ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?

A.
5
A.
5
Answers
B.
7
B.
7
Answers
C.
10
C.
10
Answers
D.
15
D.
15
Answers
Suggested answer: C

Explanation:

10 additional network connections are needed to transition from a star to a full-mesh topology. A star topology is a network topology where each device is connected to a central device, such as a switch or a hub. A full-mesh topology is a network topology where each device is directly connected to every other device. The number of connections needed for a full-mesh topology can be calculated by the formula n(n-1)/2, where n is the number of devices. In this case, there are six devices (one core and five distribution switches), so the number of connections needed for a full-mesh topology is 6(6-1)/2 = 15. Since there are already five connections in the star topology (one from each distribution switch to the core switch), the number of additional connections needed is 15 - 5 = 10.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol- rip/13788-3.html

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?

A.
Transceiver mismatch
A.
Transceiver mismatch
Answers
B.
VLAN mismatch
B.
VLAN mismatch
Answers
C.
Port security
C.
Port security
Answers
D.
Damaged cable
D.
Damaged cable
Answers
E.
Duplex mismatch
E.
Duplex mismatch
Answers
Suggested answer: D

Explanation:

A damaged cable is most likely the cause of the desktop not connecting to the network. A damaged cable can cause physical layer issues such as loss of signal, attenuation, interference, or crosstalk. These issues can prevent the desktop from establishing a link with the switch and result in the LED status light on the switchport being off. Other possible causes of physical layer issues are faulty connectors, ports, or transceivers. Reference: https://www.cisco.com/c/en/us/support/docs/lan- switching/ethernet/14119-37.html

A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?

A.
10GBaseT
A.
10GBaseT
Answers
B.
1000BaseT
B.
1000BaseT
Answers
C.
1000BaseSX
C.
1000BaseSX
Answers
D.
1000BaseLX
D.
1000BaseLX
Answers
Suggested answer: C

Explanation:

1000BaseSX is an Ethernet standard that should be used to connect the network switch to the existing multimode fiber optic cable. 1000BaseSX is a Gigabit Ethernet standard that uses short- wavelength laser (850 nm) over multimode fiber optic cable. It can support distances up to 550 meters depending on the cable type and quality. It is suitable for short-range network segments such as campus or building backbone networks. Reference:

https://www.cisco.com/c/en/us/products/collateral/interfaces-modules/gigabit-ethernet-gbic-sfp- modules/product_data_sheet09186a008014cb5e.html

An ARP request is broadcasted and sends the following request. ''Who is 192.168.1.200? Tell 192.168.1.55''

At which of the following layers of the OSI model does this request operate?

A.
Application
A.
Application
Answers
B.
Data link
B.
Data link
Answers
C.
Transport
C.
Transport
Answers
D.
Network
D.
Network
Answers
E.
Session
E.
Session
Answers
Suggested answer: B

Explanation:

An ARP request operates at the data link layer of the OSI model. ARP (Address Resolution Protocol) is a protocol that maps IP addresses to MAC addresses on a local area network. It allows devices to communicate with each other without knowing their MAC addresses beforehand. ARP operates at the data link layer (layer 2) of the OSI model, which is responsible for framing and addressing data packets on a physical medium. Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing- information-protocol-rip/13788-3.html

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?

A.
Fault tolerance
A.
Fault tolerance
Answers
B.
Quality of service
B.
Quality of service
Answers
C.
Load balancing
C.
Load balancing
Answers
D.
Port aggregation
D.
Port aggregation
Answers
Suggested answer: C

Explanation:

Load balancing is a technology that allows traffic to be sent through two different ISPs to increase performance. Load balancing is a process of distributing network traffic across multiple servers or links to optimize resource utilization, throughput, latency, and reliability. Load balancing can be implemented at different layers of the OSI model, such as layer 4 (transport) or layer 7 (application). Load balancing can also be used for outbound traffic by using multiple ISPs and routing protocols such as BGP (Border Gateway Protocol) to select the best path for each packet. Reference:

https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/border-gateway-protocol- bgp/prod_white_paper0900aecd806c4eeb.html

A network technician is observing the behavior of an unmanaged switch when a new device is added to the network and transmits dat

A.
Which of the following BEST describes how the switch processes this information?
A.
Which of the following BEST describes how the switch processes this information?
Answers
B.
The data is flooded out of every port. including the one on which it came in.
B.
The data is flooded out of every port. including the one on which it came in.
Answers
C.
The data is flooded out of every port but only in the VLAN where it is located.
C.
The data is flooded out of every port but only in the VLAN where it is located.
Answers
D.
The data is flooded out of every port, except the one on which it came in
D.
The data is flooded out of every port, except the one on which it came in
Answers
E.
The data is flooded out of every port, excluding the VLAN where it is located
E.
The data is flooded out of every port, excluding the VLAN where it is located
Answers
Suggested answer: C

Explanation:

The switch processes the data by flooding it out of every port, except the one on which it came in. Flooding is a process where a switch sends a data frame to all ports except the source port when it does not have an entry for the destination MAC address in its MAC address table. Flooding allows the switch to learn the MAC addresses of the devices connected to its ports and update its MAC address table accordingly. Flooding also ensures that the data frame reaches its intended destination, even if the switch does not know its location. Reference: https://www.cisco.com/c/en/us/support/docs/lan- switching/spanning-tree-protocol/10556-16.html

There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?

A.
Enable a management access list
A.
Enable a management access list
Answers
B.
Disable access to unnecessary services.
B.
Disable access to unnecessary services.
Answers
C.
Configure a stronger password for access
C.
Configure a stronger password for access
Answers
D.
Disable access to remote management
D.
Disable access to remote management
Answers
E.
Use an out-of-band access method.
E.
Use an out-of-band access method.
Answers
Suggested answer: E

Explanation:

Using an out-of-band access method is the best way to prevent unauthorized access to the legacy switches that do not support cryptographic functions. Out-of-band access is a method of accessing a network device through a dedicated channel that is separate from the main network traffic. Out-of- band access can use physical connections such as serial console ports or dial-up modems, or logical connections such as VPNs or firewalls. Out-of-band access provides more security and reliability than in-band access, which uses the same network as the data traffic and may be vulnerable to attacks or failures. Reference: https://www.cisco.com/c/en/us/td/docs/ios- xml/ios/fundamentals/configuration/15mt/fundamentals-15-mt-book/cf-out-band-mgmt.html

A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:

1 Must not use plaintext passwords

2 Must be certificate based

A.
Must be vendor neutralWhich of the following methods should the engineer select?
A.
Must be vendor neutralWhich of the following methods should the engineer select?
Answers
B.
TWP-RC4
B.
TWP-RC4
Answers
C.
CCMP-AES
C.
CCMP-AES
Answers
D.
EAP-TLS
D.
EAP-TLS
Answers
E.
WPA2
E.
WPA2
Answers
Suggested answer: C

Explanation:

EAP-TLS is the method that should be selected to meet the requirements for designing a new secure wireless network. EAP-TLS (Extensible Authentication Protocol - Transport Layer Security) is an authentication protocol that uses X.509 digital certificates for both clients and servers. It provides strong security and mutual authentication by using TLS encryption and public key cryptography. It does not use plaintext passwords or shared secrets that can be compromised or guessed. It is also an open standard that is vendor neutral and supported by most wireless devices1. Reference:

https://www.securew2.com/blog/what-is-eap-tls 1

A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on one of the web servers to allow communication to the company's file server, but it is unable to connect to it Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?

A.
The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS
A.
The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS
Answers
B.
The lab environment is located in the DM2, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the administrator.
B.
The lab environment is located in the DM2, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the administrator.
Answers
C.
The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch
C.
The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch
Answers
D.
The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for upgraded equipment to management.
D.
The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for upgraded equipment to management.
Answers
Suggested answer: B

Explanation:

The lab environment is located in the DMZ, and traffic to the LAN zone is denied by default. This is the most likely reason why the web server cannot retrieve files from the file server, and the technician can either move the computer to another zone or request an exception from the administrator to resolve the problem. A DMZ (Demilitarized Zone) is a network segment that separates the internal network (LAN) from the external network (Internet). It usually hosts public- facing servers such as web servers, email servers, or FTP servers that need to be accessed by both internal and external users. A firewall is used to control the traffic between the DMZ and the LAN zones, and usually denies traffic from the DMZ to the LAN by default for security reasons. Therefore, if a web server in the DMZ needs to communicate with a file server in the LAN, it would need a special rule or permission from the firewall administrator. Reference:

https://www.cisco.com/c/en/us/support/docs/ip/access-lists/13608-21.html

A technician is deploying a low-density wireless network and is contending with multiple types of building materials. Which of the following wireless frequencies would allow for the LEAST signal attenuation?

A.
2.4GHz
A.
2.4GHz
Answers
B.
5GHz
B.
5GHz
Answers
C.
850MHz
C.
850MHz
Answers
D.
900MHZ
D.
900MHZ
Answers
Suggested answer: A

Explanation:

2.4GHz is the wireless frequency that would allow for the least signal attenuation when deploying a low-density wireless network with multiple types of building materials. Signal attenuation is the loss of signal strength or quality as it travels through a medium or over a distance. Signal attenuation can be affected by various factors such as distance, interference, reflection, refraction, diffraction, scattering, or absorption. Generally, lower frequencies have less signal attenuation than higher frequencies because they can penetrate obstacles better and travel farther. Therefore, 2.4GHz would have less signal attenuation than 5GHz, 850MHz, or 900MHz. Reference:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/82068-omni-vs- direct.html

Total 865 questions
Go to page: of 87