[Free] 2017(Jan) Ensurepass Pass4sure CompTIA N10-006 Real Test 21-30

Ensurepass

CompTIA Network+ Certification Exam

 

Question 21

Which of the following refers to a network that spans several buildings that are within walking distance of each other?

 

A. CAN

B. WAN

C. PAN

D. MAN

Correct Answer: A

Explanation:

CAN stands for Campus Area Network or Corporate Area Network. Universities or colleges often implement CANs to link the buildings in a network. The range of CAN is 1KM to 5KM. If multiple buildings have the same domain and they are connected with a network, then it will be considered as a CAN.

 

 

Question 22

Which of the following network infrastructure implementations would be used to support files being transferred between Bluetooth-enabled smartphones?

 

A. PAN

B. LAN

C. WLAN

D. MAN

Correct Answer: A

Explanation:

PAN stands for Personal Area Network. It is a network of devices in the area of a person typically within a range of 10
meters and commonly using a wireless technology such as Bluetooth or IR (Infra-Red).

 

 

Question 23

Which of the following describes an IPv6 address of ::1?

 

A. Broadcast

B. Loopback

C. Classless

D. Multicast

Correct Answer: B

Explanation:

The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.

In IPv4, the loopback address is 127.0.0.1.

In IPv6, the loopback address is 0:0:0:0:0:0:0:1, which can be shortened to ::1 

 

 

Question 24

Which of the following is an example of an IPv4 address?

 

A. 192:168:1:55

B. 192.168.1.254

C. 00:AB:FA:B1:07:34

D. ::1

Correct Answer: B

Explanation:

An IPv4 address is notated as four decimal numbers each between 0 and 255 separated by dots (xxx.xxx.xxx.xxx). Each number is known as an octet as it represents eight binary bits. All four octets make up a 32-bit binary IPv4 address.

In this question, 192.168.1.254 is a valid IPv4 address.

 

Answer:

 

Question 25

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

 

A. 10.0.0.1

B. 127.0.0.1

C. 172.16.1.1

D. 192.168.1.1

Correct Answer: B

Explanation:

The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.

In IPv4, the loopback address is 127.0.0.1.

In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1

 

 

Question 26

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?

 

A. /24

B. /32

C. /28

D. /29

E. /30

Correct Answer: E

Explanation:

An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.

  In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 ?2), a /30 subnet mask will provide 2 IP addresses.

 

 

Question 27

HOTSPOT

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.

 

clip_image002

 

After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled.

 

Instructions:

When the simulation is complete, please select the Done button to submit.

 

 

 

clip_image004

 

 

 

clip_image006

 

 

 

clip_image008

 

All Networks have the range from /0 to/32

 

Correct Answer:

clip_image010

 

Explanation:

An IPv4 address consists of 32 bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.

 

The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 ?2), we can determine that the following subnets should be configured:

 

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for subnet and broadcast IP)

 

HR network – /27 – This will provide for up to 30 usable IP’s (32-2)

 

IT – /28 – This will provide for up to 14 usable IP’s (16-2)

 

Finance – /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and broadcast IP’s and can’t be used for hosts.

 

Marketing – /28

If we add up how many IP blocks are used that is 64+32+16+64+16=192.

 

A /24 contains 256 IP addresses, so 256-192=64.

 

So the last unused box should be a /26, which equates to 64 addresses

 

 

Question 28

A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?

 

A. APIPA

B. MAC

C. Static

D. Public

Correct Answer: A

Explanation:

APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable.

When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class B subnet mask of 255.255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.

 

 

Question 29

A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?

 

A. Load balancer

B. VRRP

C. OSPF

D. BGP

Correct Answer: D

Explanation:

A collection of networks that fall within the same administrative domain is called an autonomous system (AS). In this question, each datacenter will be an autonomous system.

The routers within an AS use an interior gateway protocol, such as the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information among themselves. At the edges of an AS are routers that communicate with the other AS’s on the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).

If a WAN link goes down, BGP will route data through another WAN link if redundant WAN links are available.

 

 

Question 30

An organization requires a second technician to verify changes before applying them to network devices. When checking the configuration of a network device, a technician determines that a coworker has improperly configured the AS number on the device. This would result in which of the following?

 

A. The OSPF not-so-stubby area is misconfigured

B. Reduced wireless network coverage

C. Spanning tree ports in flooding mode

D. BGP routing issues

Correct Answer: D

Explanation:

BGP (Border Gateway Protocol) is used to route data between autonomous systems (AS’s) A collection of networks that fall within the same administrative domain is called an autonomous system (AS).

The routers within an AS use an interior gateway protocol, such as the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol, to exchange routing information among themselves. At the edges of an AS are routers that communicate with the other
AS’s on the Internet, using an exterior gateway protocol such as the Border Gateway Protocol (BGP).

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in N10-006 Real Tests (2017) and tagged , , , , , , , , , , , , , . Bookmark the permalink.