ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 12

Add to Whishlist

List of questions

Question 111

Report Export Collapse

A technician is troubleshooting a workstation's network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using Which of the following concepts would BEST help the technician?

Consistent labeling
Consistent labeling
Change management
Change management
Standard work instructions
Standard work instructions
Inventory management
Inventory management
Network baseline
Network baseline
Suggested answer: A
Explanation:

Consistent labeling would be the concept that would best help the technician to confirm which switchport corresponds to the wall jack the PC is using. Consistent labeling is a practice of using standardized and descriptive labels for network devices, ports, cables, jacks, and other components. It can help with identifying, locating, and troubleshooting network issues. For example, a technician can use consistent labeling to trace a cable from a PC to a wall jack, and then from a patch panel to a switchport. Reference:

https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_6. html

asked 02/10/2024
Amil Akhundzada
52 questions

Question 112

Report Export Collapse

A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?

Full backups
Full backups
Load balancing
Load balancing
Hot site
Hot site
Snapshots
Snapshots
Suggested answer: C
Explanation:

A hot site is the disaster recovery solution that the corporation should implement for its critical system that would cause unrecoverable damage to the brand if it was taken offline. A hot site is a fully operational backup site that can take over the primary site’s functions in case of a disaster or disruption. A hot site has all the necessary hardware, software, data, network connections, and personnel to resume normal operations with minimal downtime. A hot site is suitable for systems that require high availability and cannot afford any data loss or interruption. Reference:

https://www.enterprisestorageforum.com/management/disaster-recovery-site/ 1

asked 02/10/2024
ABDUL AZEEZ
38 questions

Question 113

Report Export Collapse

Which of the following protocol types describes secure communication on port 443?

ICMP
ICMP
UDP
UDP
TCP
TCP
IP
IP
Suggested answer: C
Explanation:

TCP is the protocol type that describes secure communication on port 443. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets over an IP network. TCP uses port numbers to identify different applications or services on a device. Port 443 is the default port for HTTPS (Hypertext Transfer Protocol Secure), which is an extension of HTTP that uses SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption to protect data in transit between a web server and a web browser. Reference:

https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html

asked 02/10/2024
Kevin Klyn
49 questions

Question 114

Report Export Collapse

A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall Which of the following would be the MOST appropriate way to enable secure remote printing?

SSH
SSH
VPN
VPN
Telnet
Telnet
SSL
SSL
Suggested answer: B
Explanation:

VPN (Virtual Private Network) is the most appropriate way to enable secure remote printing. VPN is a technology that creates a secure and encrypted tunnel over a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. VPN can be used for various purposes such as accessing corporate resources, bypassing geo-restrictions, or enhancing privacy and security. VPN can also be used for remote printing by allowing users to connect to a printer on the private network and send print jobs securely over the VPN tunnel.

Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike- protocols/14106-how-vpn-works.html

asked 02/10/2024
Yenziwe Yengwa
50 questions

Question 115

Report Export Collapse

A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?

Static IP
Static IP
Default gateway
Default gateway
DNS entries
DNS entries
Local host file
Local host file
Suggested answer: B
Explanation:

The default gateway is the setting that the user most likely misconfigured on the PC that caused it to be unable to access websites by both FQDN and IP. The default gateway is a device, usually a router or a firewall, that connects a local network to other networks such as the Internet. It acts as an intermediary between devices on different networks and forwards packets based on their destination IP addresses. If the default gateway is not configured correctly on a PC, it will not be able to communicate with devices outside its local network, such as web servers or DNS servers.

Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol- rip/16448-default-gateway.html

asked 02/10/2024
Aleksandar Burdin
28 questions

Question 116

Report Export Collapse

Which of the following policies is MOST commonly used for guest captive portals?

AUP
AUP
DLP
DLP
BYOD
BYOD
NDA
NDA
Suggested answer: A
Explanation:

AUP stands for Acceptable Use Policy, which is a policy that defines the rules and guidelines for using a network or service. A guest captive portal is a web page that requires users to agree to the AUP before accessing the Internet or other network resources. This is a common way to enforce security and legal compliance for guest users. Reference:

https://www.arubanetworks.com/techdocs/Instant_87_WebHelp/Content/instant-ug/captive- portal/captive-portal.htm

asked 02/10/2024
Lebogang Aphane
50 questions

Question 117

Report Export Collapse

A network administrator has been directed to present the network alerts from the past week to the company's executive staff. Which of the following will provide the BEST collection and presentation of this data?

A port scan printout
A port scan printout
A consolidated report of various network devices
A consolidated report of various network devices
A report from the SIEM tool
A report from the SIEM tool
A report from a vulnerability scan done yesterday
A report from a vulnerability scan done yesterday
Suggested answer: C
Explanation:

SIEM stands for Security Information and Event Management, which is a tool that collects, analyzes, and correlates data from various network devices and sources to provide alerts and reports on security incidents and events. A report from the SIEM tool can provide a comprehensive overview of the network alerts from the past week to the executive staff, highlighting any potential threats, vulnerabilities, or anomalies. Reference: https://www.comptia.org/blog/what-is-siem

asked 02/10/2024
Carlo Hearne
48 questions

Question 118

Report Export Collapse

A small, family-run business uses a single SOHO router to provide Internet and WiFi to its employees At the start of a new week, employees come in and find their usual WiFi network is no longer available, and there is a new wireless network to which they cannot connect. Given that information, which of the following should have been done to avoid this situation'

The device firmware should have been kept current.
The device firmware should have been kept current.
Unsecure protocols should have been disabled.
Unsecure protocols should have been disabled.
Parental controls should have been enabled
Parental controls should have been enabled
The default credentials should have been changed
The default credentials should have been changed
Suggested answer: D
Explanation:

The default credentials are the username and password that come with a device or service when it is first installed or configured. They are often easy to guess or find online, which makes them vulnerable to unauthorized access or attacks. The default credentials should be changed to something unique and strong as soon as possible to avoid this situation. If the default credentials were not changed, someone could have accessed the SOHO router and changed the WiFi settings without the employees’ knowledge. Reference: https://www.comptia.org/blog/network-security- basics-6-easy-ways-to-protect-your-network

asked 02/10/2024
Tolga Kesici
52 questions

Question 119

Report Export Collapse

A network technician is reviewing an upcoming project's requirements to implement laaS. Which of the following should the technician consider?

Software installation processes
Software installation processes
Type of database to be installed
Type of database to be installed
Operating system maintenance
Operating system maintenance
Server hardware requirements
Server hardware requirements
Suggested answer: D
Explanation:

IaaS stands for Infrastructure as a Service, which is a cloud computing model that provides virtualized computing resources such as servers, storage, and networking over the Internet. When implementing IaaS, the network technician should consider the server hardware requirements, such as CPU, RAM, disk space, and network bandwidth, that are needed to run the applications and services on the cloud. The other options are not relevant to IaaS, as they are either handled by the cloud provider or by the end-user. Reference: https://www.comptia.org/blog/what-is-iaas

asked 02/10/2024
Delano van Kleinwee
43 questions

Question 120

Report Export Collapse

A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, but a strong signal when walking 20ft in the opposite direction The technician has reviewed the configuration and confirmed the channel type is correct There is no jitter or latency on the connection Which of the following would be the MOST likely cause of the issue?

Antenna type
Antenna type
Power levels
Power levels
Frequency
Frequency
Encryption type
Encryption type
Suggested answer: A
Explanation:

The antenna type affects the signal strength and coverage of a WAP. Different types of antennas have different radiation patterns and gain, which determine how far and wide the signal can reach. If the user experiences a weak signal in one direction but a strong signal in the opposite direction, it could mean that the antenna type is not suitable for the desired coverage area. The technician should consider changing the antenna type to one that has a more balanced or directional radiation pattern.

Reference: https://community.cisco.com/t5/wireless-small-business/wap200-poor-signal- strength/td-p/1565796

asked 02/10/2024
Janko Schutte
35 questions
Total 865 questions
Go to page: of 87
Search

Related questions