PrepAway - Latest Free Exam Questions & Answers

Category: N10-006 (v.5)

Exam N10-006: Network+ Certification (update August 3rd, 2017)

which of the following layers of the OSI model is the p…

A network administrator is using a packet analyzer to determine an issue on the local LAN. Two separate
computers are showing an error message on the screen and are unable to communicate with other computers
in the same lab. The network administrator looks at the following output:
SRC MACSRC IPDST MACDST IP
00:1D:1F:AB:10:7D192.168.1.10:200015:BE:9F:AB:10:1D192.168.1.14:1200
05:DD:1F:AB:10:27192.168.1.10:100022:C7:2F:AB:10:A2192.168.1.15:1300
Given that all the computers in the lab are directly connected to the same switch, and are not using any
virtualization technology, at which of the following layers of the OSI model is the problem occurring?

which of the following layers of the OSI model was the …

A network engineer is dispatched to an employee office to troubleshoot an issue with the employee’s laptop.
The employee is unable to connect to local and remote resources. The network engineer flips the laptop’s
wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue
resolved?

Which of the following would be the result of this action?

A network technician is troubleshooting a problem at a remote site. It has been determined that the connection
from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects
the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface.
Which of the following would be the result of this action?

which the malicious user gained access to the switches?

Two weeks after installation, a network technician is now unable to log onto any of the newly installed company
switches. The technician suspects that a malicious user may have changed the switches’ settings before they
were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained
access to the switches?


Page 38 of 51« First...102030...3637383940...50...Last »