This page was exported from Lead2pass 100% Valid Exam Questions PDF Free Download [ ] Export date:Tue Oct 20 3:47:34 2020 / +0000 GMT ___________________________________________________ Title: [2017 PDF&VCE] Try Lead2pass Latest CompTIA N10-006 Dumps To Pass The Exam Successfully (276-300) --------------------------------------------------- Lead2pass 2017 September New CompTIA N10-006 Exam Dumps! 100% Free Download! 100% Pass Guaranteed! No doubt that N10-006 exam is a worth challenging task but you should not feel hesitant against the confronting difficulties. Lead2pass is supplying the new version of N10-006 VCE dumps now. Get a complete hold on N10-006 exam syllabus through Lead2pass and boost up your skills. What's more, the N10-006 dumps are the latest. It would be great helpful to your N10-006 exam. Following questions and answers are all new published by CompTIA Official Exam Center: QUESTION 276After a technician has identified the problem and its impact, which of the following steps should be performed NEXT? A.    Implement preventative measures.B.    Establish a plan of action to resolve the problem.C.    Establish a theory of probable cause.D.    Implement the solution or escalate as necessary.Answer: CExplanation:By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not. QUESTION 277Which of the following wireless standards has a MAXIMUM transfer rate of 11Mbps? A.    802.11aB.    802.11bC.    802.11gD.    802.11n Answer: BExplanation:The 802.11b standard allows for a maximum data transfer speed of 11 Mbps, at a range of about 100 m indoors and up to 200 metres outdoors (or even beyond that, with directional antennas.) Hypothetical speedRange(indoors)Range(outdoors)11 Mbits/s50 m200 m5.5 Mbits/s75 m300 m2 Mbits/s100 m400 m1 Mbit/s150 m500 m QUESTION 278A technician tests a cable going to the patch panel and notices the following output from the cable tester: 1------------------12------------------23------------------34------------------45------------------56------------------67------------------78------------------8 On a T568A standard CAT5e cable, which of the following wire strands is the cause of this connectivity issue? A.    White OrangeB.    Solid BrownC.    Solid OrangeD.    White Green Answer: DExplanation:T568A WiringPinPairWireColor   white/green   green   white/orange   blue   white/blue   orange   white/brown   brown QUESTION 279Which of the following monitoring devices are used only to recognize suspicious traffic from specific software? A.    Signature based IPSB.    Application based IDSC.    Anomaly based IDSD.    Application based IPS Answer: BExplanation:An APIDS monitors the dynamic behavior and state of the protocol and will typically consist of a system or agent that would typically sit between a process, or group of servers, monitoring and analyzing the application protocol between two connected devices. QUESTION 280Which of the following security appliances are used to only identify traffic on individual systems? A.    Host based IPSB.    Application based IPSC.    Network based IDSD.    Host based IDS Answer: DExplanation:A host-based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyzes the internals of a computing system as well as the network packets on its network interfaces. QUESTION 281Which of the following components of wiring distribution is referred to as the core communications closet for an organization? A.    MDFB.    Smart jackC.    IDFD.    Demarc extension Answer: AExplanation: MDF stands for Main Distribution Frame and is the main computer room for servers,hubs, routers, DSL's, etc. to reside. QUESTION 282Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber? A.    10GBaseLRB.    100BaseFXC.    100BaseTXD.    1000BaseX Answer: DExplanation:1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of error-correction data. Each specification allows various cable (fiber or copper) lengths, and uses different cable media. QUESTION 283Which of the following does Kerberos provide? A.    Non-repudiationB.    AccountingC.    ExchangeD.    Authentication Answer: DExplanation:Kerberos is a trusted third-party authentication service based on the model presented by Needham and Schroeder. It is trusted in the sense that each of its clients believes Kerberos'judgmentas to the identity of each of its other clients to be accurate. QUESTION 284Which of the following does Kerberos use to authenticate? A.    TicketsB.    ServersC.    UsersD.    Clients Answer: AExplanation:Kerberos keeps a database of its clients and their private keys. The private key is a large number known only to Kerberos and the client it belongs to. In the case that the client is a user, it is an encrypted password. Network services requiring authentication register with Kerberos, as do clients wishing to use those services. The private keys are negotiated at registration. QUESTION 285After a network technician has added a new workstation and cabling to the network, users report the network is very slow. The activity lights on all switches are blinking rapidly, showing large amounts of traffic. Which of the following is the BEST explanation for the traffic? A.    The new user is downloading large files.B.    The router failed, flooding the network with beacons.C.    The new user's IP address is a duplicate.D.    A switching loop was created. Answer: DExplanation:A Switching loop or Bridge loop occurs in computer networks when there is more than one Layer 2 (OSI model) path between two endpoints (e.g. multiple connections betweentwo network switches or two ports on the same switch connected to each other). The loop creates broadcast radiation as broadcasts and multicasts are forwarded by switches out every port, the switch or switches will repeatedly rebroadcast the broadcast messages flooding the network. QUESTION 286Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays? A.    CachingB.    VoIPC.    QoSD.    SMTP Answer: CExplanation:By Qos we can prioritize the voice packets over data network.So delay and latency will get reduce. QUESTION 287A company has recently allowed its employees to telecommute two days a week. The employees MUST have a minimum of 1Mbps non-shared connection to the Internet. Which of the following MUST the employees have at their home in order to connect to the Internet? A.    ISDNB.    Cable modemC.    DSLD.    Dial-up networking Answer: CExplanation:Digital subscriber line (DSL, originally digital subscriber loop) is a family of technologies that provide Internet access by transmitting digital data over the wires of a local telephone network. QUESTION 288A customer with a SOHO requires fast, secure, cost-effective access to the Internet. Which of the following would be the MOST appropriate solution? (Select TWO). A.    OC3 line with built-in firewallB.    DS3 line with a separate firewallC.    Cable modem with a separate firewallD.    Dial-up modem with separate firewallE.    DSL router with firewall capabilities Answer: CE QUESTION 289At which of the following layers do frames exist? (Select TWO). A.    OSI model Data link layerB.    TCP/IP model Network Interface layerC.    OSI model Physical layerD.    OSI model Network layerE.    TCP/IP model Internet layer Answer: ABExplanation:The data link layer is concerned with local delivery of frames between devices on the same LAN. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local network. Inter-network routing and global addressing are higher layer functions, allowing data-link protocols to focus on local delivery, addressing, and media arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate between parties contending for access to a medium, without concern for their ultimate destination. QUESTION 290A user is unable to access any network resources. The IP configuration of the workstation is as follows: IP Address: Mask: Gateway: Which of the following would allow the user to connect to network resources? A.    Change the default gateway to    Change the default gateway to    Change the IP address to    Change the IP address to Answer: DExplanation:The given ip address is network id which we don't assign to the host so the next ip is applicable to this. QUESTION 292A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likely problem? A.    Faulty crossover cableB.    DNS server is downC.    Switching loopD.    Outside interface shutdown Answer: D QUESTION 293Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO). A.    digB.    nslookupC.    nbstatD.    ifconfigE.    ipconfig Answer: DE QUESTION 294A router operates at which of the following layers of the OSI model? A.    Layer 2B.    Layer 3C.    Layer 4D.    Layer 5 Answer: B QUESTION 295When querying a DNS server for an AAAA record, which of the following is an appropriate response? A.    00:f3:82:99:a2:b8C.    3ffe:1900:4545:3:200:f8ff:fe21:67cf Answer: D QUESTION 296A computer on VLAN 10 with the IP address of cannot ping a computer on VLAN 20 with the IP address of Which configuration change will allow the PING to be successful? A.    Replace the router with a Layer 2 switch that supports VLANsB.    Change VLAN 20 computers Default Gateway to    Change VLAN 10 computers Default Gateway to    AllowICMP to pass through the Router Answer: D QUESTION 297Which of the following network devices restricts traffic based on words, signatures, and URLs? A.    Layer 2 switchB.    Content filterC.    Load balancerD.    Traffic analyzer Answer: B QUESTION 298A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred? A.    Port security is blocking all traffic.B.    An IDS is blocking all traffic.C.    Implicit deny is blocking all traffic.D.    SMTP is blocking all traffic. Answer: C QUESTION 299Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?   A.    Network security policyB.    Network baselineC.    Logical network diagramD.    Wiring schematic Answer: C QUESTION 300Which of the following is the only standard that can operate at either frequency? A.    802.11aB.    802.11bC.    802.11gD.    802.11n Answer: DExplanation: Only 802.11n can operate at 2.4Ghz and 5Ghz More free Lead2pass N10-006 exam new questions on Google Drive: Lead2pass is one of the leading exam preparation material providers. We have a complete range of exams offered by the top vendors. You can download N10-006 dumps in PDF format on Comparing with others', our N10-006 exam questions are more authoritative and complete. What's more, the N10-006 dumps are the latest. We ensure you pass the N10-006 exam easily. 2017 CompTIA N10-006 (All 1521 Q&As) exam dumps (PDF&VCE) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-09-06 05:48:58 Post date GMT: 2017-09-06 05:48:58 Post modified date: 2017-09-06 05:48:58 Post modified date GMT: 2017-09-06 05:48:58 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from