[Free] 2018(June) Dumps4cert CompTIA N10-006 Dumps with VCE and PDF Download 151-160

By | July 4, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 151 – (Topic 5)

Which of the following is the main difference between TCP and UDP?

  1. TCP data flows in two directions, while UDP data flows from server to client.

  2. The TCP header implements flags, while the UDP header does not.

  3. The TCP header implements checksum, while the UDP header does not.

  4. TCP connections can be secured by stateful firewalls, while UDP connections cannot.

Answer: B Explanation:

Transmission Control Protocol (TCP) is a connection-oriented transport protocol. Connection-oriented transport protocols provide reliable transport. When a computer wants to send data to another computer, TCP will first establish a connection between the two computers. When a sending computer sends data segments, the receiving computer acknowledges receipt of thesegments. If the receiving computerdoes not receive an expected segment, the sending computer will send it again.

User Datagram Protocol (UDP) is a connectionless transport protocol. Connectionless transport protocols provide unreliable transport. With UDP, there is no connection establishment between the sending and receiving computers. If a data segment is lost in transit, the sending computer will not know about it so it will not resend the segment.

TCP uses control messages to manage the process of contact and communication. TCP uses a set of control flags in the TCP header to indicate whether a segment is being used for control purposes or just to carry data.

Question No: 152 – (Topic 5)

Which of the following describes an area containing a rack that is used to connect customer equipment to a service provider?

  1. 110 block

  2. MDF

  3. DSU

  4. CSU

Answer: B Explanation:

MDFstands for Main Distribution Frame. A Main Distribution Frame is a commonly a long steel rack accessible from both sides. On one side of the rack is cabling that connects the service provider’s network. The other side of the rack is for the connections tothe customer’s equipment.

Question No: 153 – (Topic 5)

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?

  1. Fire suppression

  2. Mantraps at the entry

  3. HVAC

  4. UPS and battery backups

Answer: A Explanation:

Firesuppression systems are often deployed in server rooms to prevent a fire destroying all the I.T. equipment. Different fire suppression systems work in different ways. Obviously a fire suppression system that sprays water onto the fire is no good for a server room as the water would do as much damage as the fire. A common fire suppression system used in server rooms is one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from the server room is to fill the server room withan inert gas such as carbon dioxide.

Question No: 154 – (Topic 5)

A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO).

  1. 20

  2. 21

  3. 22

  4. 23

  5. 67

  6. 68

  7. 69

Answer: A,B Explanation:

FTP (File Transfer Protocol) is used for transferring files between an FTP client and an FTP server. FTP uses TCP Ports 20 and 21.

Topic 6, Mix questions

Question No: 155 – (Topic 6)

A network technician has received a report that workstations are unable to gain access to the network. During the troubleshooting process, the technician discovers that the switch connecting these workstations has failed. Which of the following will be the QUICKEST option configure a new switch?

  1. Baseline

  2. Image

  3. Archive

  4. Syslog

Answer: B

Question No: 156 – (Topic 6)

A network technician discovers an issue with spanning tree on the core switch. Which of the following troubleshooting steps should the network technician perform NEXT to resolve the issue?

  1. Test a theory to determine the cause

  2. Escalate to a senior technician

  3. Identify the symptoms

  4. Establish a theory of probable cause

  5. Establish a plan of action

Answer: D

Question No: 157 – (Topic 6)

In the past, a company has experienced several network breaches as a result of end-user actions. To help mitigate future breaches, which of the following documents should the security team ensure are up-to-date and enforced for all employees? (Select TWO)

  1. Memorandum of understanding

  2. Data classificationdocument

  3. Service level agreement

  4. Interconnection security agreement

  5. Consent to monitor

  6. Acceptable use policy

Answer: A,F

Question No: 158 – (Topic 6)

A technician has attempted to optimize the network but some segments are still reporting poor performance. Which of the following issues should the technician look at?

  1. Switch incorrectly set to full duplex

  2. Conflicting IP addresses

  3. Packet bottlenecks

  4. IP address scope depletion

Answer: C

Question No: 159 – (Topic 6)

A network administrator is troubleshooting an issue with unstable wireless connections in a residence hall. Students on the first and second floors are reporting the hall’s SSID is not visible in the evenings. The network administrator has verified the wireless system is operating normally. Which of the following is the MOST likely cause for the problem reported by students?

  1. Internet router maintenance is scheduled.

  2. An ARP attack is underway.

  3. The SSID is set to hidden.

  4. A jammer is being used.

Answer: A

Question No: 160 – (Topic 6)

A network administrator need to install a border device on the network that will help ensure FTP commands are not being sent in traffic communicating on port 25. Which of the following devices will allow for deep packet inspection?

  1. Layer 7 firewall

  2. Web proxy

  3. Layer 3 switch

  4. Protocol analyzer

Answer: B Explanation:


100% Dumps4cert Free Download!
Download Free Demo:N10-006 Demo PDF
100% Dumps4cert Pass Guaranteed!
N10-006 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.