ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case?

A.
DB9
A.
DB9
Answers
B.
RJ11
B.
RJ11
Answers
C.
RJ45
C.
RJ45
Answers
D.
DB25
D.
DB25
Answers
Suggested answer: B

Explanation:

RJ11 is a type of connector that is commonly used for analog phone lines. RJ11 has four wires and six positions, but only two or four of them are used. A technician can crimp an RJ11 connector to a new phone line to install an analog desk phone for a new receptionist. Reference:

https://www.comptia.org/blog/what-is-rj11

Which of the following attacks encrypts user data and requires a proper backup implementation to recover?

A.
DDoS
A.
DDoS
Answers
B.
Phishing
B.
Phishing
Answers
C.
Ransomware
C.
Ransomware
Answers
D.
MAC spoofing
D.
MAC spoofing
Answers
Suggested answer: C

Explanation:

Ransomware is a type of malware that encrypts user data and demands a ransom for its decryption. Ransomware can prevent users from accessing their files and applications, and cause data loss or corruption. A proper backup implementation is essential to recover from a ransomware attack, as it can help restore the encrypted data without paying the ransom or relying on the attackers’ decryption key. Reference: https://www.comptia.org/blog/what-is-ransomware

A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?

A.
A honeypot
A.
A honeypot
Answers
B.
Network segmentation
B.
Network segmentation
Answers
C.
Antivirus
C.
Antivirus
Answers
D.
A screened subnet
D.
A screened subnet
Answers
Suggested answer: A

Explanation:

A honeypot is a decoy system that is intentionally left vulnerable or exposed to attract attackers and divert them from the real targets. A honeypot can also be used to collect information about the attackers’ techniques and motives. A network administrator can implement a honeypot to analyze attacks directed toward the company’s network, as a honeypot can help identify the source, target, method, and impact of an attack, as well as provide recommendations for remediation. Reference:

https://www.comptia.org/blog/what-is-a-honeypot

A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?

A.
nslookup
A.
nslookup
Answers
B.
netstat -a
B.
netstat -a
Answers
C.
ipconfig /a
C.
ipconfig /a
Answers
D.
arp -a
D.
arp -a
Answers
Suggested answer: B

Explanation:

netstat -a is a command that displays information about active TCP connections and listening ports on a system. A network administrator can use netstat -a to check if the database engine is listening on a certain port, as well as verify if there are any connections established to or from that port.

Reference: https://www.comptia.org/blog/what-is-netstat

A technician is implementing a new wireless network to serve guests at a local office. The network needs to provide Internet access but disallow associated stations from communicating with each other. Which of the following would BEST accomplish this requirement?

A.
Wireless client isolation
A.
Wireless client isolation
Answers
B.
Port security
B.
Port security
Answers
C.
Device geofencing
C.
Device geofencing
Answers
D.
DHCP snooping
D.
DHCP snooping
Answers
Suggested answer: A

Explanation:

Wireless client isolation is a feature on wireless routers that limits the connectivity between wireless devices connected to the same network. It prevents them from accessing resources on other wireless or wired devices, as a security measure to reduce attacks and threats. This feature can be useful for guest and BYOD SSIDs, but it can also be disabled on the router’s settings. Reference:

https://www.howtogeek.com/179089/lock-down-your-wi-fi-network-with-your-routers-wireless- isolation-option/

A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select?

A.
Cold site
A.
Cold site
Answers
B.
Hot site
B.
Hot site
Answers
C.
Warm site
C.
Warm site
Answers
D.
Cloud site
D.
Cloud site
Answers
Suggested answer: C

Explanation:

A warm site is a type of disaster recovery site that has equipment ready to go in the event of a disaster at the main datacenter, but does not have live data or applications. A warm site requires some time and effort to restore the data and services from backups, but it is less expensive than a hot site that has live data and applications. A cold site is a disaster recovery site that has no equipment or data, and requires a lot of time and money to set up after a disaster. A cloud site is a disaster recovery site that uses cloud computing resources to provide data and services, but it may have issues with bandwidth, latency, security, and cost. Reference:

https://www.comptia.org/blog/what-is-a-warm-site

An IT technician suspects a break in one of the uplinks that provides connectivity to the core switch. Which of the following command-line tools should the technician use to determine where the incident is occurring?

A.
nslookup
A.
nslookup
Answers
B.
show config
B.
show config
Answers
C.
netstat
C.
netstat
Answers
D.
show interface
D.
show interface
Answers
E.
show counters
E.
show counters
Answers
Suggested answer: D

Explanation:

show interface is a command-line tool that displays information about the status, configuration, and statistics of an interface on a network device. A technician can use show interface to determine where the incident is occurring in a network by checking the uplink status, speed, duplex mode, errors, collisions, and other parameters of each interface. Reference:

https://www.comptia.org/blog/what-is-show-interface

A technician is connecting DSL for a new customer. After installing and connecting the on-premises equipment, the technician verifies DSL synchronization. When connecting to a workstation, however, the link LEDs on the workstation and modem do not light up. Which of the following should the technician perform during troubleshooting?

A.
Identify the switching loops between the modem and the workstation.
A.
Identify the switching loops between the modem and the workstation.
Answers
B.
Check for asymmetrical routing on the modem.
B.
Check for asymmetrical routing on the modem.
Answers
C.
Look for a rogue DHCP server on the network.
C.
Look for a rogue DHCP server on the network.
Answers
D.
Replace the cable connecting the modem and the workstation.
D.
Replace the cable connecting the modem and the workstation.
Answers
Suggested answer: D

Explanation:

If the link LEDs on the workstation and modem do not light up when connecting to a workstation, it could indicate a problem with the cable connecting them. The cable could be damaged, defective, or incompatible with the devices. A technician should replace the cable with a known good one and check if the link LEDs light up. If not, the problem could be with the network interface cards (NICs) on the workstation or modem. Reference: https://www.comptia.org/blog/what-is-link-light

Which of the following services can provide data storage, hardware options, and scalability to a third- party company that cannot afford new devices?

A.
SaaS
A.
SaaS
Answers
B.
IaaS
B.
IaaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
DaaS
D.
DaaS
Answers
Suggested answer: B

Explanation:

IaaS stands for Infrastructure as a Service, which is a cloud computing model that provides virtualized computing resources such as servers, storage, and networking over the Internet. IaaS can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices by allowing them to rent or lease the infrastructure they need from a cloud provider. The company can pay only for what they use and scale up or down as needed. Reference:

https://www.comptia.org/blog/what-is-iaas

A network administrator is talking to different vendors about acquiring technology to support a new project for a large company. Which of the following documents will MOST likely need to be signed before information about the project is shared?

A.
BYOD policy
A.
BYOD policy
Answers
B.
NDA
B.
NDA
Answers
C.
SLA
C.
SLA
Answers
D.
MOU
D.
MOU
Answers
Suggested answer: B

Explanation:

NDA stands for Non-Disclosure Agreement, which is a legal contract between two or more parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to by others. A network administrator may need to sign an NDA before sharing information about a new project with different vendors, as the project may involve sensitive or proprietary data that the company wants to protect from competitors or unauthorized use. Reference: https://www.adobe.com/sign/esignature- resources/sign-nda.html

Total 865 questions
Go to page: of 87