CompTIA N10-008 Practice Test - Questions Answers, Page 3

List of questions
Question 21

Which of the following is used to track and document various types of known vulnerabilities?
CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to search, use, and incorporate into products and services. CVE provides a standardized identifier and description for each vulnerability, as well as references to related sources of information. CVE helps to track and document various types of known vulnerabilities and facilitates communication and coordination among security professionals.
Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008- exam-objectives-(2-0), https://cve.mitre.org/cve/
Question 22

The network administrator is informed that a userβs email password is frequently hacked by brute- force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
Two-factor authentication (2FA) is a method of verifying a userβs identity by requiring two pieces of evidence, such as something the user knows (e.g., a password) and something the user has (e.g., a token or a smartphone). 2FA adds an extra layer of security that makes it harder for hackers to access a userβs account by brute-force programs. Complex passwords are passwords that are long, random, and use a combination of uppercase and lowercase letters, numbers, and symbols. Complex passwords are more resistant to brute-force attacks than simple or common passwords. Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.csoonline.com/article/3225913/what-is-two-factor-authentication- 2fa-how-to-enable-it-and-why-you-should.html, https://www.howtogeek.com/195430/how-to- create-a-strong-password-and-remember-it/
Question 23

A network engineer performs the following tasks to increase server bandwidth:
Connects two network cables from the server to a switch stack Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?
NIC teaming is a technique that combines two or more network interface cards (NICs) on a server into a single logical interface that can increase bandwidth, provide redundancy, and balance traffic. NIC teaming can be configured with different modes and algorithms depending on the desired outcome. Link Aggregation Control Protocol (LACP) is a protocol that enables NIC teaming by dynamically bundling multiple links between two devices into one logical link. Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://docs.microsoft.com/en-us/windows-server/networking/technologies/nic- teaming/nic-teaming
Question 24

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?
A subnet mask is a binary number that indicates which bits of an IP address belong to the network portion and which bits belong to the host portion. A slash notation (/n) indicates how many bits are used for the network portion. A /20 notation means that 20 bits are used for the network portion and 12 bits are used for the host portion. To convert /20 to a dotted decimal notation, we need to write 20 ones followed by 12 zeros in binary and then divide them into four octets separated by dots. This gives us 11111111.11111111.11110000.00000000 or 255.255.240.0 in decimal. Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.techopedia.com/definition/950/subnet-mask
Question 25

Which of the following is the LARGEST MTU for a standard Ethernet frame?
The maximum transmission unit (MTU) is the largest size of a data packet that can be transmitted over a network. A standard Ethernet frame supports an MTU of 1500 bytes, which is the default value for most Ethernet networks. Larger MTUs are possible with jumbo frames, but they are not widely supported and may cause fragmentation or compatibility issues. Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://en.wikipedia.org/wiki/Maximum_transmission_unit
Question 26

Given the following information:
Which of the following command-line tools would generate this output?
Tracert is a command-line tool that traces the route of a packet from a source to a destination and displays the number of hops and the round-trip time for each hop. The output shown in the question is an example of a tracert output, which shows five hops with their IP addresses and hostnames (if available) and three latency measurements for each hop in milliseconds. Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.lumen.com/help/en-us/network/traceroute/understanding-the- traceroute-output.html
Question 27

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
According to troubleshooting methodology, after determining the most likely probable cause of an issue, the next step is to establish a plan of action to resolve the issue and identify potential effects. This step involves defining the steps needed to implement a solution, considering the possible consequences of each step, and obtaining approval from relevant stakeholders if necessary.
Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008- exam-objectives-(2-0), https://www.comptia.org/blog/the-comptia-guide-to-it-troubleshooting
Question 28

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
IDS stands for intrusion detection system, which is a network appliance that monitors network traffic and alerts administrators of any suspicious or malicious activity. An IDS can warn of unapproved devices that are accessing the network by detecting anomalies, signatures, or behaviors that indicate unauthorized access attempts or attacks. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.cisco.com/c/en/us/products/security/what-is-an-intrusion-detection-system-ids.html
Question 29

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
Coaxial cable is a type of cable that consists of a central copper conductor surrounded by an insulating layer and a braided metal shield. Coaxial cable is commonly used to connect a cable modem to an ISP by transmitting data over cable television networks. Coaxial cable can support high bandwidth and long distances with minimal interference or attenuation. Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.techopedia.com/definition/4027/coaxial-cable
Question 30

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:
Which of the following metrics confirms there is a cabling issue?
CRC stands for Cyclic Redundancy Check, and it is a type of error-detecting code used to detect accidental changes to raw data. If the CRC count is increasing on a particular interface, it indicates that there might be an issue with the cabling, which is causing data corruption. Reference:
Network+ N10-008 Objectives: 2.1 Given a scenario, troubleshoot common physical connectivity issues.
Question