[Free] 2018(June) Dumps4cert CompTIA N10-006 Dumps with VCE and PDF Download 131-140

By | July 4, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 131 – (Topic 5)

When a client calls and describes a problem with a computer not being able to reach the Internet, in which of the following places of the OSI model would a technician begin troubleshooting?

  1. Transport layer

  2. Physical layer

  3. Network layer

  4. Session layer

Answer: B Explanation:

The bottom layer of the OSI reference model is Layer 1, the physical layer.

The physical layer is the layer that defines the hardware elements of a network. These elements include:

Network Interface Cards Network topology Network cabling

The type of signals used for data transmissions

When troubleshooting a network connectivity issue, the first thing you would check is the computer’s network cabling, the network card etc. In other words, the computer’s physical connection to the network.

Question No: 132 – (Topic 5)

A technician has prolonged contact with a thermal compound. Which of the following resources should be consulted?

  1. HCL

  2. MSDS

  3. SLA

  4. HVAC

Answer: B Explanation:

MSDS stands forMaterial Safety Data Sheet. An MSDS is a health and safety document that contains information on the potential hazards of working with a chemical product and

how to work safely with the chemical product.

In this question, the thermal compound is a chemical product so the MSDS will provide information about the effects of prolonged contact with the thermal compound.

Question No: 133 – (Topic 5)

A network technician is attempting to connect a new host to existing manufacturing equipment on an Ethernet network. The technician is having issues trying to establish communication between the old equipment and the new host. The technician checks the cabling for breaks and finds that the CAT3 cable in use is in perfect condition. Which of the following should the technician check to ensure the new host will connect?

  1. Confirm the new host is using 10GBaseSR due to the manufacturing environment

  2. Confirm the new host is compatible with 10BaseT Ethernet

  3. Confirm the existing 10Base2 equipment is using the proper frame type

  4. Confirm that CSMA/CD is disabled on the Ethernet network

Answer: B Explanation:

The question states that the equipment is old and that CAT3 cabling is being used. 10BaseT Ethernet networks are old and slow by today’s standards. 10BaseT Ethernet networks use CAT3 UTP cabling and offer a maximum bandwidth of just 10Mpbs.

A new host computer nowadays will have a network card that supports 1000Mpbs to be used with CAT5, CAT5e or CAT6 network cables in a 1000BaseT network. In this question, we need to check that the network card on thenew host computer is backward-compatible with the old 10BaseT network.

Question No: 134 – (Topic 5)

A user with an 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network?

A. 802.11a B. 802.11ac C. 802.11b D. 802.11g

Answer: C Explanation:

802.11 is a set of IEEE standards that govern wireless networking transmission methods. The 802.11 standards commonly used today to provide wireless connectivity in home or office wireless networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.

802.11b supports speeds up to 11Mbps and uses the 2.4GHz frequency.

In this question, the user is using an 802.11n WLAN card. Although the 802.11n WLAN card can support speeds up to 300Mbps, the user is only able to connect at 11Mbps because the user is connected to a wireless network configured to use 802.11b.

Question No: 135 – (Topic 5)

A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the:

  1. MLA.

  2. SLA.

  3. SOW.

  4. MOU.

Answer: B Explanation:

SLA stands for Service Level Agreement. This is a common document in business used to define a minimum standard of service that a customer can expect from a supplier. SLA’s are particularly common in the I.T. sector where a serviceprovider is offering a service to a customer. As a customer, you want your hosted services and Internet or WAN connections to be available all the time. SLAs often guarantee 99.9% uptime for a service.

In this question, the service provider is providing WAN links to remote sites with a guaranteed bandwidth on the WAN links. A failure to maintain the connectivity to the remote sites would be a violation of the Service Level Agreement (SLA).

Question No: 136 – (Topic 5)

Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window?

  1. Configuration procedures

  2. Stakeholder notification

  3. Impact analysis

  4. Rollback procedure

Answer: D Explanation:

A rollback procedure is something that should bedocumented in a change management document. In this question, the network technician has made a change during a maintenance window. The change has not worked so the technician needs to ‘undo’ the change he made to revert the system back to its previous state. The network technician can then investigate why the change has not worked as expected.

The rollback procedure is the list of steps required to undo the changes made to the system.

Question No: 137 – (Topic 5)

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate computers are showing an error message on the screen and are unable to communicate with other computers in the same lab. The network administrator looks at the following output:




Given that all the computers in the lab are directly connected to the same switch, and are not using any virtualization technology, at which of the following layers of the OSI model is the problem occurring?

  1. Network

  2. Application

  3. Data link

  4. Transport

Answer: A Explanation:

If we look at the Source Mac column, we can see two different MAC addresses. Everynetwork interface card has a unique MAC address. These are the network cards in the two separate computers.

If we look in the Source IP column, we can see that the two network cards have been assigned the same IP address ( This is the problem in this question. The error message on the screens will be saying that “An IP conflict exists”. Every network card connected to the network needs to be configured with a different IP address.

As the problem is with the IP address configuration of the twocomputers, we know that the problem is occurring at the Network layer (layer 3) of the OSI model. The network layer is responsible for Internet Protocol (IP) addressing and routing.

Question No: 138 – (Topic 5)

Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443?

  1. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.

  2. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates.

  3. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies.

  4. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.

Answer: D Explanation:

HTTPS stands for HTTP over SSL or HTTP Secure. It is used for secure access to websites. Port 80 web sessions are HTTP (HyperText Transfer Protocol) sessions which offers no security. Port 443 web sessions use HTTPS. HTTPS uses SSL or TLS to encrypt the HTTP traffic.

HTTPS provides authentication of the website and associated web server that you are communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.

Question No: 139 – (Topic 5)

A customer has engaged a company to improve the availability of all of the customer#39;s

services and applications, enabling the customer to minimize downtime to a few hours per quarter. Which of the following will document the scope of the activities the company will provide to the customer, including the intended outcomes?

  1. MLA

  2. MOU

  3. SOW

  4. SLA

Answer: C Explanation:

SOW stands for Statement of Work. When a company has been hired for a project that involves many tasks, a statement of work is often issued at the start of the project.

The SOWwill outline the tasks or activities in a project, their costs and the timelines for deliverables within the project. In an IT project, the SOW would define what tasks will be performed (hardware and software upgrades etc.), why the work is being done andhow long each stage of the project will take.

Question No: 140 – (Topic 5)

A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design?

A. 802.11g

B. 802.11ac

C. 802.11b

D. 802.11a

Answer: B Explanation:

In this question, we need a wireless networkcapable of supporting HD video streaming to multiple devices. We therefore need the fastest wireless network speed available.

802.11 is a set of IEEE standards that govern wireless networking transmission methods. The 802.11 standards commonly used today to provide wireless connectivity in home or office wireless networks are 802.11a, 802.11b, 802.11g, 802.11n and 802.11ac.

The 802.11ac standard is the fastest wireless network supporting speeds of over 3Gbps and uses the 5-GHz band.

100% Dumps4cert Free Download!
Download Free Demo:N10-006 Demo PDF
100% Dumps4cert Pass Guaranteed!
N10-006 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.