ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?

A.
RST
A.
RST
Answers
B.
FIN
B.
FIN
Answers
C.
ICMP Time Exceeded
C.
ICMP Time Exceeded
Answers
D.
Redirect
D.
Redirect
Answers
Suggested answer: A

A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate?

A.
Configuring DHCP snooping on the switch
A.
Configuring DHCP snooping on the switch
Answers
B.
Preventing broadcast messages leaving the client network
B.
Preventing broadcast messages leaving the client network
Answers
C.
Blocking ports 67/68 on the client network
C.
Blocking ports 67/68 on the client network
Answers
D.
Enabling port security on access ports
D.
Enabling port security on access ports
Answers
Suggested answer: A

Explanation:

To prevent incorrect IP addresses from being assigned to clients on the network and allow the network to continue to operate, the security administrator should consider configuring DHCP (Dynamic Host Configuration Protocol) snooping on the switch. DHCP snooping is a security feature that is used to prevent unauthorized DHCP servers from operating on a network. It works by allowing the switch to monitor and validate DHCP traffic on the network, ensuring that only legitimate DHCP messages are forwarded to clients. This can help to prevent incorrect IP addresses from being assigned to clients, as it ensures that only authorized DHCP servers are able to provide IP addresses to clients on the network.

A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal?

A.
Captive portal
A.
Captive portal
Answers
B.
Geofencing
B.
Geofencing
Answers
C.
Wireless client isolation
C.
Wireless client isolation
Answers
D.
Role-based access
D.
Role-based access
Answers
Suggested answer: A

Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?

A.
The switch was configured with port security.
A.
The switch was configured with port security.
Answers
B.
Newly added machines are running into DHCP conflicts.
B.
Newly added machines are running into DHCP conflicts.
Answers
C.
The IPS was not configured to recognize the new users.
C.
The IPS was not configured to recognize the new users.
Answers
D.
Recently added users were assigned to the wrong VLAN
D.
Recently added users were assigned to the wrong VLAN
Answers
Suggested answer: D

A user reports that a new VoIP phone works properly but the computer that is connected to the phone cannot access any network resources. Which of the following MOST Likely needs to be configured correctly to provide network connectivity to the computer?

A.
Port duplex settings
A.
Port duplex settings
Answers
B.
Port aggregation
B.
Port aggregation
Answers
C.
ARP settings
C.
ARP settings
Answers
D.
VLAN tags
D.
VLAN tags
Answers
E.
MDIX settings
E.
MDIX settings
Answers
Suggested answer: D

Explanation:

VLAN (virtual LAN) tags are used to identify packets as belonging to a particular VLAN. VLANs are used to segment a network into logical sub-networks, and each VLAN is assigned a unique VLAN tag. If the VLAN tag is not configured correctly, the computer may not be able to access network resources.

A technician is consolidating a topology with multiple SSlDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?

A.
Seamless roaming
A.
Seamless roaming
Answers
B.
Basic service set
B.
Basic service set
Answers
C.
WPA
C.
WPA
Answers
D.
MU-MIMO
D.
MU-MIMO
Answers
Suggested answer: A

Which of the following is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices?

A.
Twisted cable with a minimum Cat 5e certification
A.
Twisted cable with a minimum Cat 5e certification
Answers
B.
Multimode fiber with an SC connector
B.
Multimode fiber with an SC connector
Answers
C.
Twinaxial cabling using an F-type connector
C.
Twinaxial cabling using an F-type connector
Answers
D.
Cable termination using TIA/EIA-568-B
D.
Cable termination using TIA/EIA-568-B
Answers
Suggested answer: A

Explanation:

twisted cable with a minimum Cat 5e certification is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices.

A new company recently moved into an empty office space Within days, users in the next office began noticing increased latency and packet drops with their Wi-Fi-connected devices. Which of the following is the MOST likely reason for this issue?

A.
Channel overlap
A.
Channel overlap
Answers
B.
Distance from the AP
B.
Distance from the AP
Answers
C.
Bandwidth latency
C.
Bandwidth latency
Answers
D.
RF attenuation
D.
RF attenuation
Answers
E.
Network congestion
E.
Network congestion
Answers
Suggested answer: A

A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?

A.
80.87.78 0 - 80.87.78.14
A.
80.87.78 0 - 80.87.78.14
Answers
B.
80.87.78 0 - 80.87.78.110
B.
80.87.78 0 - 80.87.78.110
Answers
C.
80.87.78 1 - 80.87.78.62
C.
80.87.78 1 - 80.87.78.62
Answers
D.
80.87.78.1 - 80.87.78.158
D.
80.87.78.1 - 80.87.78.158
Answers
Suggested answer: C

Explanation:

The network 80.87.78.0/26 is a Class A network with a subnet mask of /26, which means that it contains 26 bits of network information and 6 bits of host information. The range of valid host addresses for this network is 80.87.78.1 to 80.87.78.62. Any addresses outside of this range are reserved for special purposes or are not used.

A network technician is performing tests on a potentially faulty network card that is installed in a server. Which of the following addresses will MOST likely be used during traffic diagnostic tests?

A.
10.10.10.10
A.
10.10.10.10
Answers
B.
127.0.0.1
B.
127.0.0.1
Answers
C.
192.168.0.1
C.
192.168.0.1
Answers
D.
255.255.255.0
D.
255.255.255.0
Answers
Suggested answer: B

Explanation:

127.0.0.1 is the loopback address, it is used to test the functionality of a network card by sending traffic to the card and then verifying that it is received properly. This address is used because it is guaranteed to always point to the local host, regardless of the network configuration. The IP address range for loopback addresses is 127.0.0.0/8.

Total 865 questions
Go to page: of 87