ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

802.11ac
802.11ac
802.11ax
802.11ax
802.11g
802.11g
802.11n
802.11n
Suggested answer: B
Explanation:

802.11ax is the latest WiFi standard that improves WiFi performance in densely populated environments and supports both 2.4 GHz and 5 GHz bands. 802.11ac is the previous standard that only supports 5 GHz band. 802.11g and 802.11n are older standards that support 2.4 GHz band only or both bands respectively. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.techtarget.com/searchnetworking/tip/Whats-the-difference-between-80211ax-vs- 80211ac

asked 02/10/2024
Ajay Vijayan
34 questions

Question 2

Report Export Collapse

Which of the following would be BEST to use to detect a MAC spoofing attack?

Internet Control Message Protocol
Internet Control Message Protocol
Reverse Address Resolution Protocol
Reverse Address Resolution Protocol
Dynamic Host Configuration Protocol
Dynamic Host Configuration Protocol
Internet Message Access Protocol
Internet Message Access Protocol
Suggested answer: B
Explanation:

Reverse Address Resolution Protocol (RARP) is a protocol that allows a device to obtain its MAC address from its IP address. A MAC spoofing attack is an attack where a device pretends to have a different MAC address than its actual one. RARP can be used to detect a MAC spoofing attack by comparing the MAC address obtained from RARP with the MAC address obtained from other sources, such as ARP or DHCP. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.techopedia.com/definition/25597/reverse-address-resolution-protocol-rarp

asked 02/10/2024
Thijs van Ham
36 questions

Question 3

Report Export Collapse

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

NetFlow analyzer
NetFlow analyzer
Bandwidth analyzer
Bandwidth analyzer
Protocol analyzer
Protocol analyzer
Spectrum analyzer
Spectrum analyzer
Suggested answer: D
Explanation:

A spectrum analyzer is a tool that measures the frequency and amplitude of signals in a wireless network. It can be used to troubleshoot issues related to interference from other networks and non- 802.11 devices, such as microwave ovens or cordless phones, by identifying the sources and levels of interference in the wireless spectrum. A spectrum analyzer can also help to optimize the channel selection and placement of wireless access points. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.flukenetworks.com/blog/cabling-chronicles/what-spectrum-analyzer- and-how-do-you-use-it

asked 02/10/2024
Heritier kandolo
47 questions

Question 4

Report Export Collapse

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

Verify the session time-out configuration on the captive portal settings
Verify the session time-out configuration on the captive portal settings
Check for encryption protocol mismatch on the client’s wireless settings
Check for encryption protocol mismatch on the client’s wireless settings
Confirm that a valid passphrase is being used during the web authentication
Confirm that a valid passphrase is being used during the web authentication
Investigate for a client’s disassociation caused by an evil twin AP
Investigate for a client’s disassociation caused by an evil twin AP
Suggested answer: A
Explanation:

A captive portal is a web page that requires users to authenticate before they can access the internet. If the session time-out configuration is too short, users may experience intermittent internet connectivity and have to reconnect using the web authentication process each time. The network administrator can verify the session time-out configuration on the captive portal settings and adjust it if needed. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 1.0 Network Architecture, Objective 1.8 Explain the purposes and use cases for advanced networking devices.

asked 02/10/2024
Lourdhureddy Kommareddy
29 questions

Question 5

Report Export Collapse

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

Evil twin
Evil twin
Tailgating
Tailgating
Piggybacking
Piggybacking
Shoulder surfing
Shoulder surfing
Suggested answer: B
Explanation:

Tailgating is a physical security attack where an unauthorized person follows an authorized person into a restricted area without proper identification or authorization. The network administrator prevented this attack by stopping and directing the person to the security desk. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 3.0 Network Security, Objective 3.1 Compare and contrast risk-related concepts.

asked 02/10/2024
adnan reubin
30 questions

Question 6

Report Export Collapse

A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?

Layer 1
Layer 1
Layer 2
Layer 2
Layer 3
Layer 3
Layer 4
Layer 4
Layer 5
Layer 5
Layer 6
Layer 6
Layer 7
Layer 7
Suggested answer: A
Explanation:

CRC errors are cyclic redundancy check errors that occur when data is corrupted during transmission. CRC errors are usually caused by physical layer issues such as faulty cables, connectors, ports, or interference. The network administrator will most likely start to troubleshoot at layer 1 of the OSI model, which is the physical layer that deals with the transmission of bits over a medium. Reference:

CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 4.0 Network Troubleshooting and Tools, Objective 4.1 Given a scenario, implement network troubleshooting methodology.

asked 02/10/2024
Vusani Nedzungani
50 questions

Question 7

Report Export Collapse

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)

CPU usage
CPU usage
Memory
Memory
Temperature
Temperature
Bandwidth
Bandwidth
Latency
Latency
Jitter
Jitter
Suggested answer: A, B
Explanation:

The question asks about the metrics that will most accurately show the underlying performanceissues of slow or unresponsive desktops for users who are using VMs (virtual machines).VMs are software-based simulations of physical computers that run on a host system. Theyshare the resources of the host system, such as CPU, memory, disk space, etc.If the host system does not have enough resources to support the number of VMs running on it,the performance of the VMs will suffer. This is especially true if the VMs are running resource-intensive applications or tasks.Therefore, the metrics that will most accurately show the underlying performance issuesareCPU usageandmemory. These metrics indicate how much of the host system's resources arebeing consumed by the VMs and how much is available for other processes.The other metrics are not relevant to the question, as they are related to the networkperformance, not the host system performance. They are:Temperature: the measure of how hot the host system or its components are. Hightemperature can cause overheating and damage to the hardware, but it is not directly relatedto the performance of the VMs.Bandwidth: the measure of how much data can be transferred over a network connection in agiven time. Low bandwidth can cause network congestion and slow data transfer, but it is notdirectly related to the performance of the VMs.Latency: the measure of how long it takes for a data packet to travel from one point to anotheron a network. High latency can cause delays and poor quality of service, but it is not directlyrelated to the performance of the VMs.Jitter: the measure of how much the latency varies over time on a network. High jitter cancause inconsistent and unpredictable network performance, but it is not directly related to theperformance of the VMs.

CompTIA Network+ N10-008 Study Guide, Chapter 1: Networking Concepts, Section 1.3:Virtualization and Network Storage Technologies, Pages 34-36Professor Messer's CompTIA N10-008 Network+ Course, Video 1.3: Virtualization and NetworkStorage Technologies, Part 1

asked 02/10/2024
mohamed mamdouh
43 questions

Question 8

Report Export Collapse

Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?

Install load balancers
Install load balancers
Install more switches
Install more switches
Decrease the number of VLANs
Decrease the number of VLANs
Reduce the lease time
Reduce the lease time
Suggested answer: D
Explanation:

To resolve the issue of DHCP scope exhaustion without creating a new DHCP pool, the administrator can reduce the lease time. By decreasing the lease time, the IP addresses assigned by DHCP will be released back to the DHCP scope more quickly, allowing them to be assigned to new devices.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: The OSI Model and Networking Protocols, Objective 2.3: Given a scenario, implement and configure the appropriate addressing schema.

https://www.networkcomputing.com/data-centers/10-tips-optimizing-dhcp-performance

asked 02/10/2024
Norman Camacho
47 questions

Question 9

Report Export Collapse

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?

Spanning Tree Protocol
Spanning Tree Protocol
Neighbor Discovery Protocol
Neighbor Discovery Protocol
Link Aggregation Control Protocol
Link Aggregation Control Protocol
Address Resolution Protocol
Address Resolution Protocol
Suggested answer: B
Explanation:

Short The switch feature that is most likely to be used to assist with logging IPv6 and MAC addresses of devices on a network segment is Neighbor Discovery Protocol (NDP). NDP is used by IPv6 to discover and maintain information about other nodes on the network, including their IPv6 and MAC addresses. By periodically querying NDP, the administrator can log this information for auditing purposes.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: The OSI Model and Networking Protocols, Objective 2.1: Compare and contrast TCP and UDP ports, protocols, and their purposes.

asked 02/10/2024
Kajenthiran Varnamyilvaganam
47 questions

Question 10

Report Export Collapse

Which of the following DNS records works as an alias to another record?

AAAA
AAAA
CNAME
CNAME
MX
MX
SOA
SOA
Suggested answer: B
Explanation:

The DNS record that works as an alias to another record is called CNAME (Canonical Name). CNAME records are used to create an alias for a domain name that points to another domain name.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: The OSI Model and Networking Protocols, Objective 2.3: Given a scenario, implement and configure the appropriate addressing schema.

asked 02/10/2024
Tim Dekker
37 questions
Total 865 questions
Go to page: of 87
Search

Related questions