[Free] 2018(June) Ensurepass CompTIA N10-006 Dumps with VCE and PDF 1-10

Ensurepass.com : Ensure you pass the IT Exams
2018 May CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 1 – (Topic 1)

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?

  1. The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.

  2. The administrator should configure each vSAN participant to have its own VLAN.

  3. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).

  4. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

Answer: D Explanation:

When using an iSCSI SAN (with iSCSI switching), we can improve network performance by enabling ‘jumbo frames’. A jumbo frame is a frame with an MTU of more than 1500. By setting the MTU to 9000, there will be fewer but larger frames going over the network.

Enabling jumbo frames can improve network performance by making data transmissions more efficient. The CPUs on switches and routers can only processone frame at a time. By putting a larger payload into each frame, the CPUs have fewer frames to process.

Question No: 2 – (Topic 1)

Which of the following is an example of an IPv4 address?

A. 192:168:1:55

B. 192.168.1.254

C. 00:AB:FA:B1:07:34

D. ::1

Answer: B Explanation:

AnIPv4 address is notated as four decimal numbers each between 0 and 255 separated by dots (xxx.xxx.xxx.xxx). Each number is known as an octet as it represents eight binary bits. All four octets make up a 32-bit binary IPv4 address.

In this question, 192.168.1.254 is a valid IPv4 address.

Question No: 3 – (Topic 1)

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

  1. Load balancer

  2. FTP server

  3. Firewall DMZ

  4. Mail server

Answer: D Explanation:

A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsiblefor accepting email for the recipient’s domain.

For example a user sends an email to recipient@somedomain.com. The sending user’s email server will query the somedomain.com DNS zone for an MX record for the domain. The MX record will specify the hostnameof the email server responsible for accepting email for the somedomain.com domain, for example, mailserver.somedomain.com. The sending email server will then perform a second DNS query to resolve mailserver.somedomain.com to an IP address. The sending mailserver will then forward the email to the destination mail server.

Question No: 4 – (Topic 1)

A technician has been given a list of requirements for a LAN in an older building using CAT6 cabling. Which of the following environmental conditions should be considered when deciding whether or not to use plenum-rated cables?

  1. Workstation models

  2. Window placement

  3. Floor composition

  4. Ceiling airflow condition

Answer: D

Explanation:

In a large building, the ‘plenum’ is the space between floors used to circulate air through the building. This space is also an ideal place to run computer network cabling. However, in the event of fire in the building, the network cables can be very hazardous because when they burn, the cable insulation gives off a poisonous smoke that gets circulated around the building. Furthermore, the burning cables help to spread the fire.

Plenum-rated cables are designed to be cabled through the plenum in a building. Plenum- rated cables are covered in fire-retardant plastic jacket to avoid the risk of toxic smoke being circulated around the building.

QUESTIONNO: 40

A VLAN with a gateway offers no security without the addition of:

A. An ACL. B. 802.1w.

C. A RADIUS server. D. 802.1d.

Answer: A

A gateway in a VLAN connects to another network. The other network can be the Internet, another subnet on the network or another VLAN. The gateway will be a router and for security, it should also be a firewall.

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. Firewalls use

ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question No: 5 – (Topic 1)

Which of the following describes an IPv6 address of ::1?

  1. Broadcast

  2. Loopback

  3. Classless

  4. Multicast

Answer: B Explanation:

The loopback address is a special IP address thatis designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sendingsystem. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer#39;s TCP/IP network configuration.

In IPv4, the loopback address is 127.0.0.1.

In IPv6, the loopback address is 0:0:0:0:0:0:0:1, which can be shortened to ::1

Question No: 6 – (Topic 1)

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

  1. OSPF

  2. VTP trunking

  3. Virtual PBX

  4. RADIUS

E. 802.1x

Answer: D,E Explanation:

D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user accounts and passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISP’s to authenticate their customer’s Internet connections.

Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network.

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device,such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server is the RADIUS server.

Question No: 7 – (Topic 1)

When convergence on a routed network occurs, which of the following is true?

  1. All routers are using hop count as the metric

  2. Allrouters have the same routing table

  3. All routers learn the route to all connected networks

  4. All routers use route summarization

Answer: C Explanation:

Routers exchange routing topology information with each other by using a routing protocol. Whenall routers have exchanged routing information with all other routers within a network, the routers are said to have converged. In other words: In a converged network all routers quot;agreequot; on what the network topology looks like.

Question No: 8 – (Topic 1)

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

A. 10.0.0.1

B. 127.0.0.1

C. 172.16.1.1

D. 192.168.1.1

Answer: B Explanation:

The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which willpoint back to the computer#39;s TCP/IP network configuration.

In IPv4, the loopback address is 127.0.0.1.

In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1

Question No: 9 – (Topic 1)

Which of the following refers to a network that spans several buildings that are within walking distance of each other?

  1. CAN

  2. WAN

  3. PAN

  4. MAN

Answer: A Explanation:

CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often implement CANs to link the buildings in a network. The range of CAN is 1KMto 5KM. If multiple buildings have the same domain and they are connected with a network, then it will be considered as a CAN.

Question No: 10 – (Topic 1)

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).

  1. 1000Base-LR

  2. 1000Base-SR

  3. 1000Base-T

  4. 10GBase-LR

  5. 10GBase-SR

  6. 10GBase-T

Answer: B,E Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiberwith a distance capability between 220 meters and 550 meters.

10Gbase-SRis a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short wavelength signaling.

100% Ensurepass Free Download!
Download Free Demo:N10-006 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass N10-006 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.