ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 21

Question list
Search
Search

List of questions

Search

Related questions











An administrator would like to allow Windows clients from outside me office to access workstations without using third-party software. Which or the following access methods would meet this requirement?

A.
Remote desktop gateway
A.
Remote desktop gateway
Answers
B.
Spit tunnel
B.
Spit tunnel
Answers
C.
Site-to-site VPN
C.
Site-to-site VPN
Answers
D.
VNC
D.
VNC
Answers
Suggested answer: A

Explanation:

To allow Windows clients from outside the office to access workstations without using third-party software, the administrator can use the Remote Desktop Protocol (RDP). RDP is a built-in feature of the Windows operating system that allows users to remotely connect to and control other Windows computers over a network connection.

To use RDP, the administrator will need to enable the Remote Desktop feature on the workstations that need to be accessed, and ensure that the appropriate firewall rules are in place to allow RDP traffic to pass through. The administrator will also need to provide the remote users with the necessary credentials to access the workstations.

Once RDP is set up and configured, the remote users can use the Remote Desktop client on their own computers to connect to the workstations and access them as if they were physically present in the office. This allows the administrator to provide remote access to the workstations without the need for any additional software or third-party tools.

Which of the following is a benefit of the spine-and-leaf network topology?

A.
Increased network security
A.
Increased network security
Answers
B.
Stable network latency
B.
Stable network latency
Answers
C.
Simplified network management
C.
Simplified network management
Answers
D.
Eliminated need for inter-VLAN routing
D.
Eliminated need for inter-VLAN routing
Answers
Suggested answer: A

To access production applications and data, developers must first connect remotely to a different server From there, the developers are able to access production data Which of the following does this BEST represent?

A.
A management plane
A.
A management plane
Answers
B.
A proxy server
B.
A proxy server
Answers
C.
An out-of-band management device
C.
An out-of-band management device
Answers
D.
A site-to-site VPN
D.
A site-to-site VPN
Answers
E.
A jump box
E.
A jump box
Answers
Suggested answer: E

A network administrator is reviewing the following metrics from a network management system regarding a switchport. The administrator suspects an issue because users are calling in regards to the switchport's performance:

Based on the information in the chart above, which of the following fs the cause of these performance issues?

A.
The connected device is exceeding the configured MTU.
A.
The connected device is exceeding the configured MTU.
Answers
B.
The connected device is sending too many packets
B.
The connected device is sending too many packets
Answers
C.
The switchport has been up for too long
C.
The switchport has been up for too long
Answers
D.
The connected device is receiving too many packets.
D.
The connected device is receiving too many packets.
Answers
E.
The switchport does not have enough CRCs
E.
The switchport does not have enough CRCs
Answers
Suggested answer: A

A network engineer receives the following when connecting to a switch to configure a port:

Which of the following is the MOST likely cause for the failure?

A.
The network engineer is using the wrong protocol
A.
The network engineer is using the wrong protocol
Answers
B.
The network engineer does not have permission to configure the device
B.
The network engineer does not have permission to configure the device
Answers
C.
SNMP has been secured with an ACL
C.
SNMP has been secured with an ACL
Answers
D.
The switchport the engineer is trying to configure is down
D.
The switchport the engineer is trying to configure is down
Answers
Suggested answer: A

Explanation:

The error message in the image indicates that the network engineer is trying to connect to theswitch using telnet, which is a protocol that allows remote access to a device over a network1.However, telnet is an insecure protocol that sends data in plain text, which can be easilyintercepted and compromised by attackers1.

Therefore, most modern switches do not support telnet by default, and require a more secureprotocol such as SSH (Secure Shell), which encrypts the data and provides authentication andintegrity2.To connect to the switch using SSH, the network engineer needs to use a different command,such as ''ssh 10.1.200.1'' instead of ''telnet 10.1.200.1''.Alternatively, the network engineer can use a console cable to connect directly to the switchand configure it locally3.The other options are less likely to cause the error message, as they would result in differentmessages or symptoms, such as ''Access denied'', ''Timeout'', or ''No response''.Reference:1: CompTIA Network+ N10-008 Cert Guide, 1st Edition, Chapter 14: Network Security, p. 5742: CompTIA Network+ N10-008 Cert Guide, 1st Edition, Chapter 14: Network Security, p. 5753: CompTIA Network+ N10-008 Cert Guide, 1st Edition, Chapter 2: Network Devices, p. 64

During a risk assessment which of the following should be considered when planning to mitigate high CPU utilization of a firewall?

A.
Recovery time objective
A.
Recovery time objective
Answers
B.
Uninterruptible power supply
B.
Uninterruptible power supply
Answers
C.
NIC teaming
C.
NIC teaming
Answers
D.
Load balancing
D.
Load balancing
Answers
Suggested answer: D

Explanation:

The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs. This does nothing to help with CPU utilization. Load balancing does this.

A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue?

A.
Run the show interface command on the switch
A.
Run the show interface command on the switch
Answers
B.
Run the tracerouute command on the server
B.
Run the tracerouute command on the server
Answers
C.
Run iperf on the technician's desktop
C.
Run iperf on the technician's desktop
Answers
D.
Ping the client's computer from the router
D.
Ping the client's computer from the router
Answers
E.
Run a port scanner on the client's IP address
E.
Run a port scanner on the client's IP address
Answers
Suggested answer: A

Explanation:

To determine if a client's network cable issues may be causing intermittent connectivity, the help desk technician can run the show interface command on the switch. This command allows the technician to view the status and statistics of the various interfaces on the switch, including the physical link status and the number of transmitted and received packets. If the interface is experiencing a large number of errors or dropped packets, this could indicate a problem with the network cable or with the connection between the client's device and the switch. "Cisco routers and switches have a show interfaces IOS command that provides interface statistics/status information, including link state (up/down), speed/duplex, send/receive traffic, cyclic redundancy checks (CRCs), and protocol packet and byte counts."

A security engineer is installing a new IOS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?

A.
Install a network tap for the IDS
A.
Install a network tap for the IDS
Answers
B.
Configure ACLs to route traffic to the IDS.
B.
Configure ACLs to route traffic to the IDS.
Answers
C.
Install an additional NIC into the IDS
C.
Install an additional NIC into the IDS
Answers
D.
Install a loopback adapter for the IDS.
D.
Install a loopback adapter for the IDS.
Answers
E.
Add an additional route on the router for the IDS.
E.
Add an additional route on the router for the IDS.
Answers
Suggested answer: A

Explanation:

a network tap is a way of connecting an IDS out of band, which means it does not interfere with the normal network traffic. A network tap allows you to view a copy of the network traffic transmitted over the media being tapped.

Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation coordination, and termination of the call?

A.
Session
A.
Session
Answers
B.
Physical
B.
Physical
Answers
C.
Transport
C.
Transport
Answers
D.
Data link
D.
Data link
Answers
Suggested answer: A

Explanation:

The OSI model layer that ensures the initiation, coordination, and termination of a video call is the session layer. The session layer is responsible for establishing, maintaining, and terminating communication sessions between two devices on a network.

A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?

A.
Detection
A.
Detection
Answers
B.
Recovery
B.
Recovery
Answers
C.
Identification
C.
Identification
Answers
D.
Prevention
D.
Prevention
Answers
Suggested answer: D

Explanation:

A false camera is a dummy device that looks like a real camera but does not actually record ortransmit any video. It is used to deter potential intruders or attackers from entering ordamaging a building by creating the illusion of surveillance. Therefore, it is a preventivemeasure that aims to reduce the likelihood or impact of a security breach. It is not a detection,recovery, or identification tool, as it does not alert, restore, or recognize any security incidents.[CompTIA Network+ N10-008 Certification Study Guide], Chapter 6: Network Security, Section6.1: Physical Security, pp. 317-318

Professor Messer's CompTIA N10-008 Network+ Course Notes], Section 6.1: Physical Security,p. 79[Professor Messer's CompTIA N10-008 Network+ Training Course], Video 6.1: Physical Security,5:25 minutes

Total 865 questions
Go to page: of 87