Issuu on Google+

TestKing CompTIA N10-004 Exam Questions & Answers

N10-004 Network+ (2009) Exam number/code: N10-004 Exam name: Network+ (2009) Questions & Answers: 732 Q&A Related Certifications: Network+

Hundreds of people each day pass their IT certification exams with Testking guaranteed certification resources and training kits. Use the CompTIA N10-004 questions and answers to practice for your next CompTIA certification exam. If you don't pass – you don't pay! Testking has the first and only 100% product satisfaction and exam passing guarantee. Advanced practice questions and answers help drive the information into your routine thinking and surpass N10-004 brain dumps in retention and skill building. CompTIA N10-004 exam answers and practice questions can be used at home or office, installable on up to two PCs, or print the questions and answers to take with you and train on-the-go! CompTIA N10-004 preparation tools are the perfect fit for any CompTIA certification candidate with N10-004 training materials for every level of entry. Exam Engine Features Control your IT training process by customizing your practice certification questions and answers. The fastest and best way to train. * * * * * *

Truly interactive practice tests Create and take notes on any question Retake tests until you're satisfied YOU select the areas of the exam to cover Filter questions for a new practice test experience each time Re-visit difficult questions


TestKing CompTIA N10-004 Exam Questions & Answers

Exam: N10-004 Certification Questions & Answers

Question 1: You work as a network administrator at TestKing.com. A complaint was received this morning that a computer cannot locate the DHCP server that the system uses. You need to user one of the following Automatic Private IP Address (APIPA). What should you do? A. You should consider assigning 172.16.1.25. B. You should consider assigning 192.168.1.25. C. You should consider assigning 169.254.1.25. D. You should consider assigning 10.16.1.25. Answer: C Explanation: In the scenario you should remember that APIPA is used to assign IP addresses to a workstation in the event that there is no DHCP server available and your lease has expired. References: David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 130, 152

Question 2: Which of the following technologies listed below would be used by the TestKing.com technician to calculate back-off time on an Ethernet link after a collision has occurred? A. The TestKing.com technician would make use of Weighted Random Early Detect (WRED). B. The TestKing.com technician would make use of CSMA/CD. C. The TestKing.com technician would make use of CSMA/CA. D. The TestKing.com technician would make use of Spanning Tree. Answer: B Explanation: The technician would make use of CSMA/CD.. Incorrect Answers: A: The WRED is a congestion-avoidance mechanism. Anthony Bruno, Jacqueline Kim,CCDA Exam Certification Guide (2nd Edition), Cisco Press, Indianapolis, IN, 2004, pp. 643. C: The CSMA/CA will allows you to transmits a request to send (RTS) packet and it will waits for a clear to send (CTS) before sending. D: The Spanning Tree helps to prevent switching loops in a switched network.Reference:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 62, 64.

Question 3: What are the primary functions of a firewall? (Choose all that apply.) A. proxy server B. packet filtering


TestKing CompTIA N10-004 Exam Questions & Answers C. dynamic routing D. Network Address Translation Answer: B,D Explanation: Firewalls filter packets. Firewalls perform Network Address Translation. Incorrect Answers: A: Firewalls do not perform dynamic routing. C: A proxy server functions like a firewall but firewalls do not function as proxy servers.

Question 4: You work as a network administrator at TestKing.com. You have been requested to discover a rogue WAP. Which of the following documentation would be required to discover the rogue WAP? A. A Baseline would be required to discover the rogue WAP. B. Regulations would be required to discover the rogue WAP. C. Wiring schematics would be required to discover the rogue WAP. D. Policies would be required to discover the rogue WAP. Answer: A Explanation: Part 3, Given a scenario, evaluate the network based on configuration management documentation (5 questions)

Question 5: Which of the following statements BEST describes the issue concerning a wireless connection which disconnects when the house wireless telephone rings? A. The problem could be caused by the cordless phones being plugged into same outlet as the router. B. The problem could be caused by the cordless phones being 5.8 GHz which interferes with wireless. C. The problem could be caused by the cordless phones being plugged into the RJ-11 jack. D. The problem could be caused by the cordless phones being 2.4 GHz which interferes with wireless. Answer: D Explanation: In this scenario the problem occurred due to Interference. The 2.4 GHz cordless telephone interfered with the wireless connection. Wireless performance is affected by outside interference. You can thus say that the 2.4 GHz cordless phone can be classified as an outside interference. References: David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 255

Question 6: You are installing a 1000Base-T NIC in Workstation. What is the maximum segment length of a 1000Base-T segment?


TestKing CompTIA N10-004 Exam Questions & Answers A. 100 meters B. 325 meters C. 550 meters D. 3 kilometers Answer: A Explanation: Like 10Base-T and 100Base-T, the maximum distance of a 1000Base-T segment is 100 meters.

Question 7: Which of the following monitoring software listed below should be used to view network traffic at the frame level? A. Packet sniffer monitoring software should be used to view traffic at a frame level. B. Third-party monitoring software should be used to view traffic at a frame level. C. System monitoring software should be used to view traffic at a frame level. D. Throughput testing software should be used to view traffic at a frame level. Answer: A Explanation: In order to view network traffic at the frame level you need to make use of a packet sniffer. You make use of this feature to analyze traffic and troubleshoot it by capturing and decoding the packets. Packet sniffers can also be used to capture and inspect unencrypted information. Incorrect Answers: B: This feature only provides you a more vigorous monitoring and control of the system. C: System monitoring software will monitor an infected system. D: Throughput is a general term that describes the ratio o frame header to user information that is contained in the same frame. A high throughput indicates that the network is operating with high efficiency.References:

Question 8: You work as a network technician at TestKing.com. The newly appointed trainee wants to know which of the following a valid IP address is in the public addressing scheme is. What would your reply be? A. The IP address of 172.20.10.1 is a valid IP address in the public addressing scheme. B. The IP address of 10.20.1.1 is a valid IP address in the public addressing scheme. C. The IP address of 168.192.10.1 is a valid IP address in the public addressing scheme. D. The IP address of 233.10.20.1 is a valid IP address in the public addressing scheme. Answer: C Explanation: In the scenario you should remember that the IP address 168.192.10.1 is a valid public IP addressing scheme as the IP addressing scheme provides a flexible solution to the task of addressing thousands of networks. References: David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 130


TestKing CompTIA N10-004 Exam Questions & Answers Question 9: Which of the following listed devices can be remotely looped for troubleshooting requirements? A. A smart jack can be remotely looped for troubleshooting purposes. B. A 66 block can be remotely looped for troubleshooting purposes. C. A 110 block can be remotely looped for troubleshooting purposes. D. A patch panel can be remotely looped for troubleshooting purposes. Answer: A Explanation: The smart jack can be remotely looped, which can be used for troubleshooting. The 66 and 110 block is a punch-down tool that connects wires from the telephone systems.

Question 10: Which of the following fault tolerant or disaster recovery implementations is the MOST expensive? A. Cold site B. Warn site C. Hot site D. Dynamic site Answer: C Explanation: In a hot site, every computer system and every bit of information has a redundant copy. This provides 100% fault tolerance for systems that must be up 100% of the time. Hot sites are strictly fault-tolerant implementations, not disaster recovery implementations. Budgets for this type of fault tolerant implementation are typically large because each computer system must have a redundant copy. Incorrect Answers: A: Cold sites rely on backups for data recovery. This implementation has no fault tolerance and, hence, no expense, except for back up equipment. B: Warm sites are not as expensive as hot sites because it requires redundant copies on critical network components, such as servers, rather than redundant copies of all computer systems. D: There is no dynamic site in fault tolerant or disaster recovery implementations.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 369-372

Question 11: You work as a network technician at TestKing.com. The newly appointed trainee wants to know what the Virtual Local Area Network (VLAN) creates. What would your reply be? A. You should inform the trainee that Virtual Local Area Network is responsible for creating broadcast domains. B. You should inform the trainee that Virtual Local Area Network is responsible for creating network segments. C. You should inform the trainee that Virtual Local Area Network is responsible for assigning IP addresses. D. You should inform the trainee that Virtual Local Area Network is responsible for providing Media Access Control (MAC) addresses


TestKing CompTIA N10-004 Exam Questions & Answers Answer: A

Question 12: You work as a network technician at TestKing.com. The newly appointed TestKing.com trainee wants to know which transfer methods transfer files with the use of User Datagram Protocol (UDP). What would your reply be? A. You should know that the IPSec protocol would use the UDP protocol. B. You should know that the Trivial File Transfer Protocol (TFTP) would use the UDP protocol. C. You should know that the Kerberos protocol would make use of the UDP protocol. D. You should know that the File Transfer Protocol (FTP) protocol would use the UDP protocol. Answer: B Explanation: Like the IPX/SPX protocol stack, the TCP/IP protocol stack has two Transport layer protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) TCP is connection oriented, and UDP is connectionless. Some upper-layer protocols, such as FTP and HTTP, require reliable connection-oriented service and, therefore, use TCP. Other upper-layer protocols, such as Trivial File Transfer Protocol (TFTP) and Network File System (NFS), require increased speed and will trade reliability for that speed. They, therefore, use UDP. Incorrect Answers: A: You should not consider making use of the User Datagram Protocol (UDP) protocol which is a Transport layer connectionless protocol not providing the reliability services available with TCP but provides best effort transmission services to application protocols. C: You should not consider making use of the User Datagram Protocol (UDP) protocol which is a Transport layer connectionless protocol not providing the reliability services available with TCP but provides best effort transmission services to application protocols. D: You should not consider making use of the User Datagram Protocol (UDP) protocol which is a Transport layer connectionless protocol not providing the reliability services available with TCP but provides best effort transmission services to application protocols.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 115, 119.

Question 13: You work as a network technician at TestKing.com. The newly appointed TestKing.com trainee wants to know which protocol uses certificates to negotiate access to the network. What should you reply? A. The EAP-TLS protocol. B. The PAP protocol. C. The CHAP protocol. D. The Kerberos protocol. Answer: A Incorrect Answers: B: You should not consider making use of the PAP protocol because PAP pairs the usernames and passwords which are used. You should also remember when a client wants to authentication to a server the client will send the username and password to the server over the network. C: You should not consider making use of the Challenge Handshake Authentication Protocol (CHAP) because the protocol requires having both the client and server configured with the


TestKing CompTIA N10-004 Exam Questions & Answers same text phrase or known as a shared secret. The server would then compare the hash received from the client with the hash value it calculated when a match is verified the client is authenticated. D: You should not consider making use of the Kerberos protocol as is not just a protocol but an entire security system. Kerberos is used to establish a user's identity when they log on to a system that uses Kerberos. Kerberos then has that identity and its security credentials are then used throughout an entire logon session. Kerberos additionally makes use of strong encryption to encrypt all transactions and communications.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 339, 340 Part 2, Identify commonly used TCP and UDP default ports (27 questions)

Question 14: The TestKing.com network contains a 24 port switch that is configured with 12 VLANs. All the ports are actively used. Identify the amount of broadcast domains that will be created? A. The switch will result in 36 broadcast domains. B. The switch will result in 24 broadcast domains. C. The switch will result in 12 broadcast domains. D. The switch will result in 2 broadcast domains. Answer: C

Question 15: You are a network administrator at your company. Your company has a firewall that blocks all communication. You, however, want to allow users to send e-mail messages. What protocol should you allow through the firewall so that users can send e-mail messages? A. FTP B. TFTP C. POP3 D. SMTP E. SNMP Answer: D Explanation: The Simple Mail Transfer Protocol (SMTP) in most e-mail programs to send e-mail messages. POP3 is used to receive e-mail messages. Incorrect Answers: A: You should not consider making use of the FTP protocol because the protocol provides a mechanism for single or multiple file transfers between computer systems. B: You should not consider making use of the Trivial File Transfer Protocol (TFTP) protocol because the protocol is primarily used to boot diskless workstations and to transfer boot images to and from routers. The TFTP protocol additionally uses UDP instead of TCP, which makes for faster transfers but with no reliability C: You should not consider making use of POP protocol because Post Office Protocol (POP) protocol is used to provide a storage mechanism for incoming mail; the latest version of the standard is known as POP3. You should keep in mind when a client connects to a POP3 server, all the messages addressed to that client are downloaded. E: You should not consider making use of the Simple Network Management Protocol (SNMP) protocol because the protocol is used to allow network administrators to collect information about the network. The protocol can additionally be used for collecting information about devices on the network which include hubs, routers, and bridges.References:David Groth and Toby Skandier, Network+ Study Guide (4th Edition), Sybex, Alameda CA, 2005, pp. 115, 116


TestKing CompTIA N10-004 Exam Questions & Answers Related N10-004 Exams:

Popular Certification Exams: 50-658 920-807 000-444

HP0-090 000-818 000-839

LOT-711 132-S-712.2 642-983

COG-132 000-205 A00-203

642-971 646-102 132-S-900.7

CCSA CP 2000

Certified Specialist

TCDA V2R5

ECCouncil

HP

SeeBeyond

Hot Certifications: ACSA

NCDS

Popular Certification Providers: SDI

GRE


N10-004