ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











A technician is troubleshooting a workstation's network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using Which of the following concepts would BEST help the technician?

A.
Consistent labeling
A.
Consistent labeling
Answers
B.
Change management
B.
Change management
Answers
C.
Standard work instructions
C.
Standard work instructions
Answers
D.
Inventory management
D.
Inventory management
Answers
E.
Network baseline
E.
Network baseline
Answers
Suggested answer: A

Explanation:

Consistent labeling would be the concept that would best help the technician to confirm which switchport corresponds to the wall jack the PC is using. Consistent labeling is a practice of using standardized and descriptive labels for network devices, ports, cables, jacks, and other components. It can help with identifying, locating, and troubleshooting network issues. For example, a technician can use consistent labeling to trace a cable from a PC to a wall jack, and then from a patch panel to a switchport. Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_6. html

A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?

A.
Full backups
A.
Full backups
Answers
B.
Load balancing
B.
Load balancing
Answers
C.
Hot site
C.
Hot site
Answers
D.
Snapshots
D.
Snapshots
Answers
Suggested answer: C

Explanation:

A hot site is the disaster recovery solution that the corporation should implement for its critical system that would cause unrecoverable damage to the brand if it was taken offline. A hot site is a fully operational backup site that can take over the primary site’s functions in case of a disaster or disruption. A hot site has all the necessary hardware, software, data, network connections, and personnel to resume normal operations with minimal downtime. A hot site is suitable for systems that require high availability and cannot afford any data loss or interruption. Reference:

https://www.enterprisestorageforum.com/management/disaster-recovery-site/ 1

Which of the following protocol types describes secure communication on port 443?

A.
ICMP
A.
ICMP
Answers
B.
UDP
B.
UDP
Answers
C.
TCP
C.
TCP
Answers
D.
IP
D.
IP
Answers
Suggested answer: C

Explanation:

TCP is the protocol type that describes secure communication on port 443. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets over an IP network. TCP uses port numbers to identify different applications or services on a device. Port 443 is the default port for HTTPS (Hypertext Transfer Protocol Secure), which is an extension of HTTP that uses SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption to protect data in transit between a web server and a web browser. Reference:

https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html

A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall Which of the following would be the MOST appropriate way to enable secure remote printing?

A.
SSH
A.
SSH
Answers
B.
VPN
B.
VPN
Answers
C.
Telnet
C.
Telnet
Answers
D.
SSL
D.
SSL
Answers
Suggested answer: B

Explanation:

VPN (Virtual Private Network) is the most appropriate way to enable secure remote printing. VPN is a technology that creates a secure and encrypted tunnel over a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. VPN can be used for various purposes such as accessing corporate resources, bypassing geo-restrictions, or enhancing privacy and security. VPN can also be used for remote printing by allowing users to connect to a printer on the private network and send print jobs securely over the VPN tunnel.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike- protocols/14106-how-vpn-works.html

A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?

A.
Static IP
A.
Static IP
Answers
B.
Default gateway
B.
Default gateway
Answers
C.
DNS entries
C.
DNS entries
Answers
D.
Local host file
D.
Local host file
Answers
Suggested answer: B

Explanation:

The default gateway is the setting that the user most likely misconfigured on the PC that caused it to be unable to access websites by both FQDN and IP. The default gateway is a device, usually a router or a firewall, that connects a local network to other networks such as the Internet. It acts as an intermediary between devices on different networks and forwards packets based on their destination IP addresses. If the default gateway is not configured correctly on a PC, it will not be able to communicate with devices outside its local network, such as web servers or DNS servers.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol- rip/16448-default-gateway.html

Which of the following policies is MOST commonly used for guest captive portals?

A.
AUP
A.
AUP
Answers
B.
DLP
B.
DLP
Answers
C.
BYOD
C.
BYOD
Answers
D.
NDA
D.
NDA
Answers
Suggested answer: A

Explanation:

AUP stands for Acceptable Use Policy, which is a policy that defines the rules and guidelines for using a network or service. A guest captive portal is a web page that requires users to agree to the AUP before accessing the Internet or other network resources. This is a common way to enforce security and legal compliance for guest users. Reference:

https://www.arubanetworks.com/techdocs/Instant_87_WebHelp/Content/instant-ug/captive- portal/captive-portal.htm

A network administrator has been directed to present the network alerts from the past week to the company's executive staff. Which of the following will provide the BEST collection and presentation of this data?

A.
A port scan printout
A.
A port scan printout
Answers
B.
A consolidated report of various network devices
B.
A consolidated report of various network devices
Answers
C.
A report from the SIEM tool
C.
A report from the SIEM tool
Answers
D.
A report from a vulnerability scan done yesterday
D.
A report from a vulnerability scan done yesterday
Answers
Suggested answer: C

Explanation:

SIEM stands for Security Information and Event Management, which is a tool that collects, analyzes, and correlates data from various network devices and sources to provide alerts and reports on security incidents and events. A report from the SIEM tool can provide a comprehensive overview of the network alerts from the past week to the executive staff, highlighting any potential threats, vulnerabilities, or anomalies. Reference: https://www.comptia.org/blog/what-is-siem

A small, family-run business uses a single SOHO router to provide Internet and WiFi to its employees At the start of a new week, employees come in and find their usual WiFi network is no longer available, and there is a new wireless network to which they cannot connect. Given that information, which of the following should have been done to avoid this situation'

A.
The device firmware should have been kept current.
A.
The device firmware should have been kept current.
Answers
B.
Unsecure protocols should have been disabled.
B.
Unsecure protocols should have been disabled.
Answers
C.
Parental controls should have been enabled
C.
Parental controls should have been enabled
Answers
D.
The default credentials should have been changed
D.
The default credentials should have been changed
Answers
Suggested answer: D

Explanation:

The default credentials are the username and password that come with a device or service when it is first installed or configured. They are often easy to guess or find online, which makes them vulnerable to unauthorized access or attacks. The default credentials should be changed to something unique and strong as soon as possible to avoid this situation. If the default credentials were not changed, someone could have accessed the SOHO router and changed the WiFi settings without the employees’ knowledge. Reference: https://www.comptia.org/blog/network-security- basics-6-easy-ways-to-protect-your-network

A network technician is reviewing an upcoming project's requirements to implement laaS. Which of the following should the technician consider?

A.
Software installation processes
A.
Software installation processes
Answers
B.
Type of database to be installed
B.
Type of database to be installed
Answers
C.
Operating system maintenance
C.
Operating system maintenance
Answers
D.
Server hardware requirements
D.
Server hardware requirements
Answers
Suggested answer: D

Explanation:

IaaS stands for Infrastructure as a Service, which is a cloud computing model that provides virtualized computing resources such as servers, storage, and networking over the Internet. When implementing IaaS, the network technician should consider the server hardware requirements, such as CPU, RAM, disk space, and network bandwidth, that are needed to run the applications and services on the cloud. The other options are not relevant to IaaS, as they are either handled by the cloud provider or by the end-user. Reference: https://www.comptia.org/blog/what-is-iaas

A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, but a strong signal when walking 20ft in the opposite direction The technician has reviewed the configuration and confirmed the channel type is correct There is no jitter or latency on the connection Which of the following would be the MOST likely cause of the issue?

A.
Antenna type
A.
Antenna type
Answers
B.
Power levels
B.
Power levels
Answers
C.
Frequency
C.
Frequency
Answers
D.
Encryption type
D.
Encryption type
Answers
Suggested answer: A

Explanation:

The antenna type affects the signal strength and coverage of a WAP. Different types of antennas have different radiation patterns and gain, which determine how far and wide the signal can reach. If the user experiences a weak signal in one direction but a strong signal in the opposite direction, it could mean that the antenna type is not suitable for the desired coverage area. The technician should consider changing the antenna type to one that has a more balanced or directional radiation pattern.

Reference: https://community.cisco.com/t5/wireless-small-business/wap200-poor-signal- strength/td-p/1565796

Total 865 questions
Go to page: of 87