PrepAway - Latest Free Exam Questions & Answers

Category: N10-006 (v.6)

Briefing N10-006: Network+ Certification (update January 28th, 2018)

which of the following address types?

A host has been assigned the address 169.254.0.1.
This is an example of which of the following address types? client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft.

which of the following subnet masks should Joe use for …

A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers.
In order to conserve address space, which of the following subnet masks should Joe use for this subnet? addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n – 2. The “n” in the host’s formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.

Which of the following is a valid IPv4 loopback address?

A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address? computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.

Which of the following describes an IPv6 address of ::1?

Which of the following describes an IPv6 address of ::1? computer. The loopback interface has no hardware associated with it, and it is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which will point back to the computer’s TCP/IP network configuration.

Which of the following network topologies has a central…

Which of the following network topologies has a central, single point of failure? switch (or a less commonly a hub) form a star network. has a MAC address table which it populates with the MAC address of every device connected to the switch. discover which port the destination computer is connected to. The switch then unicasts the data out through the port that the destination computer is connected to. computers will be able to communicate with each other.

Which of the following topologies would the engineer im…

A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions.
Which of the following topologies would the engineer implement? computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment. uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data before releasing the token. Only a computer in possession of the token can transmit data onto the network.


Page 72 of 74« First...102030...7071727374