Amazing comptia network+ deluxe study guide (exam n10-006) secrets

Exam Code: N10-006 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Network+
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass N10-006 Exam.

2021 Oct n10-006 pdf:

Q31. A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall? 

A. Cable certifier 

B. Multimeter 

C. Cable tester 

D. Toner probe 

Answer: D 

Q32. A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? 

A. PoE 

B. Port bonding 


D. Trunking 

Answer: A 


Wireless network users recently began experiencing speed and performance issues after access point 2 (AP2) was replaced due to faulty hardware. The original network was installed according to a consultant's specifications and has always worked without a problem. 

You, a network technician, have been tasked with evaluating the situation and resolving the issues to improve both performance and connectivity. Refer to the following diagram and perform any NECESSARY changes to the wireless and wired infrastructure by adjusting devices. 

Note: Adjust the LEAST number of devices needed to fix the issue, all blue icons in the image are clickable. When you feel the simulation is complete please select the Done button. 


-Change the speed and duplex settings on AP2 only to 100 and full. -Change the mode to G on AP2 -Change the channel to 6 on AP2 


Since we know that the network was running perfectly before replacing AP2 we should start by 

looking at this new device that was used to replace the old one. Here we see that the other AP’s 

have hard coded the speed and duplex settings to 100/full, while AP2 is set to auto/auto. 

Also, the other AP’s have been configured to use 802.11G, while AP2 is using 802.11B. 

Finally the channel that AP2 is using overlaps with AP1 which can cause problems. Channels 1, 6, 

and 11 are spaced far enough apart that they don’t overlap. On a non-MIMO setup (i.e. 802.11 a, 

b, or g) you should always try to use channel 1, 6, or 11. Since AP1 is using 1, and AP3 is using 

11, AP2 should be using 6. 

Q34. The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue? 


Fast Ethernet 0 is up, line protocol is up 

Int ip address is 

MTU 1500 bytes, BW10000 kbit, DLY 100 usec 

Reliability 255/255, Tx load 1/255, Rx load 1/255 

Encapsulation ospf, loopback not set Keep alive 10 

Half duplex, 100Mb/s, 100 Base Tx/Fx 

Received 1052993 broadcasts 

0 input errors 

983881 packets output, 768588 bytes 

0 output errors, 0 collisions, 0 resets 

A. Set the loopback address 

B. Change the IP address 

C. Change the slash notation 

D. Change duplex to full 

Answer: D 

Q35. A user with a 802.11n WLAN card is connected to a SOHO network and is only able to connect at 11 Mbps with full signal strength. Which of the following standards is implemented on the network? 

A. 802.11a 

B. 802.11ac 

C. 802.11b 

D. 802.11g 

Answer: C 

N10-006 practice question

Renew n10-005 vs 006:


You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. 

Step 1: Select the tool that was used to create the cable test results. 

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button. 


Solution is pending. Please suggest your solution for this simulation question to us. 

Q37. Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? 

A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. 

B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. 

C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies. 

D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks. 

Answer: A 

Q38. A firewall ACL is configured as follows: 

10. Deny Any Trust to Any DMZ eq to TCP port 22 

11. Allow to Any DMZ eq to Any 

12. Allow to Any DMZ eq to TCP ports 80, 443 

13. Deny Any Trust to Any DMZ eq to Any 

A technician notices that users in the network are unable to SSH into servers in the DMZ. The company wants to be able to use any protocol, but restrict the rest of the subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives? 

A. 11, 10, 12, 13 

B. 12, 10, 11, 13 

C. 13, 10, 12, 11 

D. 13, 12, 11, 10 

Answer: A 

Q39. A company has changed ISPs for their office and ordered a new 250 Mbps symmetrical Internet connection. As a result, they have been given a new IP range. The ISP has assigned the company /28. The company gateway router has the following interface configuration facing the ISP: 

Interface A: 

IP address: 

Subnet mask: 

Default gateway: 

Speed: 1000 Mbps 

Duplex: Auto 

State: No Shutdown 

None of the workstations at the company are able to access the Internet. Which of the following are the reasons? (Select TWO). 

A. There is a duplex mismatch between the router and ISP. 

B. The router interface is turned off. 

C. The interface is set to the incorrect speed. 

D. The router is configured with the incorrect subnet mask. 

E. The router interface is configured with the incorrect IP address. 

F. The default gateway is configured incorrectly. 

Answer: EF 

Q40. An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions? 

A. Network map 

B. Asset management 

C. Change management 

D. Baselines 

Answer: B 

see more N10-006 dumps