Archive for the ‘Cabling’ Category

N10 006 Free Demo Questions And Answers}

Monday, December 3rd, 2018

Submitted by: Kevin Renfro

Version: 9.0

Question: 1

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

A. Add a router and enable OSPF.

B. Add a layer 3 switch and create a VLAN.

C. Add a bridge between two switches.

D. Add a firewall and implement proper ACL.

Answer: B


We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs. A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even ifthey are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.

To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a Layer 3 switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header inthe packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 2

The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service?

A. Layer 3 switch

B. Proxy serve

C. Layer 2 switch

D. Smart hu

Answer: A


The question states that the traffic being transported is a mixture of multicast and unicast signals. There are three basic types of network transmissions: broadcasts, which are packets transmitted to every node on the network; unicasts, which are packets transmitted to just one node; and multicasts, which are packetstransmitted to a group of nodes. Multicast is a layer 3 feature of IPv4 & IPv6. Therefore, we would need a layer 3 switch (or a router) to reroute the traffic. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

Question: 3

Which of the following network devices use ACLs to prevent unauthorized access into company systems?


B. Firewall

C. Content filte

D. Load balance

Answer: B


A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. Firewalls use ACLs (access control lists) to determine which traffic is allowed through the firewall. All traffic entering or leaving the intranet passes through the firewall, which examines each message and blocks or allows the message depending on rules specified in the ACL. The rules in the ACL specify which combinations of source IP address, destination address in IP port numbers are allowed.

Question: 4

YouTube Preview Image

Which of the following is used to define how much bandwidth can be used by various protocols on the network?

A. Traffic shaping

B. High availability

C. Load balancing

D. Fault tolerance

Answer: A


If a network connection becomes saturated to the point where there is a significant level of contention, network latency can rise substantially. Traffic shaping is used to control the bandwidth used by network traffic. In a corporate environment, business-related traffic may be given priority over other traffic. Traffic can be prioritized based on the ports used by the application sending the traffic. Delayed traffic is stored in a buffer until the higher priority traffic has been sent.

Question: 5

Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).


B. VTP trunking

C. Virtual PBX


E. 802.1x

Answer: DE

Explanation: D: A RADIUS (Remote Authentication Dial-in User Service) server is a server with a database of user accountsand passwords used as a central authentication database for users requiring network access. RADIUS servers are commonly used by ISPs to authenticate their customers Internet connections. Remote users connect to one or more Remote Access Servers. The remote access servers then forward the authentication requests to the central RADIUS server.

E: 802.1X is an IEEE Standard for Port-based Network Access Control (PNAC). It provides an authentication mechanism to devices wishing to attach to a network. 802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client that wishes to attach to the network. The authenticator is a network device, such as an Ethernet switch, wireless access point or in this case, a remote access server and the authentication server isthe RADIUS server.

Question: 6

Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption?

A. Multifactor authentication



D. Network access control

Answer: C


TACACS+ (Terminal Access Controller Access-Control System Plus) is a protocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required.

Question: 7

A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases

B. Helper addresses

C. Scopes

D. Reservations

Answer: D


A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address of the network interface card that should receive the IP address.For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.

Question: 8

Joe, a network technician, is setting up a DHCP server on a LAN segment. Which of the following options should Joe configure in the DHCP scope, in order to allow hosts on that LAN segment using dynamic IPaddresses, to be able to access the Internet and internal company servers? (Select THREE).

A. Default gateway

B. Subnet mask

C. Reservations

D. TFTP serve

E. Lease expiration time of 1 day

F. DNS servers

G. Bootp

Answer: ABF


The question states that the client computers need to access the Internet as well as internal company servers. To access the Internet, the client computers need to be configured with an IP address with a subnet mask (answer B) and the address of the router that connects the company network to the Internet. This is known as the default gateway (answer A).To be able to resolve web page URLs to web server IP addresses, the client computers need to be configured with the address of a DNS server (answer F).

Question: 9

A technician just completed a new external website and setup access rules in the firewall. After some testing, only users outside the internal network can reach the site. The website responds to a ping from the internal network and resolves the proper public address. Which of the following could the technician do to fix this issue while causing internal users to route to the website using an internal address?

A. Configure NAT on the firewall

B. Implement a split horizon DNS

C. Place the server in the DMZ

D. Adjust the proper internal ACL

Answer: B


Split horizon DNS (also known as Split Brain DNS) is a mechanism for DNS servers to supply different DNS query results depending on the source of the request. This can be done by hardware-based separation but is most commonly done in software. In this question, we want external users to be able to access the website by using a public IP address. To do this, we would have an external facing DNS server hosting a DNS zone for the website domain. For the internal users, we would have an internal facing DNS server hosting a DNS zone for the website domain. The externalDNS zone will resolve the website URL to an external public IP address. The internal DNS server will resolve the website URL to an internal private IP address.

Question: 10

When configuring a new server, a technician requests that an MX record be created in DNS for the new server, but the record was not entered properly. Which of the following was MOST likely installed that required an MX record to function properly?

A. Load balance

B. FTP serve

C. Firewall DMZ

D. Mail serve

Answer: D


A mail exchanger record (MX record) is a DNS record used by email servers to determine the name of the email server responsible for accepting email for the recipients domain. For example a user sends an email to The sending users email server will query the DNS zone for an MX record for the domain. The MX record will specify the hostname ofthe email server responsible for accepting email for the domain, for example, The sending email server will then perform a second DNS query to resolve to an IP address. The sending mail server will then forward the email to the destination mail server.

Question: 11

Which of the following protocols uses label-switching routers and label-edge routers to forward traffic?





Answer: D


In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself.MPLS works by prefixing packets with an MPLS header, containing one or more labels. An MPLS router that performs routing based only on the label is called a label switch router (LSR) or transit router. This is a type of router located in the middle of a MPLS network. It is responsible for switching the labelsused to route packets. When an LSR receives a packet, it uses the label included in the packet header as an index to determine the next hop on the label-switched path (LSP) and a corresponding label for the packet from a lookup table. The old label is then removed from the header and replaced with the new label before the packet is routed forward. A label edge router (LER) is a router that operates at the edge of an MPLS network and acts as the entry and exit points for the network. LERs respectively, add an MPLS label onto an incoming packet and remove it offthe outgoing packet.When forwarding IP datagrams into the MPLS domain, an LER uses routing information to determine appropriate labels to be affixed, labels the packet accordingly, and then forwards the labelled packets into the MPLS domain. Likewise, upon receiving a labelled packet which is destined to exit the MPLS domain, the LER strips off the label and forwards the resulting IP packet using normal IP forwarding rules.

Question: 12

Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch

B. Access point

C. Analog modem

D. DOCSIS modem

Answer: C


Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By todays standards, analog modems are very slow typically offering a maximum bandwidth of 56Kbps. An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computer to an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer. An analog modem uses an RJ-11 connector to connect to a phone line (POTS) in the same way a phone does.

About the Author: Test Information:Total Questions: 323Test Number: N10-006Vendor Name: CompTIACert Name: CompTIA Network+Test Name: CompTIA Network+ Certification ExamOfficial Site:

For More Details:

Get20% Immediate Discount on Full Training MaterialDiscount Coupon Code: 79741B6012


Permanent Link:}

Vo Ip The Best &Amp; Cheapest Communication Option For Any Business

Monday, October 8th, 2018

Submitted by: Syedumair Hashmi

VoIP, in simple words, is the transfer of your voice through the means of the Internet. Getting incredibly popular now-a-days, it is something you must learn about.

Voice over Internet Protocol or VoIP is also commonly termed as Internet Telephony or IP Telephony, voice over broadband or broadband phone and broadband telephony. Interesting names, but what actually Is VoIP?

It is a technique to transmit voice calls over IP based networks. In other words, it is just another way of making calls; however instead of using the traditional phone line, here we make a call over VoIP broadband Internet connection. With this service you don’t even require a handset, just the Internet connection and your computer to receive telephone calls. For instance, an individual making calls to his/her friends outside or within the office through his computer, or maybe contacting some other people who use VoIP services anywhere in the world where an Internet connection is available.

Why VoIP?

Cost Effective: – The foremost reason that VoIP is most preferable is that it is cost-effective. It is cheaper than telephone networks and offers inexpensive domestic or international long distance rates.

YouTube Preview Image

More Functions: – It contains more functions than any land based telephone services. VoIP is not only limited to voice-to-voice exchanges but also allows the caller to exchange or transfer pictures, text, video and other files.

Exciting Features:- Voice mail, call diversion, call waiting, caller display, a dedicated fax line, call waiting, call diversion and 3-way conferencing makes it interesting.

Conference Calls:- With VoIP, the calls are not just restricted to two people, as it provides conference call options to be conducted at the same time with multiple number of people.

Flexibility: – VoIP is portable. The wireless connection option makes it all the more flexible and ensures mobility.

Gaining Importance in Small businesses

VoIP is swiftly gaining in importance as a standalone set up and the best alternative option to the traditional phone set. Various small businesses can be benefited with the use of VoIP as it can reduce the communication cost while keeping the functionality of their communication network intact. Also it allows smooth flow of data/fax transfer and streamlined video conferencing. If your company has branches overseas or within the country, then opting for VoIP services would be a wise and profitable decision for your business. It offers voice quality and reliability, saves a lot of time, human resources, money, etc. which are required for professional ongoing business needs.

VoIP and Reselling

VoIP is one of the business sectors which are growing at a rapid rate today. The possibilities with VoIP are endless. Everybody needs phone services and you can help them by offering cheaper service. Many people buy VoIP since it is affordable and convenient. You could establish your own brand name with effective and high quality products. Starting up your own VoIP business could be expensive however there are many VoIP companies that do offer start-up businesses in terms of reseller and affiliate programs.

To become a VoIP reseller is a challenging task, however the catch is to build the VoIP Company on your own from scratch and sell VoIP services. In the reseller business, you would be your own brand and can set whatever price you think is appropriate for the service. Get involved in market research and reach out to your potential customers. VoIP reselling comes up as a successful idea; however you must have a computer and some technical knowledge. You may also start as an affiliate and promote a particular VoIP company on his/her website. This way you can receive a fixed commission for sales and links and signing up new users.

Purchasing VoIP Service

Undoubtedly, VoIP can transform your small business into an expense saving and highly profitable business. It is an easy way to save on your business’s telecom bill. It provides services that are low cost but provide high end features. So if you are planning to purchase VoIP service for your business, then you can wisely browse through a good web shop which deals in VoIP providers business. You should take numerous points into account while selecting a VoIP service like the cost, support, emergency calls, contracts, compatibility with existing phones, upgrading, the service provider s reliability, the actual service, etc.

About the Author: The author of this article works with Breezecom which is associated with VoIP termination services in the Indian subcontinent and the Middle East.Website:


Permanent Link:

A Wish List Of I Pad Accessories

Friday, June 30th, 2017

Click Here For More Specific Information On:

Submitted by: Stewart Wrighter

You are the proud owner of an Apple device and, as such, you live in mortal fear of having something happen to it. If you take good care of your gadget you should never have to go through the headache of having it fixed. Nonetheless, if due to unforeseen circumstances you require iPhone screen repair or iPad Repair services, you will easily find them online.

Happily, nothing could be further from your mind when you buy your iPad then having it repaired. At this moment, bear in mind that your device can be even more of a joy if you purchase the right accessories for it. Here is a list for your consideration:

A Case There is a collection of leather cases, silicon skins, and rubber cases from which to choose. They provide protection against scratches and bumps.

A Screen Protector These are custom made and protect the LCD from dust, fingerprints and scratches.

The Camera Connection Kit It allows you to display your digital photos and to upload them faster. It can even go as far as turning your device into a clear high resolution camera you can use to record special moments.

YouTube Preview Image

The Wireless Bluetooth Keyboard By using this accessory you turn your gadget into a monitor. It synchronizes quickly with the device through Bluetooth. You can transport it easily.

Batteries An extra battery is never a bad thing to have around. You want to have your device powered up when needed.

A Bluetooth Headset You can listen to your favorite songs while working or moving around another part of your house. There would not be any wires preventing your free movement.

A Data Cable You can use it to connect your PC and iPad and transfer data from one to the other. This is a great way to backup important files.

A Wired Headset When listening to music or watching a film on your device, you can use the wired headset accessory to enjoy the rich sounds of the feature stereo output.

Speakers and mounts These give you the option of turning your device into a PC. The mount, keyboard, and speakers give you an enhanced PC feel.

A MicroVision ShowWX+ Pico Projector This projector displays video up to 100 inches wide. You can share whatever is on your screen with a small group of people.

A Bluetooth Speaker It is called the Jambox. It is made of rubber and easy to transport.

A Wall Mount The name is PadTab and it allows you to mount your tablet and view it in portrait or landscape mode.

This is a small list of suggestions for you to choose from wisely. There are many accessories out there for the iPad and many more that get launched regularly. If you go online and do some detailed research you will find the names, manufacturers, features, benefits, and prices of all these goodies. The real problem will be choosing only a few. Remember, you cannot have it all.

About the Author: Stewart Wrighter thinks that the

iphone screen repair

services on the internet are a good thing. His son recently ordered

ipad repair

services on the internet.


Permanent Link: