[Free] Download New Latest (September 2016) CompTIA N10-006 Actual Test 11-20

Ensurepass

Question 11

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?

 

A. BGP

B. OSPF

C. IS-IS

D. MPLS

Correct Answer: D

Explanation:

In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.

MPLS works by prefixing packets with an MPLS header, containing one or more labels.

An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labels used to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward.

A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it off the outgoing packet.

When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

 

 

Question 12

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

 

A. Multilayer switch

B. Access point

C. Analog modem

D. DOCSIS modem

Correct Answer: C

Explanation:

Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps.

An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer   to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.

An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

 

 

Question 13

An administrator notices an unused cable behind a cabinet that is terminated with a DB-9 connector. Which of the following protocols was MOST likely used on this cable?

 

A. RS-232

B. 802.3

C. ATM

D. Token ring

Correct Answer: A

Explanation:

A DB-9 connector is used on serial cables. Serial cables use the RS-232 protocol which defines the functions of the 9 pins in a DB-9 connector. The RS-232 standard was around long before computers. It’s rare to see a new computer nowadays with a serial port but they were commonly used fo
r connecting external analog modems, keyboards and mice to computers.

 

 

Question 14

Which of the following connection types is used to terminate DS3 connections in a telecommunications facility?

 

A. 66 block

B. BNC

C. F-connector

D. RJ-11

Correct Answer: B

Explanation:

A DS3 (Digital Signal 3) is also known as a T3 line with a maximum bandwidth of 44.736 Mbit/s.

DS3 uses 75 ohm coaxial cable and BNC connectors.

 

 

Question 15

An F-connector is used on which of the following types of cabling?

 

A. CAT3

B. Single mode fiber

C. CAT5

D. RG6

< font style="font-size: 10pt" color="#000000">Correct Answer: D

Explanation:

An F connector is a coaxial RF connector commonly used for terrestrial television, cable television and universally for satellite television and cable modems, usually with RG-6/U cable or, in older installations, with RG-59/U cable.

 

 

Question 16

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).

 

A. 1000Base-LR

B. 1000Base-SR

C. 1000Base-T

D. 10GBase-LR

E. 10GBase-SR

F. 10GBase-T

Correct Answer: BE

Explanation:

1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation over multi-mode fiber with a distance capability between 220 meters and 550 meters.

10Gbase-SRis a 10 Gigabit Ethernet LAN standard for operation over multi-mode fiber optic cable and short wavelength signaling.

 

 

Question 17

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

 

Step 1: Select the tool that was used to create the cable test results. Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the ‘Submit Cable Test Analysis’ button.

 

clip_image002

 

Correct Answer:

 

clip_image004

 

Explanation:

A Cable Certifier provides “Pass” or “Fail” information in accordance with industry standards but can also show detailed information when a “Fail” occurs. This includes shorts, the wire pairs involved and the distance to the short. When a short is identified, at the full length of the cable it means the cable has not been crimped correctly.

 

 

Question 18

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

 

A. Star

B. Bus

C. Ring

D. Mesh

Correct Answer: C

Explanation:

Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a `star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any   computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.

To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a `token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data before releasing the token. Only a computer in possession of the token can transmit data onto the network.

 

 

Question 19

A network topology that utilizes a central device with point-to-point connections to all other devices is which of the following?

 

A. Star

B. Ring

C. Mesh

D. Bus

Correct Answer: A

Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network.

The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table to discover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

 

 

Question 20

Which of the following network topologies has a central, single point of failure?

 

A. Ring

B. Star

C. Hybrid

D. Mesh

Correct Answer: B

Explanation:

A Star network is the most common network in use today. Ethernet networks with computers connected to a switch (or a less commonly a hub) form a star network.

The switch forms the central component of the star. All network devices connect to the switch. A network switch has a MAC address table which it populates with the MAC address of every device connected to the switch. When the switch receives data on one of its ports from a computer, it looks in the MAC address table to discover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to.

The switch that forms the central component of a star network is a single point of failure. If the switch fails, no computers will be able to communicate with each other.

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in N10-006 Actual Test (September 2016) and tagged , , , , , . Bookmark the permalink.