Lead2pass 2017 September New CompTIA N10-006 Exam Dumps!

No doubt that N10-006 exam is a worth challenging task but you should not feel hesitant against the confronting difficulties. Lead2pass is supplying the new version of N10-006 VCE dumps now. Get a complete hold on N10-006 exam syllabus through Lead2pass and boost up your skills. What’s more, the N10-006 dumps are the latest. It would be great helpful to your N10-006 exam.

QUESTION 276
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?

A.    Implement preventative measures.
B.    Establish a plan of action to resolve the problem.
C.    Establish a theory of probable cause.
D.    Implement the solution or escalate as necessary.

Explanation:
By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not.

QUESTION 277
Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps?

A.    802.11a
B.    802.11b
C.    802.11g
D.    802.11n

Explanation:
The 802.11b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about 100 m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.) Hypothetical speed
Range(indoors)
Range(outdoors)
11 Mbits/s
50 m
200 m
5.5 Mbits/s
75 m
300 m
2 Mbits/s
100 m
400 m
1 Mbit/s
150 m
500 m

QUESTION 278
A technician tests a cable going to the patch panel and notices the following output from the cable tester:

1——————1
2——————2
3——————3
4——————4
5——————5
6——————6
7——————7
8——————8

On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue?

A.    White Orange
B.    Solid Brown
C.    Solid Orange
D.    White Green

Explanation:
T568A Wiring
Pin
Pair
Wire
Color

white/green

green

white/orange

blue

white/blue

orange

white/brown

brown

QUESTION 279
Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

A.    Signature based IPS
B.    Application based IDS
C.    Anomaly based IDS
D.    Application based IPS

Explanation:
An APIDS monitors the dynamic behavior and state of the protocol and will typically consist of a system or agent that would typically sit between a process, or group of servers, monitoring and analyzing the application protocol between two connected devices.

QUESTION 280
Which of the following security appliances are used to only identify traffic on individual systems?

A.    Host based IPS
B.    Application based IPS
C.    Network based IDS
D.    Host based IDS

Explanation:
A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as the network packets on its network interfaces.

QUESTION 281
Which of the following components of wiring distribution is referred to as the core communications closet for an organization?

A.    MDF
B.    Smart jack
C.    IDF
D.    Demarc extension

Explanation:
MDF stands for Main Distribution Frame and is the main computer room for servers,
hubs, routers, DSL’s, etc. to reside.

QUESTION 282
Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber?

A.    10GBaseLR
B.    100BaseFX
C.    100BaseTX
D.    1000BaseX

Explanation:
1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of error-
correction data. Each specification allows various cable (fiber or copper) lengths, and uses different cable media.

QUESTION 283
Which of the following does Kerberos provide?

A.    Non-repudiation
B.    Accounting
C.    Exchange
D.    Authentication

Explanation:
Kerberos is a trusted third-party authentication service based on the model presented by Needham and Schroeder. It is trusted in the sense that each of its clients believes Kerberos’judgmentas to the identity of each of its other clients to be accurate.

QUESTION 284
Which of the following does Kerberos use to authenticate?

A.    Tickets
B.    Servers
C.    Users
D.    Clients

Explanation:
Kerberos keeps a database of its clients and their private keys. The private key is a large number known only to Kerberos and the client it belongs to. In the case that the client is a user, it is an encrypted password. Network services requiring authentication register with Kerberos, as do clients wishing to use those services. The private keys are negotiated at registration.

QUESTION 285
After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic?

B.    The router failed, flooding the network with beacons.
C.    The new user’s IP address is a duplicate.
D.    A switching loop was created.

Explanation:
A Switching loop or Bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections betweentwo network switches or two ports on the same switch connected to each other). The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network.

QUESTION 286
Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?

A.    Caching
B.    VoIP
C.    QoS
D.    SMTP

Explanation:
By Qos we can prioritize the voice packets over data network.So delay and latency will get reduce.

QUESTION 287
A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet?

A.    ISDN
B.    Cable modem
C.    DSL
D.    Dial-up networking

Explanation:
Digital subscriber line (DSL, originally digital subscriber loop) is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network.

QUESTION 288
A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO).

A.    OC3 line with built-in firewall
B.    DS3 line with a separate firewall
C.    Cable modem with a separate firewall
D.    Dial-up modem with separate firewall
E.    DSL router with firewall capabilities

QUESTION 289
At which of the following layers do frames exist? (Select TWO).

A.    OSI model Data link layer
B.    TCP/IP model Network Interface layer
C.    OSI model Physical layer
D.    OSI model Network layer
E.    TCP/IP model Internet layer

Explanation:
The data link layer is concerned with local delivery of frames between devices on the same LAN. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local network. Inter-network routing and global addressing are higher layer functions, allowing data-link protocols to focus on local delivery, addressing, and media arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate between parties contending for access to a medium, without concern for their ultimate destination.

QUESTION 290
A user is unable to access any network resources. The IP configuration of the workstation is as follows:

Default Gateway: 192.168.10.46

Which of the following would allow the user to connect to network resources?

A.    Change the default gateway to 192.168.10.1
B.    Change the default gateway to 192.168.10.254
C.    Change the IP address to 192.168.10.31
D.    Change the IP address to 192.168.10.33

Explanation:
The given ip address is network id which we don’t assign to the host so the next ip is applicable to this.

QUESTION 292
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the following is the MOST likely problem?

A.    Faulty crossover cable
B.    DNS server is down
C.    Switching loop
D.    Outside interface shutdown

QUESTION 293
Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).

A.    dig
B.    nslookup
C.    nbstat
D.    ifconfig
E.    ipconfig

QUESTION 294
A router operates at which of the following layers of the OSI model?

A.    Layer 2
B.    Layer 3
C.    Layer 4
D.    Layer 5

QUESTION 295
When querying a DNS server for an AAAA record, which of the following is an appropriate response?

A.    192.168.2.1
B.    00:f3:82:99:a2:b8
D.    3ffe:1900:4545:3:200:f8ff:fe21:67cf

QUESTION 296
A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?

A.    Replace the router with a Layer 2 switch that supports VLANs
B.    Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C.    Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D.    AllowICMP to pass through the Router

QUESTION 297
Which of the following network devices restricts traffic based on words, signatures, and URLs?

A.    Layer 2 switch
B.    Content filter
D.    Traffic analyzer

QUESTION 298
A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?

A.    Port security is blocking all traffic.
B.    An IDS is blocking all traffic.
C.    Implicit deny is blocking all traffic.
D.    SMTP is blocking all traffic.

QUESTION 299
Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?

A.    Network security policy
B.    Network baseline
C.    Logical network diagram
D.    Wiring schematic

QUESTION 300
Which of the following is the only standard that can operate at either frequency?

A.    802.11a
B.    802.11b
C.    802.11g
D.    802.11n