Adobe certification Adobe
Apple certification Apple
Avaya certification Avaya
BlackBerry certification BlackBerry
CA Technologies certification CA Technologies
Check Point certification Check Point
Cisco certification Cisco
Citrix certification Citrix
CIW certification CIW
CompTIA certification CompTIA
CWNP certification CWNP
EC-Council certification EC-Council
EMC certification EMC
Exin certification Exin
FileMaker certification FileMaker
Fortinet certification Fortinet
GIAC certification GIAC
GIAC certification Google
HP certification HP
HRCI certification HRCI
IBM certification IBM
Isaca certification Isaca
ISC certification ISC
ISEB certification ISEB
iSQI certification iSQI
Juniper certification Juniper
LPI certification LPI
McAfee certification McAfee
NetApp certification NetApp
Oracle certification Oracle
Pegasystems certification Pegasystems
PMI certification PMI
Riverbed certification Riverbed
SAP certification SAP
SAS certification SAS Institute
SOA certification SOA
Symantec certification Symantec
Teradata certification Teradata
VMware certification VMware
All Exams

CompTIA N10-004 Exam - CertifySky.com

Free N10-004 Sample Questions:

1. In the OSI model, which of the following layers would be the cause of a session timeout
while browsing the web?
A.Layer 2
B.Layer 3
C.Layer 5
D.Layer 7
Answer: C

2. Which of the following network hardware allows the MOST network traffic collisions?
A.WAP
B.Hub
C.Switch
D.Router
Answer: B

3. Which of the following does a star ring topology use for data transfer?
A.CSMA/CD
B.CSMA/CA
C.CHAP
D.Token passing
Answer: D

4. On a Windows network, users are reporting that they cannot access any network resources. The users can ping the IP address and connect to the network resource using the IP address. Which of the following is the cause of the problem?
A.The file server is offline.
B.The DNS server is not resolving correctly.
C.The DHCP server is not assigning correct IP addresses.
D.The domain controller is not responding.
Answer: B

5. Which of the following is a valid IP address in the public addressing scheme?
A.10.20.1.1
B.168.192.10.1
C.233.10.20.1
D.172.20.10.1
Answer: B

6. A computer configured to use DHCP cannot locate a DHCP server. Automatic Private IP Address
(APIPA) will assign which of the following addresses?
A.172.16.1.25
B.169.254.1.25
C.10.16.1.25
D.192.168.1.25
Answer: B

7. A user reports that when the phone rings in their house the wireless on their laptops becomes
disconnected. Which of the following BEST describes the issue?
A.The cordless phones are plugged into same outlet as the router
B.The cordless phones are 5.8Ghz which interferes with wireless
C.The cordless phones are 2.4Ghz which interferes with wireless
D.The cordless phones are plugged into the RJ11 jack
Answer: C

8. For an enterprise to use one of the reserved private IP address ranges, as best practice they should coordinate with:
A.their legal department.
B.IANA.
C.IEEE.
D.their IT department.
Answer: D

9. Which of the following utilities will produce the results printed below?
Tracing route to 172.30.0.78 over a maximum of 30 hops
1 <1 ms <1 ms172.30.0.78
A.tracert
B.ping
C.arp
D.netstat
Answer: A

10. A network technician is installing a small wireless network. A requirement is that individual users must authenticate using usernames and passwords. Which of the following technologies would support users authenticating with encrypted usernames and passwords?
A.WPA TLS
B.WPA PEAP
C.64bit WEP
D.128bit WEP
Answer: B

11. Which of the following cables would a technician make in order to identify a physical interface
problem?
A.Serial
B.Loopback
C.Rollover
D.Console
Answer: B

12. A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?
A.Load balancing
B.QoS
C.High availability
D.Fault tolerance
Answer: D

13. A user reports that the wireless network is slow and is able to see and access shared folders that are unknown to the user. Which of the following is the cause of the problem?
A.The SSID broadcast is disabled.
B.Wireless router is improperly configured.
C.The user is connecting to the wrong SSID.
D.The wireless NIC is defective.
Answer: C

14. Which of the following security mitigation techniques is the MOST effective against zeroday
attacks?
A.Update antivirus definitions
B.MAC filtering
C.Effective security policies
D.User awareness training
Answer: D

15. Which of the following network protocols is used to ensure consistent time across network devices on the domain?
A.NTP
B.FTP
C.RTP
D.IGMP
Answer: A

16. Which of the following is resistant to crosstalk?
A.1000BaseT
B.10GBaseCX
C.100BaseFX
D.STP
Answer: C

17. A network administrator has been receiving work orders about poor voice quality crossing a branch T1. The cause is determined to be users running high bandwidth file sharing applications across the T1 sending large packets delaying the smaller voice streams. Which of the following would improve voice quality?
A.Configure traffic shaping to reduce the bandwidth available to the file sharing application.
B.Configure a separate VLAN for the IP phones.
C.Install a content caching proxy at the branch to reduce inbound WAN traffic.
D.Upgrade switches to provide higher bandwidth ports for workstations and IP phones.
Answer: A

18. Which of the following devices is used to connect a WAN to a LAN?
A.Basic router
B.Basic switch
C.Bridge
D.Repeater
Answer: A

19. A new segment needs to be added to a network to provide access for 64 servers. Which of the
following subnets will provide the needed access and still conserve IP addresses?
A.192.168.1.0/26
B.192.168.1.0/23
C.192.168.1.0/24
D.192.168.1.0/25
Answer: D

20. PPTP is a combination of which of the following protocols? (Select TWO).
A.PPP
B.TCP/IP
C.TCP
D.POP3
E.PPPoE
Answer: AB