Ensurepass

 

QUESTION 181

Which of the following uses port 23 by default?

 

A.

TELNET

B.

IMAP

C.

FTP

D.

SNMP

 

Correct Answer: A

Explanation:

Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).

 

 

QUESTION 182

Which of the following is a path vector routing protocol?

 

A.

RIP

B.

EIGRP

C.

ISIS

D.

OSPF

E.

BGP

 

Correct Answer: E

Explanation:

Because BGP involves a table of IP networks or “prefixes” which designate network reachability among autonomous systems (AS).

 

 

QUESTION 183

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

 

A.

Redundancy

B.

Fault tolerance

C.

Unified communications

D.

Uptime requirements

 

Correct Answer: C

Explanation:

In unified communication video,voice,data have only one end gateway so to give priority to avoid delay in voice and video we use Qos.

 

 

QUESTION 184

At which of the following layers do frames exist? (Select TWO).

 

A.

OSI model Data link layer

B.

TCP/IP model Network Interface layer

C.

OSI model Physical layer

D.

OSI model Network layer

E.

TCP/IP model Internet layer

 

Correct Answer: AB

Explanation:

The data link layer is concerned with local delivery of frames between devices on the same LAN. Data-link frames, as these protocol data units are called, do not cross the boundaries of a local network. Inter-network routing and global addressing are higher layer functions, allowing data-link protocols to focus on local delivery, addressing, and media arbitration. In this way, the data link layer is analogous to a neighborhood traffic cop; it endeavors to arbitrate between parties contending for access to a medium, without concern for their ultimate destination.

 

QUESTION 185

In order to limit the number of dynamic addresses of hosts on a network, which of the following can be implemented?

 

A.

Scope options

B.

Leases

C.

Reservations


D.

DNS suffixes

 

Correct Answer: A

 

 

QUESTION 186

Which of the following DHCP properties defines the size of the pool of available IP addresses?

 

A.

Options

B.

Scope

C.

Leases

D.

Reservations

 

Correct Answer: B

Explanation:

A range of IP addresses that are available to be leased to DHCP clients by the DHCP Server service.

 

 

QUESTION 187

When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?

 

A.

802.1q

B.

Collision avoidance

C.

Port mirroring

D.

STP

 

Correct Answer: A

Explanation:

Encapsulation is the term associated with 802.1q which is enabled by default on many devices.

 

 

QUESTION 188

Which of the following protocols works at the LOWEST layer of the OSI model?

 

A.

L2TP

B.

PPTP

C.

ISAKMP

D.

IPSec

 

Correct Answer: A

Explanation:

Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to enable the operation of a virtual private network (VPN) over the Internet.

QUESTION 189

Which of the following uses classless subnet masks across a network?

 

A.

Subnetting

B.

CIDR

C.

Supernetting

D.

Summarization

 

Correct Answer: B

Explanation:

Classless Inter-Domain Routing is based on variable-length subnet masking (VLSM), which allows a network to be divided into variously sized subnets, providing the opportunity to size a network more appropriately for local needs and also CIDR allows an address or routing prefix to be written with a suffix indicating the number of bits of the prefix, such as 192.168.2.0/24.

 

 

QUESTION 190

Discover, Offer, Request, and Acknowledge are the steps for which of the following protocols?

 

A.

DNS

B.

DOS

C.

DHCP

D.

DSL

 

Correct Answer: C

Explanation:

when we install a dhcp server into our network then dhcp server works on the basis of dora process first dhcp server sends a hello message in to the network to discover the clients pc and when any client pc found in the network then, dhcp server offers the IP to client pc. When client pc selects any IP from dhcp server then client pc request for selected IP to dhcp server then dhcp server provide that IP to client pc and both send ackonledgement to each other.

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.