ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 15

Question list
Search
Search

List of questions

Search

Related questions











Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site. Which of the following will BEST provide this functionality?

A.
Client-to-site VPN
A.
Client-to-site VPN
Answers
B.
Third-party VPN service
B.
Third-party VPN service
Answers
C.
Site-to-site VPN
C.
Site-to-site VPN
Answers
D.
Split-tunnel VPN
D.
Split-tunnel VPN
Answers
Suggested answer: C

Explanation:

A site-to-site VPN is a type of VPN that connects two or more remote offices securely over an untrustworthy network, such as the Internet. A site-to-site VPN allows each office to access network shares and resources at the other site, as if they were on the same local network. A site-to-site VPN encrypts and tunnels the traffic between the offices, ensuring privacy and integrity of the data.

Reference: https://www.comptia.org/blog/what-is-a-site-to-site-vpn

A network requirement calls for segmenting departments into different networks. The campus network is set up with users of each department in multiple buildings. Which of the following should be configured to keep the design simple and efficient?

A.
MDIX
A.
MDIX
Answers
B.
Jumbo frames
B.
Jumbo frames
Answers
C.
Port tagging
C.
Port tagging
Answers
D.
Flow control
D.
Flow control
Answers
Suggested answer: C

Explanation:

Port tagging is a technique that involves adding a tag or identifier to the frames or packets that belong to a certain VLAN. A VLAN is a logical segment of a network that isolates traffic between different groups of devices. Port tagging allows devices on different physical ports or switches to communicate with each other as if they were on the same port or switch. Port tagging can help keep the design simple and efficient by reducing the number of physical ports and switches needed to segment departments into different networks. Reference: https://www.comptia.org/blog/what-is- port-tagging

Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages?

A.
Syslog
A.
Syslog
Answers
B.
Session Initiation Protocol
B.
Session Initiation Protocol
Answers
C.
Secure File Transfer Protocol
C.
Secure File Transfer Protocol
Answers
D.
Server Message Block
D.
Server Message Block
Answers
Suggested answer: A

Explanation:

Syslog is a protocol that provides a standard way for network devices and applications to send event messages to a logging server or a security appliance. Syslog messages can contain information about security incidents, errors, warnings, system status, configuration changes, and other events. A security appliance that is correlating network events from multiple devices can rely on Syslog to receive event messages from different sources and formats. Reference:

https://www.comptia.org/blog/what-is-syslog

Which of the following is MOST commonly used to address CVEs on network equipment and/or operating systems?

A.
Vulnerability assessment
A.
Vulnerability assessment
Answers
B.
Factory reset
B.
Factory reset
Answers
C.
Firmware update
C.
Firmware update
Answers
D.
Screened subnet
D.
Screened subnet
Answers
Suggested answer: C

Explanation:

Firmware is a type of software that controls the low-level functions of a hardware device, such as a router, switch, printer, or camera. Firmware updates are patches or upgrades that fix bugs, improve performance, add features, or address security vulnerabilities in firmware. Firmware updates are commonly used to address CVEs (Common Vulnerabilities and Exposures) on network equipment and operating systems, as CVEs are publicly known flaws that can be exploited by attackers.

Reference: https://www.comptia.org/blog/what-is-firmware

A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?

A.
The nearest APs are configured for 802.11g.
A.
The nearest APs are configured for 802.11g.
Answers
B.
An incorrect channel assignment is on the nearest APs.
B.
An incorrect channel assignment is on the nearest APs.
Answers
C.
The power level is too high for the AP on the far side.
C.
The power level is too high for the AP on the far side.
Answers
D.
Interference exists around the AP on the far side.
D.
Interference exists around the AP on the far side.
Answers
Suggested answer: C

Explanation:

The power level is a setting that determines how strong the wireless signal is from an access point (AP). If the power level is too high for an AP on the far side of a warehouse, it can cause interference and overlap with other APs on the same channel or frequency. This can result in handheld devices not connecting to the nearest APs, but connecting to the AP on the far side instead. A technician should adjust the power level of the AP on the far side to reduce interference and improve connectivity. Reference: https://www.comptia.org/blog/what-is-power-level

Which of the following uses the destination IP address to forward packets?

A.
A bridge
A.
A bridge
Answers
B.
A Layer 2 switch
B.
A Layer 2 switch
Answers
C.
A router
C.
A router
Answers
D.
A repeater
D.
A repeater
Answers
Suggested answer: C

Explanation:

A router is a device that uses the destination IP address to forward packets between different networks. A bridge and a Layer 2 switch operate at the data link layer and use MAC addresses to forward frames within the same network. A repeater is a device that amplifies or regenerates signals at the physical layer.

Which of the following OSI model layers is where conversations between applications are established, coordinated, and terminated?

A.
Session
A.
Session
Answers
B.
Physical
B.
Physical
Answers
C.
Presentation
C.
Presentation
Answers
D.
Data link
D.
Data link
Answers
Suggested answer: A

Explanation:

Reference:

https://www.techtarget.com/searchnetworking/definition/OSI#:~:text=The%20session%20layer,and %20terminates%20conversations%20between%20applications.

The session layer is where conversations between applications are established, coordinated, and terminated. It is responsible for creating, maintaining, and ending sessions between different devices or processes. The physical layer deals with the transmission of bits over a medium. The presentation layer formats and translates data for different applications. The data link layer provides reliable and error-free delivery of frames within a network.

A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office?

A.
Multimode
A.
Multimode
Answers
B.
Cat 5e
B.
Cat 5e
Answers
C.
RG-6
C.
RG-6
Answers
D.
Cat 6
D.
Cat 6
Answers
E.
100BASE-T
E.
100BASE-T
Answers
Suggested answer: C

Explanation:

RG-6 is a type of coaxial cable that is commonly used by cable companies to provide Internet access from the demarcation point back to the central office. It has a thicker conductor and better shielding than RG-59, which is another type of coaxial cable. Multimode and Cat 5e are types of fiber optic and twisted pair cables respectively, which are not typically used by cable companies. Cat 6 and 100BASE-T are standards for twisted pair cables, not types of cabling.

A network administrator decided to use SLAAC in an extensive IPv6 deployment to alleviate IP address management. The devices were properly connected into the LAN but autoconfiguration of the IP address did not occur as expected. Which of the following should the network administrator verify?

A.
The network gateway is configured to send router advertisements.
A.
The network gateway is configured to send router advertisements.
Answers
B.
A DHCP server is present on the same broadcast domain as the clients.
B.
A DHCP server is present on the same broadcast domain as the clients.
Answers
C.
The devices support dual stack on the network layer.
C.
The devices support dual stack on the network layer.
Answers
D.
The local gateway supports anycast routing.
D.
The local gateway supports anycast routing.
Answers
Suggested answer: A

Explanation:

SLAAC (Stateless Address Autoconfiguration) is a method for IPv6 devices to automatically configure their IP addresses based on the network prefix advertised by a router. The router sends periodic router advertisements (RAs) that contain the network prefix and other parameters for the devices to use. If the network gateway is not configured to send RAs, then SLAAC will not work. A DHCP server is not needed for SLAAC, as the devices generate their own addresses without relying on a server. Dual stack and anycast routing are not related to SLAAC.

Which of the following is used to provide networking capability for VMs at Layer 2 of the OSI model?

A.
VPN
A.
VPN
Answers
B.
VRRP
B.
VRRP
Answers
C.
vSwitch
C.
vSwitch
Answers
D.
VIP
D.
VIP
Answers
Suggested answer: C

Explanation:

A vSwitch (virtual switch) is a software-based switch that provides networking capability for VMs (virtual machines) at Layer 2 of the OSI model. It connects the VMs to each other or to external networks using virtual NICs (network interface cards). A VPN (virtual private network) is a technology that creates a secure tunnel over a public network for remote access or site-to-site connectivity. VRRP (Virtual Router Redundancy Protocol) is a protocol that provides high availability for routers by creating a virtual router with multiple physical routers. A VIP (virtual IP) is an IP address that can be shared by multiple servers or devices for load balancing or failover purposes.

Total 865 questions
Go to page: of 87