CompTIA Network+ Practice Exam 6 N10-005 CompTIA Network+ Practice Exam 6 N10-005 The OSI model uses an encapsulation method to describe the data as it is encapsulated at each layer of the OSI. What is the encapsulation named at the Data Link layer? Bits Packets Frames Data Segments At which of the following layers of the OSI network model does a network adapter work? Layer 1 Layer 2 Layer 3 Layer 4 You want to stop a hacker in their tracks. Which of the following devices are proactive in providing this service? Access control list (ACL) Content filtering Security zones Intrusion Prevention System (IPS) Network Address Translation Virtual LAN’s If you wanted to verify the local IP stack on your computer, what would you do? ping 127.0.0.0 ping 127.0.0.1 telnet 1.0.0.127 ping 127.0.0.255 telnet 255.255.255.255 Which tool is used to attach ends to network cables? Punch-down tool Crimper VLAN tool Strippers ARP tool A workstation gives an error message to a user. The message states that a duplicate IP address has been detected on the network. After developing a hypothesis, what should the next step be according to the standard troubleshooting model? Test and observe an action plan. Determine if anything has changed. Implement an action plan. Document the solution and the entire process’ lists Which three of the following are types of denial of service attacks? Ping of Death Stacheldraht SYN flood Virus FloodSyn Which of the following protocol suites includes RTMP? AppleTalk IPX/SPX TP/IP NetBEUI Most Application-layer protocols only use UDP or TCP at the Transport layer. Which of the following could use both? TCP Microsoft Word Telnet DNS You want your users to log in and authenticate before they can get onto your network. Which of the following services would you use? RADIUS TACACS+ Virtual Network Computing Remote desktop protocol Loading … Question 1 of 10 More Tests A+ Practice Test A+ 220-901 and 220-902 Practice Test Network+ Practice Test Security+ Practice Test