following is the BEST action to alleviate the situation?

"Pass Any Exam. Any Time." - www.actualtests.com

180

CompTIA N10-006 Exam


A.
Allow the contractor to reset switches to factory defaults
B.
Check the cabling on all switches for improper crossover use
C.
Document the changes that were made
D.
Downgrade firmware and restore backup configuration

Answer: D
Explanation:

QUESTION NO: 203


An organization is involved in a civil court action and needs to ensure email messages are
retained. Which of the following describes the requirement to archive and retain email traffic and
other correspondence?
A.
Chain of custody
B.
Legal hold
C.
Divide and conquer
D.
Persistent agents

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

181

CompTIA N10-006 Exam

QUESTION NO: 204


In the past, a company has experienced several network breaches as a result of end-user actions.
To help mitigate future breaches, which of the following documents should the security team
ensure are up-to-date and enforced for all employees? (Select TWO)
A.
Memorandum of understanding
B.
Data classification document
C.
Service level agreement
D.
Interconnection security agreement
E.
Consent to monitor
F.
Acceptable use policy

Answer: A,F
Explanation:

QUESTION NO: 205


The Chief Information Officer (CIO) wants to improve the security of the company's data. Which of
the following is a management control that should be implemented to ensure employees are using
encryption to transmit sensitive information?
A.
Policies
"Pass Any Exam. Any Time." - www.actualtests.com

182

CompTIA N10-006 Exam


B.
VPN
C.
HTTPS
D.
Standards

Answer: A
Explanation:

QUESTION NO: 206


A client reports that half of the office is unable to access a shared resource. Which of the following
should be used to troubleshoot the issue?
A.
Data backups
B.
Network diagrams
C.
Baseline information
D.
Vendor documentation

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

183

CompTIA N10-006 Exam

QUESTION NO: 207


An administrator needs to set up a space in the office where co-workers can relax. The
administrator sets up several TV's with interconnected gaming systems in the office. Which of the
following did the administrator set up?
A.
CAN
B.
MAN
C.
WAN
D.
LAN

Answer: A
Explanation:

QUESTION NO: 208


Channel bonding will improve which of the following wireless characteristics?
A.
Signal strength
B.
Encryption strength
C.
Coverage area
D.
Connection speed
"Pass Any Exam. Any Time." - www.actualtests.com

184

CompTIA N10-006 Exam


Answer: D
Explanation:

QUESTION NO: 209


Users have reported poor network performance. A technician suspects a user may have
maliciously flooded the network with ping request. Which of the following should the technician
implement to avoid potential occurrences from happening in the future?
A.
Block all ICMP request
B.
Update all antivirus software
C.
Remove all suspected users from the network
D.
Upgrade firmware on all network cards

Answer: A
Explanation:

QUESTION NO: 210


A network technician is troubleshooting a network connection error, when pinging the default
gateway no reply is received. The default gateway is found to be functioning properly but cannot
connect to any workstations. At which of the following OSI layers could the problem exist? (Select
"Pass Any Exam. Any Time." - www.actualtests.com

185

CompTIA N10-006 Exam


TWO)
A.
Presentation
B.
Transport
C.
Session
D.
Data link
E.
Application
F.
Physical

Answer: D,F
Explanation:

QUESTION NO: 211


A technician has determined the most likely cause of an issue and implement a solution. Which of
the following is the NEXT step that should be taken?
A.
Document the findings, actions, and outcomes
B.
Duplicate the problem if possible
C.
Verify system functionality
D.
Make an archival backup
"Pass Any Exam. Any Time." - www.actualtests.com

186

CompTIA N10-006 Exam


Answer: C
Explanation:

QUESTION NO: 212


An administrator has a physical server with a single NIC. The server needs to deploy two virtual
machines. Each virtual machine needs two NIC's, one that connects to the network, and a second
that is a server to server heartbeat connection between the two virtual machines. After deploying
the virtual machines, which of the following should the administrator do to meet these
requirements?
A.
The administrator should create a virtual switch for each guest. The switches should be configured
for inter-switch links and the primary NIC should have a NAT to the corporate network
B.
The administrator should create a virtual switch that is bridged to the corporate network and a
second virtual switch that carries intra-VM communication only
C.
The administrator should create a virtual switch to bridge all of the connections to the network. The
virtual heartbeat NICs should be set to addresses in an unused range
D.
The administrator should install a second physical NIC onto the host, and then connect each guest
machine's NICs to a dedicated physical NIC

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

187

CompTIA N10-006 Exam


QUESTION NO: 213
A network technician is asked to redesign an Ethernet network before new monitoring software is
added to each host on the network. The new software will broadcast statistics from each host to a
monitoring host for each of the five departments in the company. The added network traffic is a
concern of management that must be addressed. Which of the following solutions should the
technician design into the new network?
A.
Place each department in a separate VLAN
B.
Add a router and create a segment for all the monitoring host stations
C.
Increase the number of switches on the network to reduce broadcasts
D.
Increase the collision domain to compensate for the added broadcasts

Answer: A
Explanation:

QUESTION NO: 214


A company has added several new employees, which has caused the network traffic to increase
by 200%. The network traffic increase from the new employees was only expected to be 20% to
30%. The administration suspects that the network may have been compromised. Which of the
following should the network administrator have done previously to minimize the possibility of a
network breach?
A.
Create VLANs to segment the network traffic
B.
Place a network sniffer on segments with new employees
C.
Provide end user awareness and training for employees
"Pass Any Exam. Any Time." - www.actualtests.com

188

CompTIA N10-006 Exam


D.
Ensure best practices were implemented when creating new user accounts

Answer: C
Explanation:

QUESTION NO: 215


A network technician discovers an issue with spanning tree on the core switch. Which of the
following troubleshooting steps should the network technician perform NEXT to resolve the issue?
A.
Test a theory to determine the cause
B.
Escalate to a senior technician
C.
Identify the symptoms
D.
Establish a theory of probable cause
E.
Establish a plan of action

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

189

CompTIA N10-006 Exam


QUESTION NO: 216
Which of the following would be the BEST addition to a business continuity plan that would protect
business from a catastrophic event such as a fire, tornado, or earthquake?
A.
UPS and battery backups
B.
Fire suppression systems
C.
Building generator
D.
Hot sites or cold sites
E.
NAS and tape backups

Answer: D
Explanation:

QUESTION NO: 217


A network technician has created a network consisting of an external internet connection, a DMZ,
an internal private network, and an administrative network. All routers and switches should be
configured to accept SSH connections from which of the following network segments?
A.
The internal network since it is private
B.
The admin private network allowing only admin access
C.
The DMZ only allowing access from the segment with the servers
D.
"Pass Any Exam. Any Time." - www.actualtests.com

190

CompTIA N10-006 Exam


The internet connection to allow admin access from anywhere

Answer: B
Explanation:

QUESTION NO: 218


A network technician needs to monitor the network to find a user that is browsing inappropriate
websites. Which of the following would the technician use to view the website and find the user
browsing it?
A.
An SNMP GET
B.
A top listener tool
C.
An intrusion detection system
D.
A packet sniffer

Answer: D
Explanation:

QUESTION NO: 219


A network administrator receives a call asking for assistance with connecting to the network. The
"Pass Any Exam. Any Time." - www.actualtests.com

191

CompTIA N10-006 Exam


user asks for the IP address, subnet class, and VLAN required to access the network. This
describes which of the following attacks?
A.
Social engineering
B.
Spoofing
C.
Zero-day attack
D.
VLAN hopping

Answer: A
Explanation:

QUESTION NO: 220


Which of the following cloud infrastructure designs includes on premise servers utilizing a
centralized syslog server that is hosted at a third party organization for review?
A.
Hybrid
B.
Public
C.
Community
D.
Private

Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

192

CompTIA N10-006 Exam

QUESTION NO: 221


A new threat is hiding traffic by sending TLS-encrypted traffic outbound over random ports. Which
of the following technologies would be able to detect and block this traffic?
A.
Intrusion detection system
B.
Application aware firewall
C.
Stateful packet inspection
D.
Stateless packet inspection

Answer: C
Explanation:

QUESTION NO: 222


The network administrator is configuring a switch port for a file server with a dual NIC. The file
server needs to be configured for redundancy and both ports on the NIC need to be combined for
maximum throughput. Which of the following features on the switch should the network
administrator use?
A.
BPDU
B.
LACP
C.
Spanning tree
"Pass Any Exam. Any Time." - www.actualtests.com

193

CompTIA N10-006 Exam


D.
Load balancing

Answer: B
Explanation:

QUESTION NO: 223


A network technician is using telnet to connect to a router on a network that has been
compromised. A new user and password has been added to the router with full rights. The
technician is concerned that the regularly used administrator account has been compromised.
After changing the password on all networking devices, which of the following should the
technician perform to prevent the password for the administrator account from being sniffed on the
network?
A.
Use SNMPv1 for all configurations involving the router
B.
Ensure the password is 10 characters, containing letter and numbers
C.
Copy all configurations to routers using TFTP for secuirty
D.
Only allow administrators to access routers using port 22

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

194

CompTIA N10-006 Exam


QUESTION NO: 224
A network technician has configured a point-to-point interface on a router, however, once the fiber
optic cables have been run, the interface will not come up. The technician has cleaned the fiber
connectors and used an optical power meter to confirm that light is passing in both directions
without excessive loss. Which of the following is the MOST likely cause?
A.
Distance limitation
B.
Wavelength mismatch
C.
cross-talk
D.
EMI
E.
Macro bend

Answer: B
Explanation:

QUESTION NO: 225


A network administrator wants to deploy a wireless network in a location that has too much RF
interference at 2.4 GHz. Which of the following standards requires the use of 5 GHz band wireless
transmissions? (Select TWO)
A.
802.11a
B.
802.11ac
C.
802.11b
"Pass Any Exam. Any Time." - www.actualtests.com

195

CompTIA N10-006 Exam


D.
802.11g
E.
802.11n

Answer: A,B
Explanation:

QUESTION NO: 226


Upon arrival at work, an administrator is informed that network users cannot access the file server.
The administrator logs onto the server and sees the updates were automatically installed and the
network connection shows limited and no availability. Which of the following needs to be rolled
back?
A.
The browser on the server
B.
The server's NIC drivers
C.
The server's IP address
D.
The antivirus updates

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

196

CompTIA N10-006 Exam

QUESTION NO: 227


A network engineer is conducting an assessment for a customer that wants to implement an
802.11n wireless network. Before the engineer can estimate the number of WAPs needed, it is
important to reference which of the following?
A.
Network diagram
B.
Site survey
C.
Network topology
D.
PoE requirements

Answer: B
Explanation:

QUESTION NO: 228


Which of the following default ports is associated with protocols that are connectionless?
A.
80
B.
443
C.
2427
D.
3389
"Pass Any Exam. Any Time." - www.actualtests.com

197

CompTIA N10-006 Exam


Answer: C
Explanation:

QUESTION NO: 229


A company is implementing enhanced user authentication for system administrators accessing the
company's confidential servers. Which of the following would be the BEST example of two-factor
authentication?
A.
ID badge and keys
B.
Password and key fob
C.
fingerprint scanner and retina scan
D.
Username and password

Answer: B
Explanation:

QUESTION NO: 230


A company that was previously running on a wired network is performing office-wide upgrades. A
department with older desktop PC's that do not have wireless capabilities must be migrated to the
new network, ensuring that all computers are operating on a single network. Assuming CAT5e
"Pass Any Exam. Any Time." - www.actualtests.com

198

CompTIA N10-006 Exam


cables are available, which of the following network devices should a network technician use to
connect all the devices to the wireless network?
A.
Wireless bridge
B.
VPN concentrator
C.
Default WAP
D.
Wireless router

Answer: D
Explanation:

QUESTION NO: 231


Which of the following integrity security mechanisms ensures that a sent message has been
received intact, by the intended receiver?
A.
IPSEC
B.
SHA
C.
DES
D.
CRC

Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

199

CompTIA N10-006 Exam

QUESTION NO: 232


A technician installs a new piece of hardware and now needs to add the device to the network
management tool database. However, when adding the device to the tool using SNMP credentials,
the tool cannot successfully interpret the results. Which of the following would need to be added to
the network management tool to allow it to interpret the new device and control it using SNMP?
A.
TRAP
B.
GET
C.
MIB
D.
WALK

Answer: C
Explanation:

QUESTION NO: 233


Which of the following communication technologies is used by video conferencing systems to
synchronize video streams, and reduce bandwidth, sent by a central location to subscribed
devices?
A.
Anycast
B.
Unicast
C.
CoS
"Pass Any Exam. Any Time." - www.actualtests.com

200

CompTIA N10-006 Exam


D.
QoS
E.
Multicast

Answer: E
Explanation:

QUESTION NO: 234


Which of the following is a UC application?
A.
Softphone
B.
Intranet
C.
Proxy
D.
Facsimile

Answer: A
Explanation:

QUESTION NO: 235


"Pass Any Exam. Any Time." - www.actualtests.com

201

CompTIA N10-006 Exam


A company is installing several APs for a new wireless system that requires users to authenticate
to the domain. The network technician would like to authenticate to a central point. Which of the
following would work BEST to achieve these results?
A.
A TACACS+ device and a RADIUS server
B.
A TACACS and a proxy server
C.
A RADIUS server and an access point
D.
A RADIUS server and a network controller

Answer: C
Explanation:

QUESTION NO: 236


A network technician is replacing security devices that protect the DMZ for a client. The client has
an application that allows external users to access the application remotely. After replacing the
devices, the external users are unable to connect remotely to the application. Which of the
following is MOST likely misconfigured?
A.
Content filter
B.
Firewall
C.
DNS
D.
DHCP

"Pass Any Exam. Any Time." - www.actualtests.com

202

CompTIA N10-006 Exam


Answer: B
Explanation:

QUESTION NO: 237


A technician is dispatched to investigate sporadic network outages. After looking at the event logs
of the network equipment, the technician finds that all of the equipment is restarting at the same
time every day. Which of the following can the technician deploy to correct this issue?
A.
Grounding bar
B.
Rack monitoring
C.
UPS
D.
Air flow management
E.
Surge protector

Answer: C
Explanation:

QUESTION NO: 238


A network technician needs to protect IP based servers in the network DMZ from being discovered
"Pass Any Exam. Any Time." - www.actualtests.com
203

CompTIA N10-006 Exam


by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the
network from ping sweeps?
A.
Block echo replies inbound to the DMZ
B.
Disable UDP on the servers
C.
Block ICMP at the firewall
D.
Disable TCP/IP on the server

Answer: C
Explanation:

QUESTION NO: 239


Which of the following 802.11g antennas broadcast an RF signal in a specific direction with a
narrow path?
A.
Omni-direction
B.
Unidirectional
C.
Patch
D.
Yagi

Answer: B
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

204

CompTIA N10-006 Exam

QUESTION NO: 240


A network administrator notices that the border router is having high network capacity loads during
non-working hours which is causing web services outages. Which of the following is the MOST
likely cause?
A.
Evil twin
B.
Session hijacking
C.
Distributed DoS
D.
ARP cache poisoning

Answer: C
Explanation:

QUESTION NO: 241


A client is receiving certificate errors in other languages when trying to access the company's main
intranet site. Which of the following is MOST likely the cause?
A.
DoS
B.
Reflective DNS
C.
Man-in-the-middle
D.
"Pass Any Exam. Any Time." - www.actualtests.com

205

CompTIA N10-006 Exam


ARP poisoning

Answer: C
Explanation:

QUESTION NO: 242


A technician add memory to a router, but that memory is never recognized by the router. The
router is then powered down, and the technician relocates all of the memory to different modules.
On startup, the router does not boot and displays memory errors. Which of the following is MOST
likely the cause?
A.
VTP
B.
Driver update
C.
ESD
D.
Halon particles

Answer: B
Explanation:

QUESTION NO: 243


"Pass Any Exam. Any Time." - www.actualtests.com

206

CompTIA N10-006 Exam


An additional network segment is urgently needed for QA testing on the external network. A
software release could be impacted id this change is not immediate. The request come directly
from management, and there is no time to go through the emergency change control process.
Given this scenario, which of the following is the BEST course of action for the network
administrator to take?
A.
Wait until the maintenance window, and make the requested change
B.
First document the potential impacts and procedures related to the change
C.
Send out a notification to the company about the change
D.
Make the change, noting the requester, and document all network changes

Answer: D
Explanation:

QUESTION NO: 244


A technician who is working with a junior member of the team is called away for another issue.
The junior technician orders an SC 80/125 fiber cable instead of an ST 80/125. Which of the
following will MOST likely be an issue with the new cable?

A.
Wavelength mismatch
B.
Distance limitations
C.
Connector mismatch
D.
Attenuation/Db loss:
"Pass Any Exam. Any Time." - www.actualtests.com

207

CompTIA N10-006 Exam


Answer: C
Explanation:

QUESTION NO: 245


Which of the following is a document that is used in cyber forensics that lists everywhere evidence
has been?

A.
Warrant
B.
Legal document
C.
Chain of custody
D.
Forensic report
E.
Documentation of the scene

Answer: C
Explanation:

QUESTION NO: 246


QoS operates at which of the following OSI model layers? (Select TWO)
"Pass Any Exam. Any Time." - www.actualtests.com

208

CompTIA N10-006 Exam


A.
Layer 1
B.
Layer 2
C.
Layer 3
D.
Layer 4
E.
Layer 5

Answer: B,C
Explanation:

QUESTION NO: 247


Which of the following is considered a classless routing protocol?

A.
IGRP
B.
IS-IS
C.
RIPv1
D.
STP

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

209

CompTIA N10-006 Exam

QUESTION NO: 248


A network technician needs to set up two public facing web servers and watns to ensure that if
they are compromised the intruder cannot access the intranet. Which of the following security
techniques should be used?
A.
Place them behind honeypots
B.
Place them in a separate subnet
C.
Place them between two internal firewalls
D.
Place them in the demilitarized zone

Answer: D
Explanation:

QUESTION NO: 249


A company has a network with three switches, each one with eight ports. The switch is connected
to a router that has a hub with four computers plugged into one of its interfaces. How many
broadcast domains are present in this company's network
A.
1
B.
2
C.
5
"Pass Any Exam. Any Time." - www.actualtests.com

210

CompTIA N10-006 Exam


D.
16
E.
28

Answer: B
Explanation:

QUESTION NO: 250


A company plan established to resume normal system operations following a disruption in
business would be described as which of the following?
A.
First responders
B.
User awareness training
C.
Disaster recovery
D.
Business continuity

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

211

CompTIA N10-006 Exam


QUESTION NO: 251
A client is concerned about a hacker compromising a network in order to gain access to
confidential research data. Which of the following could be implemented to redirect any attackers
on the network?
A.
DMZ
B.
Content Filter
C.
Botnet
D.
Honeypot

Answer: D
Explanation:

QUESTION NO: 252


A technician installs a new WAP and users in the area begin to report poor performance. The
technician uses a ping and 3 of 5 packets respond. Testing from a wired connection shows 5 of 5
packets respond. Which of the following tools should be used to discover the cause of the poor
performance?
A.
Port scanner tool
B.
Interface monitoring tool
C.
Packet capture tool
D.
Spectrum Analyzer tool
"Pass Any Exam. Any Time." - www.actualtests.com

212

CompTIA N10-006 Exam


Answer: D
Explanation:

QUESTION NO: 253


A network technician has just received an email regarding a security issue detected on the
company's standard web browser. Which of the following will MOST likely fix the issue?
A.
Firmware update
B.
OS update
C.
Vulnerability patch
D.
Driver update

Answer: C
Explanation:

QUESTION NO: 254


There is a network looping problem after installing some switches. The switch vendor suggested
the use of 802.1d. Which of the following is the MOST probable reason the vendor made this
suggestion?

"Pass Any Exam. Any Time." - www.actualtests.com

213

CompTIA N10-006 Exam


A.
It is a rapid version of spanning tree that uses BPDU to detect problems
B.
It is a regular version of port mirroring that uses hellow packets to detect loops
C.
It is a simple version of spanning tree that uses BPDU to detect problems
D.
It is a rapid version of port mirroring that uses BPDU to detect problems

Answer: A
Explanation:

QUESTION NO: 255


A NAC service has discovered a virus on a client laptop. In which of the following locations would
the NAC service place the laptop?
A.
On the DMZ network
B.
On the sandbox network
C.
On the honeypot
D.
On the quarantine network

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

214

CompTIA N10-006 Exam

QUESTION NO: 256


A company utilizes a patching server to regularly update their PC's. After the latest round of
patching all of the older PCs with non-gigabit Ethernet cards become disconnected from the
network and now require a technician to fix the issue locally at each PC. Which of the following
should be done to prevent this issue in the future?
A.
Enable automatic rebooting of the pCs after patching is completed
B.
Require the patching server to update the oldest PCs off hours
C.
Disable automatic driver updates to PCs on the patching server
D.
Throttle the connection speed of the patching server to match older PCs

Answer: D
Explanation:

QUESTION NO: 257


A technician has punched down only the middle two pins (pins 4 and 5) on an ethernet patch
panel. The technician has cabled this port to be used with which of the following?
A.
10baseT
B.
POTS
C.
568B
"Pass Any Exam. Any Time." - www.actualtests.com

215

CompTIA N10-006 Exam


D.
568A

Answer: B
Explanation:

QUESTION NO: 258


Which of the following protocols is used to encapsulate other network layer protocols such as
multicast and IPX over WAN connections?
A.
MPLS
B.
ESP
C.
GRE
D.
PPP

Answer: C
Explanation:

QUESTION NO: 259


A network technician is tasked with designing a firewall to improve security for an existing FTP
"Pass Any Exam. Any Time." - www.actualtests.com

216

CompTIA N10-006 Exam


server that is on the company network and is accessible from the internet. The security concern is
that the FTP server is compromised it may be used as a platform to attack other company servers.
Which of the following is the BEST way to mitigate this risk?
A.
Add an outbound ACL to the firewall
B.
Change the FTP server to a more secure SFTP
C.
Use the implicit deny of the firewall
D.
Move the server to the DMZ of the firewall

Answer: D
Explanation:

QUESTION NO: 260


A network administrator received the following email from a user:
From: [email protected]
To: [email protected]
Subject: Free smart phone
Dear, user, please click the following link to get your free smart phone
http://www.freesmartphone.it:8080/survey.php
Which of of the following should the administrator do to prevent all employees from accessing the
link in the above email, while still allowing Internet access to the freesmartphone.it domain?
A.
Add http://www.freesmartphone.it:8080/survey.php to the browser group policy block list.
B.
"Pass Any Exam. Any Time." - www.actualtests.com

217

CompTIA N10-006 Exam


Add DENY TCP http://www.freesmartphone.it ANY EQ 8080 to the firewall ACL
C.
Add DENY IP ANY ANY EQ 8080 to the intrusion detection system filter
D.
Add http://www.freesmartphone.it:8080/survey.php to the load balancer

Answer: A
Explanation:

QUESTION NO: 261


Which of the following types of equipment should be used for telecommunications equipment and
have an open design?
A.
2/4 post racks
B.
Rail Racks
C.
Vertical frame
D.
Ladder racks

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

218

CompTIA N10-006 Exam


QUESTION NO: 262
A facility would like to verify each individual's identity prior to allowing access to the datacenter.
Additionally,the facility would like to ensure that users do not tailgate behind other users. Which of
the following would BEST meet these goals?
A.
Implement a biometric reader at the datacenter entrance and require passage through a mantrap
B.
Implement a security guard at the facility entrance and a keypad on the datacenter entrance
C.
Implement a CCTV camera and a proximity reader on the datacenter entrance
D.
Implement a biometric reader at the facility entrance and a proximity card at the datacenter
entrance

Answer: A
Explanation:

QUESTION NO: 263


A network technician needs to connect two switches. The technician needs a link between them
which is capable of handling 10gb. Which of the following media would be optimal for this
application?
A.
CAT5e cable
B.
Coax cable
C.
Fiber Optic cable
D.
CAT6 cable
"Pass Any Exam. Any Time." - www.actualtests.com

219

CompTIA N10-006 Exam


Answer: C
Explanation:

QUESTION NO: 264


Joe, and administrator, is setting up three more switches in the test lab and is configuring the
switches. He is verifying the connectivity but when he pings one of the switches he receives
"Destination Unreachable". Which of the following issues could this be?
A.
Denial of service attack
B.
Misconfigured DNS settings
C.
Misconfigured Split Horizon
D.
RADIUS authentication errors

Answer: C
Explanation:

QUESTION NO: 265


A company is selecting a fire suppression system for their new datacenter and wants to minimize
the IT system recovery period in the event of a fire. Which of the following is the best choice for
the fire suppression system?
"Pass Any Exam. Any Time." - www.actualtests.com

220

CompTIA N10-006 Exam


A.
Portable extinguishers
B.
Wet Pipe
C.
Clean Gas
D.
Dry Pipe

Answer: C
Explanation:

QUESTION NO: 266


Which of the following BEST describes the process of documenting everyone who has physical
access or possession of evidence
A.
Legal hold
B.
Chain of custody
C.
Secure copy protocol
D.
Financial responsiblity

Answer: B
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

221

CompTIA N10-006 Exam

QUESTION NO: 267


A network manager wants a monthly report of the security posture of all the assets on the network
(e.g. workstations, servers, routers, switches, firewalls). The report should include any feature of a
system or appliance that is missing a security patch, OS update, etc. and the severity of risk that is
associated with the missing update or patch. Which of the following solutions would work BEST to
present this data?
A.
Security policy
B.
Penetration scan
C.
Virus scan
D.
Vulnerability scanner

Answer: D
Explanation:

QUESTION NO: 268


Which of the following is a logical host on the network where unauthorized users believe they are
on the production network?
A.
Virtual server
B.
VLAN
C.
Honeypot
"Pass Any Exam. Any Time." - www.actualtests.com

222

CompTIA N10-006 Exam


D.
Virtual Terminal

Answer: C
Explanation:

QUESTION NO: 269


Joe, the network manager, is leading a project to deploy a SAN. Joe is working with the vendor
support technician to properly set up and configure the SAN on the network. In order to begin SAN
I/O optimization, which of the following would Joe need to provide the vendor support technician?
A.
Network diagrams
B.
Baseline documents
C.
Asset management document
D.
Access to the datacenter

Answer: A
Explanation:

QUESTION NO: 270


"Pass Any Exam. Any Time." - www.actualtests.com

223

CompTIA N10-006 Exam


Joe, a home user, would like to share music throughout the computers in his house using a USB
drive connected to a router he purchased a year ago. The manufacturer states that the router is
capable of recognizing 4 TB, however, Joe is unable to get his 3TB drive to show up on the
network. Which of the following should Joe perform in order to resolve this issue?
A.
Load the latest hardware drivers for his USB drive
B.
Install the latest OS on his computers
C.
Download the latest playback software for his music files
D.
Flash the latest firmware for his router

Answer: D
Explanation:

QUESTION NO: 271


A technician has completed a survey of a wireless network and documented signal strengths. This
document is known as which of the following?
A.
Logical Network map
B.
Heat map
C.
Network baseline
D.
Bandwidth survey

Answer: B
"Pass Any Exam. Any Time." - www.actualtests.com

224

CompTIA N10-006 Exam


Explanation:

QUESTION NO: 272


A network technician must allow use of HTTP from the internet to an internal resource running
HTTP. This is an example of which of the following?
A.
Dynamic DNS
B.
Virtual Private networking (VPN)
C.
Dynamic NAT
D.
Port Forwarding

Answer: D
Explanation:

QUESTION NO: 273


A network topology in which all nodes have point to point connections to all other nodes is known
as which of the following?
A.
Mesh
"Pass Any Exam. Any Time." - www.actualtests.com

225

CompTIA N10-006 Exam


B.
Ring
C.
Bus
D.
Star

Answer: A
Explanation:

QUESTION NO: 274


A technician needs to install a server to authenticate remote users before they have access to
corporate network resources when working from home. Which of the following servers should the
technician implement?
A.
DNSSEC
B.
PPP
C.
RAS
D.
VLAN
E.
NAT

Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

226

CompTIA N10-006 Exam

QUESTION NO: 275


While monitoring the network, a technician notices that the network traffic to one of the servers is
extremely high. Which of the following should the technician use to verify if this is a concern?
A.
Log management
B.
Network diagram
C.
Network baseline
D.
Real time monitor

Answer: C
Explanation:

QUESTION NO: 276


A network administrator is tasked with building a wireless network in a new adjacent building.
Wireless clients should not have visibility to one another but should have visibility to the wired
users. Users must seamlessly migrate between the two buildings while maintaining a connection
to the LAN. Which of the following is the BEST way to configure the new wireless network in the
new building?
A.
Use the same SSIDs on different channels and AP isolation
B.
Use different SSIDs on different channels and VLANs
C.
Use different SSIDs on the same channels with VLANs
"Pass Any Exam. Any Time." - www.actualtests.com

227

CompTIA N10-006 Exam


D.
Use the same SSIDs on same channels with AP isolation

Answer: A
Explanation:

QUESTION NO: 277


A customer is attempting to download a file from a remote FTP server, but receives an error that a
connection cannot be opened. Which of the following should be one FIRST to resolve the
problem?
A.
Ensure that port 20 is open
B.
Ensure that port 161 is open
C.
Flush the DNS cache on the local workstation
D.
Validate the security certificate from the host

Answer: A
Explanation:

QUESTION NO: 278


"Pass Any Exam. Any Time." - www.actualtests.com

228

CompTIA N10-006 Exam


OFDM, QAM and QPSK are all examples of which of the following wireless technologies?
A.
Frequency
B.
Modulation
C.
RF interference
D.
Spectrum

Answer: B
Explanation:

QUESTION NO: 279


A network administrator is following best practices to implement firewalls, patch management and
policies on the network. Which of the following should be performed to verify the security controls
in place?
A.
Penetration testing
B.
AAA authentication testing
C.
Disaster recovery testing
D.
Single point of failure testing

Answer: A
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

229

CompTIA N10-006 Exam

QUESTION NO: 280


Which of the following is a connectionless protocol? (Select TWO)
A.
ICMP
B.
SSL
C.
TCP
D.
SSH
E.
HTTP
F.
UDP

Answer: A,F
Explanation:

QUESTION NO: 281


Ann, a network technician is preparing to configure a company's network. She has installed a
firewall to allow for an internal DMZ and external network. No hosts on the internal network should
be directly accessible by IP address from the internet, but they should be able to communicate
with remote networks after receiving a proper IP address. Which of the following is an addressing
scheme that will work in this situation?
A.
Teredo tunneling
"Pass Any Exam. Any Time." - www.actualtests.com

230

CompTIA N10-006 Exam


B.
Private
C.
APIPA
D.
Classless

Answer: B
Explanation:

QUESTION NO: 282


A company has just implemented VoIP. Prior to the implementation, all of the switches were
upgraded to layer 3 capable in order to more adequately route packages. This is an example of
which of the following network segmentation techniques?
A.
Compliance implementation
B.
Separate public/private newtorking
C.
Honeypot implementation
D.
Performance optimization

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

231

CompTIA N10-006 Exam

QUESTION NO: 283


A malicious student is blocking mobile devices from connecting to the internet when other students
are in the classroom. Which of the following is the malicious student implementing?
A.
Removing the AP from the classroom
B.
ACL
C.
Jamming
D.
Firewall
E.
IPS

Answer: C
Explanation:

QUESTION NO: 284


A technician configures a firewall in the following manner in order to allow HTTP traffic
Source IPZone Dest IPZonePortAction
AnyUntrustAnyDMZ80Allow
The organization should upgrade to which of the following technologies to prevent unauthorized
traffic from traversing the firewall?
A.
HTTPS
"Pass Any Exam. Any Time." - www.actualtests.com

232

CompTIA N10-006 Exam


B.
Stateless packet inspection
C.
Intrusion detection system
D.
Application aware firewall

Answer: D
Explanation:

QUESTION NO: 285


Exploiting a weakness in a user's wireless headset to compromise the mobile device is known as
which of the following?
A.
Multiplexing
B.
Zero-day attack
C.
Smurfing
D.
Bluejacking

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

233

CompTIA N10-006 Exam

QUESTION NO: 286


A technician is concerned about security and is asked to set up a network management protocol.
Which of the following is the best option?
A.
SLIP
B.
SNMPv3
C.
TKIP
D.
SNMPv2

Answer: B
Explanation:

QUESTION NO: 287


A network technician wants to allow HTTP traffic through a stateless firewall. The company uses
the 192.168.0.0/24 network. Which of the following ACL should the technician configure? (Select
TWO)
A.
PERMIT SRCIP 192.168.0.0/24 SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
B.
PERMIT SRCIP 192.168.0.0/24 SPORT:ANY DSTIP:ANY DPORT 80
C.
PERMIT SRCIP:ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT ANY
D.
"Pass Any Exam. Any Time." - www.actualtests.com

234

CompTIA N10-006 Exam


PERMIT SRCIP: ANY SPORT:80 DSTIP:192.168.0.0/24 DPORT:80
E.
PERMIT SRCIP:192.168.0.0/24 SPORT:80 DSTIP:ANY DPORT:80

Answer: B
Explanation:

QUESTION NO: 288


A network technician has been asked to make the connections necessary to add video transported
via fiber optics to the LAN within a building. Which of the following is the MOST common
connector that will be used on the switch to connect the media converter?
A.
FDDI
B.
Fiber coupler
C.
MT-RJ
D.
ST

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

235

CompTIA N10-006 Exam


QUESTION NO: 289
Which of the following protocols is considered a hybrid routing protocol?
A.
OSPF
B.
RIPv2
C.
IS-IS
D.
BGP
E.
EIGRP

Answer: E
Explanation:

QUESTION NO: 290


Ann, an employee, has properly connected her personal wireless router to a network jack in her
office. The router is unable to get a DHCP address though her corporate laptop can get a DHCP
address when connected to the same jack. Ann checks the router configuration to ensure it is
configured to obtain a DCHP address. Which of the following is the MOST likely reason why the
router is not receiving a DHCP address?
A.
The administrator has enabled DHCP snooping on the network
B.
The administrator is blocking DHCP requests that originate from access points
C.
The administrator is blocking the wireless router's MAC address using MAC filtering
"Pass Any Exam. Any Time." - www.actualtests.com

236

CompTIA N10-006 Exam


D.
The Administrator has implemented a feature that only allows white-listed MAC addresses

Answer: D
Explanation:

QUESTION NO: 291


As part of unified communications services, QoS must be implemented. DSCP and CoS map to
which of the following OSI layers? (Select TWO)
A.
Layer 1
B.
Layer 2
C.
Layer 3
D.
Layer 4
E.
Layer 5

Answer: B,C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

237

CompTIA N10-006 Exam


QUESTION NO: 292
A technician is troubleshooting a newly installed WAP that is sporadically dropping connections to
devices on the network. Which of the following should the technician check FIRST?
A.
WAP placement
B.
Encryption type
C.
Bandwidth saturation
D.
WAP SSID

Answer: A
Explanation:

QUESTION NO: 293


A network technician responds to a customer reporting that a workstation keeps losing its network
connection. The user explains that it occurs randomly and it happens several times throughout the
day. Which of the following troubleshooting methods should the technician perform FIRST?
A.
Test the theory
B.
Establish a plan of action
C.
Gather information
D.
Question the obvious

"Pass Any Exam. Any Time." - www.actualtests.com

238

CompTIA N10-006 Exam


Answer: C
Explanation:

QUESTION NO: 294


A user reports slow computer performance. A technician troubleshooting the issue uses a
performance monitoring tool and receives the following results:
Avg % Processor Time =10%
Avg Pages/Second = 0
Avg Disk Queue Length = 3
Based on the results, which of the following is causing a bottleneck?
A.
Hard drive
B.
Memory
C.
Processor
D.
NIC

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

239

CompTIA N10-006 Exam


QUESTION NO: 295
A technician has responded to a security issue with an employee's computer. Which of the
following basic forensic steps should be taken NEXT?
A.
Secure the area
B.
Initiate Data collection
C.
Create the forensics report
D.
Verify the chain of custody

Answer: A
Explanation:

QUESTION NO: 296


A network technician has downloaded the latest vendor switch O/S. which includes new features
and enhancements. Which of the following should the technician perform FIRST when updating
the switches?
A.
Backup the current configuration for each switch
B.
Install during non-business hours to test the system
C.
Test the O/S on one of the production switches
D.
Power cycle the company's border router

"Pass Any Exam. Any Time." - www.actualtests.com

240

CompTIA N10-006 Exam


Answer: A
Explanation:

QUESTION NO: 297


Which of the following protocols is used to send mail to another server on the Internet?
A.
RTP
B.
SNMP
C.
POP
D.
SMTP

Answer: D
Explanation:

QUESTION NO: 298


Which of the following ports is used to provide secure sessions over the web by default?
A.
22
"Pass Any Exam. Any Time." - www.actualtests.com

241

CompTIA N10-006 Exam


B.
25
C.
80
D.
5004

Answer: A
Explanation:

QUESTION NO: 299


An attack where the potential intruder tricks a user into providing sensitive information is known as
which of the following?
A.
Social engineering
B.
Bluesnarfing
C.
Man-in-the-middle
D.
Evil Twin

Answer: A
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

242

CompTIA N10-006 Exam

QUESTION NO: 300


After an employee connected a switch port of a home router to the wall jack in the office, other
employees in the office started losing connectivity. Which of the following can be implemented on
the company switch to prevent loss of connectivity in the future?
A.
Loop prevention
B.
ARP inspections
C.
DHCP snooping
D.
MAC address filtering

Answer: A
Explanation:

QUESTION NO: 301


An administrator hosts all of the company's virtual servers internally. In the event of total server
failure, the server images can be restored on a cloud provider and accessed through the VPN.
Which of the following cloud services is the administrator using?
A.
Community PaaS
B.
Public Iaas
C.
Hybrid Saas
"Pass Any Exam. Any Time." - www.actualtests.com

243

CompTIA N10-006 Exam


D.
Private Iaas

Answer: B
Explanation:

QUESTION NO: 302


When troubleshooting a T1 connection, the support representative from the provider instructs a
technician to place a special device into the CSU/DSU. Using this device the provider is able to
verify that communications are reaching the CSU/DSU. Which of the following was MOST likely
used by the technician?
A.
Cable analyzer
B.
Toner probe
C.
OTDR
D.
Loopback plug

Answer: D
Explanation:

QUESTION NO: 303


"Pass Any Exam. Any Time." - www.actualtests.com

244

CompTIA N10-006 Exam


A network technician wants to create a network where consultants can go to access the Internet
without disrupting the intranet of the office. Which of the following should be created?
A.
Guest network
B.
VLAN network
C.
Security network
D.
DMZ network

Answer: A
Explanation:

QUESTION NO: 304


A technician needs to use SNMP to manage several legacy devices. The technician wants to ask
the vendor for specification that will provide SNMP monitoring of the devices. Which of the
following will allow SNMP monitoring of the devices?
A.
SSH
B.
MIMO
C.
SYSLOG
D.
MIBS

Answer: D
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

245

CompTIA N10-006 Exam

QUESTION NO: 305


A network technician determines that two dynamically assigned workstations have duplicate IP
addresses. Which of the following commands should the technician use to correct this problem?
A.
ipconfig /all
B.
ipconfig /dhcp
C.
ipconfig /release then ipconfig /renew
D.
ipconfig /renew

Answer: C
Explanation:

QUESTION NO: 306


After moving to an adjacent cubicle, a user is reporting that the VoIP phone is randomly rebooting.
When the technician relocates the equipment back to the previous space, the phone functions
properly. No other stations are being affected. Which of the following is the MOST likely cause?
A.
Attenuation
B.
Bad UPS
C.
Cable short
D.
"Pass Any Exam. Any Time." - www.actualtests.com

246

CompTIA N10-006 Exam


Misconfigured DNS

Answer: C
Explanation:

QUESTION NO: 307


The administrator would like to use the strongest encryption level possible using PSK without
utilizing an additional authentication server. Which of the following encryption types should be
implemented?
A.
WPA2 Enterprise
B.
WEP
C.
MAC filtering
D.
WPA personal

Answer: A
Explanation:

QUESTION NO: 308


A network administrator wants to logically separate web function servers on the network. Which of
"Pass Any Exam. Any Time." - www.actualtests.com

247

CompTIA N10-006 Exam


the following network devices will need to be configured?
A.
IPS
B.
Switch
C.
Hub
D.
HIDS

Answer: B
Explanation:

QUESTION NO: 309


A user has installed a new wireless printer. The user cannot get to the internet but can print. All
other office users can reach the internet, but cannot connect to the new wireless printer. All users
are wireless in this area of the office. The used has MOST likely:
A.
Installed the printer in infrastructure mode
B.
Installed the printer in the wrong subnet
C.
misconfigured the gateway on the wireless printer
D.
installed the printer in ad-hoc mode

Answer: D
Explanation:
"Pass Any Exam. Any Time." - www.actualtests.com

248

CompTIA N10-006 Exam

QUESTION NO: 310


When installing a network cable with multiple strands, a technician drags the cable past a sharp
edge and exposes the copper conductor on several wires. These exposed wires come into contact
with each other forming an electrical connection. This creates which of the following conditions?
A.
Short
B.
Twisted pair
C.
Electrostatic discharge
D.
Crosstalk
E.
Open

Answer: A
Explanation:

QUESTION NO: 311


Which of the following attacks utilizes a wireless access point which has been made to look as
though it belongs to the network in order to eavesdrop on wireless traffic?
A.
Evil twin
B.
Rogue access point
C.
"Pass Any Exam. Any Time." - www.actualtests.com

249

CompTIA N10-006 Exam


WEP attack
D.
War driving

Answer: A
Explanation:

QUESTION NO: 312


A home user is pairing a bluetooth gaming controller with the game console. Which of the
following is implemented between the console and the controller?
A.
LAN
B.
PAN
C.
WAN
D.
MAN

Answer: B
Explanation:

QUESTION NO: 313


"Pass Any Exam. Any Time." - www.actualtests.com

250

CompTIA N10-006 Exam


A technician has attempted to optimize the network but some segments are still reporting poor
performance. Which of the following issues should the technician look at?
A.
Switch incorrectly set to full duplex
B.
Conflicting IP addresses
C.
Packet bottlenecks
D.
IP address scope depletion

Answer: C
Explanation:

QUESTION NO: 314


Coverage analysis for a new implementation of 802.11n WLAN involves which of the following?
(Select TWO)
A.
Humidity
B.
Temperature
C.
Heatmap
D.
Building material
E.
Sight lines

"Pass Any Exam. Any Time." - www.actualtests.com

251

CompTIA N10-006 Exam


Answer: D,E
Explanation:

QUESTION NO: 315


A technician is in a large room that contains a large amount of industrial equipment. The
technician would like to record the usable bandwidth between devices in a wireless network and
the access point. Which of the following should the technician document?
A.
Goodput
B.
EMI
C.
Latency
D.
Jitter
E.
Overhead

Answer: A
Explanation:

QUESTION NO: 316


A project manager is tasked with the planning of a new network installation for a client. The client
"Pass Any Exam. Any Time." - www.actualtests.com
252

CompTIA N10-006 Exam


wants to ensure that everything discussed in the meetings will be installed and configured when a
network engineer arrives onsite. Which of the following should the project manager provide the
client?
A.
Acceptable Use Policy
B.
Service Level agreement
C.
Statement of work
D.
Security Policy

Answer: C
Explanation:

QUESTION NO: 317


A technician suspects that the email system is slow due to excessive incoming SPAM. Which of
the following should the technician do according to the troubleshooting methodology?
A.
Verify full system functionality
B.
Block incoming email
C.
Establish a plan of action
D.
Gather information
E.
Consider multiple approaches
"Pass Any Exam. Any Time." - www.actualtests.com

253

CompTIA N10-006 Exam


Answer: D
Explanation:

QUESTION NO: 318


A home office has a dozen devices that need a class based DHCP device to assign addresses.
The subnet only has one octet for the host portion of each device. Which of the following IP
addresses would be assigned to the default gateway?
A.
10.0.0.1
B.
169.254.0.1
C.
192.168.0.1
D.
224.0.0.1

Answer: C
Explanation:

QUESTION NO: 319


A network administrator needs to allow employees to securely upload files to a remote server.
Which of the following should be allowed on the firewall?

"Pass Any Exam. Any Time." - www.actualtests.com

254

CompTIA N10-006 Exam


A.
20
B.
21
C.
22
D.
161

Answer: B
Explanation:

QUESTION NO: 320


Joe, a system administrator, is troubleshooting an issue with remotely accessing a new server on
the LAN. He is using an LMHOST file and the file contains the hostname and IP address of the
new server. The server that he cannot remote to is located on the same LAN as another server
that he can successfully remote to. Which of the following output from the command line would
BEST resolve the problem?
A.
C:\windows\system32>ipconfig /flushdnsWindows IP configurationSuccessfully flushed DNS
resolver cache
B.
C:\windows\system32>ipconfig /registerdnsWindows IP configurationRegistration of the DNS
resource records for all adapters has been initiated. Any errors will be reported in the event viewer
in 15 minutes.
C.
C:\windows\system32>nslookupDefault server: unknownAddress: 1.1.1.1
D.
C:\windows\system32>nbtstat -RSuccessful purge and reload of the NBT remote cache table

Answer: B
"Pass Any Exam. Any Time." - www.actualtests.com

255

CompTIA N10-006 Exam


Explanation:

QUESTION NO: 321


A technician is called to investigate a connectivity issue to a remote office that is connected by
fiber optic cable. Using a light meter, it is determined that the Db loss is excessive. The installation
has been working for several years. The switch was recently moved to the other side of the room
and a new patch cord installed. Which of the following is MOST likely the cause of the issue?
A.
Distance limitations
B.
Wavelength mismatch
C.
Bend radius limitation
D.
Dirty connectors

Answer: D
Explanation:

QUESTION NO: 322


A technician is being tasked to centralize the management of the switches and segment the
switches by broadcast domains. The company is currently all on VLAN1 using a single private IP
address range with a 24 bit mask. The supervisor wants VLAN 100 to be the management subnet
and all switches to share the VLAN information. Which of the following options would work BEST
"Pass Any Exam. Any Time." - www.actualtests.com
256

CompTIA N10-006 Exam


to accomplish these requirements?
A.
Use VLSM on the IP address range, with STP and 802.1q on the inter switch connections with
native VLAN 100
B.
Use VLSM on the IP address range with VTP and 802.1x on all inter switch connections with
native VLAN 100
C.
Use VLSM on VLAN1, with VTP and 802.1w on the inter switch connections with native VLAN 100
D.
Use VLSM on the IP address range with VTP and 802.1q on the inter switch connections with
native VLAN 100

Answer: D
Explanation:

QUESTION NO: 323


A new network administrator is hired to replace a consultant that has been keeping the network
running for several months. After a month, the network administrator is having network issues. The
problems are easily resolved and appear to be changes in the server settings. The log files on the
servers do not contain any error or messages related to the issues. Which of the following is a
possible cause of the issues?
A.
TACAS\Radius misconfiguration is causing logs to be erased
B.
ICMP ping of death is resetting DHCP and DNS on the server
C.
A backdoor has been installed to access the network
D.
The last ACL on the router is set to Deny All
"Pass Any Exam. Any Time." - www.actualtests.com

257

CompTIA N10-006 Exam


Answer: C
Explanation:

"Pass Any Exam. Any Time." - www.actualtests.com

258

You might also like