ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

Related questions











A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

A.
802.11ac
A.
802.11ac
Answers
B.
802.11ax
B.
802.11ax
Answers
C.
802.11g
C.
802.11g
Answers
D.
802.11n
D.
802.11n
Answers
Suggested answer: B

Explanation:

802.11ax is the latest WiFi standard that improves WiFi performance in densely populated environments and supports both 2.4 GHz and 5 GHz bands. 802.11ac is the previous standard that only supports 5 GHz band. 802.11g and 802.11n are older standards that support 2.4 GHz band only or both bands respectively. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.techtarget.com/searchnetworking/tip/Whats-the-difference-between-80211ax-vs- 80211ac

Which of the following would be BEST to use to detect a MAC spoofing attack?

A.
Internet Control Message Protocol
A.
Internet Control Message Protocol
Answers
B.
Reverse Address Resolution Protocol
B.
Reverse Address Resolution Protocol
Answers
C.
Dynamic Host Configuration Protocol
C.
Dynamic Host Configuration Protocol
Answers
D.
Internet Message Access Protocol
D.
Internet Message Access Protocol
Answers
Suggested answer: B

Explanation:

Reverse Address Resolution Protocol (RARP) is a protocol that allows a device to obtain its MAC address from its IP address. A MAC spoofing attack is an attack where a device pretends to have a different MAC address than its actual one. RARP can be used to detect a MAC spoofing attack by comparing the MAC address obtained from RARP with the MAC address obtained from other sources, such as ARP or DHCP. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.techopedia.com/definition/25597/reverse-address-resolution-protocol-rarp

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

A.
NetFlow analyzer
A.
NetFlow analyzer
Answers
B.
Bandwidth analyzer
B.
Bandwidth analyzer
Answers
C.
Protocol analyzer
C.
Protocol analyzer
Answers
D.
Spectrum analyzer
D.
Spectrum analyzer
Answers
Suggested answer: D

Explanation:

A spectrum analyzer is a tool that measures the frequency and amplitude of signals in a wireless network. It can be used to troubleshoot issues related to interference from other networks and non- 802.11 devices, such as microwave ovens or cordless phones, by identifying the sources and levels of interference in the wireless spectrum. A spectrum analyzer can also help to optimize the channel selection and placement of wireless access points. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.flukenetworks.com/blog/cabling-chronicles/what-spectrum-analyzer- and-how-do-you-use-it

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

A.
Verify the session time-out configuration on the captive portal settings
A.
Verify the session time-out configuration on the captive portal settings
Answers
B.
Check for encryption protocol mismatch on the client’s wireless settings
B.
Check for encryption protocol mismatch on the client’s wireless settings
Answers
C.
Confirm that a valid passphrase is being used during the web authentication
C.
Confirm that a valid passphrase is being used during the web authentication
Answers
D.
Investigate for a client’s disassociation caused by an evil twin AP
D.
Investigate for a client’s disassociation caused by an evil twin AP
Answers
Suggested answer: A

Explanation:

A captive portal is a web page that requires users to authenticate before they can access the internet. If the session time-out configuration is too short, users may experience intermittent internet connectivity and have to reconnect using the web authentication process each time. The network administrator can verify the session time-out configuration on the captive portal settings and adjust it if needed. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 1.0 Network Architecture, Objective 1.8 Explain the purposes and use cases for advanced networking devices.

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

A.
Evil twin
A.
Evil twin
Answers
B.
Tailgating
B.
Tailgating
Answers
C.
Piggybacking
C.
Piggybacking
Answers
D.
Shoulder surfing
D.
Shoulder surfing
Answers
Suggested answer: B

Explanation:

Tailgating is a physical security attack where an unauthorized person follows an authorized person into a restricted area without proper identification or authorization. The network administrator prevented this attack by stopping and directing the person to the security desk. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 3.0 Network Security, Objective 3.1 Compare and contrast risk-related concepts.

A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?

A.
Layer 1
A.
Layer 1
Answers
B.
Layer 2
B.
Layer 2
Answers
C.
Layer 3
C.
Layer 3
Answers
D.
Layer 4
D.
Layer 4
Answers
E.
Layer 5
E.
Layer 5
Answers
F.
Layer 6
F.
Layer 6
Answers
G.
Layer 7
G.
Layer 7
Answers
Suggested answer: A

Explanation:

CRC errors are cyclic redundancy check errors that occur when data is corrupted during transmission. CRC errors are usually caused by physical layer issues such as faulty cables, connectors, ports, or interference. The network administrator will most likely start to troubleshoot at layer 1 of the OSI model, which is the physical layer that deals with the transmission of bits over a medium. Reference:

CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 4.0 Network Troubleshooting and Tools, Objective 4.1 Given a scenario, implement network troubleshooting methodology.

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)

A.
CPU usage
A.
CPU usage
Answers
B.
Memory
B.
Memory
Answers
C.
Temperature
C.
Temperature
Answers
D.
Bandwidth
D.
Bandwidth
Answers
E.
Latency
E.
Latency
Answers
F.
Jitter
F.
Jitter
Answers
Suggested answer: A, B

Explanation:

The question asks about the metrics that will most accurately show the underlying performanceissues of slow or unresponsive desktops for users who are using VMs (virtual machines).VMs are software-based simulations of physical computers that run on a host system. Theyshare the resources of the host system, such as CPU, memory, disk space, etc.If the host system does not have enough resources to support the number of VMs running on it,the performance of the VMs will suffer. This is especially true if the VMs are running resource-intensive applications or tasks.Therefore, the metrics that will most accurately show the underlying performance issuesareCPU usageandmemory. These metrics indicate how much of the host system's resources arebeing consumed by the VMs and how much is available for other processes.The other metrics are not relevant to the question, as they are related to the networkperformance, not the host system performance. They are:Temperature: the measure of how hot the host system or its components are. Hightemperature can cause overheating and damage to the hardware, but it is not directly relatedto the performance of the VMs.Bandwidth: the measure of how much data can be transferred over a network connection in agiven time. Low bandwidth can cause network congestion and slow data transfer, but it is notdirectly related to the performance of the VMs.Latency: the measure of how long it takes for a data packet to travel from one point to anotheron a network. High latency can cause delays and poor quality of service, but it is not directlyrelated to the performance of the VMs.Jitter: the measure of how much the latency varies over time on a network. High jitter cancause inconsistent and unpredictable network performance, but it is not directly related to theperformance of the VMs.

CompTIA Network+ N10-008 Study Guide, Chapter 1: Networking Concepts, Section 1.3:Virtualization and Network Storage Technologies, Pages 34-36Professor Messer's CompTIA N10-008 Network+ Course, Video 1.3: Virtualization and NetworkStorage Technologies, Part 1

Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?

A.
Install load balancers
A.
Install load balancers
Answers
B.
Install more switches
B.
Install more switches
Answers
C.
Decrease the number of VLANs
C.
Decrease the number of VLANs
Answers
D.
Reduce the lease time
D.
Reduce the lease time
Answers
Suggested answer: D

Explanation:

To resolve the issue of DHCP scope exhaustion without creating a new DHCP pool, the administrator can reduce the lease time. By decreasing the lease time, the IP addresses assigned by DHCP will be released back to the DHCP scope more quickly, allowing them to be assigned to new devices.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: The OSI Model and Networking Protocols, Objective 2.3: Given a scenario, implement and configure the appropriate addressing schema.

https://www.networkcomputing.com/data-centers/10-tips-optimizing-dhcp-performance

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?

A.
Spanning Tree Protocol
A.
Spanning Tree Protocol
Answers
B.
Neighbor Discovery Protocol
B.
Neighbor Discovery Protocol
Answers
C.
Link Aggregation Control Protocol
C.
Link Aggregation Control Protocol
Answers
D.
Address Resolution Protocol
D.
Address Resolution Protocol
Answers
Suggested answer: B

Explanation:

Short The switch feature that is most likely to be used to assist with logging IPv6 and MAC addresses of devices on a network segment is Neighbor Discovery Protocol (NDP). NDP is used by IPv6 to discover and maintain information about other nodes on the network, including their IPv6 and MAC addresses. By periodically querying NDP, the administrator can log this information for auditing purposes.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: The OSI Model and Networking Protocols, Objective 2.1: Compare and contrast TCP and UDP ports, protocols, and their purposes.

Which of the following DNS records works as an alias to another record?

A.
AAAA
A.
AAAA
Answers
B.
CNAME
B.
CNAME
Answers
C.
MX
C.
MX
Answers
D.
SOA
D.
SOA
Answers
Suggested answer: B

Explanation:

The DNS record that works as an alias to another record is called CNAME (Canonical Name). CNAME records are used to create an alias for a domain name that points to another domain name.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: The OSI Model and Networking Protocols, Objective 2.3: Given a scenario, implement and configure the appropriate addressing schema.

Total 865 questions
Go to page: of 87