This page was exported from Quickly Pass Test With Lead2pass New Brain Dumps [ ] Export date:Wed Jul 28 20:49:30 2021 / +0000 GMT ___________________________________________________ Title: [Lead2pass New] Lead2pass CompTIA New Exam N10-006 VCE Files Free Instant Download (651-675) --------------------------------------------------- Lead2pass 2017 November New CompTIA N10-006 Exam Dumps! 100% Free Download! 100% Pass Guaranteed! If you are worried about your N10-006 exam and you are not prepared so, now you don't need to take any stress about it. Get most updated N10-006 braindumps with 100% accurate answers. is considered one of the best website where you can save extra money by getting 150-days of free updates after buying the N10-006 dumps practice exam. Following questions and answers are all new published by CompTIA Official Exam Center: QUESTION 651A network technician needs to install an additional access point to the company's wireless network. The network has two 802.11b access points. Which of the following channels should be used to allow the access point's coverage areas to overlap? A.    1, 6, 11B.    2, 5, 10C.    3, 13, 23D.    4, 8, 16Answer: A QUESTION 652Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue? A.    Change the security methodB.    Reduce the transmission powerC.    Change the SSIDD.    Change the frequency Answer: B QUESTION 653An 801.11g wireless access point was configured as follows: - AP encryption forced to WPA2-AES mode only- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40 Which is true about the above configuration? A.    Any 802.11b/g compatible client can connect to the wireless network if they support TKIP, the MAC address is 00-ab-29-da-c3-40, and the encryption key is known by the client.B.    An 802.11a compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.C.    An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.D.    Any 802.11g compatible client can connect to the wireless network if the encryption key is known by the client. Answer: C QUESTION 654Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks? A.    PPPoE authenticationB.    MAC filteringC.    WPA encryptionD.    Wireless channel Answer: D QUESTION 655A company only wants preapproved laptops to be able to connect to a wireless access point.Which of the following should be configured? A.    SSID disableB.    ACL rulesC.    WPA encryptionD.    MAC filtering Answer: D QUESTION 656company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this? A.    Content filtering on the wireless access pointB.    Allow traffic from the wireless access pointC.    Block traffic from the wireless access pointD.    Packet filtering on the wireless access point Answer: C QUESTION 657Which of the following occurs when antenna gain is increased on an access point? A.    Connection speeds decreaseB.    Throughput decreasesC.    Cell size increasesD.    Attenuation increases Answer: C QUESTION 658Which of the following technologies allows more than two transceivers with an access point? A.    MIMOB.    FIFOC.    802.1xD.    WPA Answer: A QUESTION 659Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO). A.    WPA encryptionB.    Changing wireless channelsC.    MAC filteringD.    Changing wireless speed standardsE.    SSID disable Answer: AC QUESTION 660Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate? A.    Enable mixed modeB.    Disable SSIDC.    Disable encryptionD.    Enable `n' only mode Answer: A QUESTION 661Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the following would MOST likely fix this issue? A.    Enable wireless multimedia (WMM) for QoSB.    Use the 40MHz channels in the 2.4GHz bandC.    Enable access point antenna isolationD.    Limit the clients to 802.11g compatible laptops Answer: A QUESTION 662Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following features are the MOST important for the new switch to support? A.    PoE and QoSB.    LACP and OSPFC.    802.1x and 802.11nD.    NAT and VTP Answer: A QUESTION 663Which of the following would Kim, a technician, do to monitor remote traffic through an access point? A.    Enable an SNMP agentB.    Enable network mappingC.    Set monitoring SSIDD.    Select WPA2 Answer: A QUESTION 664Which of the following solutions will detect and disable a rogue access point? A.    Port scanB.    Packet snifferC.    IPSD.    IDS Answer: C QUESTION 665When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address? A.    pingB.    arpC.    routeD.    dig Answer: B QUESTION 666Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution would provide the BEST solution? A.    Private IP AddressingB.    Wireless Access PointsC.    Wide Area NetworkingD.    Virtual Local Area Networks Answer: B QUESTION 667A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity? A.    Disable SSID broadcastB.    Increase the signal strengthC.    Move the access pointD.    Change the broadcast channel Answer: C QUESTION 668A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (Select TWO). A.    RouterB.    Wi-Fi Access pointC.    Cable modemD.    Ten WiMAX adaptersE.    Ten CAT6 patch cables Answer: AB QUESTION 669Which of the following security threats relies primarily on user deception and misinformation? A.    Rogue access pointsB.    DoS attacksC.    Man-in-the-middle attacksD.    Phishing Answer: D QUESTION 670A network technician is sent to troubleshoot a phone line in the building. The user reports a dial tone is not available when attempting to place a call. Which of the following tools should the technician utilize in this scenario? A.    Protocol analyzerB.    Punch down toolC.    MultimeterD.    Toner probe Answer: D QUESTION 671Which of the following WAN technology types are mainly used over POTS lines to provide Internet connectivity? (Select TWO). A.    DialupB.    DSLC.    SONETD.    CableE.    WiMAXF.    LTE Answer: AB QUESTION 672Which of the following connector types is MOST commonly used for serial connections? A.    MTRJB.    RJ-11C.    RS-232D.    RJ-45 Answer: C QUESTION 673A technician needs to restrict access to a SOHO wireless network to specific devices. Which of the following would MOST likely be used with minimal client configuration? A.    Port filteringB.    WEPC.    MAC address filteringD.    PoE Answer: C QUESTION 674Which of the following is described by the MAC address FF:FF:FF:FF:FF:FF? A.    Unicast MAC address.B.    Invalid MAC address.C.    Multicast MAC address.D.    Broadcast MAC address. Answer: D QUESTION 675Which of the following 802.11 standards can operate at both 2.4Ghz and 5.0Ghz? A.    aB.    bC.    gD.    n Answer: D More free Lead2pass N10-006 exam new questions on Google Drive: With the complete collection of N10-006 exam questions and answers, Lead2pass has assembled to take you through N10-006 dumps Questions and Answers for your Exam preparation. In this N10-006 exam we have compiled real exam questions with their answers so that you can prepare and pass exam in your first attempt. 2017 CompTIA N10-006 (All 1521 Q&As) exam dumps (PDF&VCE) from Lead2pass: [100% Exam Pass Guaranteed] --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2017-11-22 09:37:57 Post date GMT: 2017-11-22 09:37:57 Post modified date: 2017-11-22 09:37:57 Post modified date GMT: 2017-11-22 09:37:57 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from