ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would be used to forward requests and replies between a DHCP server and client?

A.
Relay
A.
Relay
Answers
B.
Lease
B.
Lease
Answers
C.
Scope
C.
Scope
Answers
D.
Range
D.
Range
Answers
Suggested answer: A

Explanation:

TheDynamic Host Configuration Protocol (DHCP)is a protocol that automatically assigns IPaddresses and other network configuration parameters to network devices12.DHCP uses aclient-server model, where a DHCP client requests an IP address from a DHCP server, and theDHCP server responds with an IP address and other information34.When a DHCP client and server are on the same physical network, the DHCP client broadcasts aDHCPDISCOVER message to find a DHCP server, and the DHCP server replies with a DHCPOFFERmessage containing an IP address offer34.The DHCP client then broadcasts a DHCPREQUESTmessage to request the IP address, and the DHCP server replies with a DHCPACK message toacknowledge the IP address assignment34.When a DHCP client and server are not on the same physical network, aDHCP relayis used toforward the DHCP messages between them56.A DHCP relay is a network device, such as arouter or a switch, that listens for DHCP broadcast messages on one network interface andrelays them to another network interface where the DHCP server is located56.The DHCP relayalso adds the IP address of the network interface where the DHCP client is located to the DHCPmessages, so that the DHCP server can determine which pool of IP addresses to use for theDHCP client56.The other options are not related to forwarding requests and replies between a DHCP serverand client.ADHCP leaseis the duration of time that a DHCP server assigns an IP address to aDHCP client78.ADHCP scopeis a range of IP addresses that a DHCP server can assign to DHCPclients on a specific network segment78. ADHCP rangeis a subset of a DHCP scope that definesthe start and end IP addresses that a DHCP server can assign to DHCP clients .Therefore, the best answer is A. Relay, which would be used to forward requests and repliesbetween a DHCP server and client.1:CompTIA Network+ N10-008 Certification Study Guide, page 215

At which of the following OSI model layers does routing occur?

A.
Data link
A.
Data link
Answers
B.
Transport
B.
Transport
Answers
C.
Physical
C.
Physical
Answers
D.
Network
D.
Network
Answers
Suggested answer: D

A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?

A.
Validate the findings in a top-to-bottom approach
A.
Validate the findings in a top-to-bottom approach
Answers
B.
Duplicate the issue, if possible
B.
Duplicate the issue, if possible
Answers
C.
Establish a plan of action to resolve the issue
C.
Establish a plan of action to resolve the issue
Answers
D.
Document the findings and actions
D.
Document the findings and actions
Answers
Suggested answer: C

A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?

A.
Enable IGMP snooping on the switches.
A.
Enable IGMP snooping on the switches.
Answers
B.
Implement another DHCP server.
B.
Implement another DHCP server.
Answers
C.
Reconfigure port tagging for the video traffic.
C.
Reconfigure port tagging for the video traffic.
Answers
D.
Change the SSID of the APs
D.
Change the SSID of the APs
Answers
Suggested answer: A

Which of the following can be used to store various types of devices and provide contactless delivery to users?

A.
Asset tags
A.
Asset tags
Answers
B.
Biometrics
B.
Biometrics
Answers
C.
Access control vestibules
C.
Access control vestibules
Answers
D.
Smart lockers
D.
Smart lockers
Answers
Suggested answer: D

Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Select TWO).

A.
T1A-568-A - TIA-568-B
A.
T1A-568-A - TIA-568-B
Answers
B.
TIA-568-B - TIA-568-B
B.
TIA-568-B - TIA-568-B
Answers
C.
RJ11
C.
RJ11
Answers
D.
RJ45
D.
RJ45
Answers
E.
F-type
E.
F-type
Answers
Suggested answer: B, D

Explanation:

To make a Cat 6 cable that connects from a PC to a non-capable MDIX switch, you need to usethe same wiring standard on both ends of the cable, such as TIA-568-B, which is the mostcommon standard for Ethernet cables. This will create a straight-through cable, which is used toconnect devices of different types, such as a PC and a switch.You also need to use the appropriate connectors for the cable, which are RJ45 connectors forCat 6 cables. RJ45 connectors are 8-pin modular connectors that are used for Ethernet andother network applications. They are different from RJ11 connectors, which are 4-pin or 6-pinconnectors that are used for telephone lines. F-type connectors are coaxial connectors that areused for cable TV or satellite signals, not for Ethernet cables.TIA-568-A is another wiring standard for Ethernet cables, but it is not compatible with TIA-568-B. If you use TIA-568-A on one end and TIA-568-B on the other end of the cable, you will createa crossover cable, which is used to connect devices of the same type, such as two switches ortwo PCs. A crossover cable will not work for connecting a PC to a non-capable MDIX switch,unless the switch has an auto-MDIX feature that can automatically detect and adjust the cabletype.

CompTIA Network+ N10-008 Study Guide, Chapter 2: Network Cabling and Topologies, Section2.1: Network Cabling, p. 55-58Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 2.1: Network Cabling, p.9-10Professor Messer's CompTIA N10-008 Network+ Training Course, Video 2.1: Network Cabling,7:06-9:48

Users are reporting intermittent Wi-Fi connectivity in specific parts of a building. Which of the following should the network administrator check FIRST when troubleshooting this issue? (Select TWO).

A.
Site survey
A.
Site survey
Answers
B.
EIRP
B.
EIRP
Answers
C.
AP placement
C.
AP placement
Answers
D.
Captive portal
D.
Captive portal
Answers
E.
SSID assignment
E.
SSID assignment
Answers
F.
AP association time
F.
AP association time
Answers
Suggested answer: A, C

Explanation:

This is a coverage issue. WAP placement and power need to be checked. Site survey should be done NEXT because it takes a while.

A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?

A.
Disabling unneeded switchports
A.
Disabling unneeded switchports
Answers
B.
Changing the default VLAN
B.
Changing the default VLAN
Answers
C.
Configuring DHCP snooping
C.
Configuring DHCP snooping
Answers
D.
Writing ACLs to prevent access to the switch
D.
Writing ACLs to prevent access to the switch
Answers
Suggested answer: A

Explanation:

Disabling unneeded switchports is a securitybest practice that prevents unauthorized devices from connecting to the network andpotentially compromising its integrity or confidentiality. By disabling the switchports that arenot in use, the network manager reduces the attack surface and the risk of rogue devices, suchas laptops, printers, or cameras, from accessing the network. Disabling unneeded switchports

can also prevent MAC flooding attacks, which occur when an attacker sends a large number ofspoofed MAC addresses to a switch, causing it to overflow its MAC address table and forwardall traffic to all ports, effectively turning the switch into a hub. To disable a switchport, thenetwork manager can use the commandswitchport mode shutdownon the interfaceconfiguration mode of the switch. Changing the default VLAN, configuring DHCP snooping, andwriting ACLs are also security measures that can be applied to switches, but they are not themost likely ones in this scenario. Changing the default VLAN can prevent VLAN hopping attacks,which occur when an attacker sends frames with double 802.1Q tags to a switch, causing it toforward the frames to another VLAN. Configuring DHCP snooping can prevent DHCP spoofingattacks, which occur when an attacker sets up a rogue DHCP server on the network and offersfake IP addresses and gateway information to unsuspecting clients, redirecting their traffic tothe attacker's device. Writing ACLs can prevent unauthorized access to the switch or thenetwork resources, by filtering traffic based on source and destination IP addresses, ports,protocols, or other criteria.Reference: Network + N10-008 practice exam Flashcards | QuizletNetwork+ N10-008 Practice Test | CertBlaster | Free CompTIA Network+ Practice Test

Which of the following OSI model layers is where a technician would view UDP information?

A.
Physical
A.
Physical
Answers
B.
Data link
B.
Data link
Answers
C.
Network
C.
Network
Answers
D.
Transport
D.
Transport
Answers
Suggested answer: D

A technician installed an 8-port switch in a user's office. The user needs to add a second computer in the office, so the technician connects both PCs to the switch and connects the switch to the wall jack. However, the new PC cannot connect to network resources. The technician then observes the following:

• The new computer does not get an IP address on the client's VLAN.

• Both computers have a link light on their NICs.

• The new PC appears to be operating normally except for the network issue.

• The existing computer operates normally.

Which of the following should the technician do NEXT to address the situation?

A.
Contact the network team to resolve the port security issue.
A.
Contact the network team to resolve the port security issue.
Answers
B.
Contact the server team to have a record created in DNS for the new PC.
B.
Contact the server team to have a record created in DNS for the new PC.
Answers
C.
Contact the security team to review the logs on the company's SIEM.
C.
Contact the security team to review the logs on the company's SIEM.
Answers
D.
Contact the application team to check NetFlow data from the connected switch.
D.
Contact the application team to check NetFlow data from the connected switch.
Answers
Suggested answer: A
Total 865 questions
Go to page: of 87