N10-006 Latest Certification Tests

Query: 1 A technician must restrict the quantity of broadcast site visitors on a community and permit totally different segments to speak with one another. Which of the next choices would fulfill these necessities? A. Add a router and allow OSPF. B. Add a layer Three swap and create a VLAN. C. Add a bridge between two switches. D. Add a firewalland implement correct ACL. Reply: B Clarification: We are able to restrict the quantity of broadcast site visitors on a switched community by dividing the computer systems into logical community segments known as VLANs. A digital native space community (VLAN) is a logical group of computer systems that seem like on the identical LAN even when they’re on separate IP subnets. These logical subnets are configured within the community switches. Every VLAN is a broadcast area which means that solely computer systems inside the similar VLAN will obtain broadcast site visitors. Toallow totally different segments (VLAN) to speak with one another, a router is required to determine a connection between the techniques. We are able to use a community router to route between the VLANs or we will use a ‘Layer 3’ swap. Not like layer 2 switches that may solely learn the contents of the data-link layer protocol header within the packets they course of, layer Three switches can learn the (IP) addresses within the community layer protocol header as nicely. Query: 2 The community set up is failing redundancy testing on the MDF. The site visitors being transported is a mix of multicast and unicast indicators. Which of the next would BEST deal with the rerouting brought on by the disruption of service? A. Layer Three swap B. Proxy server C. Layer 2 swap D. Sensible hub Reply: A Clarification: The query states that the site visitors being transported is a mix of multicast and unicast indicators. There are three fundamental varieties of community transmissions: broadcasts, that are packets transmitted to each node on the community; unicasts,that are packets transmitted to only one node; and multicasts, that are packets transmitted to a gaggle of nodes. Multicast is a layer Three function of IPv4 & IPv6. Due to this fact, we would wish a layer Three swap (or a router) to reroute the site visitors. Not like layer 2switches that may solely learn the contents of the data-link layer protocol header within the packets they course of, layer Three switches can learn the (IP) addresses within the community layer protocol header as nicely. Query: 3 Which of the next community gadgets use ACLs to stop unauthorized entry into firm techniques? A. IDS B. Firewall C. Content material filter D. Load balancer Reply: B Clarification: A firewall is a system designed to stop unauthorized entry to or from a personal community. Firewalls arefrequently used to stop unauthorized Web customers from accessing privatenetworks linked to the Web, particularly intranets. Firewalls use ACLs (entry management lists) to find out which site visitors is allowed by means of the firewall. All site visitors getting into or leaving the intranet passes by means of the firewall, which examines every message and blocks or permits the message relying on guidelines specified within the ACL. The foundations within the ACL specify which mixtures of supply IP handle, vacation spot handle in IP port numbers are allowed. Query: 4 Which of the next is used to outline how a lot bandwidth can be utilized by varied protocols on the community? A. Site visitors shaping B. Excessive availability C. Load balancing D. Fault tolerance Reply: A Clarification: If a community connection turns into saturated to the purpose the place there’s a important degree of competition, community latency can rise considerably. Site visitors shaping is used to manage the bandwidth utilized by community site visitors. In a company surroundings, business-related site visitors could also be given precedence over different site visitors. Site visitors will be prioritized based mostly on the ports utilized by the appliance sending the site visitors. Delayed site visitors is saved in a buffer till the upper precedence site visitors has been despatched. Query: 5 Which of the next is used to authenticate distant employees who join from offsite? (Choose TWO). A. OSPF B. VTP trunking C. Digital PBX D. RADIUS E. 802.1x Reply: D,E Clarification: D: A RADIUS (Distant Authentication Dial-in Consumer Service)server is a server with a database of person accounts and passwords used as a central authentication database for customers requiring community entry. RADIUS servers are generally utilized by ISP’s to authenticate their buyer’s Web connections. Distant customers hook up with a number of Distant Entry Servers. The distant entry servers then ahead the authentication requests to the central RADIUS server. E: 802.1X is an IEEE Commonplace for Port-based Community Entry Management (PNAC). It offers an authentication mechanism to gadgets wishing to connect to a community. 802.1X authentication entails three events: a supplicant, an authenticator, and an authentication server. The supplicant is a shopper that needs to connect to the community. The authenticator is a community gadget,resembling an Ethernet swap, wi-fi entry level or on this case, a distant entry server and the authentication server is the RADIUS server. Query: 6 Which of the next offers accounting, authorization, and authentication through a centralized privileged database, in addition to, problem/response and password encryption? A. Multifactor authentication B. ISAKMP C. TACACS+ D. Community entry management Reply: C Clarification: TACACS+ (Terminal Entry Controller Entry-Management System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) companies. Just like RADIUS, TACACS+ is a centralized authentication resolution used to supply entry to community sources. TACACS+ separates the authentication, authorization, and accounting companies enabling you to host every service on a separate server if required. Query: 7 A technician must put aside addresses in a DHCP pool in order that sure servers all the time obtain the identical handle. Which of the next needs to be configured? A. Leases B. Helper addresses C. Scopes D. Reservations Reply: D Clarification: A reservation is utilized in DHCP to make sure that a pc all the time receives the identical IP handle. To create a reservation, you could know the {hardware} MAC handle ofthe community interface card that ought to obtain the IP handle. For instance, if Server1 has MAC handle of 00:A1:FB:12:45:4C and that laptop ought to all the time get 192.168.0.7 as its IP handle, you may map the MAC handle of Server1 with the IP handle to configure reservation. Query: 8 Joe, a community technician, is establishing a DHCP server on a LAN section. Which of the next choices ought to Joe configure within the DHCP scope, to be able to enable hosts on that LAN section utilizing dynamic IP addresses, to have the ability to entry the Web and inside firm servers? (Choose THREE). A. Default gateway B. Subnet masks C. Reservations D. TFTP server E. Lease expiration time of 1 day F. DNS servers G. Bootp Reply: A,B,F Clarification: The query statesthat the shopper computer systems must entry the Web in addition to inside firm servers. To entry the Web, the shopper computer systems should be configured with an IP handle with a subnet masks (reply B) and the handle of the router that connects thecompany community to the Web. This is called the ‘default gateway’ (reply A). To have the ability to resolve internet web page URLs to internet server IP addresses, the shopper computer systems should be configured with the handle of a DNS server (reply F). Query: 9 A technician simply accomplished a brand new exterior web site and setup entry guidelines within the firewall. After some testing, solely customers outdoors the inner community can attain the location. The web site responds to a ping from the inner community and resolves the right public handle. Which of the next might the technician do to repair this challenge whereas inflicting inside customers to path to the web site utilizing an inside handle? A. Configure NAT on the firewall B. Implement a break up horizon DNS C. Place the server within the DMZ D. Alter the right inside ACL Reply: B Clarification: Break up horizon DNS (also referred to as Break up Mind DNS) is a mechanism for DNS servers to provide totally different DNS question outcomes relying on the supply of the request. This may be finished by hardware-basedseparation however is mostly finished in software program. On this query, we would like exterior customers to have the ability to entry the web site by utilizing a public IP handle. To do that, we’d have an exterior dealing with DNS server internet hosting a DNS zone for the web site area. Forthe inside customers, we’d have an inside dealing with DNS server internet hosting a DNS zone for the web site area. The exterior DNS zone will resolve the web site URL to an exterior public IP handle. The inner DNS server will resolve the web site URL to an inside personal IP handle. Query: 10 When configuring a brand new server, a technician requests that an MX document be created in DNS for the brand new server, however the document was not entered correctly. Which of the next was MOST probably put in that required an MX document to perform correctly? A. Load balancer B. FTP server C. Firewall DMZ D. Mail server Reply: D Clarification: A mail exchanger document (MX document) is a DNS document utilized by e-mail servers to find out the identify of the e-mail server responsiblefor accepting e-mail for the recipient’s area. For instance a person sends an e-mail to recipient@somedomain.com. The sending person’s e-mail server will question the somedomain.com DNS zone for an MX document for the area. The MX document will specify the hostnameof the e-mail server chargeable for accepting e-mail for the somedomain.com area, for instance, mailserver.somedomain.com. The sending e-mail server will then carry out a second DNS question to resolve mailserver.somedomain.com to an IP handle. The sending mailserver will then ahead the e-mail to the vacation spot mail server. Query: 11 Which of the next protocols makes use of label-switching routers and label-edge routers to ahead site visitors? A. BGP B. OSPF C. IS-IS D. MPLS Reply: D

Clarification: In an MPLS community, knowledge packets are assigned labels. Packet-forwarding selections are made solely on the contents of this label, with out the necessity to study the packet itself. MPLS works by prefixing packets with an MPLS header, containing a number of labels. An MPLS router that performs routing based mostly solely on the label is known as a label swap router (LSR) or transit router. It is a kind of router situated in the course of a MPLS community. It’s chargeable for switching the labels used to route packets. When an LSR receives a packet, it makes use of the label included within the packet header as an index to find out the subsequent hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup desk. The outdated label is then faraway from the header and changed with the brand new label earlier than the packet is routed ahead. A label edge router (LER) is a router that operates on the fringe of an MPLS community and acts because the entry and exit factors for the community. LERs respectively, add an MPLS label onto an incoming packet and take away it off the outgoing packet. When forwarding IP datagrams into the MPLS area, an LER makes use of routing data to find out applicable labels to be affixed, labels the packet accordingly, after which forwards the labelled packets into the MPLS area. Likewise, upon receiving a labelled packet which is destined to exit the MPLS area, the LER strips off the label and forwards the ensuing IP packet utilizing regular IP forwarding guidelines. Query: 12 Which of the next is MOST probably to make use of an RJ-11 connector to attach a pc to an ISP utilizing a POTS line? A. Multilayer swap B. Entry level C. Analog modem D. DOCSIS modem Reply: C Clarification: Earlier than ADSL broadband connections grew to become the usual for Web connections, computer systems used analog modems to hook up with the Web. By immediately’s requirements, analog modems are very sluggish sometimes providing a most bandwidth of 56Kbps. An analog modem (modulator/demodulator) converts (modulates) a digital sign from a computerto an analog sign to be transmitted over a regular (POTS) cellphone line. The modem then converts (demodulates) the incoming analog sign to digital knowledge for use by the pc. An analog modem makes use of an RJ-11 connector to hook up with a cellphone line (POTS)in the identical approach a cellphone does. Query: 13 An administrator notices an unused cable behind a cupboard that’s terminated with a DB-9 connector. Which of the next protocols was MOST probably used on this cable? A. RS-232 B. 802.3 C. ATM D. Tokenring Reply: A Clarification: A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the features of the 9 pins in a DB-9 connector. The RS-232 normal was round lengthy earlier than computer systems. It is uncommon to see a brand new laptop these days with a serial port however they had been generally used for connecting exterior analog modems, keyboards and mice to computer systems. Query: 14 Which of the next connection varieties is used to terminate DS3 connections in a telecommunications facility? A. 66 block B. BNC C. F-connector D. RJ-11 Reply: B Clarification: A DS3 (Digital Sign 3) is also referred to as a T3 line with a most bandwidth of 44.736 Mbit/s. DS3 makes use of 75 ohm coaxial cable and BNC connectors. Query: 15 An F-connector is used on which of the next varieties of cabling? A. CAT3 B. Single mode fiber C. CAT5 D. RG6 Reply: D Clarification: An F connector is a coaxial RF connector generally used for terrestrial tv, cable tv and universally forsatellite tv and cable modems, normally with RG-6/U cable or, in older installations, with RG-59/U cable. Query: 16 A community technician should make the most of multimode fiber to uplink a brand new networking gadget. Which of the next Ethernet requirements might the technician make the most of? (Choose TWO). A. 1000Base-LR B. 1000Base-SR C. 1000Base-T D. 10GBase-LR E. 10GBase-SR F. 10GBase-T Reply: B,E Clarification: 1000BASE-SX is a fiber optic Gigabit Ethernet normal for operation over multi-mode fiberwith a distance functionality between 220 meters and 550 meters. 10Gbase-SRis a 10 Gigabit Ethernet LAN normal for operation over multi-mode fiber optic cable and quick wavelength signaling. Query: 17 CORRECT TEXT You will have been tasked with testing a CAT5e cable. A abstract of the take a look at outcomes will be discovered on the display. Step 1: Choose the instrument that was used to create the cable take a look at outcomes. Step 2: Interpret the take a look at outcomes and choose the choice that explains the outcomes. After you might be finished together with your evaluation, click on the ‘Submit Cable Take a look at Evaluation’ button. Clarification: A Cable Certifier offers “Pass” or “Fail” data in accordance with trade requirements however may present detailed data when a “Fail” happens. This includesshorts, the wire pairs concerned and the gap to the quick. When a brief is recognized, on the full size of the cable it means the cable has not been crimped accurately. Query: 18 A community engineer must arrange a topology that won’t fail if there’s an outage on a single piece of the topology. Nevertheless, the computer systems want to attend to speak on the community to keep away from congestions. Which of the next topologies would the engineer implement? A. Star B. Bus C. Ring D. Mesh Reply: C Clarification: Token Ring networks are fairly uncommon immediately. Token Ring networks use the ring topology. Regardless of being known as a Ring topology, the ring is logical and the bodily community construction usually kinds a ‘star’ topology with all computer systems on the community connecting to a central multistation entry unit (MAU). The MAU implements the logical ring by transmitting indicators to every node in flip and ready for the node to ship them again earlier than it transmits to the subsequent node. Due to this fact, though the cables are bodily linked in a star, the info path takes the type of a hoop. If any laptop or community cable fails in a token ring community, the rest of the community stays useful. The MAU has the intelligence to isolate the failed section. To make sure that the computer systems want to attend to speak on the community to keep away from congestions, a Token Ring community makes use of a ‘token’. The token regularly passes across the community till a pc must ship knowledge. The pc then takes the token and transmits the info beforereleasing the token. Solely a pc in possession of the token can transmit knowledge onto the community. Query: 19 A community topology that makes use of a central gadget with point-to-point connections to all different gadgets is which of the next? A. Star B. Ring C. Mesh D. Bus Reply: A Clarification: A Star community is the most typical community in use immediately. Ethernet networks with computer systems linked to a swap (or a much less generally a hub) type a star community. The swap kinds the central part ofthe star. All community gadgets hook up with the swap. A community swap has a MAC handle desk which it populates with the MAC handle of each gadget linked to the swap. When the swap receives knowledge on one in every of its ports from a pc, it seems to be within the MAC handle desk to find which port the vacation spot laptop is linked to. The swap then unicasts the info out by means of the port that the vacation spot laptop is linked to. Query: 20 Which of the next community topologies has a central, single level of failure? A. Ring B. Star C. Hybrid D. Mesh Reply: B Clarification: A Star community is the most typical community in use immediately. Ethernet networks with computer systems linked to a swap (or a much less generally a hub) type a star community. The swap kinds the central part of the star. All community gadgets hook up with the swap. A community swap has a MAC handle desk which it populates with the MAC handle of each gadget linked to the swap. When the swap receives knowledge on one in every of its ports from a pc, it seems to be within the MAC handle desk to find which port the vacation spot laptop is linked to. The swap then unicasts the info out by means of the port that the vacation spot laptop is linked to. The swap that kinds thecentral part of a star community is a single level of failure. If the swap fails, no computer systems will have the ability to talk with one another. Query: 21 Which of the next refers to a community that spans a number of buildings which are inside strolling distance of one another? A. CAN B. WAN C. PAN D. MAN Reply: A Clarification: CAN stands for Campus Space Community or Company Space Community. Universities or schools usually implement CANs to hyperlink the buildings in a community. The vary of CAN is 1KMto 5KM. If a number of buildings have the identical area and they’re linked with a community, then will probably be thought of as a CAN. Query: 22 Which of the next community infrastructure implementations could be used to assist recordsdata being transferred between Bluetooth-enabled smartphones? A. PAN B. LAN C. WLAN D. MAN Reply: A Clarification: PAN stands for Private Space Community. It’s a community of gadgets within the space of an individual sometimes inside a variety of 10 meters and generally utilizing a wirelesstechnology resembling Bluetooth or IR (Infra-Pink).

Leave a Reply

Your email address will not be published. Required fields are marked *