ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 19

Question list
Search
Search

List of questions

Search

Related questions











An international company is transferring its IT assets including a number of WAPs from the United States to an office in Europe for deployment. Which of the following considerations should the company research before Implementing the wireless hardware?

A.
WPA2 cipher
A.
WPA2 cipher
Answers
B.
Regulatory Impacts
B.
Regulatory Impacts
Answers
C.
CDMA configuration
C.
CDMA configuration
Answers
D.
802.11 standards
D.
802.11 standards
Answers
Suggested answer: B

Explanation:

When transferring IT assets, including wireless access points (WAPs), from one country to another, it's important to research the regulatory impacts of the move. Different countries have different regulations and compliance requirements for wireless devices, such as frequency bands, power levels, and encryption standards. Failing to comply with these regulations can result in fines or other penalties.

Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of me following actions can reduce repair time?

A.
Using a tone generator and wire map to determine the fault location
A.
Using a tone generator and wire map to determine the fault location
Answers
B.
Using a multimeter to locate the fault point
B.
Using a multimeter to locate the fault point
Answers
C.
Using an OTDR In one end of the optic cable to get the liber length information
C.
Using an OTDR In one end of the optic cable to get the liber length information
Answers
D.
Using a spectrum analyzer and comparing the current wavelength with a working baseline
D.
Using a spectrum analyzer and comparing the current wavelength with a working baseline
Answers
Suggested answer: C

Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure?

A.
Business continuity plan
A.
Business continuity plan
Answers
B.
Onboarding and offboarding policies
B.
Onboarding and offboarding policies
Answers
C.
Acceptable use policy
C.
Acceptable use policy
Answers
D.
System life cycle
D.
System life cycle
Answers
E.
Change management
E.
Change management
Answers
Suggested answer: A

Which of the following would be the MOST cost-effective recovery solution for a company's lower- priority applications?

A.
Warm site
A.
Warm site
Answers
B.
Cloud site
B.
Cloud site
Answers
C.
Hot site
C.
Hot site
Answers
D.
Cold site
D.
Cold site
Answers
Suggested answer: C

A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of me connectivity failure?

A.
Incorrect VLAN
A.
Incorrect VLAN
Answers
B.
DNS failure
B.
DNS failure
Answers
C.
DHCP scope exhaustion
C.
DHCP scope exhaustion
Answers
D.
Incorrect gateway
D.
Incorrect gateway
Answers
Suggested answer: A

Explanation:

A VLAN is a virtual local area network that logically separates devices on the same physicalnetwork. VLANs can improve network performance, security, and management by reducingbroadcast domains and isolating traffic.

A DHCP reservation is a feature that allows a network administrator to assign a specific IPaddress to a device based on its MAC address. This ensures that the device always receives thesame IP address from the DHCP server, even if the lease expires or the device reboots.A networked printer is a device that can be shared by multiple users on the same network. Anetworked printer typically has a built-in network interface card (NIC) that allows it tocommunicate with other devices using TCP/IP protocols.A print server is a device or a software application that manages the printing requests frommultiple clients. A print server can also provide additional features such as print queuemanagement, printer driver installation, and printer status monitoring.A subnet is a logical division of an IP network that allows devices to communicate moreefficiently and securely. A subnet is defined by a network address and a subnet mask, whichdetermine the range of valid IP addresses within the subnet. Devices on the same subnet cancommunicate directly with each other without the need for a router.A ping is a network diagnostic tool that tests the connectivity and reachability between twodevices by sending and receiving echo packets. A ping request can fail for various reasons, suchas network congestion, firewall settings, routing issues, or device configuration errors.Based on the question, the networked printer is unavailable because it cannot be pinged fromthe print server in the same subnet. This means that there is a problem with the layer 2connectivity between the two devices, which is determined by the MAC addresses and theVLANs. The most likely cause of this problem is that the printer and the print server are ondifferent VLANs, which prevents them from communicating with each other. The other optionsare less likely because they affect the layer 3 connectivity, which is determined by the IPaddresses and the gateways. A DNS failure would not affect the ping request, since it uses IPaddresses and not hostnames. A DHCP scope exhaustion would not affect the printer, since ithas a DHCP reservation that guarantees its IP address. An incorrect gateway would not affectthe communication within the same subnet, since it is only used for routing packets to othernetworks.Reference:CompTIA Network+ N10-008 Study Guide, Chapter 2: Network Devices and Technologies,Section 2.2: Network Device Functions and Features, Subsection: Print Servers, pp. 76-77.CompTIA Network+ N10-008 Study Guide, Chapter 3: Network Operations, Section 3.3:Network Configuration Management, Subsection: DHCP, pp. 144-146.CompTIA Network+ N10-008 Study Guide, Chapter 4: Network Security, Section 4.2: NetworkSegmentation and Isolation, Subsection: VLANs, pp. 202-204.Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 1.5: NetworkTroubleshooting Methodology, Subsection: Identify the Problem, pp. 16-17.

Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 2.2: Network Devices,Subsection: Print Servers, p. 28.Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 2.6: NetworkAddressing, Subsection: DHCP, p. 38.Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 2.7: NetworkAddressing, Subsection: Subnetting, p. 39.Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 3.5: NetworkSegmentation, Subsection: VLANs, p. 58.

An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ?

A.
Spanning Tree Protocol
A.
Spanning Tree Protocol
Answers
B.
Open Shortest Path First
B.
Open Shortest Path First
Answers
C.
Port mirroring
C.
Port mirroring
Answers
D.
An interior gateway protocol
D.
An interior gateway protocol
Answers
Suggested answer: A

Explanation:

Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology in Ethernet networks by actively blocking certain links and enabling others. STP prevents loops by putting some of the links in a blocking state, effectively creating a loop-free topology. This ensures that there is only one active path between two devices, which helps prevent network loops and the associated problems (such as broadcast storms) that can result from them. STP is used to create a fault-tolerant ring between three switches within a Layer 2 network.

A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?

A.
Network access control
A.
Network access control
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Multifactor authentication
C.
Multifactor authentication
Answers
D.
Separation of duties
D.
Separation of duties
Answers
Suggested answer: D

Which of the following physical security methods Is the MOST effective to prevent tailgating?

A.
Biometrics in an access control vestibule
A.
Biometrics in an access control vestibule
Answers
B.
IP cameras with motion detection
B.
IP cameras with motion detection
Answers
C.
Smart lockers with tamper protection
C.
Smart lockers with tamper protection
Answers
D.
Badge readers plus a PIN pad
D.
Badge readers plus a PIN pad
Answers
Suggested answer: A

Explanation:

Biometrics is a type of authentication that uses a person’s physical characteristics, such as fingerprints, iris, or face, to verify their identity. An access control vestibule is a small room or area that separates two spaces and allows only one person to enter or exit at a time. Biometrics in an access control vestibule is the most effective physical security method to prevent tailgating, which is the unauthorized entry of a person behind another person who has legitimate access.

Reference: Network+ Study Guide Objective 5.1: Summarize the importance of physical security controls.

Which of the following is used to provide disaster recovery capabilities to spin up an critical devices using internet resources?

A.
Cloud site
A.
Cloud site
Answers
B.
Hot site
B.
Hot site
Answers
C.
Cold site
C.
Cold site
Answers
D.
Warm site
D.
Warm site
Answers
Suggested answer: A

Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?

A.
Elastic computing
A.
Elastic computing
Answers
B.
Scalable networking
B.
Scalable networking
Answers
C.
Hybrid deployment
C.
Hybrid deployment
Answers
D.
Multitenant hosting
D.
Multitenant hosting
Answers
Suggested answer: B

Explanation:

A technique used to adjust resources dynamically for a virtual web server under variable loads is called auto-scaling. Auto-scaling automatically increases or decreases the number of instances of a virtual web server in response to changes in demand, ensuring that the right amount of resources are available to handle incoming traffic. This can help to improve the availability and performance of a web application, as well as reduce costs by avoiding the need to provision and maintain excess capacity.

Total 865 questions
Go to page: of 87