[2017-New-Dumps]100% Valid CompTIA N10-006 VCE & PDF 1438Q&As Provided by Braindump2go[81-90]
2017/New N10-006: CompTIA Network+ Certification Exam Questions Updated Today!
1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com: http://www.braindump2go.com/n10-006.html
2.|2017/New N10-006 Exam Questions & Answers: https://1drv.ms/f/s!AvI7wzKf6QBjgWim_TfUZBipTeqP QUESTION 81 A network administrator is tasked with deploying a company-wide wireless system which allows for accurate tracking of employees' wireless device locations via WAP triangulation. Which of the following is the MOST important aspect of the deployment? A. WAP placement B. TX/RX channel C. Signal strength D. Transmission power Answer: A Explanation: Before going ahead with the deployment, the first thing that need to be check is where you are going to place your wireless router so that you can have internet connectivity from every location that you need. QUESTION 82 A network administrator needs to implement a monitoring tool and be able to send log information to a server and receive log information from other clients. Which of the following should be implemented? (Select TWO). A. SNMP B. Network sniffer C. Syslog D. System log E. History log Answer: AC Explanation: Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks". Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. Syslog is a standard for computer message logging. It permits separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. QUESTION 83 Which of the following network appliances will only detect and not prevent malicious network activity? A. IDS B. Network sniffer C. IPS D. Firewall Answer: A Explanation: Anintrusion detection system(IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. QUESTION 84 Ann, a home user, wishes to confine a wireless network to devices ONLY inside of her house. Which of the following will accomplish this? A. Decreasing radio strength B. MAC filtering C. WEP encryption D. SSID broadcast disable Answer: A Explanation: Decreasing Radio Strength will reduce signal strength outside the house and will accomplish what she is intending to do. QUESTION 85 A large company has experienced Internet slowdowns as users have increased their use of the Internet. Which of the following can the Network Administrator use to determine the amount of bandwidth used by type of application? A. Network maps B. Traffic analysis C. Syslog D. ICMP Answer: B Explanation: By traffic analysis administrator will come to wheather user are using bandwidth for right purpose or not. QUESTION 86 An employee connects to a work computer from home via the built-in Windows remote desktop connection. Which of the following is MOST likely being used to establish the connection? A. RDP B. RTP C. RIP D. RAS Answer: A Explanation: Remote Desktop Protocol(RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. QUESTION 87 A user reports intermittent network connectivity. Which of the following should a technician configure on the managed switch to help troubleshoot this issue? A. SMTP B. SNTP C. SNMP D. SNAT Answer: C Explanation: SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host. You can monitor network devices such as servers, workstations, printers, routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet Name Service (WINS). QUESTION 88 Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe? A. Web server B. Syslog C. Network sniffer D. SNMP Answer: C Explanation: Network sniffer is a tool to analyze packets that are being exchanged between the hosts and using this Joe can understand whether there was traffic encountered to server or not which was infected. QUESTION 89 When troubleshooting a connectivity issue, which of the following commands will give the technician a list of the host names connected to the network? A. ping B. nbstat C. arp D. msconfig Answer: B Explanation: TheNbstatcommand is a great command to use when you need to display the NetBIOS over TCP/IP protocol statistics. TheNbstatcommand can also be used to display NetBIOS name tables for both local and remote computers. QUESTION 90 Which of the following WAN technologies has the HIGHEST latency? A. ADSL B. LTE C. Satellite D. WiMAX Answer: C Explanation: Satellite WAN latency is the delay caused by the physical distance a signal must travel from earth, to the satellite, and back to earth to complete a round-trip transmission. Because of the physics involved in the round-trip-time (RTT), end-to-end latency can take 600 milliseconds or more due to geosynchronous satellites orbiting miles above the earth.
!!!RECOMMEND!!! 1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com: http://www.braindump2go.com/n10-006.html
2.|2017/New N10-006 Study Guide:
YouTube Video: YouTube.com/watch?v=wB4oZ7gOluM
|