ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?

A.
MAC table
A.
MAC table
Answers
B.
Neighbor Discovery Protocol
B.
Neighbor Discovery Protocol
Answers
C.
ARP table
C.
ARP table
Answers
D.
IPConfig
D.
IPConfig
Answers
E.
ACL table
E.
ACL table
Answers
Suggested answer: C

Explanation:

The ARP table is a database that is used by a device to map MAC addresses to their corresponding IP addresses. When a device sends a packet to another device on the same network, it uses the MAC address of the destination device to deliver the packet. The ARP table allows the device to determine the IP address of the destination device based on its MAC address.

Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?

A.
EIGRP
A.
EIGRP
Answers
B.
BGP
B.
BGP
Answers
C.
IPv6
C.
IPv6
Answers
D.
MPLS
D.
MPLS
Answers
Suggested answer: B

Explanation:

BGP is a routing protocol that is used to exchange routing information between different autonomous systems (ASes) on the internet. An autonomous system is a network or group of networks that is under the same administrative control and uses a common routing protocol. By acquiring its own public IP prefixes and autonomous system number, a company can use BGP to advertise these prefixes to other ASes and establish its own internet connection. This would enable the company to have more control over its internet connection and potentially improve its connectivity.EIGRP (Enhanced Interior Gateway Routing Protocol) is a routing protocol used within a single autonomous system, so it would not be used to establish a connection to the internet. IPv6 is a version of the Internet Protocol (IP) used to identify devices on a network. It is not a routing protocol and would not be used to establish an internet connection.MPLS (Multi-Protocol Label Switching) is a networking technology that is used to route packets between different networks. It is not a routing protocol and would not be used to establish an internet connection.

A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Select TWO).

A.
Data loss prevention policy
A.
Data loss prevention policy
Answers
B.
BYOD policy
B.
BYOD policy
Answers
C.
Acceptable use policy
C.
Acceptable use policy
Answers
D.
Non-disclosure agreement
D.
Non-disclosure agreement
Answers
E.
Disaster recovery plan
E.
Disaster recovery plan
Answers
F.
Physical network diagram
F.
Physical network diagram
Answers
Suggested answer: E, F

Explanation:

A disaster recovery plan is a document that outlines the procedures and steps to restore thenormal operations of a network in the event of a disaster, such as a fire, flood, power outage,cyberattack, or human error. It includes the roles and responsibilities of the staff, the backupand recovery strategies, the communication channels, the testing and maintenance schedules,and the inventory of the network assets and resources. A disaster recovery plan needs to beupdated to reflect any changes in the network topology, configuration, or equipment, such asthe installation of an additional IDF (Intermediate Distribution Frame), which is a wiring closetthat connects the MDF (Main Distribution Frame) to the end devices. Updating the disasterrecovery plan ensures that the network administrator has the most accurate and currentinformation to restore the network in case of a disaster.A physical network diagram is a visual representation of the physical layout and connections ofthe network devices, such as routers, switches, firewalls, servers, workstations, printers, andcables. It shows the location, name, IP address, MAC address, and port number of each device,as well as the type, length, and color of each cable. A physical network diagram needs to beupdated to reflect any changes in the network infrastructure, such as the installation of anadditional IDF, which adds more devices and cables to the network. Updating the physicalnetwork diagram helps the network administrator to troubleshoot, monitor, and document thenetwork performance and status.

A data loss prevention policy is a document that defines the rules and guidelines to prevent theunauthorized access, disclosure, modification, or deletion of sensitive or confidential data onthe network. It includes the classification of the data, the encryption and backup methods, theaccess control and authentication mechanisms, the audit and logging procedures, and theincident response and reporting protocols. A data loss prevention policy does not need to beupdated to reflect the installation of an additional IDF, unless the IDF contains devices or cablesthat handle sensitive or confidential data, in which case the policy should specify the securitymeasures and controls for those devices or cables.A BYOD (Bring Your Own Device) policy is a document that regulates the use of personaldevices, such as smartphones, tablets, laptops, or USB drives, on the network. It includes therequirements and restrictions for the devices, the network access and security policies, the userrights and responsibilities, the support and maintenance services, and the legal and ethicalimplications. A BYOD policy does not need to be updated to reflect the installation of anadditional IDF, unless the IDF affects the network access or security of the personal devices, inwhich case the policy should clarify the impact and the actions for the users.An acceptable use policy is a document that specifies the rules and expectations for theappropriate and ethical use of the network resources and services by the users. It includes thepurpose and scope of the network, the acceptable and unacceptable behaviors and activities,the consequences and penalties for violations, and the user acknowledgment and agreement.An acceptable use policy does not need to be updated to reflect the installation of an additionalIDF, unless the IDF changes the purpose or scope of the network, in which case the policyshould inform the users of the changes and the implications.A non-disclosure agreement is a legal contract that binds the parties involved in the networkproject or service to keep the confidential information secret and not to share it with anyunauthorized third parties. It includes the definition and scope of the confidential information,the duration and termination of the agreement, the exceptions and exclusions, the remediesand damages, and the signatures and dates of the parties. A non-disclosure agreement doesnot need to be updated to reflect the installation of an additional IDF, unless the IDF involvesconfidential information that is not covered by the existing agreement, in which case theagreement should be amended or renewed to include the new information.

A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer?

A.
Port duplex settings
A.
Port duplex settings
Answers
B.
Port aggregation
B.
Port aggregation
Answers
C.
ARP settings
C.
ARP settings
Answers
D.
VLAN tags
D.
VLAN tags
Answers
E.
MDIX settings
E.
MDIX settings
Answers
Suggested answer: D

Explanation:

VoIP phone is a device that uses voice over IP (VoIP) technology to transmit and receive voicecalls over a network. A VoIP phone typically has a built-in switch that allows a computer to beconnected to the same network port as the phone, sharing the same physical link andbandwidth.A VLAN tag is a piece of information that is added to the header of a network frame to indicatewhich virtual LAN (VLAN) it belongs to. A VLAN is a logical grouping of network devices thatshare the same broadcast domain, regardless of their physical location or connection. VLANscan help to isolate traffic, improve security, and reduce congestion on a network.A VLAN tag is required to provide network connectivity to the computer that is connected tothe VoIP phone, because the phone and the computer may belong to different VLANs. Forexample, the phone may belong to a voice VLAN that is dedicated for VoIP traffic, while thecomputer may belong to a data VLAN that is used for general network access. Without a VLANtag, the switch that connects to the VoIP phone would not be able to distinguish between theframes from the phone and the frames from the computer, and would not be able to forwardthem to the correct destination VLAN.Therefore, option D is the most likely answer, as the VLAN tags need to be configured correctlyto provide network connectivity to the computer. The switch port that connects to the VoIPphone needs to be configured as a trunk port, which can carry multiple VLANs, and the VoIPphone needs to be configured to add the appropriate VLAN tag to the frames from thecomputer.Option A is not a likely answer, as the port duplex settings determine the mode of datatransmission between the switch and the VoIP phone. The port duplex settings can be either

half-duplex, which means that data can be transmitted in one direction at a time, or full-duplex,which means that data can be transmitted in both directions simultaneously. The port duplexsettings do not affect the VLAN tags or the network connectivity to the computer.Option B is also not a likely answer, as the port aggregation is a technique that combinesmultiple physical ports into a single logical port, increasing the bandwidth and redundancy ofthe link. The port aggregation does not affect the VLAN tags or the network connectivity to thecomputer.Option C is also not a likely answer, as the ARP settings are related to the address resolutionprotocol (ARP), which is a protocol that maps a network layer address, such as an IP address, toa data link layer address, such as a MAC address. The ARP settings do not affect the VLAN tagsor the network connectivity to the computer.Option E is also not a likely answer, as the MDIX settings are related to the medium dependentinterface crossover (MDIX), which is a feature that allows a switch to automatically detect thetype of cable that is connected to a port, and adjust the pinout accordingly. The MDIX settingsdo not affect the VLAN tags or the network connectivity to the computer.CompTIA Network+ N10-008 Study Guide, Chapter 3: Network Architecture, Section 3.1:Network Topologies and Technologies, Page 1361Professor Messer's CompTIA N10-008 Network+ Course Notes, Section 3.1: Network Topologiesand Technologies, Page 232What is a VoIP Phone? | Definition and Examples3What is a VLAN Tag? | Definition and Examples4How to Configure VLANs on a VoIP Phone - Cisco5

A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?

A.
Disabling unneeded switchports
A.
Disabling unneeded switchports
Answers
B.
Implementing role-based access
B.
Implementing role-based access
Answers
C.
Changing the default passwords
C.
Changing the default passwords
Answers
D.
Configuring an access control list
D.
Configuring an access control list
Answers
Suggested answer: B

Explanation:

Role-based access is a security technique that assigns permissions and privileges to users or groups based on their roles or functions within an organization. Role-based access can help secure the physical networking equipment by limiting who can access, modify, or manage the devices in the shared IT closet. Only authorized personnel with a valid role and credentials should be able to access the networking equipment. Disabling unneeded switchports is a security technique that prevents unauthorized devices from connecting to the network by turning off unused ports on a switch. Changing the default passwords is a security technique that prevents unauthorized access to network devices by replacing the factory-set passwords with strong and unique ones. Configuring an access control list is a security technique that filters network traffic by allowing or denying packets based on criteria such as source and destination IP addresses, ports, or protocols.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.2:

Given a scenario, use appropriate network hardening techniques.

Which of the following would be the BEST choice to connect branch sites to a main office securely?

A.
VPN headend
A.
VPN headend
Answers
B.
Proxy server
B.
Proxy server
Answers
C.
Bridge
C.
Bridge
Answers
D.
Load balancer
D.
Load balancer
Answers
Suggested answer: A

Explanation:

Host-to-Site, or Client-to-Site, VPN allows for remote servers, clients, and other hosts to establish tunnels through a VPN gateway (or VPN headend) via a private network. The tunnel between the headend and the client host encapsulates and encrypts data.

A network administrator is designing a wireless network. The administrator must ensure a rented office space has a sufficient signal. Reducing exposure to the wireless network is important, but it is secondary to the primary objective. Which of the following would MOST likely facilitate the correct accessibility to the Wi-Fi network?

A.
Polarization
A.
Polarization
Answers
B.
Channel utilization
B.
Channel utilization
Answers
C.
Channel bonding
C.
Channel bonding
Answers
D.
Antenna type
D.
Antenna type
Answers
E.
MU-MIMO
E.
MU-MIMO
Answers
Suggested answer: D

Explanation:

Theantenna typeis the factor that would most likely facilitate the correct accessibility to the Wi-Fi network, as it determines the shape, direction, and range of the wireless signal12.Differenttypes of antennas have different characteristics, such as gain, beamwidth, and polarization, thataffect how well they can cover a given area and overcome obstacles or interference12.Forexample, an omnidirectional antenna can radiate the signal in all directions, while a directionalantenna can focus the signal in a specific direction12. By choosing the appropriate antenna typefor the rented office space, the network administrator can ensure a sufficient signal and reduceexposure to the wireless network.Polarizationis the orientation of the electric field of the wireless signal, which can be eithervertical, horizontal, or circular12.Polarization affects the compatibility and performance of thewireless communication, as the transmitter and receiver antennas should have the samepolarization to avoid signal loss12.However, polarization alone would not facilitate the correctaccessibility to the Wi-Fi network, as it depends on the antenna type and the environment12.Channel utilizationis the measure of how much a wireless channel is occupied by datatransmission, management frames, or control frames13.Channel utilization affects theefficiency and throughput of the wireless network, as a high channel utilization can indicatecongestion, interference, or contention13.However, channel utilization alone would notfacilitate the correct accessibility to the Wi-Fi network, as it depends on the network design,configuration, and demand13.Channel bondingis the technique of combining two adjacent channels into one wider channel toincrease the bandwidth and throughput of the wireless network1.Channel bonding can improvethe performance of the wireless network, especially for applications that require high datarates, such as video streaming1.However, channel bonding alone would not facilitate the

correct accessibility to the Wi-Fi network, as it also introduces some challenges, such asincreased interference, reduced channel availability, and compatibility issues1.MU-MIMO(Multi-User Multiple Input Multiple Output) is a technology that allows a wirelessaccess point to transmit data to multiple devices simultaneously using multiple antennas andspatial streams1.MU-MIMO can enhance the capacity and efficiency of the wireless network,especially for high-density environments, such as offices, classrooms, or stadiums1.However,MU-MIMO alone would not facilitate the correct accessibility to the Wi-Fi network, as it alsorequires some conditions, such as compatible devices, sufficient signal strength, and optimalantenna placement1.1: CompTIA Network+ N10-008 Study Guide, Chapter 4: Wireless Technologies2: Professor Messer's CompTIA N10-008 Network+ Course Notes, Page 42: Wireless Antennas3: Professor Messer's CompTIA N10-008 Network+ Course Notes, Page 43: WirelessTroubleshooting: Professor Messer's CompTIA N10-008 Network+ Course Notes, Page 41: Wireless Channels: Professor Messer's CompTIA N10-008 Network+ Course Notes, Page 40: Wireless Technologies

A company wants to add a local redundant data center to its network in case of failure at its primary location. Which of the following would give the LEAST amount of redundancy for the company's network?

A.
Cold site
A.
Cold site
Answers
B.
Hot site
B.
Hot site
Answers
C.
Cloud site
C.
Cloud site
Answers
D.
Warm site
D.
Warm site
Answers
Suggested answer: A

A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers?

A.
Coaxial over Ethernet
A.
Coaxial over Ethernet
Answers
B.
Internet Small Computer Systems Interface
B.
Internet Small Computer Systems Interface
Answers
C.
Fibre Channel
C.
Fibre Channel
Answers
D.
Gigabit interface converter
D.
Gigabit interface converter
Answers
Suggested answer: C

Explanation:

The transceivers labeled 8Gbps are likely to be used with the Fibre Channel protocol. Fibre Channel is a high-speed networking technology that is primarily used to connect storage devices to servers in storage area networks (SANs). It is capable of transmitting data at speeds of up to 8 Gbps (gigabits per second), and uses specialized transceivers to transmit and receive data over fiber optic cables.

Coaxial over Ethernet (CoE) is a networking technology that uses coaxial cables to transmit data, and is not related to the transceivers in question. Internet Small Computer Systems Interface (iSCSI) is a protocol that allows devices to communicate over a network using the SCSI protocol, and does not typically use specialized transceivers. Gigabit interface converter (GBIC) is a type of transceiver used to transmit and receive data over fiber optic cables, but it is not capable of transmitting data at 8 Gbps.

During a client audit, a network analyst is tasked with recommending changes to upgrade the client network and readiness. Afield technician has submitted the following report:

Based on this report, which of the following metrics or sensors would be the BEST recommendation to the client?

A.
Electrical
A.
Electrical
Answers
B.
Humidity
B.
Humidity
Answers
C.
Flooding
C.
Flooding
Answers
D.
Temperature
D.
Temperature
Answers
Suggested answer: B

Explanation:

Humidity is the amount of water vapor in the air. High humidity can cause corrosion, condensation, and short circuits in electronic devices. Low humidity can cause static electricity and damage sensitive components. The optimal humidity range for a data center is between 40% and 60%. Based on the report, the humidity level in the server room is 70%, which is too high and can affect the performance and reliability of the network equipment. Therefore, the best recommendation to the client is to install a humidity sensor and a dehumidifier to control the humidity level in the server room.

Reference: Network+ Study Guide Objective 5.1: Summarize the importance of physical security controls.

Total 865 questions
Go to page: of 87