This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Sun Apr 28 21:52:38 2024 / +0000 GMT ___________________________________________________ Title: [2017-New-Dumps]Braindump2go CompTIA N10-006 VCE PDF Exam Dumps 1438Q&As for 100% Passing N10-006 Exam[101-110] --------------------------------------------------- 2017/New N10-006: CompTIA Network+ Certification Exam Questions Updated Today! 1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com:http://www.braindump2go.com/n10-006.html 2.|2017/New N10-006 Exam Questions & Answers:https://1drv.ms/f/s!AvI7wzKf6QBjgWim_TfUZBipTeqP   QUESTION 101A network administrator wants to see what ports are open on a server. Which of the following commands will show open ports? A.    netstatB.    tracertC.    nbtstatD.    nslookup Answer: AExplanation:Netstat command displays various network related information such as network connections, routing tables, interface statistics, masquerade connections, multicast memberships etc. QUESTION 102Which of the following would be the BEST solution for an IDS to monitor known attacks? A.    Host-basedB.    Signature-basedC.    Network-basedD.    Behavior-based Answer: BExplanation:Signature detection involves searching network traffic for a series of bytes or packet sequencesknown to be malicious. A key advantage of this detection method is that signatures are easy to develop and understand if you know what network behavior you're trying to identify. QUESTION 103At which of the following layers of the OSI model does ASCII work? A.    SessionB.    TransportC.    PresentationD.    Application Answer: CExplanation:The presentation layer is responsible for the delivery and formatting of information to the application layer for further processing or display. It relieves the application layer of concern regarding syntactical differences in data representation within the end-user systems. An example of a presentation service would be the conversion of an EBCDIC-coded text computer file to an ASCII-coded file. QUESTION 104Users report that an internal file server is inaccessible. Of the following commands, which would be the MOST useful in determining network-layer connectivity? A.    digB.    nbtstatC.    netstatD.    ping Answer: DExplanation:TheNbstatcommand is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tables for both local and remote computers. QUESTION 105Which of the following uses port 23 by default? A.    TELNETB.    IMAPC.    FTPD.    SNMP Answer: AExplanation:Telnetis a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). QUESTION 106Ann, a technician, is installing network cables for an office building. Some of the cables are not showing active on the switch even when moved to different ports. Which of the following is MOST likely the cause? A.    Port speed mismatchB.    Faulty F-connectorsC.    Bad wiringD.    Bad switch Answer: CExplanation:Bad wiring refers to the state when you do not follow a pattern and everything seems messed up and you are not able to figure out the cause. QUESTION 107Which of the following is the MAXIMUM rated speed for CAT5 cabling? A.    10MbpsB.    100MbpsC.    1000MbpsD.    10Gbps Answer: BExplanation: Category 5 cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet) QUESTION 108Which of the following is a specialized piece of hardware designed to encrypt and decrypt user traffic? A.    Proxy serverB.    TDRC.    Smart jackD.    VPN concentrator Answer: DExplanation:The VPN Concentrator is used for Remote Access VPN's. In typical use, a Remote Access VPN allows users to use an encrypted tunnel to securely access a corporate or other network via the Internet. QUESTION 109Which of the following wireless security measures, although widely implemented, does not provide strong security? A.    IPSecB.    WPA2C.    MAC address filteringD.    802.1x Answer: CExplanation:By MAC address filtering you can only filter layer 2 traffic but in security system layer 4 and layer 4 security is also essential. QUESTION 110After a new user moves furniture into a cubicle, the computer does not connect to the network any longer. Which of the following would be the MOST likely reason? (Select TWO). A.    Bad Ethernet switch portB.    TX/RX reversedC.    Bad connectorsD.    Bad patch cableE.    Mismatched MTU Answer: CDExplanation:It could be problem with the bad connector because the user just moved furniture to the cubicle and it is quite possible that the movement of the furniture has created problem by disrupting the cabling and connections. These two are the important things which can be broken down whenever there is a physical movement. !!!RECOMMEND!!! 1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com:http://www.braindump2go.com/n10-006.html 2.|2017/New N10-006 Study Guide: YouTube Video: YouTube.com/watch?v=wB4oZ7gOluM --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2016-12-30 07:59:02 Post date GMT: 2016-12-30 07:59:02 Post modified date: 2016-12-30 07:59:02 Post modified date GMT: 2016-12-30 07:59:02 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com