ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 27

Question list
Search
Search

List of questions

Search

Related questions











Which of the following devices have the capability to allow communication between two different subnetworks? (Select TWO).

A.
IDS
A.
IDS
Answers
B.
Access point
B.
Access point
Answers
C.
Layer 2 switch
C.
Layer 2 switch
Answers
D.
Layer 3 switch
D.
Layer 3 switch
Answers
E.
Router
E.
Router
Answers
F.
Media converter
F.
Media converter
Answers
Suggested answer: D, E

Which of the following describes traffic going in and out of a data center from the internet?

A.
Demarcation point
A.
Demarcation point
Answers
B.
North-South
B.
North-South
Answers
C.
Fibre Channel
C.
Fibre Channel
Answers
D.
Spine and leaf
D.
Spine and leaf
Answers
Suggested answer: B

A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?

A.
ipconfig
A.
ipconfig
Answers
B.
netstat
B.
netstat
Answers
C.
tracert
C.
tracert
Answers
D.
ping
D.
ping
Answers
Suggested answer: C

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors?

A.
A bad wire on the Cat 5e cable
A.
A bad wire on the Cat 5e cable
Answers
B.
The wrong VLAN assignment to the switchport
B.
The wrong VLAN assignment to the switchport
Answers
C.
A misconfigured QoS setting on the router
C.
A misconfigured QoS setting on the router
Answers
D.
Both sides of the switch trunk set to full duplex
D.
Both sides of the switch trunk set to full duplex
Answers
Suggested answer: A

A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?

A.
Active-active
A.
Active-active
Answers
B.
Warm
B.
Warm
Answers
C.
Cold
C.
Cold
Answers
D.
Cloud
D.
Cloud
Answers
Suggested answer: B

Explanation:

Active-active refers to more than one NIC being active at the same time. In my opinion, this question is referring to a recovery site (hot, warm, cold, cloud)

A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?

A.
The configuration of the encryption protocol
A.
The configuration of the encryption protocol
Answers
B.
Interference from other devices
B.
Interference from other devices
Answers
C.
Insufficient bandwidth capacity
C.
Insufficient bandwidth capacity
Answers
D.
Duplicate SSIDs
D.
Duplicate SSIDs
Answers
Suggested answer: B

Explanation:

Interference from other devices can cause wireless connection drops or slow performance. This can happen when devices use the same or overlapping frequency channels as the wireless network, such as cordless phones, microwaves, Bluetooth devices, etc. To avoid interference, it is recommended to use non-overlapping channels and avoid placing wireless access points near potential sources of interference. Reference: Network+ Study Guide Objective 2.1: Explain the purposes and use cases for advanced network devices. Subobjective: Wireless controllers.

A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?

A.
SSO
A.
SSO
Answers
B.
LDAP
B.
LDAP
Answers
C.
EAP
C.
EAP
Answers
D.
TACACS+
D.
TACACS+
Answers
Suggested answer: A

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

A.
Syslog server messages
A.
Syslog server messages
Answers
B.
MIB of the attacked firewall
B.
MIB of the attacked firewall
Answers
C.
Network baseline reports
C.
Network baseline reports
Answers
D.
NetFlow aggregate data
D.
NetFlow aggregate data
Answers
Suggested answer: A

Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?

A.
Secure web access to internal corporate resources.
A.
Secure web access to internal corporate resources.
Answers
B.
Upgrade security via the use of an NFV technology
B.
Upgrade security via the use of an NFV technology
Answers
C.
Connect two data centers across the internet.
C.
Connect two data centers across the internet.
Answers
D.
Increase VPN availability by using a SDWAN technology.
D.
Increase VPN availability by using a SDWAN technology.
Answers
Suggested answer: A

A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks needs to be completed to allow the phone to operate correctly?

A.
Assign the phone's switchport to the correct VLAN
A.
Assign the phone's switchport to the correct VLAN
Answers
B.
Statically assign the phone's gateway address.
B.
Statically assign the phone's gateway address.
Answers
C.
Configure a route on the VoIP network router.
C.
Configure a route on the VoIP network router.
Answers
D.
Implement a VoIP gateway
D.
Implement a VoIP gateway
Answers
Suggested answer: A
Total 865 questions
Go to page: of 87