Pass4Test 는 꼭 한번에 CompTIA N10-005 시험을 패스할 수 있도록 도와드릴 것입니다. 여러분은 CompTIA N10-005 시험자료 구매로 제일 정확하고 또 최신 시험 문제에 대비한 학습가이드를 사용할 수 있습니다. Pass4Test의 인증시험 적중율은 아주 높습니다. 때문에 많은 IT인증시험 준비중인 분들에게 많은 편리를 드릴수 있습니다.100%정확도 100%신뢰! 여러분은 마음 편히 응시하시면 됩니다.Pass4Test는 여러분의 시간을 절약해드릴 뿐만 아니라 여러분들이 안심하고 응시하여 순조로이 패스할수 있도록 도와주는 사이트 입니다. CompTIA N10-005인증시험 패스로 이 치열한 IT업계경쟁 속에서 자기만의 자리를 잡고, 스펙을 쌓고, 전문적인 지식을 높이고 싶으십니까? CompTIA N10-005 패스는 쉬운 일이 아닌걸 알고 있습니다. Com pTIA N10-005 패스는 여러분이 IT업계에 한발작 더 가까워졌다는걸 의미합니다.하지만 이렇게 중요한 시험이라고 많은 시간과 정력을 낭비할 필요는 없습니다. Pass4Test의 완벽한 자료만으로도 가능합니다.Pass4Test는 믿을 수 있는 사이트입니다. IT업계에서는 이미 많이 알려져 있습니다. 그리고 여러분에 신뢰를 드리기 위하여 CompTIA N10-005관련자료의 일부분 문제와 답 등 샘플을 무료로 다운받아 체험해볼 수 있게 제공합니다. 아주 만족할 것이라고 믿습니다. Pass4Test제품에 대하여 아주 자신이 있습니다. CompTIA N10-005 도 여러분의 무용지물이 아닌 아주 중요한 자료가 되리라 믿습니다. 여러분께서는 아주 순조로이 시험을 패스하실 수 있을 것입니다.
NO.1 Which of the following sizes is the fixed cell length in ATM?
A. 8 bytes
B. 53 bytes
C. 64 kilobytes
D. 128 kilobytes
Answer: B
NO.2 The location that the local network connection ends and the ISP responsibility begins is known as the:
A. Access point.
B. Default gateway.
C. IDF connection.
D. Demarcation point.
Answer: D
NO.3 Which of the following would Joe, a technician, configure to modify the time a device will hold an IP
address provided through DHCP?
A. DNS suffixes
B. Leases
C. Static IP addressing
D. Reservations
Answer: B
NO.4 Which of the following is an example of two-factor authentication?
A. A username and PIN
B. A username and password
C. A username, password, finger print scan, and smart card
D. A username, password, and key fob number
Answer: D
NO.5 Two duplicate pieces of equipment can be used in conjunction for which of the following purposes?
(Select TWO)
A. High availability
B. Fault tolerance
C. Reduce latency
D. Wi-MAX
E. CARP
Answer: AB
NO.6 Which of the following is a form of encrypting packets for safe, secure data transmission within a
network?
A. RAS
B. PPTP
C. IPSec
D. ICA
Answer: C
NO.7 Sandy, a technician, wants to limit access to a wireless network to company owned laptops, but does
not want to use an encryption method. Which of the following methods would be BEST to accomplish
this?
A. MAC filtering
B. SSL VPN
C. PPPoE
D. WPA Enterprise
Answer: A
NO.8 Sandy, a network administrator, wants to be able to block all already known malicious activity.
Which of the following would allow her to perform this activity.?
A. Behavioral Based IDS
B. Signature Based IDS
C. Behavioral Based IPS
D. Signature Based IPS
Answer: D
NO.9 Which of the following network appliances would facilitate an even amount of traffic hitting each web
server?
A. Load balancer
B. VPN concentrator
C. Proxy server
D. Content filter
Answer: A
NO.10 Joe, a network technician, is tasked with installing a router and firewall to get an office working with
Internet access. Which of the following features MUST be configured to allow sharing of a single public IP
address?
A. QoS
B. POP3
C. PAT
D. SMTP
Answer: C
NO.11 Sandy, a technician, installs a new WAP and users are able to connect; however, users cannot access
the Internet. Which of the following is the MOST likely cause of the problem?
A. The signal strength has been degraded and latency is increasing hop count.
B. An incorrect subnet mask has been entered in the WAP configuration.
C. The signal strength has been degraded and packets are being lost.
D. Users have specified the wrong encryption type and routes are being rejected.
Answer: B
NO.12 Which of the following TCP/IP and OSI model layers retransmits a TCP packet if it is not received
successfully at its destination?
A. The transport OSI model layer and the transport TCP/IP model layer
B. The transport OSI model layer and the Internet TCP/IP model layer
C. The network OSI model layer and the transport TCP/IP model layer
D. The network OSI model layer and the Internet TCP/IP model layer
Answer: A
NO.13 Which of the following connector types would Sandy, a network technician, use to connect a serial
cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
Answer: D
NO.14 Sandy, the network administrator, has funding to do a major upgrade of the company LAN. This upgrade
is currently in the planning stage, and Sandy still needs to determine the network requirements,
bottlenecks, and any future upgrades in mind.
Which of the following is the FIRST step in the planning process?
A. Conduct a vulnerability scan
B. Establish a network baseline
C. Conduct traffic analysis
D. Conduct a risk assessment
Answer: B
NO.15 A company has only three laptops that connect to their wireless network. The company is currently
using WEP encryption on their wireless network. They have noticed unauthorized connections on their
WAP and want to secure their wireless connection to prevent this. Which of the following security
measures would BEST secure their wireless network? (Select TWO).
A. Change the encryption method to WPA
B. Limit the DHCP scope to only have three addresses total
C. Enable the SSID broadcast
D. Enable and configure MAC filtering
E. Change the broadcast channel to a less commonly used channel
Answer: AD
NO.16 Which of the following should Joe, a technician, do FIRST when setting up a SOHO network?
A. Set up an account with an Internet service provider.
B. Create a list of requirements and constraints.
C. Arrange a domain name with a suitable registrar.
D. Choose the correct operating system version.
Answer: B
NO.17 Which of the following network topologies, when a single machine's cable breaks, would only affect one
network device and not the rest of the network?
A. Bus
B. Peer-to-peer
C. Ring
D. Star
Answer: D
NO.18 Joe, a user, is unable to reach websites, but is able to ping several Internet IPv4 addresses. Which of
the following is the MOST likely problem?
A. Incorrect subnet mask
B. Incorrect DNS
C. Missing default gateway
D. Incorrect IPv6 address
Answer: B
NO.19 Joe, a technician, is configuring ports on a switch. He turns off auto-negotiation and sets the port
speed to 1000 Mbps. A user
PC is no longer able to access the network. Which of the following is
MOST likely the problem?
A. The user
NIC does not support 1Gbps
B. The switch is not compatible with 1000Mbps.
C. The user's NIC does not support 100Mbps.
D. Joe needs to restart the DNS server.
Answer: A
NO.20 Which of the following network scanners detects and sends out alerts for malicious network activity?
A. Packet sniffers
B. IDS
C. Port scanners
D. IPS
Answer: B
CompTIA N10-005 시험예상문제
Posted 2013/4/12 3:57:09 | Category: 미분류 | Tag: