[Free] 2018(June) Dumps4cert CompTIA RC0-N06 Dumps with VCE and PDF Download 11-20

By | July 10, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released RC0-N06
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Recertification Exam for Continuing Education

Question No: 11 – (Topic 1)

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

  1. Traffic shaping

  2. High availability

  3. Load balancing

  4. Fault tolerance

Answer: A Explanation:

If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially.

Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

Question No: 12 – (Topic 1)

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

  1. Multifactor authentication



  4. Network access control

Answer: C Explanation:

TACACS (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS is a centralized authentication solution used to provide access to network resources. TACACS separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question No: 13 HOTSPOT – (Topic 1)

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.

Dumps4Cert 2018 PDF and VCE

After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled.

Instructions: When the simu-lation is complete, please select the Done button to submit.

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

Dumps4Cert 2018 PDF and VCE

All Networks have the range from /0 to/32


Dumps4Cert 2018 PDF and VCE


An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines howmany bits form the network address and from that, we can calculate how many bits are used for the host addresses.

The formula to calculate the number of hosts in a subnet is 2n – 2. The quot;nquot; in the host#39;s formula represents the number of bits used for host addressing.If we apply the formula (22 – 2), we can determine that the following subnets should be configured:

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP)

HR network – /27 – This will provide for up to 30usable IP’s (32-2) IT – /28 – This will provide for up to 14 usable IP’s (16-2)

Finance – /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP’s and can’t be used for hosts.

Marketing – /28

If we add up howmany IP blocks are used that is 64 32 16 64 16=192. A /24 contains 256 IP addresses, so 256-192=64.

So the last unused box should be a /26, which equates to 64 addresses

Question No: 14 – (Topic 1)

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?

A. RS-232

B. 802.3

  1. ATM

  2. Tokenring

Answer: A Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the functions of the 9 pins in a DB-9 connector. The RS-232 standard was around

long before computers. It’s rare to see a new computer nowadays with a serial port but they were commonly used for connecting external analog modems, keyboards and mice to computers.

Question No: 15 – (Topic 1)

A technician is connecting a NAS device to an Ethernet network. Which of the following technologies will be used to encapsulate the frames?

  1. HTTPS

  2. Fibre channel

  3. iSCSI

  4. MS-CHAP

Answer: C Explanation:

A NAS or a SAN will use either iSCSI or Fiber Channel. In this question, the NAS is connected to an Ethernet network. Therefore, iSCSI will most likely be used (Fiber Channel over Ethernet (FCoE) can be used but is less common). ISCSI means Internet SCSI. ISCSI uses TCP (Transmission Control Protocol) which enables it to be used over TCP/IP networks such as Ethernet.

For Fiber channel,a separate Fiber Channel network would be required unless FCoE is used.

Question No: 16 – (Topic 1)

An administrator has a virtualization environment that includes a vSAN and iSCSI switching. Which of the following actions could the administrator take to improve the performance of data transfers over iSCSI switches?

  1. The administrator should configure the switch ports to auto-negotiate the proper Ethernet settings.

  2. The administrator should configure each vSAN participant to have its own VLAN.

  3. The administrator should connect the iSCSI switches to each other over inter-switch links (ISL).

  4. The administrator should set the MTU to 9000 on the each of the participants in the vSAN.

Answer: D Explanation:

When using an iSCSI SAN (with iSCSI switching), we can improve network performance by enabling ‘jumbo frames’. A jumbo frame is a frame with an MTU of more than 1500. By setting the MTU to 9000, there will be fewer but larger frames going over the network.

Enabling jumbo frames can improve network performance by making data transmissions more efficient. The CPUs on switches and routers can only processone frame at a time. By putting a larger payload into each frame, the CPUs have fewer frames to process.

Question No: 17 – (Topic 1)

A SQL server needs several terabytes of disk space available to do an uncompressed backup of a database. Which of the following devices would be the MOST cost efficient to use for this backup?

  1. iSCSI SAN

  2. FCoE SAN

  3. NAS

  4. USB flash drive

Answer: C Explanation:

A NAS is a Network Attached Storage device; typically a bunch of cheap hard disks, usually arranged in a Raid and consisting of either SAS (serial attached SCSI) or Sata disks just like the ones in most desktops.

A NAS is essentially a file server that connects to an Ethernet network and is configured with a TCP/IP address. A NAS supports Windows networking and works at the file level as opposedto a SAN (Storage Area Network) which works at the block level when dealing with data. You can access file shares on a NAS in the same way that you would access file shares on a file server.

A NAS is a much cheaper option than a SAN.

Question No: 18 – (Topic 1)

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).

  1. OSPF

  2. VTP trunking

  3. Virtual PBX


E. 802.1x

Answer: D,E Explanation:

D: A RADIUS (Remote Authentication Dial-in User Service)server is a server with a database of user accounts and passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISP’s to authenticate their customer’s Internet connections.

Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network.

802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device,such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server is the RADIUS server.

Question No: 19 – (Topic 1)

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

  1. Star

  2. Bus

  3. Ring

  4. Mesh

Answer: C Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a ‘star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.

To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data beforereleasing the token. Only a computer in possession of the token can transmit data onto the network.

Question No: 20 – (Topic 1)

A host has been assigned the address This is an example of which of the following address types?

  1. APIPA

  2. MAC

  3. Static

  4. Public

Answer: A Explanation:

APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from to to the client when a DHCP server is unavailable.

When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class Bsubnet mask of The client will use the self-configured IP address until a DHCP server becomes available.

100% Dumps4cert Free Download!
Download Free Demo:RC0-N06 Demo PDF
100% Dumps4cert Pass Guaranteed!
RC0-N06 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.