[2017-New-Dumps]Braindump2go CompTIA N10-006 PDF & VCE Exam Dumps 1438Q&As for 100% Passing N10-006 Exam[101-110]

2017/New N10-006: CompTIA Network+ Certification Exam Questions Updated Today!

1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com:
http://www.braindump2go.com/n10-006.html

2.|2017/New N10-006 Exam Questions & Answers:
https://1drv.ms/f/s!AvI7wzKf6QBjgWim_TfUZBipTeqP

 

QUESTION 101
A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports?

A.    netstat
B.    tracert
C.    nbtstat
D.    nslookup

Answer: A
Explanation:
Netstat command displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc.

QUESTION 102
Which of the following would be the BEST solution for an IDS to monitor known attacks?

A.    Host-based
B.    Signature-based
C.    Network-based
D.    Behavior-based

Answer: B
Explanation:
Signature detection involves searching network traffic for a series of bytes or packet sequences
known to be malicious. A key advantage of this detection method is that signatures are easy to develop and understand if you know what network behavior you’re trying to identify.

QUESTION 103
At which of the following layers of the OSI model does ASCII work?

A.    Session
B.    Transport
C.    Presentation
D.    Application

Answer: C
Explanation:
The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file.

QUESTION 104
Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity?

A.    dig
B.    nbtstat
C.    netstat
D.    ping

Answer: D
Explanation:
TheNbstatcommand is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tables for both local and remote computers.

QUESTION 105
Which of the following uses port 23 by default?

A.    TELNET
B.    IMAP
C.    FTP
D.    SNMP

Answer: A
Explanation:
Telnetis a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).

QUESTION 106
Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause?

A.    Port speed mismatch
B.    Faulty F-connectors
C.    Bad wiring
D.    Bad switch

Answer: C
Explanation:
Bad wiring refers to the state when you do not follow a pattern and everything seems messed up and you are not able to figure out the cause.

QUESTION 107
Which of the following is the MAXIMUM rated speed for CAT5 cabling?

A.    10Mbps
B.    100Mbps
C.    1000Mbps
D.    10Gbps

Answer: B
Explanation:
Category 5 cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet)

QUESTION 108
Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic?

A.    Proxy server
B.    TDR
C.    Smart jack
D.    VPN concentrator

Answer: D
Explanation:
The VPN Concentrator is used for Remote Access VPN’s. In typical use, a Remote Access VPN allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet.

QUESTION 109
Which of the following wireless security measures, although widely implemented, does not provide strong security?

A.    IPSec
B.    WPA2
C.    MAC address filtering
D.    802.1x

Answer: C
Explanation:
By MAC address filtering you can only filter layer 2 traffic but in security system layer 4 and layer 4 security is also essential.

QUESTION 110
After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO).

A.    Bad Ethernet switch port
B.    TX/RX reversed
C.    Bad connectors
D.    Bad patch cable
E.    Mismatched MTU

Answer: CD
Explanation:
It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important things which can be broken down whenever there is a physical movement.


!!!RECOMMEND!!!

1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com:
http://www.braindump2go.com/n10-006.html

2.|2017/New N10-006 Study Guide:
https://youtu.be/wB4oZ7gOluM

         

Braindump2go Testking Pass4sure Actualtests Others
$99.99 $124.99 $125.99 $189 $29.99/$49.99
Up-to-Dated
Real Questions
Error Correction
Printable PDF
Premium VCE
VCE Simulator
One Time Purchase
Instant Download
Unlimited Install
100% Pass Guarantee
100% Money Back