ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 11

Add to Whishlist

List of questions

Question 101

Report Export Collapse

A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations The manufacturer says the system will work if ping times are less than 50ms. The company has recorded the following ping times:

CompTIA N10-008 image Question 101 95985 10022024175234000000

Which of the following is MOST likely causing the issue?

Attenuation
Attenuation
Latency
Latency
VLAN mismatch
VLAN mismatch
Jitter
Jitter
Suggested answer: D
Explanation:

Jitter is most likely causing the issue of intermittent one-way audio and dropped conversations for the company that uses VoIP telephones. Jitter is a variation in delay of packets arriving at the destination. It can cause choppy or distorted audio quality for VoIP applications, especially over WAN links that have limited bandwidth and high latency. The recommended jitter for VoIP is less than 10ms1. The company has recorded ping times that exceed 50ms, which indicates high jitter and latency on their network. Reference: https://www.voip-info.org/voip-jitter/ 1

asked 02/10/2024
Barret Tan
29 questions

Question 102

Report Export Collapse

Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?

A smart card
A smart card
A key fob
A key fob
An employee badge
An employee badge
A door lock
A door lock
Suggested answer: D
Explanation:

A door lock would be the best security device to use to provide mechanical access control to the MDF/IDF. A door lock is a device that prevents unauthorized access to a physical area by requiring a key, a code, a card, a biometric scan, or a combination of these factors to open it. A door lock can provide mechanical access control to the MDF/IDF, which are rooms that house network equipment such as switches, routers, servers, or patch panels. A door lock can prevent unauthorized persons from tampering with or stealing the network equipment or data. Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_6. html

asked 02/10/2024
rene laas
56 questions

Question 103

Report Export Collapse

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

VLAN mismatch
VLAN mismatch
Transceiver mismatch
Transceiver mismatch
Latency
Latency
DHCP exhaustion
DHCP exhaustion
Suggested answer: A
Explanation:

A VLAN mismatch is the most likely reason why an IP phone does not receive the necessary DHCP options for registration. A VLAN mismatch occurs when a device is connected to a switch port that belongs to a different VLAN than the device’s intended VLAN. This can cause communication problems or prevent access to network resources. For example, if an IP phone is connected to a switch port that belongs to the data VLAN instead of the voice VLAN, it may not receive the DHCP options that contain information such as the TFTP server address, the NTP server address, or the default gateway address for the voice VLAN. These DHCP options are essential for the IP phone to register with the VoIP system and function properly. Reference:

https://www.cisco.com/c/en/us/support/docs/voice-unified-communications/unified- communications-manager-callmanager/13979-dhcp-option-150-00.html

asked 02/10/2024
Dang Xuan Bao
46 questions

Question 104

Report Export Collapse

A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

Confirm the patch's MD5 hash prior to the upgrade
Confirm the patch's MD5 hash prior to the upgrade
Schedule the switches to reboot after an appropriate amount of time.
Schedule the switches to reboot after an appropriate amount of time.
Download each switch's current configuration before the upgrade
Download each switch's current configuration before the upgrade
Utilize FTP rather than TFTP to upload the patch
Utilize FTP rather than TFTP to upload the patch
Suggested answer: A
Explanation:

The network administrator should confirm the patch’s MD5 hash prior to the upgrade to help ensure the upgrade process will be less likely to cause problems with the switches. MD5 (Message Digest 5) is a cryptographic hash function that produces a 128-bit hash value for any given input. It can be used to verify the integrity and authenticity of a file by comparing its hash value with a known or expected value. If the hash values match, it means that the file has not been corrupted or tampered with during transmission or storage. If the hash values do not match, it means that the file may be damaged or malicious and should not be used for the upgrade. Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/15292-scp.html

asked 02/10/2024
Eli Thompson
37 questions

Question 105

Report Export Collapse

Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?

Storage array
Storage array
Type 1 hypervisor
Type 1 hypervisor
Virtual machine
Virtual machine
Guest QS
Guest QS
Suggested answer: B
Explanation:

A type 1 hypervisor is a system that is installed directly on a server’s hardware and abstracts the hardware from any guest machines. A hypervisor is a software layer that enables virtualization by creating and managing virtual machines (VMs) on a physical host. A type 1 hypervisor, also known as a bare-metal hypervisor or a native hypervisor, runs directly on the host’s hardware without requiring an underlying operating system (OS). It provides better performance and security than a type 2 hypervisor, which runs on top of an existing OS and relies on it for hardware access. Reference:

https://www.vmware.com/topics/glossary/content/hypervisor

asked 02/10/2024
Venkata Nandyala
44 questions

Question 106

Report Export Collapse

A city has hired a new employee who needs to be able to work when traveling at home and at the municipal sourcing of a neighboring city that snares services. The employee is issued a laptop, and a technician needs to train the employee on the appropriate solutions for secure access to the network from all the possible locations On which of the following solutions would the technician MOST likely train the employee?

Site-to-site VPNs between the two city locations and client-to-site software on the employee's laptop tor all other remote access
Site-to-site VPNs between the two city locations and client-to-site software on the employee's laptop tor all other remote access
Client-to-site VPNs between the travel locations and site-to-site software on the employee's laptop for all other remote access
Client-to-site VPNs between the travel locations and site-to-site software on the employee's laptop for all other remote access
Client-to-site VPNs between the two city locations and site-to-site software on the employee's laptop for all other remote access
Client-to-site VPNs between the two city locations and site-to-site software on the employee's laptop for all other remote access
Site-to-site VPNs between the home and city locations and site-to-site software on the employee's laptop for all other remote access
Site-to-site VPNs between the home and city locations and site-to-site software on the employee's laptop for all other remote access
Suggested answer: A
Explanation:

The technician would most likely train the employee on using site-to-site VPNs between the two city locations and client-to-site software on the employee’s laptop for all other remote access. A VPN (Virtual Private Network) is a technology that creates a secure and encrypted tunnel over a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. A site-to-site VPN connects two or more networks, such as branch offices or data centers, using a VPN gateway device at each site. A client-to-site VPN connects individual users, such as mobile workers or telecommuters, using a VPN client software on their devices. In this scenario, the employee needs to access the network from different locations, such as home, travel, or another city. Therefore, the technician would train the employee on how to use site- to-site VPNs to connect to the network from another city location that shares services, and how to use client-to-site software to connect to the network from home or travel locations. Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106- how-vpn-works.html

asked 02/10/2024
Vijayakumar Dhandapani
45 questions

Question 107

Report Export Collapse

A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing?

NAT
NAT
PAT
PAT
STP
STP
SNAT
SNAT
ARP
ARP
Suggested answer: B
Explanation:

The firewall administrator is implementing a PAT (Port Address Translation) rule that directs HTTP traffic to an internal server listening on a non-standard socket. PAT is a type of NAT (Network Address Translation) that allows multiple devices to share a single public IP address by using different port numbers. PAT can also be used to redirect traffic from one port to another port on the same or different IP address. This can be useful for security or load balancing purposes. For example, a firewall administrator can configure a PAT rule that redirects HTTP traffic (port 80) from the public IP address of the firewall to an internal server that listens on a non-standard port (such as 8080) on its private IP address. Reference: https://www.cisco.com/c/en/us/support/docs/ip/network-address- translation-nat/13772-12.html

asked 02/10/2024
rudzani nndwammbi
35 questions

Question 108

Report Export Collapse

Given the following output:

CompTIA N10-008 image Question 108 95992 10022024175234000000

Which of the following attacks is this MOST likely an example of?

ARP poisoning
ARP poisoning
VLAN hopping
VLAN hopping
Rogue access point
Rogue access point
Amplified DoS
Amplified DoS
Suggested answer: A
Explanation:

The output is most likely an example of an ARP poisoning attack. ARP poisoning, also known as ARP spoofing, is a type of attack that exploits the ARP protocol to associate a malicious device’s MAC address with a legitimate IP address on a local area network. This allows the attacker to intercept, modify, or redirect network traffic between two devices without their knowledge. The output shows that there are multiple entries for the same IP address (192.168.1.1) with different MAC addresses in the ARP cache of the device. This indicates that an attacker has sent fake ARP replies to trick the device into believing that its MAC address is associated with the IP address of another device (such as the default gateway). Reference: https://www.cisco.com/c/en/us/about/security-center/arp- spoofing.html

asked 02/10/2024
Tamas Szekely
39 questions

Question 109

Report Export Collapse

An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?

MS-CHAP
MS-CHAP
RADIUS
RADIUS
LDAPS
LDAPS
RSTP
RSTP
Suggested answer: B
Explanation:

RADIUS (Remote Authentication Dial-In User Service) is a protocol that should be used by the organization to allow for authentication, authorization, and auditing of network services. RADIUS is an AAA (Authentication, Authorization, and Accounting) protocol that manages network access by verifying user credentials, granting access permissions, and logging user activities. RADIUS uses a client-server model where a RADIUS client (such as a router, switch, or VPN server) sends user information to a RADIUS server (such as an authentication server) for verification and authorization. The RADIUS server can also send accounting information to another server for billing or reporting purposes. Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote- authentication-dial-user-service-radius/13838-10.html

asked 02/10/2024
Michael White
34 questions

Question 110

Report Export Collapse

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?

A VPN concentrator
A VPN concentrator
A load balancer
A load balancer
A wireless controller
A wireless controller
A RADIUS server
A RADIUS server
Suggested answer: C
Explanation:

A wireless controller would be able to handle the requirement of implementing a large number of WAPs throughout the building and allowing users to move around without dropping their connections. A wireless controller is a device that centrally manages and configures multiple wireless access points (WAPs) on a network. It can provide features such as load balancing, roaming, security, QoS, and monitoring for the wireless network. A wireless controller can also support wireless mesh networks, where some WAPs act as relays for other WAPs to extend the wireless coverage.

Reference: https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/index.html

asked 02/10/2024
Donald Wu
41 questions
Total 865 questions
Go to page: of 87
Search

Related questions