[Free] 2018(Mar) EnsurePass Pass4sure CompTIA N10-006 Dumps with VCE and PDF 51-60

Ensurepass.com : Ensure you pass the IT Exams
2018 Mar CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 51 – (Topic 2)

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions?

  1. Network map

  2. Asset management

  3. Change management

  4. Baselines

Answer: B Explanation:

Documenting the location, the user of the device and the date of the reassignment would be part of the asset management.

The best way to keep track of your computers and their configurations is to document them yourself. Large enterprise networks typically assign their own identification numbers to their computers and other hardware purchases as part of an asset management process that controls the entire life cycle of each device, from recognition of a need to retirement or disposal.

Question No: 52 – (Topic 2)

It has been determined by network operations that there is a severe bottleneck on the company#39;s mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network. This is an example of which of the following?

  1. Network device power issues

  2. Network device CPU issues

  3. Storage area network issues

  4. Delayed responses from RADIUS

Answer: B Explanation:

Network processors (CPUs) are used in the manufacture of many different types of network equipment such as routers. Such a CPU on a router could become bottleneck for the network traffic. The routing through that device would then slow down.

Question No: 53 – (Topic 2)

Which of the following protocols must be implemented in order for two switches to share VLAN information?

  1. VTP

  2. MPLS

  3. STP

  4. PPTP

Answer: A


The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to other switches in a group of switches (that is, a VTP domain).

Question No: 54 – (Topic 2)

A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages?

  1. Network analyzer

  2. Packet analyzer

  3. Protocol analyzer

  4. Network sniffer

Answer: A Explanation:

A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network.

Question No: 55 – (Topic 2)

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem?

  1. Username is misspelled is the device configuration file

  2. IDS is blocking RADIUS

  3. Shared secret key is mismatched

  4. Group policy has not propagated to the device

Answer: C Explanation:

AAA through RADIUS uses a Server Secret Key (a shared secret key). A secret key mismatch could cause login problems.

Authentication, authorization, and accounting (AAA) allows anetwork to have a single repository of user credentials. A network administrator can then, for example, supply the same credentials to log in to various network devices (for example, routers and switches). RADIUS and TACACS are protocols commonly used tocommunicate with an AAA server.

Question No: 56 – (Topic 2)

Network segmentation provides which of the following benefits?

  1. Security through isolation

  2. Link aggregation

  3. Packet flooding through all ports

  4. High availability through redundancy

Answer: A Explanation:

Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security through isolation. Advantages of network segmentation:

Improved security: Broadcasts will be contained to local network. Internal network structure will not be visible from outside

Reduced congestion: Improved performance is achieved because on a segmented network there are fewer hosts per subnetwork, thus minimizing local traffic

Containing network problems: Limiting the effect of local failures on other parts of network

Question No: 57 – (Topic 2)

A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access. Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?

  1. DHCP

  2. Split horizon

  3. CIDR

  4. TRUNK

Answer: D Explanation:

We should use trunk ports to set up a VLAN for the laptops that will be used in the auditorium.

A trunk portis a port that is assigned to carry traffic for all the VLANs that are accessible by a specific switch, a process known as trunking. Trunk ports mark frames with unique identifying tags – either 802.1Q tags or Interswitch Link (ISL) tags – as they move between switches. Therefore, every single frame can be directed to its designated VLAN.

Question No: 58 – (Topic 2)

A network technician receives the following alert from a network device: quot;High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54quot; Which of the following is being monitored to trigger the alarm?

  1. Speed and duplex mismatch

  2. Wireless channel utilization

  3. Network device CPU

  4. Network device memory

  5. Interface link status

Answer: E Explanation:

This is an error message that indicates that threshold of high utilization of network interface, in this case interfacegi1/0/24, has been exceeded. The message has been triggered on the interface link status.

Note: gi1/0 would be a gigabyte interface.

Question No: 59 – (Topic 2)

When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?

A. Port mirroring

B. 802.1w

  1. LACP

  2. VTP

Answer: C Explanation:

The Link Aggregation Control Protocol (LACP) enables you to assign multiple physicallinks

to a logical interface, which appears as a single link to a route processor.

Question No: 60 – (Topic 2)

Which of the following requires the network administrator to schedule a maintenance window?

  1. When a company-wide email notification must be sent.

  2. A minor release upgrade of a production router.

  3. When the network administrator#39;s laptop must be rebooted.

  4. A major release upgrade of a core switchin a test lab.

Answer: B Explanation:

During an update of a production router the router would not be able to route packages and the network traffic would be affected. It would be necessary to announce a maintenance window.

In information technologyand systems management, a maintenance window is a period of time designated in advance by the technical staff, during which preventive maintenance that could cause disruption of service may be performed.

100% Ensurepass Free Download!
Download Free Demo:N10-006 Demo PDF
100% Ensurepass Free Guaranteed!
N10-006 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com