[Free] 2018(June) Dumps4cert CompTIA N10-006 Dumps with VCE and PDF Download 31-40

By | July 4, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 31 – (Topic 1)

An F-connector is used on which of the following types of cabling?

  1. CAT3

  2. Single mode fiber

  3. CAT5

  4. RG6

Answer: D Explanation:

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and universally forsatellite television and cable modems, usually with RG-6/U cable or, in older installations, with RG-59/U cable.

Question No: 32 – (Topic 1)

Which of the following network topologies has a central, single point of failure?

  1. Ring

  2. Star

  3. Hybrid

  4. Mesh

Answer: B Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network.

The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table to discover which port the

destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

The switch that forms thecentral component of a star network is a single point of failure. If the switch fails, no computers will be able to communicate with each other.

Question No: 33 – (Topic 1)

Which of the following network devices use ACLs to prevent unauthorized access into company systems?

  1. IDS

  2. Firewall

  3. Content filter

  4. Load balancer

Answer: B Explanation:

A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls arefrequently used to prevent unauthorized Internet users from accessing privatenetworks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question No: 34 – (Topic 1)

Which of the following network elements enables unified communication devices to connect to and traverse traffic onto the PSTN?

  1. Access switch

  2. UC gateway

  3. UC server

  4. Edge router

Answer: B Explanation:

People use many methods of communication nowadays such as voice, email, video and instant messaging. People also use many different devices to communicate such as smart phones, PDAs, computers etc.Unified Communications (UC) enables people using different modes of communication, different media, and different devices to communicate with anyone, anywhere, at any time.

Many communication methods use digital signals. To send a digital signal over the analog PSTN, you need a gateway (in this case a UC Gateway) to convert the digital signals into an analog format that can be sent over the PSTN.

Question No: 35 CORRECT TEXT – (Topic 1)

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the #39;Submit Cable Test Analysis#39; button.

Dumps4Cert 2018 PDF and VCE


Dumps4Cert 2018 PDF and VCE

A Cable Certifier provides “Pass” or “Fail” information in accordance with industry standards but can also show detailed information when a “Fail” occurs. This includesshorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.

Question No: 36 – (Topic 1)

A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another.

This is an example of which of the following?

  1. Public SaaS

  2. Private SaaS

  3. Hybrid IaaS

  4. Community IaaS

Answer: B Explanation:

SaaS stands for Software as a Service. This is a cloud model whereby a service provider provides asoftware service and makes the service available to customers over the Internet. Examples of Saas include Microsoft Office 365, Microsoft Exchange Online, Microsoft Lync Online etc.

Advantages of Saas include ease of administration: no need to install andconfigure local servers, no need to configure backups, no need to keep the software patched, no need to worry about system recovery, lower costs: saving on the purchase of server hardware and software; with SaaS, you lease the service paying either monthlyor yearly and compatibility by ensuring that all users are using the same version of software.

There are two types of SaaS: public and private. With public Saas, multiple customers (usually companies) share the same servers running the software. Withprivate Saas, the servers running the software are dedicated to a single customer which provides the isolation and extra security required when dealing with sensitive information.

Question No: 37 – (Topic 1)

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

  1. Multifactor authentication



  4. Network access control

Answer: C Explanation:

TACACS (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS is a centralized authentication solution used to provide access to network resources. TACACS separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question No: 38 – (Topic 1)

A technician is helping a SOHO determine where to install the server. Which of the following should be considered FIRST?

  1. Compatibility requirements

  2. Environment limitations

  3. Cable length

  4. Equipment limitations

Answer: B Explanation:

SOHO stands for Small Office / Home Office. A SOHO network istypically a small network. Being a small network, it is unlikely that it will have a datacenter or even a dedicated server room. Any servers installed in the network will still have the same environmental requirements as servers in a large network. The servers should be in a secure isolated area if required. The servers also need to be kept cool and dry. Therefore, the first consideration in a SOHO office is “Environment limitations”: where the servers and other network hardware will be located.

Question No: 39 – (Topic 1)

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

  1. BGP

  2. OSPF

  3. IS-IS

  4. MPLS

Answer: D Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.

MPLS works by prefixing packets with an MPLS header, containing one or more labels.

An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labels used to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward.

A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it off the outgoing packet.

When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

Topic 2, Network operations

Question No: 40 – (Topic 2)

A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?

  1. Host-based intrusion detection systems

  2. Acceptable use policies

  3. Incident response team

  4. Patch management

Answer: D Explanation:

As vulnerabilities are discovered, the vendors ofthe operating systems or applications often respond by releasing a patch. A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be vulnerable to virus infections, in a piece of software. A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

100% Dumps4cert Free Download!
Download Free Demo:N10-006 Demo PDF
100% Dumps4cert Pass Guaranteed!
N10-006 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.