Ensurepass

 

QUESTION 171

Which of the following IP address/subnet mask combinations represent a broadcast address? (Select TWO).

 

A.

200.200.100.0/28

B.

200.200.100.32/27

C.

200.200.100.63/27

D.

200.200.100.79/27

E.

200.200.100.95/27

F.

200.200.100.254/30

 

Correct Answer: CE

Explanation:

A broadcast address is a logical address at which all devices connected to a multiple-access communications network are enabled to receive datagrams. A message sent to a broadcast address is typically received by all network-attached hosts, rather than by a specific host.

Reference: http://www.wikihow.com/Calculate-Network-and-Broadcast-Address

 

 

QUESTION 172

Enterprise IP routing policy is MOST clearly depicted in which of the following configuration management documents?

 

A.

Logical network diagrams

B.

Physical network diagrams

C.

Wiring schematics

D.

Group security role assignments

 

Correct Answer: A

Explanation:

A logical network diagram illustrates the network architecture of a group of interconnected computers and other devices, such as printers, modems, switches, routers, and even mobile devices. These electronic components form the physical network that provides local area network (LAN) and wide area network (WAN) access to users. Once you know the layout and you have an idea about the packet flow then your job becomes easy and you can create an action plan to go for the implementation.

 

 

QUESTION 173

In which of the following layers of the OSI model would MAC addressing be found?

 

A.

Network

B.

Application

C.

Data Link

D.

Transport

 

Correct Answer: C

Explanation:

The ITU-T G.hn standard, which provides high-speed local area networking over existing wires (power lines, phone lines and coaxial cables), includes a complete data link layer which provides both error correction and flow control by means of a selective repeat Sliding Window Protocol.

 

 

QUESTION 174

A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees’ wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment?

 

A.

WAP placement

B.

TX/RX channel

C.

Signal strength

D.

Transmission power

 

Correct Answer: A

Explanation:

Before going ahead with the deployment, the first thing that need to be check is where you are going to place your wireless router so that you can have internet connectivity from every location that you need.

 

 

QUESTION 175

Which of the following can be used to limit wireless network access to a single computer?

 

A.

Configure PPP

B.

Packet sniffing

C.

MAC address filtering

D.

Omni-directional antennas

 

Correct Answer: C

Explanation:

Wireless access can be filtered by using the Media Access Control (MAC) addresses of the wireless devices transmitting within your wireless network. You can either permit or prevent specific wireless computers and devices access to your wireless network.

 

 

 

 

QUESTION 176

A user’s laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured?

 

A.

SSID name

B.

WAP encryption strength

C.

WAP radio power

D.

Channel overlay

 

Correct Answer: C

Explanation:

WAP radio power is the signal strength through which you can specify the range from which you can stay connected to the network and access internet. Here, when the user is not able to maintain a stable connection then it is a problem with the signal strength for sure so you can try to increase the signal strength by increasing the radio power.

 

 

QUESTION 177

Which of the following LAN technologies is used to provide a MAXIMUM bandwidth of 1Gbps through singlemode fiber?

 

A.

10GBaseLR

B.

100BaseFX

C.

100BaseTX

D.

1000BaseX

 

Correct Answer: D

Explanation:

1000BaseX identifies various Gigabit Ethernet physical layer standards as defined in IEEE802.3z, such as 1000BaseLX, 1000BaseSX, 1000BaseCX and 1000BaseLH. Basically, all standards included in 1000BaseX uses 8B/10B coding scheme with 8 bits of data and 2 bits of error-correction data. Each specification allows various cable (fiber or copper) lengths, and uses different cable media.

 

 

QUESTION 178

Multiple servers’ IP addresses fall within the DHCP scope assigned by the administrator. Which of the following should be implemented to ensure these static IP addresses are not assigned to workstations?

 

A.

The administrator should create exclusions for the workstations IP addresses.

B.

The administrator should change the servers to utilize DHCP to obtain IP addresses.

C.

The administrator should change the workstations to utilize static IP addresses.

D.

The administrator should create exclusions for the servers IP addresses.

 

Correct Answer: D

Explanation:

Whenever you define the ip pool from which IP addresses are to be dynamically assigned to the users then in order to avoid assignment of static ip address we can creat exclusion for the static ip addresses so that they are not assigned to any other host and this is how we can avoid ip address conflict on the network.

 

 

 

QUESTION 179

Which of the following standards can operate at either 20MHz or 40MHz channel spacing?

 

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

 

Correct Answer: D

Explanation:

The 2.4 GHz ISM band is fairly congested. With 802.11n, there is the option to double the bandwidth per channel to 40 MHz which results in slightly more than double the data rate. However, when in 2.4 GHz, enabling this option takes up to 82%[10] of the unlicensed band, which in many areas may prove to be infeasible.

 

The specification calls for requiring one primary 20 MHz channel as well as a secondary adjacent channel spaced ±20 MHz away. The primary channel is used for communications with clients incapable of 40 MHz mode. When in 40 MHz mode, the center frequency is actually the mean of the primary and secondary channels.

 

 

QUESTION 180

A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO).

 

A.

SNMP

B.

Network sniffer

C.

Syslog

D.

System log

E.

History log

 

Correct Answer: AC

Explanation:

Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention.

 

Syslog is a standard for computer message logging. It permits separation of the software that generates messages from the system that stores them and the software that reports and analyzes them.

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.