ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations The manufacturer says the system will work if ping times are less than 50ms. The company has recorded the following ping times:

Which of the following is MOST likely causing the issue?

A.
Attenuation
A.
Attenuation
Answers
B.
Latency
B.
Latency
Answers
C.
VLAN mismatch
C.
VLAN mismatch
Answers
D.
Jitter
D.
Jitter
Answers
Suggested answer: D

Explanation:

Jitter is most likely causing the issue of intermittent one-way audio and dropped conversations for the company that uses VoIP telephones. Jitter is a variation in delay of packets arriving at the destination. It can cause choppy or distorted audio quality for VoIP applications, especially over WAN links that have limited bandwidth and high latency. The recommended jitter for VoIP is less than 10ms1. The company has recorded ping times that exceed 50ms, which indicates high jitter and latency on their network. Reference: https://www.voip-info.org/voip-jitter/ 1

Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?

A.
A smart card
A.
A smart card
Answers
B.
A key fob
B.
A key fob
Answers
C.
An employee badge
C.
An employee badge
Answers
D.
A door lock
D.
A door lock
Answers
Suggested answer: D

Explanation:

A door lock would be the best security device to use to provide mechanical access control to the MDF/IDF. A door lock is a device that prevents unauthorized access to a physical area by requiring a key, a code, a card, a biometric scan, or a combination of these factors to open it. A door lock can provide mechanical access control to the MDF/IDF, which are rooms that house network equipment such as switches, routers, servers, or patch panels. A door lock can prevent unauthorized persons from tampering with or stealing the network equipment or data. Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_6. html

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

A.
VLAN mismatch
A.
VLAN mismatch
Answers
B.
Transceiver mismatch
B.
Transceiver mismatch
Answers
C.
Latency
C.
Latency
Answers
D.
DHCP exhaustion
D.
DHCP exhaustion
Answers
Suggested answer: A

Explanation:

A VLAN mismatch is the most likely reason why an IP phone does not receive the necessary DHCP options for registration. A VLAN mismatch occurs when a device is connected to a switch port that belongs to a different VLAN than the device’s intended VLAN. This can cause communication problems or prevent access to network resources. For example, if an IP phone is connected to a switch port that belongs to the data VLAN instead of the voice VLAN, it may not receive the DHCP options that contain information such as the TFTP server address, the NTP server address, or the default gateway address for the voice VLAN. These DHCP options are essential for the IP phone to register with the VoIP system and function properly. Reference:

https://www.cisco.com/c/en/us/support/docs/voice-unified-communications/unified- communications-manager-callmanager/13979-dhcp-option-150-00.html

A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

A.
Confirm the patch's MD5 hash prior to the upgrade
A.
Confirm the patch's MD5 hash prior to the upgrade
Answers
B.
Schedule the switches to reboot after an appropriate amount of time.
B.
Schedule the switches to reboot after an appropriate amount of time.
Answers
C.
Download each switch's current configuration before the upgrade
C.
Download each switch's current configuration before the upgrade
Answers
D.
Utilize FTP rather than TFTP to upload the patch
D.
Utilize FTP rather than TFTP to upload the patch
Answers
Suggested answer: A

Explanation:

The network administrator should confirm the patch’s MD5 hash prior to the upgrade to help ensure the upgrade process will be less likely to cause problems with the switches. MD5 (Message Digest 5) is a cryptographic hash function that produces a 128-bit hash value for any given input. It can be used to verify the integrity and authenticity of a file by comparing its hash value with a known or expected value. If the hash values match, it means that the file has not been corrupted or tampered with during transmission or storage. If the hash values do not match, it means that the file may be damaged or malicious and should not be used for the upgrade. Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/secure-shell-ssh/15292-scp.html

Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?

A.
Storage array
A.
Storage array
Answers
B.
Type 1 hypervisor
B.
Type 1 hypervisor
Answers
C.
Virtual machine
C.
Virtual machine
Answers
D.
Guest QS
D.
Guest QS
Answers
Suggested answer: B

Explanation:

A type 1 hypervisor is a system that is installed directly on a server’s hardware and abstracts the hardware from any guest machines. A hypervisor is a software layer that enables virtualization by creating and managing virtual machines (VMs) on a physical host. A type 1 hypervisor, also known as a bare-metal hypervisor or a native hypervisor, runs directly on the host’s hardware without requiring an underlying operating system (OS). It provides better performance and security than a type 2 hypervisor, which runs on top of an existing OS and relies on it for hardware access. Reference:

https://www.vmware.com/topics/glossary/content/hypervisor

A city has hired a new employee who needs to be able to work when traveling at home and at the municipal sourcing of a neighboring city that snares services. The employee is issued a laptop, and a technician needs to train the employee on the appropriate solutions for secure access to the network from all the possible locations On which of the following solutions would the technician MOST likely train the employee?

A.
Site-to-site VPNs between the two city locations and client-to-site software on the employee's laptop tor all other remote access
A.
Site-to-site VPNs between the two city locations and client-to-site software on the employee's laptop tor all other remote access
Answers
B.
Client-to-site VPNs between the travel locations and site-to-site software on the employee's laptop for all other remote access
B.
Client-to-site VPNs between the travel locations and site-to-site software on the employee's laptop for all other remote access
Answers
C.
Client-to-site VPNs between the two city locations and site-to-site software on the employee's laptop for all other remote access
C.
Client-to-site VPNs between the two city locations and site-to-site software on the employee's laptop for all other remote access
Answers
D.
Site-to-site VPNs between the home and city locations and site-to-site software on the employee's laptop for all other remote access
D.
Site-to-site VPNs between the home and city locations and site-to-site software on the employee's laptop for all other remote access
Answers
Suggested answer: A

Explanation:

The technician would most likely train the employee on using site-to-site VPNs between the two city locations and client-to-site software on the employee’s laptop for all other remote access. A VPN (Virtual Private Network) is a technology that creates a secure and encrypted tunnel over a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. A site-to-site VPN connects two or more networks, such as branch offices or data centers, using a VPN gateway device at each site. A client-to-site VPN connects individual users, such as mobile workers or telecommuters, using a VPN client software on their devices. In this scenario, the employee needs to access the network from different locations, such as home, travel, or another city. Therefore, the technician would train the employee on how to use site- to-site VPNs to connect to the network from another city location that shares services, and how to use client-to-site software to connect to the network from home or travel locations. Reference:

https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106- how-vpn-works.html

A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing?

A.
NAT
A.
NAT
Answers
B.
PAT
B.
PAT
Answers
C.
STP
C.
STP
Answers
D.
SNAT
D.
SNAT
Answers
E.
ARP
E.
ARP
Answers
Suggested answer: B

Explanation:

The firewall administrator is implementing a PAT (Port Address Translation) rule that directs HTTP traffic to an internal server listening on a non-standard socket. PAT is a type of NAT (Network Address Translation) that allows multiple devices to share a single public IP address by using different port numbers. PAT can also be used to redirect traffic from one port to another port on the same or different IP address. This can be useful for security or load balancing purposes. For example, a firewall administrator can configure a PAT rule that redirects HTTP traffic (port 80) from the public IP address of the firewall to an internal server that listens on a non-standard port (such as 8080) on its private IP address. Reference: https://www.cisco.com/c/en/us/support/docs/ip/network-address- translation-nat/13772-12.html

Given the following output:

Which of the following attacks is this MOST likely an example of?

A.
ARP poisoning
A.
ARP poisoning
Answers
B.
VLAN hopping
B.
VLAN hopping
Answers
C.
Rogue access point
C.
Rogue access point
Answers
D.
Amplified DoS
D.
Amplified DoS
Answers
Suggested answer: A

Explanation:

The output is most likely an example of an ARP poisoning attack. ARP poisoning, also known as ARP spoofing, is a type of attack that exploits the ARP protocol to associate a malicious device’s MAC address with a legitimate IP address on a local area network. This allows the attacker to intercept, modify, or redirect network traffic between two devices without their knowledge. The output shows that there are multiple entries for the same IP address (192.168.1.1) with different MAC addresses in the ARP cache of the device. This indicates that an attacker has sent fake ARP replies to trick the device into believing that its MAC address is associated with the IP address of another device (such as the default gateway). Reference: https://www.cisco.com/c/en/us/about/security-center/arp- spoofing.html

An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?

A.
MS-CHAP
A.
MS-CHAP
Answers
B.
RADIUS
B.
RADIUS
Answers
C.
LDAPS
C.
LDAPS
Answers
D.
RSTP
D.
RSTP
Answers
Suggested answer: B

Explanation:

RADIUS (Remote Authentication Dial-In User Service) is a protocol that should be used by the organization to allow for authentication, authorization, and auditing of network services. RADIUS is an AAA (Authentication, Authorization, and Accounting) protocol that manages network access by verifying user credentials, granting access permissions, and logging user activities. RADIUS uses a client-server model where a RADIUS client (such as a router, switch, or VPN server) sends user information to a RADIUS server (such as an authentication server) for verification and authorization. The RADIUS server can also send accounting information to another server for billing or reporting purposes. Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/remote- authentication-dial-user-service-radius/13838-10.html

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?

A.
A VPN concentrator
A.
A VPN concentrator
Answers
B.
A load balancer
B.
A load balancer
Answers
C.
A wireless controller
C.
A wireless controller
Answers
D.
A RADIUS server
D.
A RADIUS server
Answers
Suggested answer: C

Explanation:

A wireless controller would be able to handle the requirement of implementing a large number of WAPs throughout the building and allowing users to move around without dropping their connections. A wireless controller is a device that centrally manages and configures multiple wireless access points (WAPs) on a network. It can provide features such as load balancing, roaming, security, QoS, and monitoring for the wireless network. A wireless controller can also support wireless mesh networks, where some WAPs act as relays for other WAPs to extend the wireless coverage.

Reference: https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/index.html

Total 865 questions
Go to page: of 87