CompTIA Realtests N Exam Questions & Answers

Size: px
Start display at page:

Download "CompTIA Realtests N Exam Questions & Answers"

Transcription

1 CompTIA Realtests N Exam Questions & Answers Number: N Passing Score: 800 Time Limit: 120 min File Version: Comptia N Exam Questions & Answers Exam Name: CompTIA Network+ Certification Exam Last up date 31,2013

2 Exam A QUESTION 1 Which of the following would Kim, a technician, use in voice over IP communications? A. SNTP B. SCP C. SMTP D. SIP /Reference: QUESTION 2 Which of the following is the MOST appropriate to use when routing Internet traffic through multiple ISP connections? A. BGP B. SNAT C. RIP D. GPG QUESTION 3 Which of the following protocols allows more than three non-overlapping channels? A a B g C q D QUESTION 4 Which of the following represents the physical address of a network access card? A. FF01:D2:C4:87::11 B B-C8 C. 08-9D L2-34-FF-21 D. 2D1A:C3:0:1C3B:2AD:FF:FEBE:9D3A

3 QUESTION 5 Which of the following OSI layers BEST describes where an HTTP proxy operates? A. Transport B. Application C. Presentation D. Session QUESTION 6 Which of the following would be MOST useful to alert Jeff, an administrator, that a denial of service attack is occurring? A. RAS B. RDP C. IDS D. VPN QUESTION 7 A MAC address is used at which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 /Reference: QUESTION 8 Multimode fiber should be used in place of copper when:

4 A. distances are short. B. EMI is a concern. C. PoE is necessary. D. the switch has BNC connectors. QUESTION 9 A network device is more than 100 meters (328 feet) from a 24-port copper switch. Which of the following can be used to connect the device to the network? A. Fiber multiplexer B. Repeater C. Attenuator D. OTDR QUESTION 10 Which of the following regulates the amount of network traffic a single node receives in a server cluster? A. Load balancer B. Proxy server C. Content filter D. Quality of service QUESTION 11 Which of the following evaluates packet payload when detecting network threats? A. IPS B. Proxy server C. Caching server D. Content filter /Reference: QUESTION 12 A disassociation request is a way to mitigate which of the following threats?

5 A. ARP poisoning B. Rogue AP C. Man-in-the-middle attack D. Botnet QUESTION 13 A crossover cable is MOST commonly associated with which of the following layers of the OSI model? A. Session B. Application C. Network D. Physical QUESTION 14 Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Jeff, an administrator? A. DoS attack B. Man-in-the-middle attack C. Smurf attack D. Xmas attack /Reference: QUESTION 15 Which of the following WAN technologies uses four wires for digital and a 66 block? A. Cable B. ATM C. T3 D. POTS QUESTION 16 Which of the following has the HIGHEST data rate speed?

6 A. T1 B. ADSL C. SDSL D. OC-3 QUESTION 17 Which of the following is designed to be used with multimode fiber over short wavelengths? A. 10GBaseLW B. 10GBaseER C. 10GBaseSW D. 10GBaseLR QUESTION 18 Which of the following is used to verify configuration updates on a firewall? A. Signature identification B. Access control lists C. Scanning services D. Content filtering QUESTION 19 Which of the following sizes is the fixed cell length in ATM? A. 8 bytes B. 53 bytes C. 64 kilobytes D. 128 kilobytes QUESTION 20 In the 2.4GHz range, which of the following channel combinations are non-overlapping? A. 1, 6, 11 B. 2, 7, 10

7 C. 2, 8, 13 D. 3, 6, 9 QUESTION 21 Which of the following technologies relies on a ticket granting server to allow clients to verify their identity? A. TACACS+ B. Kerberos C. PKI D. RADIUS QUESTION 22 Lisa, an administrator, determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks? A. DDoS B. Viruses C. Worms D. Man-in-the-middle /Reference: QUESTION 23 Which of the following authenticates, allows, and controls the execution of router commands? A. PKI B. RADIUS C. Kerberos D. TACACS+ QUESTION 24 A user's new computer is not able to connect to the network at all. Upon further investigation, Kim, the administrator, finds that the wall jack is terminated with a 568B configuration. After locating the correct cable in the IDF, which of the following is the MOST likely cause of the problem?

8 A. Other end of the cable is terminated with a 568B configuration B. Trunk port on the switch is disabled C. Other end of the cable is terminated with a 568A configuration D. Wall jack needs to be replaced with a smart jack QUESTION 25 Which of the following network access methods is the MOST secure? A. PPPoE B. SIP C. RSH D. IPSec /Reference: QUESTION 26 Lisa, a technician, is reporting wireless transmission speeds of 300Mbps. Which of the following wireless standards is being used? A a B b C g D n QUESTION 27 The selection of the correct punch down tool to use depends on which of the following? A. Connector type B. Demarcation point location C. Block type D. Switch location QUESTION 28 Which of the following services do TCP connections provide to application layer protocols? (Select TWO).

9 A. Transport services without error recovery B. Large data size manageability using segmentation C. Secure Kerberos password encryption on data D. Delivery through error recovery E. Proxy server authentication D QUESTION 29 Which of the following devices will allow Lisa, a user, to see a cached copy of websites? A. Content switch B. DNS server C. Proxy server D. Load balancer QUESTION 30 Kim, a user, reports that the web browser is indicating the site certificate is not trusted. Which of the following attacks may be in progress? A. Man-in-the-middle B. Denial of service C. Ping flooding D. Smurfing QUESTION 31 Which of the following has a DB-9 connector? A. SC B. RS-232 C. LC D. RJ-45 QUESTION 32 Users are unable to access the company's intranet website. Which of the following attacks has the network MOST likely experienced?

10 A. Man-in-the-middle B. Smurf C. Trojan D. DoS QUESTION 33 Which of the following is the BEST method to ensure network performance on a VoIP network? A. Traffic shaping B. Quality of service C. Load balancing D. Caching engines /Reference: QUESTION 34 Kim, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO). A. Packet sniffer B. Honeypot C. Port mirroring D. IPS E. Port scanner F. IDS C QUESTION 35 Which of the following colors represents the outer leads on a connector head of a 568B patch cable? (Select TWO). A. Blue, brown/white B. Green/white, blue C. Orange/white, orange D. Blue, blue/white E. Brown/white, brown E

11 /Reference: QUESTION 36 Kim, an administrator, has created a patch cable. Which of the following tools should she use to check the integrity of the cable? A. Protocol analyzer B. Toner probe C. Cable certifier D. Cable stripper QUESTION 37 PKI is a method of user authentication which uses which of the following? A. Various router commands B. Access control lists C. Certificate services D. A RADIUS server QUESTION 38 Kim, an administrator, wants to verify which protocols are in use on the network. Which of the following tools should she use? A. Intrusion detection software B. PoE C. Packet sniffer D. Intrusion prevention software QUESTION 39 Lisa, an administrator, needs to install a wireless network that will allow legacy devices to connect to the network and also offer both 5GHz and 2.4GHz frequencies. Which of the following would BEST describe the type of WAP needed? A a B b C g D n

12 QUESTION 40 Which of the following is the MAXIMUM distance a single 1000BaseT segment can cover? A. 100 kilometers (62 miles) B. 10 kilometers (6 miles) C meters (3281 feet) D. 100 meters (328 feet) QUESTION 41 Which of the following wireless standards operates on the same frequency as a? A. Compatible with b wireless networks B. Compatible with g wireless networks C. Compatible with i wireless networks D. Compatible with n wireless networks QUESTION 42 Which of the following components would a technician plug into a smart jack? A. 25 pair cable B. 100 pair cable C. Patch cable D. Patch panel QUESTION 43 Which of the following is used by RADIUS to encrypt messages between the server and the client? A. Public key B. CSU/DSU C. Private key D. Shared secret

13 QUESTION 44 Which of the following network scanners detects and sends out alerts for malicious network activity? A. Packet sniffers B. IDS C. Port scanners D. IPS QUESTION 45 Which of the following is a social engineering attack? A. Worms B. Man-in-the-middle C. Phishing D. Evil twin QUESTION 46 Peer to peer networks are used to pass information in between which of the following? A. Several clients to a centralized server B. One client to another C. Several servers to several centralized clients D. One client to a centralized server QUESTION 47 Which of the following threats is MOST likely to enable an attacker to modify data in transit? A. DoS B. Smurf attack C. Virus D. Man-in-the-middle QUESTION 48

14 Which of the following solutions will detect and disable a rogue access point? A. Port scan B. Packet sniffer C. IPS D. IDS QUESTION 49 Which of the following connector types will MOST likely be located on a serial cable? A. DB-9 B. LC C. ST D. BNC QUESTION 50 Which of the following is an encrypted remote access protocol? A. RDP B. PoE C. RAS D. PPP QUESTION 51 Jeff, an administrator, wishes to add a third network segment to the firewall where the company's public web servers will be placed. Which of the following BEST describes this new segment? A. PKI B. VPN C. IPS D. DMZ QUESTION 52 Which of the following would the telecommunications carrier use to segregate customer traffic over long fiber links?

15 A. VLAN B. MPLS C. VPN D. PSTN QUESTION 53 Which of the following can be configured to restrict specific ports and IP addresses from accessing the internal network? (Select TWO). A. Layer 2 switch B. MAC address filtering C. ACLs D. IIS server E. Port scanner F. Firewall F /Reference: QUESTION 54 Which of the following authentication solutions also provides AAA and uses TCP? A. TACACS+ B. Kerberos C. RADIUS D. RAS QUESTION 55 Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks? A. Honeynet B. Honeypot C. Vulnerability scanner D. Network based IDS

16 QUESTION 56 Which of the following separates broadcast domains? A. Port mirroring B. Router C. Convergence D. Switch QUESTION 57 Which of the following commands can Lisa, a network technician, use to check whether the DNS server for a given domain is reachable? A. nmap B. nbtstat C. dig D. arp QUESTION 58 Which of the following could Kim, a network technician, use to find the approximate location of a break in a long network cable? A. Protocol analyzer B. Time domain reflectometer C. Toner probe D. Multimeter QUESTION 59 Which of the following can Jeff, a technician, modify on an n router that is not available as an option on an g device? A. SSID B. Encryption C. Channels D. Spectrum

17 QUESTION 60 Which of the following technologies could be implemented to improve call clarity when using VoIP technology? A. Static IP addressing B. Caching engines C. QoS D. Port forwarding

18 Exam B QUESTION 1 When Jeff, a technician, is troubleshooting a problem, which of the following is the NEXT step after verifying full system functionality? A. Establish a plan of action to resolve the problem and identify potential effects. B. Implement the solution. C. Establish a theory of probable cause. D. Document findings, actions, and outcomes. QUESTION 2 Lisa, a technician, is troubleshooting a cable problem. She has checked both ends and suspects an issue 50 yards (46 meters) from the location. Which of the following network tools will confirm this analysis? A. TDR B. Protocol analyzer C. Multimeter D. Cable crimper QUESTION 3 A switch in IDF 3 has shut down at 3 p.m. everyday this week. Which of the following network tools should Kim, a technician, use to troubleshoot this problem? A. Environmental monitor B. Cable tester C. TDR D. Loopback plug QUESTION 4 Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port? A. 20 B. 21 C. 22 D. 23

19 /Reference: QUESTION 5 Which of the following ports is the default telnet port? A. 20 B. 21 C. 22 D. 23 QUESTION 6 Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 E. 162 F E /Reference: QUESTION 7 Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC? A. Loopback plug B. Protocol analyzer C. Smart jack D. Coupler QUESTION 8 A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?

20 A. net share B. hostname C. ipconfig D. tracert QUESTION 9 Which of the following hardware tools would MOST likely be used to verify Layer 1 connectivity? A. Multimeter B. Loopback plug C. Cable certifier D. CAT3 coupler QUESTION 10 Which of the following properties of DHCP would Lisa, a technician, use to ensure an IP address is not leased out from the active scope? A. Reservations B. Lease times C. Removing IPs from the active leases D. Configuring the DNS options QUESTION 11 A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable? A. Butt set B. Punch down tool C. Toner probe D. Protocol analyzer QUESTION 12 Kim, a network technician, needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

21 A. STP B. PoE C. VTP trunking D. Port forwarding QUESTION 13 Which of the following describes a rationale for a network with redundant paths? A. VPN compatibility B. Unified communications implementation C. High availability requirement D. QoS QUESTION 14 Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use? A. OTDR B. Multimeter C. Punch down tool D. Temperature monitor QUESTION 15 Which of the following is an example of a DHCP failover mechanism? A. APIPA B. Inactive lease C. Reservations D. Active lease QUESTION 16 Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency? A a

22 B b C g D n QUESTION 17 Which of the following devices is used to distribute network traffic equally over multiple links? A. Content filter B. DNS server C. Load balancer D. Proxy server /Reference: QUESTION 18 Which of the following is used to restrict access according to user policies? A. Content filter B. DHCP server C. DNS server D. VPN concentrator QUESTION 19 Which of the following is used to filter outgoing network requests? A. Proxy server B. VPN concentrator C. DHCP server D. IIS server QUESTION 20 A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector? A. Wire tester

23 B. Punch down C. Crimper D. Multimeter /Reference: QUESTION 21 There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic? A. Protocol analyzer B. Cable tester C. Cable certifier D. Environmental monitor QUESTION 22 Kim, a network technician, is installing an n network. Which of the following should Kim enable to ensure that the network only allows n clients? A. Name the SSID on the n network only B. Limit the DHCP address pool C. Disable b and g D. Only use WPA encryption QUESTION 23 Which of the following network devices restricts traffic based on words, signatures, and URLs? A. Layer 2 switch B. Content filter C. Load balancer D. Traffic analyzer QUESTION 24 Which of the following network devices hides network nodes behind one public IP address?

24 A. Layer 3 switch B. Content filter C. VPN server D. Proxy server QUESTION 25 A VPN concentrator is used for which of the following purposes? A. MAC filtering B. Content filtering C. Secure network access D. Connectivity troubleshooting QUESTION 26 Lisa, a technician, has configured a new switch that is remotely accessed using SSH. The switch is working properly but cannot be accessed remotely. Which of the following items is MOST likely missing in the configuration? A. Port speed B. Cryptokey C. Data VLAN D. NAT/PAT /Reference: QUESTION 27 Kim, a technician, needs to monitor network traffic for bandwidth analysis because of slow Internet downloads. Which of the following protocols will the tool use to show the necessary information? A. SNMP B. NTP C. SIP D. PPTP QUESTION 28

25 Kim, a user, on a wireless network reports an issue with network access while using a cordless phone. Which of the following is the MOST likely cause? A. Encryption type B. Channel selection C. Antenna placement D. Signal strength /Reference: QUESTION 29 Which of the following n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth? A. Channel bonding B. MIMO C. Spatial reuse D. 20MHz channel spacing QUESTION 30 Lisa, a user, reports the network is down. While troubleshooting, a technician walks into a communications closet and notices a small patch cable with both ends plugged into interfaces on the same switch. Which of the following is this an example of? A. Switch loop B. Port bonding C. Virtual switch D. Port mirroring /Reference: QUESTION 31 Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause? A. TXRX is reversed B. Faulty crossover cable C. Incorrect WEP key D. A short in the cable pairs

26 QUESTION 32 Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data? A. SNMP v2 B. VPN C. SYSLOG D. SMTP QUESTION 33 Which of the following network management tools can filter information from all data entering and leaving a specific port on the switch? A. SNMP trap B. Bandwidth analyzer C. Network sniffer D. Syslog server QUESTION 34 A Windows server has a problem after booting up. Kim, a technician, should immediately check the: A. history logs. B. cron logs. C. application logs. D. system logs. QUESTION 35 Management has decided that they want a high level of security. They do not want Internet requests coming directly from users. Which of the following is the BEST recommendation? A. Content filter B. Proxy server C. Layer 3 switch D. Firewall

27 QUESTION 36 A small office has asked to have six PCs networked together by Jeff, a consultant. The office users want file sharing capability with no access to the Internet. Which of the following items will Jeff need? (Select TWO). A. Network bridge B. RG-59 patch cabling C. CAT5e patch cabling D. Firewall E. Switch E QUESTION 37 Jeff, a customer, has requested a solution to allow all internally and externally bound traffic to be monitored. Which of the following would allow a packet sniffer to do this? A. A VPN client and VPN concentrator B. A smart jack installed for each network jack C. A managed switch with port mirroring D. A proxy server with content filter QUESTION 38 Jeff, a customer, shares a building with several other tenants. He reports that an unencrypted wireless network has been getting slower while his Internet traffic has steadily been increasing. Which of the following should be configured to resolve this problem? A. VLAN B. MTU C. WPA D. SSID QUESTION 39 Which of the following issues is a common problem in wireless infrastructures? A. Incorrect port number B. Mismatched SSIDs C. Invalid telnet sessions

28 D. Too many collisions /Reference: QUESTION 40 After a recent generator test, several users are reporting network connectivity issues. Jeff, the network technician, is unable to connect via SSH to the main switch. Which of the following is the MOST likely cause of the connectivity issue? A. Faulty cable B. Misconfigured speed and duplex C. Wrong gateway D. Power loss /Reference: QUESTION 41 Lisa, the network technician, has been instructed to provide connectivity to workstations within a SOHO that is over 800 feet (243 meters) away from the main switch. Which of the following would she install to provide connectivity? A. CAT5e B. CAT6 C. Coaxial D. Multimode fiber QUESTION 42 During a disaster recovery test, several billing representatives need to be temporarily setup to take payments from customers. It has been determined that this will need to occur over a wireless network, with security being enforced where possible. Which of the following configurations should be used in this scenario? A. WPA2, SSID enabled, and n. B. WEP, SSID enabled, and b. C. WEP, SSID disabled, and g. D. WPA2, SSID disabled, and a.

29 QUESTION 43 Which of the following could cause employees to be redirected to an incorrect site after typing in the correct name in a web browser? A. DNS cache poisoning B. Mismatched MTU C. Incorrect DHCP address D. Duplicate IP address QUESTION 44 Zach, a network technician, is trying to set up a SOHO network to allow Internet connectivity for all employees based on the following hardware: - 4 computers with LAN and wireless cards - 1 router with 3 LAN ports - 2 Ethernet cables - 1 cable modem The manager would like as many of the computers as possible to be physically connected, instead of using wireless. Which of the following scenarios would meet this requirement based on the equipment available? A. The router should be connected to the modem and one PC can be physically connected to the router. All other PCs must connect wirelessly. B. The modem should be physically connected to the router and two PCs can be physically connected to the router. All other PCs must connect wirelessly. C. The router should be connected to the modem and three PCs can be physically connected to the router. The other PC must connect wirelessly. D. The modem should be physically connected to one PC. All other PCs must connect wirelessly. QUESTION 45 An g wireless access point was configured as follows: - AP encryption forced to WPA2-AES mode only - MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40 Which is true about the above configuration? A. Any b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client. B. An a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-dac3-40 and the encryption key is known by the client. C. An n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-dac3-40 and the encryption key is known by the client. D. Any g compatible client can connect to the wireless network if the encryption key is known by the client.

30 /Reference: QUESTION 46 Which of the following is a reason to use dynamic DNS? A. The host IP address is not listed in the firewall. B. The host IP address is assigned by DHCP. C. Static routes cannot be used on the host network. D. A third-party certificate is being used. QUESTION 47 Jeff, a user, can no longer access the accounting file share, but others are still able to access the share. Which of the following would be the FIRST step in troubleshooting the issue? A. Notify senior management of the issue. B. Develop a probable cause theory. C. Ask Jeff if anything has changed on the system. D. Escalate the issue to the vendor. /Reference: QUESTION 48 Jeff, a user connected to the wireless network, takes a laptop from his desk to a conference room. Arriving at the conference room, Jeff realizes that the laptop is in process of reconnecting to the wireless network. Which of the following is a common wireless problem that can cause this issue? A. Mismatched SSID B. Incorrect encryption type C. Weak signal strength D. Increased latency QUESTION 49 Jeff, a network administrator, would like to ensure that the footprint of the company's wireless coverage is limited to the office borders, located on the premises. Which of the following features should he adjust on all of the company's WAPs to make this change?

31 A. SSID masking B. PPPoE C. Transmission power D. Encryption technology /Reference: QUESTION 50 Zach, a network administrator, is checking work on some new CAT5 LAN network cabling installed at an organization. Multiple lines are receiving poor signals, and Zach finds the lengths of the runs to be sometimes over 350 feet (107 meters). Which of the following is the cause of the issue? A. CAT5 cable runs over 330 feet (100 meters) need to utilize STP instead of UTP. B. CAT5 cabling is limited to single-run lines of 330 feet (100 meters). C. CAT5 cabling is limited to single-run lines of 250 feet (76 meters). D. CAT5 cabling needs to have terminators installed at each end for runs over 330 feet (100 meters). QUESTION 51 Zach, a customer, has Internet service that includes several static IP addresses. Zach wishes to host a website from a server within a privately addressed network and make it publicly available. Which of the following would have to be configured on the router to allow the public to access the website from one of the static IP addresses? A. QoS monitoring B. Static NAT C. VLAN tagging D. MAC filtering QUESTION 52 Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks? A. PPPoE authentication B. MAC filtering C. WPA encryption D. Wireless channel

32 QUESTION 53 A company's database software runs in the cloud. The device hosting the software is an example of which of the following? A. Virtual server B. Virtual switch C. Virtual desktop D. Virtual PBX QUESTION 54 Lisa, a technician, is troubleshooting a laptop's connection to a wireless network and notices the user has placed their cell phone on top of the wireless router. Which of the following is the cell phone MOST likely generating? A. Wrong encryption B. An SSID mismatch C. Latency D. Interference

33 Exam C QUESTION 1 Kim, a technician, is asked to run new cabling for an office that is 350 feet (107 meters) away from the networking equipment. The type of cable being run is CAT6. Kim purchases and installs a 500 foot (152 meters) CAT6 cable, but after installation, notices a weak signal between the office and the networking equipment. Which of the following would have been the BEST to install instead of the CAT6 cable? A. Install two CAT6 cables with a repeater. B. Install a 500 foot (152 meter) CAT5 cable. C. Install a 500 foot (152 meter) CAT5e cable. D. Install three CAT6 cables with a repeater. QUESTION 2 Which of the following default services uses TCP/UDP port 88? A. LDAP B. IGMP C. HTTP D. Kerberos /Reference: QUESTION 3 Multiprotocol Label Switching (MPLS) operates at which of the following layers of the OSI model? (Select TWO). A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 E. Layer 5 C QUESTION 4 Which of the following examples would require a private static IP address, but not a public static IP address? A. A PDA connecting to the wireless network. B. A laptop that is deployed on a LAN. C. A file server deployed in the internal datacenter. D. An Internet facing web server for external access.

34 QUESTION 5 Zach, a network engineer, is troubleshooting poor wireless throughput for a group of 15 users in a large office. Many of the computers are showing moderate to weak signals even though there are two APs less then 15 feet (4 meters) away in either direction. Which of the following is MOST likely the cause? A. The local antennas are not powerful enough. B. There is an SSID mismatch. C. The receiver sensitivity is too high. D. The closest APs are down. QUESTION 6 An organization currently has CAT5e cabling throughout its office. Kim, the network technician, is troubleshooting a new CAT6 run that supports network traffic, but does not meet specification when tested with a TDR. Which of the following is MOST likely the cause? A. Improper grounding B. TXRX reversed C. Incorrect termination D. Outdated NIC drivers QUESTION 7 Which of the following OSI model layers is between the data link and transport layers? A. Presentation B. Physical C. Session D. Network QUESTION 8 Which of the following is a Class A private IP address? A B C

35 D /Reference: QUESTION 9 Which of the following services would have assigned the IP address ? A. DHCP B. APIPA C. IDS D. DNS QUESTION 10 Zach, a technician, suspects a NIC in a desktop computer has failed. Which of the following commands can Zach use to BEST troubleshoot this issue? A. netsh B. nslookup C. ipconfig D. tracert QUESTION 11 company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? A. Content filtering on the wireless access point B. Allow traffic from the wireless access point C. Block traffic from the wireless access point D. Packet filtering on the wireless access point

36 /Reference: QUESTION 12 Lisa, an administrator, is unable to route traffic between VLANs on a switch. Communication between devices within each VLAN is functioning. At which of the following layers does the problem MOST likely reside? A. Network B. Data link C. Transport D. Session QUESTION 13 Lisa, a technician, installs a new WAP and users are able to connect; however, users cannot access the Internet. Which of the following is the MOST likely cause of the problem? A. The signal strength has been degraded and latency is increasing hop count. B. An incorrect subnet mask has been entered in the WAP configuration. C. The signal strength has been degraded and packets are being lost. D. Users have specified the wrong encryption type and routes are being rejected. QUESTION BaseT has a MAXIMUM run distance of: A. 25 meters (82 feet). B. 100 meters (328 feet). C. 500 meters (1640 feet). D meters (3280 feet). QUESTION 15 Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources. Which of the following is the MOST likely reason? A. Incorrect DNS B. Incorrect subnet mask C. Duplicate IP address D. Incorrect SSID

37 QUESTION 16 Teachers and students at a school currently share the same bandwidth. The Internet performance for the teachers in the classroom is becoming extremely slow. Which of the following is the BEST method to mitigate the issue? A. Increased uptime B. Caching engines C. Traffic shaping D. Load balancing /Reference: QUESTION 17 The location where the Telco wiring stops and the clients wiring starts is known as the: A. MDF. B. demarc. C. IDF. D. 66 block. QUESTION 18 Blocking a known malicious web address by using the ACL on the firewall is an example of which of the following? A. IP filtering B. Application filtering C. MAC filtering D. Port filtering QUESTION 19 A firewall that examines all the incoming traffic and decides if the traffic is going to be allowed though or dumped is a example of which of the following? A. Packet sniffing B. Packet filter

38 C. Stateful inspection D. Content filter QUESTION 20 Two duplicate pieces of equipment can be used in conjunction for which of the following purposes? (Select TWO). A. High availability B. Fault tolerance C. Reduce latency D. Wi-MAX E. CARP B /Reference: QUESTION 21 Which of the following improves wireless performance by allowing only one wireless transmission on the network at a time? A. CSMA/CA B. CSMA/CD C. Wireless encryption D. Wireless bonding QUESTION 22 Lisa, an administrator, is responsible for one Linux and two Windows servers. She would like to review all server logs centrally. Which of the following services could Lisa use in this scenario? A. Event logs B. Baselines C. Change management D. Syslog QUESTION 23 Lisa, a network technician, needs to push changes out to network devices and also monitor the devices based

39 on each device's MIB. Which of the following should she use? A. SNMP B. Traffic analysis C. Syslog D. Asset management QUESTION 24 Kim, a network technician, needs to identify the MAC address of a device that is creating broadcast storms on the network. Which of the following tools will provide the needed information? A. History logs B. Network sniffer C. Network maps D. Traffic shaping QUESTION 25 For security reasons Zach, a network technician, wants to install a Linux based server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hardware costs? A. VPN concentrator B. Virtual servers C. Wireless D. Multimode fiber QUESTION 26 Which of the following VPN methods is BEST used for connecting a remote office to the main company office? A. WEP-to-WPA B. RDP-to-RAS C. Client-to-site D. Site-to-site QUESTION 27

40 Creating a uniform user environment throughout the network can BEST be achieved by using which of the following? A. Honeypots B. Virtual switches C. Virtual PBX D. Virtual desktops /Reference: QUESTION 28 Zach, an administrator, wants to eliminate remote access to a network from all users, except those users in Zach's own country. Which of the following security measures could he use to set up this functionality? A. MAC filtering B. Port filtering C. IP filtering D. TLS QUESTION 29 Lisa, a network technician, has determined that the initial theory of probable cause was incorrect. Which of the following would be the NEXT step in the troubleshooting process? A. Implement the solution B. Establish a plan C. Document findings D. Escalate the issue QUESTION 30 Which of the following is the MAXIMUM hop count for RIP before the network is considered converged? A. 1 B. 5 C. 10 D. 15

41 QUESTION 31 Jeff, a technician, has identified a problem, established and confirmed a theory, and has attempted to resolve the problem. Jeff, however, does not appear to have the rights to make the needed changes. Which of the following should he do NEXT? A. Re-establish a new theory. B. Gather more information. C. Establish a plan of action. D. Escalate the problem. /Reference: QUESTION 32 Jeff, a network administrator, has been requested to install wireless access throughout the entire building, while utilizing a single SSID. Which of the following options will meet this requirement? A. Set a separate VLAN on each WAP with the same encryption type. B. Set the SSID on each WAP and set contiguous WAPs to different channels. C. Set the SSID on each WAP and set contiguous WAPs to the same channel. D. Set a separate VLAN on each WAP with the same frequency. QUESTION 33 Which of the following should Kim, a technician, update when new computers are purchased? A. Asset management B. Change management C. Cable management D. Baselines /Reference: QUESTION 34 Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this? A. 21 B. 22 C. 23 D. 25

42 QUESTION 35 Kim, a technician, needs to test if domain name resolution is functioning properly. Which of the following software tools would she use to accomplish this? (Select TWO). A. arp B. dig C. route D. nslookup E. netstat D /Reference: QUESTION 36 Which of the following DNS records would be queried to locate a company's mail server? A. A B. MX C. AAAA D. CNAME QUESTION 37 Which of the following protocols would Lisa, a technician, use to disable switch ports automatically to prevent switching loops? A. RIP B. OSPF C. STP D. EGP QUESTION 38 Which of the following network appliances can BEST be described as allowing multiple servers to share requests for a website through the same public IP address? A. VPN concentrator

43 B. Content filter C. Load balancer D. Proxy server QUESTION 39 Jeff, a company executive, has noticed that a wireless network signal from the company's WAP can be seen in the company's parking lot. Jeff is very worried that this is a potential security threat. Which of the following can be done to eliminate this threat? A. Implement WEP encryption B. Decrease signal strength C. Change wireless channels D. Rotate the SSID daily QUESTION 40 Jeff, a network administrator, is installing an n network. Which of the following should he consider FIRST? A. Placement B. MAC filtering C. Channel D. VTP configuration /Reference: QUESTION 41 Jeff, a network administrator, needs to forward HTTP traffic from a SOHO firewall public IP to the internal web server's private IP. Which of the following can Jeff implement? A. DNS B. NAT C. PKI D. RAS QUESTION 42

44 Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO). A. 21 B. 22 C. 23 D. 53 E. 67 C QUESTION 43 Which of the following DNS record types is used for IPv6 resolution? A. MX B. AAAA C. A D. PTR QUESTION 44 A company wishes to have a wireless signal broadcast only through a specific stretch of a highway tunnel. Which of the following measures will accomplish this? A. WPA encryption B. MAC filtering C. Changing antenna type D. Decreasing radio strength

45 Exam D QUESTION 1 Zach, a user, is unable to logon to his domain from his desktop PC. A cable certifier is used and shows a high value of NEXT. Which of the following represents the cause? A. Crosstalk B. TX/RX reversed C. Split cables D. DB loss QUESTION 2 Lisa, a user, is unable to map a drive to a known NetBIOS share. A ping from the client to the server is successful. Which of the following software tools is used to check if NetBIOS is enabled? A. netstat B. arp C. nbtstat D. nslookup QUESTION 3 In order to reduce spam , Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587? A. 20 B. 21 C. 23 D. 25 /Reference: QUESTION 4 A company would like all HTTP traffic to filter through a proxy server on port Which of the following port numbers needs to be redirected through the proxy server to accomplish this? A. 20 B. 80 C. 143 D. 443

46 QUESTION 5 As a best practice, which of the following should be assigned to a network's main server? A. Lease B. Dynamic IP address C. Static IP address D. Scope QUESTION 6 A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO). A. 20 B. 80 C. 143 D. 443 E D /Reference: QUESTION 7 Kim, an employee, connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is she MOST likely using to establish the connection? A. RDP B. RTP C. RIP D. RAS QUESTION 8 A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity?

47 A. Disable SSID broadcast B. Increase the signal strength C. Move the access point D. Change the broadcast channel /Reference: QUESTION 9 Which of the following is the default subnet mask for a Class B address? A B C D QUESTION 10 Which of the following wireless technologies has the LARGEST cell size? A a B af C g D i QUESTION 11 Which of the following is similar to MIMO? A. WPA B. SSID C. PoE D. Diversity QUESTION 12 RADAR avoidance technologies are built into which of the following technologies? A a

48 B b C g D i /Reference: QUESTION 13 Which of the following occurs when antenna gain is increased on an access point? A. Connection speeds decrease B. Throughput decreases C. Cell size increases D. Attenuation increases QUESTION 14 Which encryption type uses only a 28 character key? A. 40/64 bit WEP B. 104/128 bit WEP C. WPA2 PSK D. WPA Personal QUESTION 15 Which of the following uses a Management Information Base (MIB) to monitor the network? A. History Logs B. Syslog C. SMTP D. SNMP QUESTION 16 Zach, a network administrator, is tasked with simplifying the review of events from network devices. Which of the following is used to accomplish this? A. History logs

49 B. Event logs C. Syslog server D. Traffic analyzer QUESTION 17 Jeff, a technician, is troubleshooting connectivity issues with a new data circuit. Jeff verifies that the ST fiber jumper is good. Which of the following is the problem? A. TX/RX reversed B. Interference C. Cable length D. Bad connectors /Reference: QUESTION 18 Frames are the Protocol Data Unit for which of the following layers of the OSI model? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 /Reference: QUESTION 19 Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution would provide the BEST solution? A. Private IP Addressing B. Wireless Access Points C. Wide Area Networking D. Virtual Local Area Networks QUESTION 20

50 Which of the following servers would MOST likely be placed in a DMZ? A. Proxy Server B. Web Server C. File Server D. Intranet Server /Reference: QUESTION 21 Lisa, an administrator, must connect to a remote UNIX server securely. Which of the following would be the MOST secure connection method? A. FTP B. PPP C. Telnet D. SSH QUESTION 22 How many collision domains and broadcast domains are present on a 24-port switch with no VLAN assignments? A. 1 collision domain, 1 broadcast domain B. 1 collision domain, 24 broadcast domains C. 24 collision domains, 1 broadcast domain D. 24 collision domains, 24 broadcast domains QUESTION 23 Users report that an internal web server is not responding. Which of the following commands could be used on the server to confirm that the web service is running? A. nbtstat B. traceroute C. nslookup D. netstat

51 /Reference: QUESTION 24 When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? A. ping B. arp C. route D. dig QUESTION 25 Kim, an administrator, has detected a worm spreading throughout the network. Which of the following ACLs can be configured on a Layer2 switch port to mitigate the attack? A. Drop 19:21:68:10:20:00 B. Permit ::1/32 C. Permit A0:H1:B0:90:1D:6C D. Drop /Reference: QUESTION 26 Which of the following MUST be used to implement a wireless network supporting EAP-TTLS? A. Kerberos B. Two factor authentication C. CHAP D. PKI QUESTION 27 After installing a SOHO wireless router, Jeff, the network administrator, notices that all internal RFC 1918 IP addresses are being logged by an Internet web server as coming from the router's public interface IP address. Which of the following must Jeff implement to assign a different public IP from the router's public interface IP address to one of the workstations in the office? A. NAT B. PAT C. DMZ

52 D. ACL QUESTION 28 After running a CAT6 cable from the maintenance office 80 floors above the network closet, users are reporting lack of connectivity. Which of the following is the MOST likely cause? A. Cable placement B. Crosstalk C. Bad wiring D. Cable length QUESTION 29 Lisa, a technician, is testing a CAT6 cabling run. The speed of the cable is showing 100Mbps instead of 1Gbps. Which of the following is the reason? A. Bad connectors B. TX/RX reversed C. Packet loss D. Distance QUESTION 30 When running cable in an office building, which of the following should Zach, a technician, consider to help reduce EMI? A. Cable distance B. Cable placement C. Connector types D. PoE devices /Reference: QUESTION 31 Which of the following protocols is used by the ping command? A. SMTP

53 B. ICMP C. TFTP D. ARP QUESTION 32 Which of the following could be BEST described as multiple operating system environments running at the same time on a single physical server? A. Traffic Shaping B. Virtualization C. Load Balancing D. VPN tunneling QUESTION 33 Jeff, a user, is having intermittent connectivity problems. The technician discovers that the network cable from Jeff's desktop is run next to a user's desk where a large file cabinet has been placed on top of the wire. Which of the following is the MOST probable cause of the intermittent connectivity problems? A. Split cables B. DB loss C. EMI D. TX/RX reversed QUESTION 34 Zach, a user, cannot access the Internet. A similar problem occurred several times last week to other users, and the solution was to reboot each workstation. As the first step, the technician reboots the workstation and it does not solve the problem. Which of the following should have been done instead? A. Change the DNS server IP on the client B. Information gathering C. Change the workstation IP address D. Establish a plan of action QUESTION 35 Which of the following is the BEST encryption protocol to use to allow customers to access a secure website

54 from the Internet without using VPNs? A. IPSec B. TLS C. SSL version 1 D. SSL version 2 QUESTION 36 Lisa, a technician, is troubleshooting a problem with a managed network switch. She determines the resolution to the problem is beyond her experience level. Which of the following should Lisa do NEXT? A. Question users B. Test the theory C. Re-establish a theory of probable cause D. Escalate the problem /Reference: QUESTION 37 Which of the following circuits provides the MOST bandwidth? A. T3 B. OC3 C. T1 D. PRI /Reference: QUESTION 38 Jeff, a network technician, has been asked to add a web server and server to the company's network. The company's stateful firewall must remain in place to prevent any external originating traffic from entering the internal network segment. Which of the following is the BEST solution to ensure protecting the internal network and implementing the new servers? A. Block all TCP Port 80 traffic B. Enable WPA encryption C. Create a DMZ D. Add an implicit deny to the firewall

55 QUESTION 39 Which of the following are components of IPSec? (Select TWO). A. AH B. ESP C. SSH D. ICA E. TLS B QUESTION 40 An organization recently installed a firewall on the network. Employees must be able to send and receive from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO). A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110 C QUESTION 41 Lisa, a technician, replaced the CAT6 cable from the server to the patch panel. Before the cable was replaced, there were no issues with connectivity. Immediately after the cable was replaced, users report that they are unable to access a database application on the server. Which of the following is the MOST likely reason for the inaccessibility? A. Lisa used a short patch cable. B. Lisa used a cable with an RJ-45 connector. C. Lisa used a crossover cable. D. Lisa used a patch cable that was over 50 meters long. QUESTION 42 Which of the following is occurring when Jeff, an employee, unintentionally gives information that is used maliciously? A. Tailgating B. DoS attack

56 C. DDoS attack D. Social engineering QUESTION 43 Which of the following attacks creates a buffer overflow to stop access to a system? A. Blue jacking B. DoS C. Netstat D. Man-in-the-middle QUESTION 44 At which of the following layers of the OSI model does an unmanaged switch operate? A. Layer 1 B. Layer 2 C. Layer 3 D. Layer 4 /Reference:

57 Exam E QUESTION 1 When using high bandwidth applications over multiple WAN connections, which of the following should be used? A. Static IP addressing B. Half-duplex C. PoE devices D. Load balancing QUESTION 2 Kim, an administrator, is attempting to connect a laptop to a server via RJ-45 ports on both a device and a CAT5 patch cable. All of the IP settings have been verified to be correct, yet there is a connectivity problem. Which of the following would MOST likely fix the IP connectivity problem? A. Wires 1, 2 and 3, 6 need to be swapped on one end of the connecting cable. B. Use the DB-9 port with a DB-9 to RJ-45 adapter on the server. C. Manually adjust the duplex mode on the server's link. D. Configure the laptop to receive a DHCP address from the server, rather than manually setting one. /Reference: QUESTION 3 Jeff, a user, reports very slow network access. He has spoken to other users, and no one else is experiencing network problems. Which of the following is the NEXT step in troubleshooting this issue? A. Determine if anything has changed. B. Upgrade the user to a gigabit speed. C. Replace the user's network card. D. Set the switch port to full-duplex. QUESTION 4 To achieve MAXIMUM bandwidth throughput, n clients should use which of the following? A. Only the 5GHz band B. Only the 2.4GHz band C. Only the 900MHz band D. Both 2.4GHz and 5GHz bands

CompTIA Realtests N Exam Questions & Answers

CompTIA Realtests N Exam Questions & Answers CompTIA Realtests N10-005 Exam Questions & Answers Number: N10-005 Passing Score: 800 Time Limit: 120 min File Version: 21.4 http://www.gratisexam.com/ Comptia N10-005 Exam Questions & Answers Exam Name:

More information

N10-005_formatted. Product Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available within 150 days after your purchase.

N10-005_formatted. Product Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available within 150 days after your purchase. N10-005_formatted Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 12.59 http://www.gratisexam.com/ Vendor: CompTIA Exam Code: N10-005 Exam Name: CompTIA Network+ Certification Exam

More information

N10-005_formatted. Product Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available within 150 days after your purchase.

N10-005_formatted. Product Our Product Manager keeps an eye for Exam updates by Vendors. Free update is available within 150 days after your purchase. N10-005_formatted Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 12.59 http://www.gratisexam.com/ Vendor: CompTIA Exam Code: N10-005 Exam Name: CompTIA Network+ Certification Exam

More information

Comptia N Number: N Passing Score: 720 Time Limit: 120 min File Version:

Comptia N Number: N Passing Score: 720 Time Limit: 120 min File Version: Comptia N10-005 Number: N10-005 Passing Score: 720 Time Limit: 120 min File Version: 12.49 http://www.gratisexam.com/ Exam A QUESTION 1 Which of the following network tools is used to identify running

More information

N Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0.

N Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. N10-005 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ www.yesuse.com Exam A QUESTION 1 Which of the following can be configured to restrict specific

More information

Comptia N Exam Questions & Answers

Comptia N Exam Questions & Answers Comptia N10-005 Exam Questions & Answers Number: N10-005 Passing Score: 720 Time Limit: 120 min File Version: 34.4 http://www.gratisexam.com/ Comptia N10-005 Exam Questions & Answers Exam Name: CompTIA

More information

COMPTIA N EXAM QUESTIONS & ANSWERS

COMPTIA N EXAM QUESTIONS & ANSWERS COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Number: N10-005 Passing Score: 720 Time Limit: 120 min File Version: 16.6 http://www.gratisexam.com/ COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

High School Graduation Years 2016, 2017 and 2018

High School Graduation Years 2016, 2017 and 2018 Secondary Task List 100 PERSONAL AND ENVIRONMENTAL SAFETY 101 List common causes of accidents and injuries in a computer facility. 102 Wear personal protective equipment. 103 List and identify safety hazard

More information

CompTIA Network + JK0-019

CompTIA Network + JK0-019 CompTIA Network + JK0-019 Number: 000-000 Passing Score: 720 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ CompTIA JK0-019 CompTIA E2C Network + Certification Exam Version: 6.1 CompTIA

More information

COMPTIA JK0-019 EXAM QUESTIONS & ANSWERS

COMPTIA JK0-019 EXAM QUESTIONS & ANSWERS COMPTIA JK0-019 EXAM QUESTIONS & ANSWERS Number: JK0-019 Passing Score: 720 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ COMPTIA JK0-019 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

Network Fundamentals PRECISION EXAMS DESCRIPTION. EXAM INFORMATION Items

Network Fundamentals PRECISION EXAMS DESCRIPTION. EXAM INFORMATION Items PRECISION EXAMS EXAM INFORMATION Items 77 Points 77 Prerequisites COMPUTER MECHANICS AND REPAIR Course Length ONE SEMESTER OR ONE YEAR DESCRIPTION The knowledge and skills contained in these Network Fundamentals

More information

PrepKing. PrepKing N10-004

PrepKing. PrepKing N10-004 PrepKing Number: N10-004 Passing Score: 800 Time Limit: 120 min File Version: 8.0 http://www.gratisexam.com/ PrepKing N10-004 Exam A QUESTION 1 Which of the following tools allows an administrator to determine

More information

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ]

CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] s@lm@n CompTIA Exam JK0-023 CompTIA Network+ certification Version: 5.0 [ Total Questions: 1112 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 3: Troubleshooting 140

More information

VerifiedDumps. Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass

VerifiedDumps.   Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass VerifiedDumps http://www.verifieddumps.com Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass Exam : N10-007 Title : CompTIA Network+ N10-007 Vendor : CompTIA Version : DEMO Get Latest

More information

N Q&As. CompTIA Network+ Pass CompTIA N Exam with 100% Guarantee. Free Download Real Questions & Answers PDF and VCE file from:

N Q&As. CompTIA Network+ Pass CompTIA N Exam with 100% Guarantee. Free Download Real Questions & Answers PDF and VCE file from: N10-007 Q&As CompTIA Network+ Pass CompTIA N10-007 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance Following Questions

More information

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N CompTIA Network+ (Exam N10-007) Course Description: CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT

More information

CompTIA JK CompTIA Network+ Certification. Download Full Version :

CompTIA JK CompTIA Network+ Certification. Download Full Version : CompTIA JK0-023 CompTIA Network+ Certification Download Full Version : http://killexams.com/pass4sure/exam-detail/jk0-023 QUESTION: 349 A user reports that they are unable to access a new server but are

More information

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1.

Objective Applications, Devices, Protocols Applications, Devices, Protocols Classifying Network Components Objective 1. CompTIA Network+ (Exam N10-005) Course Overview This course is intended for entry-level computer support professionals with basic knowledge of computer hardware, software, and operating systems, who wish

More information

CompTIA Network+ N10-005

CompTIA Network+ N10-005 CompTIA Network+ N10-005 Course Number: Network+ N10-005 Length: 7 Day(s) Certification Exam This course is preparation for the CompTIA Network+ N10-005 Certification exam Course Overview The CompTIA Network+

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

COMPTIA N EXAM QUESTIONS & ANSWERS

COMPTIA N EXAM QUESTIONS & ANSWERS COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Number: N10-005 Passing Score: 720 Time Limit: 120 min File Version: 16.6 http://www.gratisexam.com/ COMPTIA N10-005 EXAM QUESTIONS & ANSWERS Exam Name: CompTIA

More information

CompTIA Network+ Study Guide Table of Contents

CompTIA Network+ Study Guide Table of Contents CompTIA Network+ Study Guide Table of Contents Course Introduction Table of Contents Getting Started About This Course About CompTIA Certifications Module 1 / Local Area Networks Module 1 / Unit 1 Topologies

More information

N exam.72q N CompTIA Network+ Certification Exam

N exam.72q N CompTIA Network+ Certification Exam N10-007.exam.72q Number: N10-007 Passing Score: 800 Time Limit: 120 min File Version: 2 N10-007 CompTIA Network+ Certification Exam Exam A QUESTION 1 According to the OSI model, at which of the following

More information

Untitled Exam. CompTIA N Exam. Exam Name: CompTIA Network+ Certification Exam

Untitled Exam.   CompTIA N Exam. Exam Name: CompTIA Network+ Certification Exam Untitled Exam Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam Name: CompTIA Network+ Certification Exam For Full Set of Questions please visit:

More information

ITexamGuide. High-quality IT Cert Exam study guide

ITexamGuide.  High-quality IT Cert Exam study guide ITexamGuide http://www.itexamguide.com High-quality IT Cert Exam study guide Exam : N10-006 Title : CompTIA Network+ certification Vendor : CompTIA Version : DEMO Get Latest & Valid N10-006 Exam's Question

More information

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified TestOut Network Pro - English 4.1.x COURSE OUTLINE Modified 2017-07-06 TestOut Network Pro Outline - English 4.1.x Videos: 141 (18:42:14) Demonstrations: 81 (10:38:59) Simulations: 92 Fact Sheets: 145

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

Chapter 14: Introduction to Networking

Chapter 14: Introduction to Networking Chapter 14: Introduction to Networking Complete CompTIA A+ Guide to PCs, 6e How different networks are wired (or wireless) How to identify common network cables How Ethernet works About the OSI and TCP/IP

More information

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. Chapter Three test Name: Period: CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it. 1. What protocol does IPv6 use for hardware address resolution? A. ARP

More information

Exam Questions N10-006

Exam Questions N10-006 Exam Questions N10-006 CompTIA Network+ https://www.2passeasy.com/dumps/n10-006/ 1.A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified TestOut Network Pro - English 5.0.x COURSE OUTLINE Modified 2018-03-06 TestOut Network Pro Outline - English 5.0.x Videos: 130 (17:10:31) Demonstrations: 78 (8:46:15) Simulations: 88 Fact Sheets: 136 Exams:

More information

JPexam. 最新の IT 認定試験資料のプロバイダ IT 認証であなたのキャリアを進めます

JPexam.   最新の IT 認定試験資料のプロバイダ IT 認証であなたのキャリアを進めます JPexam 最新の IT 認定試験資料のプロバイダ http://www.jpexam.com IT 認証であなたのキャリアを進めます Exam : N10-006 Title : CompTIA Network+ certification Vendor : CompTIA Version : DEMO Get Latest & Valid N10-006 Exam's Question and

More information

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] s@lm@n CompTIA Exam N10-006 CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ] Topic break down Topic No. of Questions Topic 1: Network Architecture 183 Topic 2: Network Operations 149

More information

Vendor: CompTIA. Exam Code: N Exam Name: Network + Certification Exam. Version: Demo

Vendor: CompTIA. Exam Code: N Exam Name: Network + Certification Exam. Version: Demo Vendor: CompTIA Exam Code: N10-005 Exam Name: Network + Certification Exam Version: Demo Question Set 1 QUESTION 1 A user's laptop is unable to keep a stable network connection. Which of the following

More information

CompTIA Network+ Study Guide. Second Edition. John Wiley & Sons, Inc. WILEY

CompTIA Network+ Study Guide. Second Edition. John Wiley & Sons, Inc. WILEY CompTIA Network+ Study Guide Second Edition WILEY John Wiley & Sons, Inc. Foreword Introduction Assessment Test xxv xxix li Chapter 1 Introduction to Networks 1 First Things First: What's a Network? 2

More information

POS Perkins Statewide Articulation Agreement Documentation Coversheet

POS Perkins Statewide Articulation Agreement Documentation Coversheet POS Perkins Statewide Articulation Agreement Documentation Coversheet Student Name: Secondary School Name: Secondary School Address: CTE Program of Study: CIP # CIP Program Name Grade 9 1. CAREER AND TECHNICAL

More information

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

PracticeDump.   Free Practice Dumps - Unlimited Free Access of practice exam PracticeDump http://www.practicedump.com Free Practice Dumps - Unlimited Free Access of practice exam Exam : N10-007 Title : CompTIA Network+ N10-007 Vendor : CompTIA Version : DEMO Get Latest & Valid

More information

Test Code: 8148 / Version 1

Test Code: 8148 / Version 1 Blueprint Computer Systems Networking PA Test Code: 8148 / Version 1 Copyright 2013. All Rights Reserved. General Assessment Information Computer Systems Networking PA Blueprint Contents General Assessment

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: Microsoft

Number: Passing Score: 750 Time Limit: 120 min File Version: Microsoft 70-742 Number: 70-742 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Sections 1. Understanding Local Area Networks 2. Defining Networks with the OSI Model 3. Understanding Wired and Wireless

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: Microsoft

Number: Passing Score: 750 Time Limit: 120 min File Version: Microsoft 70-741 Number: 70-741 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Sections 1. Understanding Local Area Networks 2. Defining Networks with the OSI Model 3. Understanding Wired and Wireless

More information

TestOut Network Pro - English 5.0.x LESSON PLAN. Modified

TestOut Network Pro - English 5.0.x LESSON PLAN. Modified TestOut Network Pro - English 5.0.x LESSON PLAN Modified 2018-03-06 2 Table of Contents Introduction Section 0.1: Network Pro Introduction... 5 Section 0.2: Use the Simulator... 6 Networking Basics Section

More information

CompTIA Network+ (2009 Edition) Certification Examination Objectives

CompTIA Network+ (2009 Edition) Certification Examination Objectives CompTIA Network+ (2009 Edition) Certification Examination Objectives DRAFT INTRODUCTION The CompTIA Network+ (2009 Edition) certification is an internationally recognized validation of the technical knowledge

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta)

Number: Passing Score: 750 Time Limit: 120 min File Version: 1.0. Microsoft Exam Name: Identity with Windows Server 2016 (beta) 70-742 Number: 70-742 Passing Score: 750 Time Limit: 120 min File Version: 1.0 Microsoft 70-742 Exam Name: Identity with Windows Server 2016 (beta) Sections 1. Understanding Local Area Networks 2. Defining

More information

Sample question paper. Duration: 75 minutes. Candidate s name: Candidate s enrolment number: Centre name: Centre number: Date:

Sample question paper. Duration: 75 minutes. Candidate s name: Candidate s enrolment number: Centre name: Centre number: Date: 9628-06 Level 3 Certificate in Networking and Architecture (for the Level 3 Infrastructure Technician Apprenticeship) 9628-306 Networking and Architecture Sample question paper Duration: 75 minutes Candidate

More information

Exam code: Exam name: Networking Fundamentals. Version 18.0

Exam code: Exam name: Networking Fundamentals. Version 18.0 98-366 Number: 98-366 Passing Score: 800 Time Limit: 120 min File Version: 18.0 Exam code: 98-366 Exam name: Networking Fundamentals Version 18.0 98-366 QUESTION 1 The default subnet mask for a Class B

More information

microsoft. Number: Passing Score: 800 Time Limit: 120 min.

microsoft.   Number: Passing Score: 800 Time Limit: 120 min. 98-366 microsoft Number: 98-366 Passing Score: 800 Time Limit: 120 min 98-366 QUESTION 1 The default subnet mask for a Class B network is: A. 0.0.0.255 B. 0.0.255.255 C. 255.0.0.0 D. 255.255.0.0 Correct

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.4 10.7: Troubleshooting Interpreting ipconfig Condition Static IP DHCP Alternate Configuration APIPA ipconfig /all Output DHCP Enabled = No and DHCP Server

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification https://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0)

CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) CCENT Practice Certification Exam # 2 - CCNA Exploration: Accessing the WAN (Version 4.0) 1. Data is being sent from a source PC to a destination server. Which three statements correctly describe the function

More information

Section 1.1: Networking Overview

Section 1.1: Networking Overview Section 1.1: Networking Overview This section provides an introduction to networking. Students will become familiar with the following aspects of a network: Components of a network o Computers o Transmission

More information

Study Guide. Module Two

Study Guide. Module Two Module Two Study Guide Study Guide Contents Part One -- Textbook Questions Part Two -- Assignment Questions Part Three -- Vocabulary Chapter 4 Data Link Layer What is the function of the data link layer?

More information

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo Vendor: HP Exam Code: HP2-Z32 Exam Name: Implementing HP MSM Wireless Networks Version: Demo QUESTION 1 A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs discover the

More information

N exam.420q. Number: N Passing Score: 800 Time Limit: 120 min N CompTIA Network+ Certification

N exam.420q. Number: N Passing Score: 800 Time Limit: 120 min N CompTIA Network+ Certification N10-006.exam.420q Number: N10-006 Passing Score: 800 Time Limit: 120 min N10-006 CompTIA Network+ Certification Sections 1. Network security 2. Troubleshooting 3. Industry standards, practices, and network

More information

COURSE OUTLINE: CompTIA Network+

COURSE OUTLINE: CompTIA Network+ Course Name CompTIA Network + Course Duration 5 Days Course Structure Instructor-Led Course Overview The CompTIA Network+ proves knowledge of networking features and functions and is the leading vendor-neutral

More information

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND)

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Interconnecting Cisco Networking Devices Part 1 (ICND) 100-105.exam Number: 100-105 Passing Score: 800 Time Limit: 120 min CISCO 100-105 Interconnecting Cisco Networking Devices Part 1 (ICND) Exam A QUESTION 1 Which route source code represents the routing

More information

Understanding Networking Fundamentals

Understanding Networking Fundamentals Understanding Networking Fundamentals Training Details Training Time : 5 Days Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training A strong foundation

More information

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac

WISNETWORKS. WisOS 11ac V /3/21. Software version WisOS 11ac WISNETWORKS User Manual V1.1 2016/3/21 Software version 1.0.0021 Table of contents 1. Setup& WMI... 3 1.1 Hardware Setup... 3 1.2 Web Management Interface... 3 2. Status... 4 2.1 Overview... 4 2.1.1 System...

More information

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain G l o s s a r y A access link A port on a switch that is used to link to an individual device. Most ports on switches are access links. ad hoc wireless network Offers equal sharing between devices without

More information

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs)

Course Outline. CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs) Course Outline CompTIA Network+ Deluxe Study Guide Third Edition (Course & Labs) 17 Nov 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions

More information

TestOut Network Pro English 4.1.x LESSON PLAN. Modified

TestOut Network Pro English 4.1.x LESSON PLAN. Modified TestOut Network Pro English 4.1.x LESSON PLAN Modified 2017-07-05 2 Table of Contents Introduction Section 0.1: Using the Simulator... 5 Networking Basics Section 1.1: Networking Overview... 6 Section

More information

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview

IT114 NETWORK+ Learning Unit 1 Objectives: 1, 2 Time In-Class Time Out-Of-Class Hours 2-3. Lectures: Course Introduction and Overview IT114 NETWORK+ Course Objectives Upon successful completion of this course, the student will be able to: 1. Identify the devices and elements of computer networks; 2. Diagram network models using the appropriate

More information

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038)

Course overview. CompTIA Network+ Certification (Exam N10-007) Study Guide (G525eng v038) Overview This course is intended for those wishing to qualify with CompTIA Network+ certification. CompTIA's Network+ Certification is a foundation-level certification designed for IT professionals with

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

A+ Certification Guide. Chapter 16 (Part B) Networking

A+ Certification Guide. Chapter 16 (Part B) Networking A+ Certification Guide Chapter 16 (Part B) Networking Chapter 16 (Part B) Objectives Installing and Configuring Network Interface Cards Networking Configuration for Small Network Switches and Routers Setting

More information

CCNA. Course Catalog

CCNA. Course Catalog CCNA Course Catalog 2012-2013 This course is intended for the following audience: Network Administrator Network Engineer Systems Engineer CCNA Exam Candidates Cisco Certified Network Associate (CCNA 640-802)

More information

KX/3G ADSL2+ ROUTER MAIN FEATURES

KX/3G ADSL2+ ROUTER MAIN FEATURES The KORTEX 3G/ADSL2+, a dual-wan 3G / ADSL2+ firewall router integrated with the 802.11g wireless access point and 4-port switch, is a cutting-edge networking product for SOHO and office users. Uniquely,

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices : Managing, Maintaining, and Troubleshooting, 5e Chapter 9 Networking Practices Objectives Learn how to connect a computer or small network to the Internet using a broadband, satellite, or dialup connection

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

Computer to Network Connection

Computer to Network Connection Computer to Network Connection Network Installation Steps Having a clear understanding of all the steps required to physically building a network improves the success of a project. You may need to install

More information

jk0-022 Exam Questions Demo CompTIA Exam Questions jk0-022

jk0-022 Exam Questions Demo   CompTIA Exam Questions jk0-022 CompTIA Exam Questions jk0-022 CompTIA Academic/E2C Security+ Certification Exam Voucher Only Version:Demo 1.An attacker used an undocumented and unknown application exploit to gain access to a file server.

More information

Security SSID Selection: Broadcast SSID:

Security SSID Selection: Broadcast SSID: 69 Security SSID Selection: Broadcast SSID: WMM: Encryption: Select the SSID that the security settings will apply to. If Disabled, then the device will not be broadcasting the SSID. Therefore it will

More information

CTS2134 Introduction to Networking. Module : Troubleshooting

CTS2134 Introduction to Networking. Module : Troubleshooting CTS2134 Introduction to Networking Module 10.1 10.3: Troubleshooting Troubleshooting Methodology Facts 1. Identify the symptoms and potential causes. 2. Identify the affected area and determine how large

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Cisco 1: Networking Fundamentals

Cisco 1: Networking Fundamentals Western Technical College 10150110 Cisco 1: Networking Fundamentals Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 90.00 This course

More information

Appendix B Networks, Routing, and Firewall Basics

Appendix B Networks, Routing, and Firewall Basics Appendix B Networks, Routing, and Firewall Basics This appendix provides an overview of IP networks, routing, and firewalls. Related Publications As you read this document, you may be directed to various

More information

Fireware-Essentials. Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.

Fireware-Essentials.  Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7. Fireware-Essentials Number: Fireware Essentials Passing Score: 800 Time Limit: 120 min File Version: 7.0 http://www.gratisexam.com/ Fireware Essentials Fireware Essentials Exam Exam A QUESTION 1 Which

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

CCNA 1 v5.0 R&S ITN Final Exam 2014

CCNA 1 v5.0 R&S ITN Final Exam 2014 CCNA 1 v5.0 R&S ITN Final Exam 2014 1 Refer to the exhibit. The network administrator enters these commands into the R1 router: R1# copy running-config tftp Address or name of remote host [ ]? When the

More information

CompTIA N CompTIA Network+ Certification.

CompTIA N CompTIA Network+ Certification. CompTIA N10-006 CompTIA Network+ Certification http://killexams.com/pass4sure/exam-detail/n10-006 Question: 1389 Which of the following TCP/IP model layers does the OSI model Presentation layer map to?

More information

CompTIA MB CompTIA Mobility+

CompTIA MB CompTIA Mobility+ CompTIA MB0-001 CompTIA Mobility+ http://killexams.com/exam-detail/mb0-001 QUESTION: 268 Users in a building report difficulty connecting and slow performance when using mobile devices. The issue is intermittent

More information

LKR Port Broadband Router. User's Manual. Revision C

LKR Port Broadband Router. User's Manual. Revision C LKR-604 4-Port Broadband Router User's Manual Revision C 1 Contents 1 Introduction... 4 1.1 Features... 4 1.2 Package Contents... 4 1.3 Finding Your Way Around... 5 1.3.1 Front Panel... 5 1.3.2 Rear Panel

More information

Fundamentals of Network Security v1.1 Scope and Sequence

Fundamentals of Network Security v1.1 Scope and Sequence Fundamentals of Network Security v1.1 Scope and Sequence Last Updated: September 9, 2003 This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document

More information

Unified Services Routers

Unified Services Routers Product Highlights Comprehensive Management Solution Active-Active WAN port features such as auto WAN failover and load balancing, ICSA-certified firewall, and D-Link Green Technology make this a reliable,

More information

Cisco CCNA (ICND1, ICND2) Bootcamp

Cisco CCNA (ICND1, ICND2) Bootcamp Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (jaamsp_mngnwi-088) You are the administrator for medium-sized network with many users who connect remotely. You have configured a server running Microsoft Windows Server 2003,

More information

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified

TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE. Modified TestOut Routing and Switching Pro - English 6.0.x COURSE OUTLINE Modified 2017-07-10 TestOut Routing and Switching Pro Outline- English 6.0.x Videos: 133 (15:42:34) Demonstrations: 78 (7:22:19) Simulations:

More information

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices

Wired internetworking devices. Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Wired internetworking devices Unit objectives Differentiate between basic internetworking devices Identify specialized internetworking devices Topic A Topic A: Basic internetworking devices Topic B: Specialized

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 100-101 EXAM QUESTIONS & ANSWERS Number: 100-101 Passing Score: 800 Time Limit: 120 min File Version: 35.5 http://www.gratisexam.com/ CISCO 100-101 EXAM QUESTIONS & ANSWERS Exam Name: CCNA Interconnecting

More information

VG422R. User s Manual. Rev , 5

VG422R. User s Manual. Rev , 5 VG422R User s Manual Rev 1.0 2003, 5 CONGRATULATIONS ON YOUR PURCHASE OF VG422R... 1 THIS PACKAGE CONTAINS... 1 CONFIRM THAT YOU MEET INSTALLATION REQUIREMENTS... 1 1. INSTALLATION GUIDE... 2 1.1. HARDWARE

More information

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver LevelOne WBR-3407 11g Wireless ADSL VPN Router User s Manual Ver 1.00-0510 Table of Contents CHAPTER 1 INTRODUCTION... 1 Wireless ADSL Router Features... 1 Package Contents... 5 Physical Details... 6 CHAPTER

More information

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21. Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small

More information

CTS2134 Introduction to Networking. Module 09: Network Management

CTS2134 Introduction to Networking. Module 09: Network Management CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems

More information

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo Exam : JK0-015 Title : CompTIA E2C Security+ (2008 Edition) Exam Version : Demo 1.Which of the following logical access control methods would a security administrator need to modify in order to control

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.3 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.3-111215-01-1215

More information