This page was exported from Free IT Exam VCE Download - ExamCollection
Export date: Sun Jul 21 9:31:51 2019 / +0000 GMT
2017/New N10-006: CompTIA Network+ Certification Exam Questions Updated Today! 1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com: 2.|2017/New N10-006 Exam Questions & Answers: QUESTION 51 A. DNS Answer: A QUESTION 52 A. SSH Answer: A QUESTION 53 A. IMAP4 Answer: D QUESTION 54 A. Establish a plan of action to resolve the problem. Answer: C QUESTION 55 A. The signal strength has been degraded and latency is increasing hop count. Answer: B QUESTION 56 A. SMTP Answer: A QUESTION 57 A. Create a MAC filter containing the current users. Answer: A QUESTION 58 A. MTU Answer: D QUESTION 59 A. ping Answer: A QUESTION 60 A. System log Answer: C 1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com:
Which of the following network protocols is used to resolve FQDNs to IP addresses?
An Internet service that translatesdomain namesinto IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain namewww.example.commight translate to188.8.131.52.
Which of the following network protocols is used for a secure command line interface for management of network devices?
Secure Shell is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.
Which of the following network protocols is used to transport email between servers?
While electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically use SMTP only for sending messages to a mail server for relaying
A user is having difficulty connecting a laptop to the company's network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop's wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?
B. Test the theory to determine a cause.
C. Re-establish a new theory or escalate.
D. Implement the solution or escalate as necessary.
As first theorey doesn't work he will establish a new theorey or escalate it to the vendor hardware company to work on it.
Ann, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem?
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.
Due to wrong subnet entered user is unable to communicate with anyone so to communicate he needs to be in right subnet.
An administrator is using a packet sniffer to try to determine what is causing the traffic on the network. The administrator sees a lot of packets on port 25. Which of the following traffic types is MOST likely using port 25?
Port no. 25 is assigned to smtp as documented by iana.
Which of the following is the BEST way to prevent new users from connecting to a wireless access point, but still allow already connected users to continue to connect?
B. Turn off SSID broadcast.
C. Change the encryption type to AES 256-bit for current users.
D. Reduce the signal strength to 0 percent.
MAC Filtering (or EUI filtering, or layer 2 address filtering) refers to a security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network.
MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists. While the restriction of network access through the use of lists is straightforward, an individual person is not identified by a MAC address, rather a device only, so an authorized person will need to have a whitelist entry for each device that he or she would use to access the network.
Which of the following should be used when throughput to the destination network is a priority?
B. Hop count
C. Reliability of the path
Users have reported issues accessing an Internet website. The network technician wants to verify network layer connectivity. Which of the following tools can provide the verification?
Pingis a computer network administration utility used to test the reachability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
A network technician is concerned that a user is utilizing a company PC for file sharing and using a large amount of the bandwidth. Which of the following tools can be used to identify the IP and MAC address of the user's PC?
B. History log
C. Network sniffer
Network snifferis a computer program or a piece of computer hardware that can intercept and log
traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes the packet's raw data, showing the values of various fields in the packet, and analyzes its content according to the appropriate RFC or other specifications.
2017/New N10-006: CompTIA Network+ Certification Exam Questions Updated Today!
1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com:
2.|2017/New N10-006 Exam Questions & Answers:
A. Establish a plan of action to resolve the problem.
A. The signal strength has been degraded and latency is increasing hop count.
A. Create a MAC filter containing the current users.
A. System log
Post date: 2016-12-29 08:24:48
Post date GMT: 2016-12-29 08:24:48
Post modified date: 2016-12-29 08:24:48
Post modified date GMT: 2016-12-29 08:24:48
Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com