ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 13

Add to Whishlist

List of questions

Question 121

Report Export Collapse

A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect Which of the following describes the issue?

Rogue DHCP server
Rogue DHCP server
Misconfigured HSRP
Misconfigured HSRP
DNS poisoning
DNS poisoning
Exhausted IP scope
Exhausted IP scope
Suggested answer: C
Explanation:

DNS poisoning is a type of attack that modifies the DNS records of a domain name to point to a malicious IP address instead of the legitimate one. This can result in users being directed to cloned websites that are stealing credentials, even if they enter the correct URL for the website. The incorrect DNS server address on the user’s PC could be a sign of DNS poisoning, as the attacker could have compromised the DNS server or spoofed its response to redirect the user’s queries. Reference:

https://www.comptia.org/blog/what-is-dns-poisoning

asked 02/10/2024
Tom Starren
47 questions

Question 122

Report Export Collapse

A network technician needs to correlate security events to analyze a suspected intrusion. Which of the following should the technician use?

SNMP
SNMP
Log review
Log review
Vulnerability scanning
Vulnerability scanning
SIEM
SIEM
Suggested answer: D
Explanation:

SIEM stands for Security Information and Event Management, which is a tool that collects, analyzes, and correlates data from various network devices and sources to provide alerts and reports on security incidents and events. A network technician can use SIEM to correlate security events to analyze a suspected intrusion, as SIEM can help identify the source, target, method, and impact of an attack, as well as provide recommendations for remediation. Reference:

https://www.comptia.org/blog/what-is-siem

asked 02/10/2024
Kanta Prasad
42 questions

Question 123

Report Export Collapse

A network administrator is setting up several loT devices on a new VLAN and wants to accomplish the following

Reduce manual configuration on each system
Reduce manual configuration on each system
Assign a specific IP address to each system
Assign a specific IP address to each system
Allow devices to move to different switchports on the same VLANWhich of the following should the network administrator do to accomplish these requirements?
Allow devices to move to different switchports on the same VLANWhich of the following should the network administrator do to accomplish these requirements?
Set up a reservation for each device
Set up a reservation for each device
Configure a static IP on each device
Configure a static IP on each device
Implement private VLANs for each device
Implement private VLANs for each device
Use DHCP exclusions to address each device
Use DHCP exclusions to address each device
Suggested answer: A
Explanation:

A reservation is a feature of DHCP that assigns a specific IP address to a device based on its MAC address. This way, the device will always receive the same IP address from the DHCP server, regardless of its location or connection time. A network administrator can set up a reservation for each loT device to accomplish the requirements of reducing manual configuration, assigning a specific IP address, and allowing devices to move to different switchports on the same VLAN.

Reference: https://www.comptia.org/blog/what-is-dhcp

asked 02/10/2024
Aaaa ddsdss
28 questions

Question 124

Report Export Collapse

During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied'

Privileged user accounts
Privileged user accounts
Role separation
Role separation
Container administration
Container administration
Job rotation
Job rotation
Suggested answer: B
Explanation:

Role separation is a security principle that involves dividing the tasks and privileges for a specific business process among multiple users. This reduces the risk of fraud and errors, as no one user has complete control over the process. In the scenario, there are three employees who perform very distinct functions on the server, which is an example of role separation. Reference:

https://hyperproof.io/resource/segregation-of-duties/

asked 02/10/2024
Charly Ndedi Priso
38 questions

Question 125

Report Export Collapse

A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?

Standard operating procedures
Standard operating procedures
Configuration baseline documents
Configuration baseline documents
Work instructions
Work instructions
Change management documentation
Change management documentation
Suggested answer: D
Explanation:

Change management documentation is a record of the changes that have been made to a system or process, including the reason, date, time, and impact of each change. A technician can reference this documentation to find what solution was implemented to resolve a previously encountered issue, as well as any potential side effects or dependencies of the change. Reference:

https://www.comptia.org/blog/what-is-change-management

asked 02/10/2024
Fabio Morais Melo
46 questions

Question 126

Report Export Collapse

A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?

Insider threat
Insider threat
War driving
War driving
Evil twin
Evil twin
Honeypot
Honeypot
Suggested answer: D
Explanation:

A honeypot is a decoy system that is intentionally left vulnerable or exposed to attract attackers and divert them from the real targets. A honeypot can also be used to collect information about the attackers’ techniques and motives. In the scenario, the SaaS provider has left an unpatched VM available via a public DMZ port, which could be a honeypot technique to lure attackers and monitor their activities. Reference: https://www.comptia.org/blog/what-is-a-honeypot

asked 02/10/2024
Srecka Kovacevic
43 questions

Question 127

Report Export Collapse

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?

A network tap
A network tap
A proxy server
A proxy server
A UTM appliance
A UTM appliance
A content filter
A content filter
Suggested answer: C
Explanation:

A UTM appliance stands for Unified Threat Management appliance, which is a device that combines multiple security functions into one solution. A UTM appliance can provide firewall, IDS/IPS, antivirus, VPN, web filtering, and other security features. A network technician can use a UTM appliance in place of an edge firewall and an IDS to prevent future attacks, as a UTM appliance can block malicious traffic and detect and respond to intrusions more effectively. Reference:

https://www.comptia.org/blog/what-is-utm

asked 02/10/2024
Camilo Garrido Lizana
37 questions

Question 128

Report Export Collapse

A customer wants to segregate the traffic between guests on a hypervisor. Which of the following does a technician need to configure to meet the requirement?

Virtual switches
Virtual switches
OSPF routing
OSPF routing
Load balancers
Load balancers
NIC teaming
NIC teaming
Fibre Channel
Fibre Channel
Suggested answer: A
Explanation:

A virtual switch is a software-based switch that connects virtual machines on a hypervisor. A virtual switch can create and manage VLANs, which are logical segments of a network that isolate traffic between different groups of devices. A customer can use virtual switches to segregate the traffic between guests on a hypervisor by creating a separate VLAN for each guest and assigning it to a virtual switch port. Reference: https://www.comptia.org/blog/what-is-a-virtual-switch

asked 02/10/2024
Rohit Kumar
44 questions

Question 129

Report Export Collapse

A Chief Information Officer (CIO) wants to improve the availability of a company's SQL database

Which of the following technologies should be utilized to achieve maximum availability?

Clustering
Clustering
Port aggregation
Port aggregation
NIC teaming
NIC teaming
Snapshots
Snapshots
Suggested answer: A
Explanation:

Clustering is a technique that involves grouping multiple servers or instances together to provide high availability and fault tolerance for a database. Clustering can help improve the availability of a SQL database by allowing automatic failover and load balancing between the cluster nodes. If one node fails or becomes overloaded, another node can take over the database operations without disrupting the service. Reference: https://www.educba.com/sql-cluster/

asked 02/10/2024
Test Test
31 questions

Question 130

Report Export Collapse

A network administrator wants to improve the security of the management console on the company's switches and ensure configuration changes made can be correlated to the administrator who conformed them Which of the following should the network administrator implement?

Port security
Port security
Local authentication
Local authentication
TACACS+
TACACS+
Access control list
Access control list
Suggested answer: C
Explanation:

TACACS+ is a protocol that provides centralized authentication, authorization, and accounting (AAA) for network devices and users. TACACS+ can help improve the security of the management console on the company’s switches by verifying the identity and credentials of the administrators, enforcing granular access policies and permissions, and logging the configuration changes made by each administrator. This way, the network administrator can ensure only authorized and authenticated users can access and modify the switch settings, and also track and correlate the changes made by each user. Reference: https://www.comptia.org/blog/what-is-tacacs

asked 02/10/2024
Sumit Sengupta
46 questions
Total 865 questions
Go to page: of 87
Search

Related questions