ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is used to track and document various types of known vulnerabilities?

A.
CVE
A.
CVE
Answers
B.
Penetration testing
B.
Penetration testing
Answers
C.
Zero-day
C.
Zero-day
Answers
D.
SIEM
D.
SIEM
Answers
E.
Least privilege
E.
Least privilege
Answers
Suggested answer: A

Explanation:

CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to search, use, and incorporate into products and services. CVE provides a standardized identifier and description for each vulnerability, as well as references to related sources of information. CVE helps to track and document various types of known vulnerabilities and facilitates communication and coordination among security professionals.

Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008- exam-objectives-(2-0), https://cve.mitre.org/cve/

The network administrator is informed that a user’s email password is frequently hacked by brute- force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

A.
Captive portal
A.
Captive portal
Answers
B.
Two-factor authentication
B.
Two-factor authentication
Answers
C.
Complex passwords
C.
Complex passwords
Answers
D.
Geofencing
D.
Geofencing
Answers
E.
Role-based access
E.
Role-based access
Answers
F.
Explicit deny
F.
Explicit deny
Answers
Suggested answer: B, C

Explanation:

Two-factor authentication (2FA) is a method of verifying a user’s identity by requiring two pieces of evidence, such as something the user knows (e.g., a password) and something the user has (e.g., a token or a smartphone). 2FA adds an extra layer of security that makes it harder for hackers to access a user’s account by brute-force programs. Complex passwords are passwords that are long, random, and use a combination of uppercase and lowercase letters, numbers, and symbols. Complex passwords are more resistant to brute-force attacks than simple or common passwords. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.csoonline.com/article/3225913/what-is-two-factor-authentication- 2fa-how-to-enable-it-and-why-you-should.html, https://www.howtogeek.com/195430/how-to- create-a-strong-password-and-remember-it/

A network engineer performs the following tasks to increase server bandwidth:

Connects two network cables from the server to a switch stack Configure LACP on the switchports

Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?

A.
Load balancing
A.
Load balancing
Answers
B.
Multipathing
B.
Multipathing
Answers
C.
NIC teaming
C.
NIC teaming
Answers
D.
Clustering
D.
Clustering
Answers
Suggested answer: C

Explanation:

NIC teaming is a technique that combines two or more network interface cards (NICs) on a server into a single logical interface that can increase bandwidth, provide redundancy, and balance traffic. NIC teaming can be configured with different modes and algorithms depending on the desired outcome. Link Aggregation Control Protocol (LACP) is a protocol that enables NIC teaming by dynamically bundling multiple links between two devices into one logical link. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://docs.microsoft.com/en-us/windows-server/networking/technologies/nic- teaming/nic-teaming

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?

A.
255.255.128.0
A.
255.255.128.0
Answers
B.
255.255.192.0
B.
255.255.192.0
Answers
C.
255.255.240.0
C.
255.255.240.0
Answers
D.
255.255.248.0
D.
255.255.248.0
Answers
Suggested answer: C

Explanation:

A subnet mask is a binary number that indicates which bits of an IP address belong to the network portion and which bits belong to the host portion. A slash notation (/n) indicates how many bits are used for the network portion. A /20 notation means that 20 bits are used for the network portion and 12 bits are used for the host portion. To convert /20 to a dotted decimal notation, we need to write 20 ones followed by 12 zeros in binary and then divide them into four octets separated by dots. This gives us 11111111.11111111.11110000.00000000 or 255.255.240.0 in decimal. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.techopedia.com/definition/950/subnet-mask

Which of the following is the LARGEST MTU for a standard Ethernet frame?

A.
1452
A.
1452
Answers
B.
1492
B.
1492
Answers
C.
1500
C.
1500
Answers
D.
2304
D.
2304
Answers
Suggested answer: C

Explanation:

The maximum transmission unit (MTU) is the largest size of a data packet that can be transmitted over a network. A standard Ethernet frame supports an MTU of 1500 bytes, which is the default value for most Ethernet networks. Larger MTUs are possible with jumbo frames, but they are not widely supported and may cause fragmentation or compatibility issues. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://en.wikipedia.org/wiki/Maximum_transmission_unit

Given the following information:

Which of the following command-line tools would generate this output?

A.
netstat
A.
netstat
Answers
B.
arp
B.
arp
Answers
C.
dig
C.
dig
Answers
D.
tracert
D.
tracert
Answers
Suggested answer: D

Explanation:

Tracert is a command-line tool that traces the route of a packet from a source to a destination and displays the number of hops and the round-trip time for each hop. The output shown in the question is an example of a tracert output, which shows five hops with their IP addresses and hostnames (if available) and three latency measurements for each hop in milliseconds. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.lumen.com/help/en-us/network/traceroute/understanding-the- traceroute-output.html

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

A.
Establish a plan of action to resolve the issue and identify potential effects
A.
Establish a plan of action to resolve the issue and identify potential effects
Answers
B.
Verify full system functionality and, if applicable, implement preventive measures
B.
Verify full system functionality and, if applicable, implement preventive measures
Answers
C.
Implement the solution or escalate as necessary
C.
Implement the solution or escalate as necessary
Answers
D.
Test the theory to determine the cause
D.
Test the theory to determine the cause
Answers
Suggested answer: A

Explanation:

According to troubleshooting methodology, after determining the most likely probable cause of an issue, the next step is to establish a plan of action to resolve the issue and identify potential effects. This step involves defining the steps needed to implement a solution, considering the possible consequences of each step, and obtaining approval from relevant stakeholders if necessary.

Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008- exam-objectives-(2-0), https://www.comptia.org/blog/the-comptia-guide-to-it-troubleshooting

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

A.
Firewall
A.
Firewall
Answers
B.
AP
B.
AP
Answers
C.
Proxy server
C.
Proxy server
Answers
D.
IDS
D.
IDS
Answers
Suggested answer: D

Explanation:

IDS stands for intrusion detection system, which is a network appliance that monitors network traffic and alerts administrators of any suspicious or malicious activity. An IDS can warn of unapproved devices that are accessing the network by detecting anomalies, signatures, or behaviors that indicate unauthorized access attempts or attacks. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.cisco.com/c/en/us/products/security/what-is-an-intrusion-detection-system-ids.html

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

A.
Coaxial
A.
Coaxial
Answers
B.
Single-mode fiber
B.
Single-mode fiber
Answers
C.
Cat 6e
C.
Cat 6e
Answers
D.
Multimode fiber
D.
Multimode fiber
Answers
Suggested answer: A

Explanation:

Coaxial cable is a type of cable that consists of a central copper conductor surrounded by an insulating layer and a braided metal shield. Coaxial cable is commonly used to connect a cable modem to an ISP by transmitting data over cable television networks. Coaxial cable can support high bandwidth and long distances with minimal interference or attenuation. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.techopedia.com/definition/4027/coaxial-cable

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:

Which of the following metrics confirms there is a cabling issue?

A.
Last cleared
A.
Last cleared
Answers
B.
Number of packets output
B.
Number of packets output
Answers
C.
CRCs
C.
CRCs
Answers
D.
Giants
D.
Giants
Answers
E.
Multicasts
E.
Multicasts
Answers
Suggested answer: C

Explanation:

CRC stands for Cyclic Redundancy Check, and it is a type of error-detecting code used to detect accidental changes to raw data. If the CRC count is increasing on a particular interface, it indicates that there might be an issue with the cabling, which is causing data corruption. Reference:

Network+ N10-008 Objectives: 2.1 Given a scenario, troubleshoot common physical connectivity issues.

Total 865 questions
Go to page: of 87