ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 22

Question list
Search
Search

List of questions

Search

Related questions











A network administrator is reviewing the network device logs on a syslog server. The messages are normal but the stamps on the messages are incorrect. Which of the following actions should the administrator take to ensure the log message time stamps are correct?

A.
Change the NTP settings on the network device
A.
Change the NTP settings on the network device
Answers
B.
Change the time on the syslog server
B.
Change the time on the syslog server
Answers
C.
Update the network device firmware
C.
Update the network device firmware
Answers
D.
Adjust the timeout settings on the syslog server
D.
Adjust the timeout settings on the syslog server
Answers
E.
Adjust the SSH settings on the network device.
E.
Adjust the SSH settings on the network device.
Answers
Suggested answer: A

Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?

A.
Scope options
A.
Scope options
Answers
B.
Reservation
B.
Reservation
Answers
C.
Exclusion
C.
Exclusion
Answers
D.
Relay
D.
Relay
Answers
E.
Pool
E.
Pool
Answers
Suggested answer: B

Explanation:

DHCP is a protocol that dynamically assigns IP addresses to devices on a network. DHCP allowsdevices to obtain an IP address automatically without manual configuration. DHCP alsosimplifies network management by reducing IP conflicts and address exhaustion.A DHCP setting is a configuration option that affects how DHCP operates on a network. DHCPsettings can be applied at different levels, such as the server, the scope, or the client. DHCPsettings can control various aspects of the IP address assignment process, such as the range,the duration, the options, and the exclusions.A DHCP reservation is a DHCP setting that assigns a specific IP address to a specific device basedon its MAC address. A DHCP reservation ensures that the device always receives the same IPaddress from the DHCP server, even if the lease expires or the device reboots. A DHCPreservation can be useful for devices that need a consistent IP address, such as servers,printers, cameras, or gaming consoles.The other options are not DHCP settings that would ensure a device gets the same IP addresseach time it is connected to the network. Scope options are DHCP settings that apply to a groupof devices within a defined range of IP addresses. Exclusion is a DHCP setting that prevents arange of IP addresses from being assigned to any device. Relay is a DHCP setting that allows adevice to forward DHCP requests from one network segment to another. Pool is a DHCP settingthat defines the available IP addresses that can be assigned to devices.Reference:CompTIA Network+ N10-008 Study Guide, Chapter 3: Network Operations, Section 3.3:Network Configuration Management, Subsection: DHCP, pp. 144-146.Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 2.6: NetworkAddressing, Subsection: DHCP, p. 38.Static IP vs DHCP Reservation, The Tech Journal, May 7, 2019

Which of the following is the primary function of the core layer of the three-tiered model?

A.
Routing
A.
Routing
Answers
B.
Repeating
B.
Repeating
Answers
C.
Bridging
C.
Bridging
Answers
D.
Switching
D.
Switching
Answers
Suggested answer: A

Explanation:

https://www.omnisecu.com/cisco-certified-network-associate-ccna/three-tier-hierarchical-network- model.php

Core Layer consists of biggest, fastest, and most expensive routers with the highest model numbers and Core Layer is considered as the back bone of networks. Core Layer routers are used to merge geographically separated networks. The Core Layer routers move information on the network as fast as possible. The switches operating at core layer switches packets as fast as possible.

Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?

A.
Changing the VLAN of the web server
A.
Changing the VLAN of the web server
Answers
B.
Changing the server's IP address
B.
Changing the server's IP address
Answers
C.
Implementing an ACL
C.
Implementing an ACL
Answers
D.
Instating a rule on the firewall connected to the web server
D.
Instating a rule on the firewall connected to the web server
Answers
Suggested answer: D

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated significant network issues occur. Which of the following is the MOST likely cause for the WAN instability?

A.
A routing loop
A.
A routing loop
Answers
B.
Asymmetrical routing
B.
Asymmetrical routing
Answers
C.
A switching loop
C.
A switching loop
Answers
D.
An incorrect IP address
D.
An incorrect IP address
Answers
Suggested answer: B

Explanation:

Asymmetrical routing is the most likely cause for the WAN instability. When two different routing protocols are used, like OSPF and EIGRP, it can cause asymmetrical routing, which results in traffic being routed differently in each direction. This can lead to instability in the WAN. A CDP neighbor change, a switching loop, or an incorrect IP address are not likely causes for WAN instability.

A network technician receives a report from the server team that a server's network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data;

Which of the following should the network technician perform to correct the issue?

A.
Replace the Cat 5 patch cable with a Cat 6 cable
A.
Replace the Cat 5 patch cable with a Cat 6 cable
Answers
B.
Install a crossover cable between the server and the switch
B.
Install a crossover cable between the server and the switch
Answers
C.
Reset the switchport configuration.
C.
Reset the switchport configuration.
Answers
D.
Use NetFlow data from the switch to isolate the issue.
D.
Use NetFlow data from the switch to isolate the issue.
Answers
E.
Disable MDIX on the switchport and reboot the server.
E.
Disable MDIX on the switchport and reboot the server.
Answers
Suggested answer: A

Explanation:

"Bad cables, incorrect pinouts, or bent pins: Faulty cables (with electrical characteristics preventing successful transmission) or faulty connectors (which do not properly make connections) can prevent successful data transmission at Layer 1. A bad cable could simply be an incorrect category of cable being used for a specific purpose. For example, using a Cat 5 cable (instead of a Cat 6 or higher cable) to connect two 1000BASE-TX devices would result in data corruption. Bent pins in a connector or incorrect pinouts could also cause data to become corrupted."

Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?

A.
Client-to-site VPN
A.
Client-to-site VPN
Answers
B.
Clientless VPN
B.
Clientless VPN
Answers
C.
RDP
C.
RDP
Answers
D.
Site-to-site VPN
D.
Site-to-site VPN
Answers
E.
SSH
E.
SSH
Answers
Suggested answer: D

Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?

A.
MPLS
A.
MPLS
Answers
B.
mGRE
B.
mGRE
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
VRRP
D.
VRRP
Answers
Suggested answer: A

Explanation:

Multiprotocol Label Switching, or MPLS, is a networking technology that routes traffic using the shortest path based on “labels,” rather than network addresses, to handle forwarding over private wide area networks. As a scalable and protocol-independent solution, MPLS assigns labels to each data packet, controlling the path the packet follows. MPLS greatly improves the speed of traffic, so users don’t experience downtime when connected to the network.

An employee reports to a network administrator that internet access is not working. Which of the following should the administrator do FIRST?

A.
Establish a theory of probable cause.
A.
Establish a theory of probable cause.
Answers
B.
Identify symptoms.
B.
Identify symptoms.
Answers
C.
Determine if anything has changed.
C.
Determine if anything has changed.
Answers
D.
Ask the user to restart the computer.
D.
Ask the user to restart the computer.
Answers
Suggested answer: C

Explanation:

When a user reports that internet access is not working, it is important to first determine if there have been any recent changes to the network or the user's computer that could have caused the issue. This could include changes to the network configuration, the installation of new software or hardware, or other events that could have impacted the user's ability to access the internet. By determining if anything has changed, the administrator can narrow down the possible causes of the issue and focus on addressing the most likely cause.

A company is utilizing multifactor authentication for data center access. Which of the following is the MOST effective security mechanism against physical intrusions due to stolen credentials?

A.
Biometrics security hardware
A.
Biometrics security hardware
Answers
B.
Access card readers
B.
Access card readers
Answers
C.
Access control vestibule
C.
Access control vestibule
Answers
D.
Motion detection cameras
D.
Motion detection cameras
Answers
Suggested answer: C
Total 865 questions
Go to page: of 87