ExamGecko
Home Home / CompTIA / N10-009

CompTIA N10-009 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Which of the following network cables involves bounding light off of protective cladding?

A.
Twinaxial
A.
Twinaxial
Answers
B.
Coaxial
B.
Coaxial
Answers
C.
Single-mode
C.
Single-mode
Answers
D.
Multimode
D.
Multimode
Answers
Suggested answer: D

Explanation:

Multimode fiber optic cables involve the transmission of light signals that bounce off the core's cladding as they travel down the fiber. This characteristic differentiates it from single-mode fiber, where the light travels directly down the fiber without reflecting off the cladding.

Here are some detailed points about multimode fiber cables:

Construction: Multimode fibers have a larger core diameter, typically 50 or 62.5 microns, compared to single-mode fibers, which have a core diameter of about 9 microns.

Light Propagation: The larger core of multimode fiber allows multiple light modes to propagate. These modes travel at different angles, leading to reflections off the core-cladding boundary.

Distance and Bandwidth: Due to modal dispersion, where different light modes arrive at the receiver at different times, multimode fibers are suited for shorter distance applications compared to single-mode fibers. Typical distances are up to 550 meters for 10 Gbps Ethernet using OM4 multimode fiber.

Applications: Multimode fibers are commonly used in LANs (Local Area Networks), data centers, and for shorter distance data transmission due to their cost-effectiveness and ease of installation.

Network


A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.
The PoE power budget was exceeded.
A.
The PoE power budget was exceeded.
Answers
B.
TX/RX was transposed.
B.
TX/RX was transposed.
Answers
C.
A port security violation occured.
C.
A port security violation occured.
Answers
D.
An incorrect cable type was installed.
D.
An incorrect cable type was installed.
Answers
Suggested answer: D

Explanation:

When a network administrator installs a new Network Interface Card (NIC) and users are unable to reach the server, one of the common issues is the use of an incorrect cable type. Network cables must match the specifications required by the NIC and the network infrastructure (e.g., Cat5e, Cat6 for Ethernet).

NIC Compatibility: The new NIC might require a specific type of cable to function properly. Using a cable not rated for the NIC's required speeds or capabilities can result in connectivity issues.

Cable Standards: Different NICs and network devices might need different cabling standards (straight-through vs. crossover cables, or specific fiber optic types).

Connection Types: Ensuring that the cable connectors are appropriate for the NIC ports (e.g., RJ45 for Ethernet, LC connectors for fiber optics).

Network


Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.
Web traffic is filtered through a web filter.
A.
Web traffic is filtered through a web filter.
Answers
B.
More bandwidth is required on the company's internet connection.
B.
More bandwidth is required on the company's internet connection.
Answers
C.
Monitoring detects insecure machines on the company's network.
C.
Monitoring detects insecure machines on the company's network.
Answers
D.
Cloud-based traffic flows outside of the company's network.
D.
Cloud-based traffic flows outside of the company's network.
Answers
Suggested answer: D

Explanation:

A split-tunnel VPN allows some traffic to be routed through the VPN while other traffic goes directly to the internet. This setup offers several advantages, with a primary one being cost-effectiveness due to cloud-based traffic not consuming company bandwidth.

Bandwidth Utilization: Split-tunnel VPNs reduce the amount of traffic passing through the company's network, freeing up bandwidth for other uses.

Performance: By allowing internet-bound traffic to bypass the VPN, it can reduce latency and improve the performance for users accessing cloud services directly.

Cost Savings: Reduced load on the company's VPN infrastructure can lead to lower costs in terms of both hardware and bandwidth.

Network


A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

A.
Toner
A.
Toner
Answers
B.
Laptop
B.
Laptop
Answers
C.
Cable tester
C.
Cable tester
Answers
D.
Visual fault locator
D.
Visual fault locator
Answers
Suggested answer: A

Explanation:

A toner probe, often referred to as a toner and probe kit, is the easiest and most effective tool for identifying individual cables in a bundle, especially in situations where the patch panel is not labeled. The toner sends an audible tone through the cable, and the probe detects the tone at the other end, allowing the technician to quickly identify the correct cable.

Functionality: The toner generates a tone that travels along the cable. When the probe is placed near the correct cable, it detects the tone and emits a sound.

Ease of Use: Toner probes are straightforward to use, even in environments with many cables, making them ideal for identifying cables in unlabeled patch panels.

Efficiency: This method is much faster and more reliable than manual tracing, especially in complex setups.

Network


A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

A.
A physical interface used for trunking logical ports
A.
A physical interface used for trunking logical ports
Answers
B.
A physical interface used for management access
B.
A physical interface used for management access
Answers
C.
A logical interface used for the routing of VLANs
C.
A logical interface used for the routing of VLANs
Answers
D.
A logical interface used when the number of physical ports is insufficent.
D.
A logical interface used when the number of physical ports is insufficent.
Answers
Suggested answer: C

Explanation:

An SVI (Switched Virtual Interface) is a logical interface on a Layer 3-capable switch used to route traffic between VLANs. This is particularly useful in environments where voice and data traffic need to be separated, as each type of traffic can be assigned to different VLANs and routed accordingly.

SVI (Switched Virtual Interface): A virtual interface created on a switch for inter-VLAN routing.

VLAN Routing: Enables the routing of traffic between VLANs on a Layer 3 switch, allowing for logical separation of different types of traffic, such as voice and data.

Use Case: Commonly used in scenarios where efficient and segmented traffic management is required, such as in VoIP implementations.

Network


A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements>?

A.
Link speed
A.
Link speed
Answers
B.
Jumbo frames
B.
Jumbo frames
Answers
C.
QoS
C.
QoS
Answers
D.
802.1q tagging
D.
802.1q tagging
Answers
Suggested answer: B

Explanation:

Jumbo frames are Ethernet frames with a payload greater than the standard maximum transmission unit (MTU) of 1500 bytes. Configuring jumbo frames can reduce overhead and increase efficiency in storage networks by allowing more data to be sent in each frame, thus reducing the number of frames needed to transmit the same amount of data.

Reduced Overhead: By sending larger frames, the relative overhead for headers and acknowledgments is reduced.

Increased Efficiency: Larger frames mean fewer packets to process, leading to better utilization of network bandwidth and improved performance in high-throughput environments like storage networks.

Configuration: Requires support from all devices in the network path, including switches and network interface cards (NICs).

Network


A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

A.
Incorrect wiring standard
A.
Incorrect wiring standard
Answers
B.
Power budget exceeded
B.
Power budget exceeded
Answers
C.
Signal attenuation
C.
Signal attenuation
Answers
D.
Wrong voltage
D.
Wrong voltage
Answers
Suggested answer: B

Explanation:

When installing multiple Power over Ethernet (PoE) devices like security cameras, it is crucial to ensure that the total power requirement does not exceed the power budget of the PoE switch. Each PoE switch has a maximum power capacity, and exceeding this capacity can cause some devices to fail to receive power.

PoE Standards: PoE switches conform to standards such as IEEE 802.3af (PoE) and 802.3at (PoE+), each with specific power limits per port and total power capacity.

Power Calculation: Adding up the power requirements of all connected PoE devices can help determine if the total power budget of the switch is exceeded.

Symptoms: When the power budget is exceeded, some devices, typically those farthest from the switch or connected last, may not power up or function correctly.

Network


Which of the following network traffic type is sent to all nodes on the network?

A.
Unicast
A.
Unicast
Answers
B.
Broadcast
B.
Broadcast
Answers
C.
Multicast
C.
Multicast
Answers
D.
Anycast
D.
Anycast
Answers
Suggested answer: B

Explanation:

Broadcast traffic is sent to all nodes on the network. In a broadcast, a single packet is transmitted to all devices in the network segment. This is commonly used for tasks like ARP (Address Resolution Protocol) requests.

Broadcast Domain: All devices within the same broadcast domain will receive broadcast traffic.

Network Types: Ethernet networks commonly use broadcast traffic for certain functions, including network discovery and addressing.

IPv4 Broadcast: An IPv4 broadcast address (e.g., 255.255.255.255) ensures the packet is sent to all devices on the network.

Network


A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A.
Least privilege network access
A.
Least privilege network access
Answers
B.
Dynamic inventeries
B.
Dynamic inventeries
Answers
C.
Central policy management
C.
Central policy management
Answers
D.
Zero-touch provisioning
D.
Zero-touch provisioning
Answers
E.
Configuration drift prevention
E.
Configuration drift prevention
Answers
F.
Subnet range limits
F.
Subnet range limits
Answers
Suggested answer: A, C

Explanation:

To increase overall security after a recent breach, implementing least privilege network access and central policy management are effective strategies.

Least Privilege Network Access: This principle ensures that users and devices are granted only the access necessary to perform their functions, minimizing the potential for unauthorized access or breaches. By limiting permissions, the risk of an attacker gaining access to critical parts of the network is reduced.

Central Policy Management: Centralized management of security policies allows for consistent and streamlined implementation of security measures across the entire network. This helps in quickly responding to security incidents, ensuring compliance with security protocols, and reducing the chances of misconfigurations.

Network


A support agent receives a report that a remote user's wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user's coaxial modern has a signal power of -97dB.

A.
Removing any spliters connecte to the line
A.
Removing any spliters connecte to the line
Answers
B.
Switching the devices to wireless
B.
Switching the devices to wireless
Answers
C.
Moving the devices closer to the modern
C.
Moving the devices closer to the modern
Answers
D.
Lowering the network speed
D.
Lowering the network speed
Answers
Suggested answer: A

Explanation:

A signal power of -97dB indicates a very weak signal, which can cause connectivity issues and slow speeds. Splitters on a coaxial line can degrade the signal quality further, so removing them can help improve the signal strength and overall connection quality.

Signal Quality: Splitters can reduce the signal strength by dividing the signal among multiple lines, which can be detrimental when the signal is already weak.

Direct Connection: Ensuring a direct connection from the modem to the incoming line can maximize signal quality and reduce potential points of failure.

Network


Total 153 questions
Go to page: of 16