Certbus > CompTIA > CompTIA Mobility+ > N10-005 > N10-005 Online Practice Questions and Answers

N10-005 Online Practice Questions and Answers

Questions 4

In which of the following layers of the OSI model would MAC addressing be found?

A. Network

B. Application

C. Data Link

D. Transport

Browse 828 Q&As
Questions 5

Which of the following is the difference between 802.11b and 802.11g?

A. Distance

B. Frequency

C. Speed

D. Transmission power

Browse 828 Q&As
Questions 6

Some visitors are unable to access the wireless network. The network's wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices.

Which of the following settings would need to be modified to provide wireless access to all visitors?

Building A Building B Building C Channel: 2 Channel: 6 Channel: 11 Encryption: WPA2 Encryption: WPA2 Encryption: WPA2

A. Encryption set to Open in all Buildings

B. Encryption set to Open in Building B

C. Encryption set to WEP in Building B

D. Channel set to 11 in Building B

Browse 828 Q&As
Questions 7

Ann, a client, shares half of a rectangular floor plan with another company and wishes to set up a secure wireless network. The installed antenna limits the signal to her half of the floor. Through analysis, the frequency and channels of surrounding wireless networks have been determined and configuration changes made accordingly.

Which of the following would be the NEXT step in setting up this secure wireless network?

A. Decrease signal strength on the antenna

B. Change the wireless channel on the WAP

C. Change the device placement to further obfuscate the signal

D. Set up encryption on the WAP and clients

Browse 828 Q&As
Questions 8

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor.

Multiple wireless networks are present in the building.

Which of the following can be changed on the client's wireless network to help ensure that interference from other wireless networks is at a minimum?

A. WPA encryption key selection

B. Channel selection

C. Antenna types

D. Disable SSID

Browse 828 Q&As
Questions 9

A SOHO had their wireless network breached on several occasions. The user turned off the SSID and enabled WEP encryption, but breaches are still occurring. Which of the following will improve security and MOST likely prevent future breaches?

A. Turn down the signal strength

B. Replace the WAP and enable WEP

C. Change both the SSID and WEP key

D. Enable WPA2 encryption

Browse 828 Q&As
Questions 10

A technician has determined that calls placed over a wireless connection are breaking up and the speaker's voices are delayed. This is making conversation difficult. This is a symptom of which of the following network issues?

A. Latency

B. Bad GBIC

C. Bad SFP

D. SSID mismatch

Browse 828 Q&As
Questions 11

Which of the following cables supports 10Gbps throughput and 100 meters as the maximum distance?

A. T1 crossover

B. Singlemode fiber

C. CAT6a

D. Coaxial

Browse 828 Q&As
Questions 12

Which of the following characteristics allows an 802.11g WAP to have transfer speeds up to 108Mbps?

A. MIMO technology

B. Channel bonding

C. Encryption type

D. Frequency

Browse 828 Q&As
Questions 13

A user's computer is unable to access the Internet.

Which of the following utilities can a technician use to determine if DNS is working?

A. nbstat

B. arp

C. nslookup

D. ipconfig

Browse 828 Q&As
Questions 14

Which of the following will allow a technician to monitor all network traffic when connected to a mirror port?

A. VLAN tags

B. SNMP

C. Packet sniffer

D. Syslog

Browse 828 Q&As
Questions 15

Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?

A. Network intrusion detection

B. Traffic analysis tool

C. Syslog server

D. Network sniffer

Browse 828 Q&As
Questions 16

Which of the following can be used to prioritize network streams to optimize performance for certain traffic types?

A. VLAN

B. VPN

C. QoS

D. PoE

Browse 828 Q&As
Questions 17

A malicious user connects to an open wireless network and is able to copy, reassemble and play back live VoIP data streams from wireless VoIP users. Which of the following attacks has the user performed?

A. Man-in-the-middle

B. Evil Twin

C. Packet Sniffing

D. IV attack

Browse 828 Q&As
Questions 18

An administrator would like to provide outside access to the company web server and separate the traffic from the local network. Which of the following would the administrator use to accomplish this?

A. Network Address Translation

B. Stateful Inspection

C. Port Address Translation

D. Demilitarized Zone

Browse 828 Q&As
Exam Code: N10-005
Exam Name: CompTIA Network+ Certification Exam
Last Update: Mar 24, 2024
Questions: 828 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99