ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

Which of the following is used to track and document various types of known vulnerabilities?

CVE
CVE
Penetration testing
Penetration testing
Zero-day
Zero-day
SIEM
SIEM
Least privilege
Least privilege
Suggested answer: A
Explanation:

CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to search, use, and incorporate into products and services. CVE provides a standardized identifier and description for each vulnerability, as well as references to related sources of information. CVE helps to track and document various types of known vulnerabilities and facilitates communication and coordination among security professionals.

Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008- exam-objectives-(2-0), https://cve.mitre.org/cve/

asked 02/10/2024
j j
37 questions

Question 22

Report Export Collapse

The network administrator is informed that a user’s email password is frequently hacked by brute- force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

Captive portal
Captive portal
Two-factor authentication
Two-factor authentication
Complex passwords
Complex passwords
Geofencing
Geofencing
Role-based access
Role-based access
Explicit deny
Explicit deny
Suggested answer: B, C
Explanation:

Two-factor authentication (2FA) is a method of verifying a user’s identity by requiring two pieces of evidence, such as something the user knows (e.g., a password) and something the user has (e.g., a token or a smartphone). 2FA adds an extra layer of security that makes it harder for hackers to access a user’s account by brute-force programs. Complex passwords are passwords that are long, random, and use a combination of uppercase and lowercase letters, numbers, and symbols. Complex passwords are more resistant to brute-force attacks than simple or common passwords. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.csoonline.com/article/3225913/what-is-two-factor-authentication- 2fa-how-to-enable-it-and-why-you-should.html, https://www.howtogeek.com/195430/how-to- create-a-strong-password-and-remember-it/

asked 02/10/2024
Mark Churly
40 questions

Question 23

Report Export Collapse

A network engineer performs the following tasks to increase server bandwidth:

Connects two network cables from the server to a switch stack Configure LACP on the switchports

Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?

Load balancing
Load balancing
Multipathing
Multipathing
NIC teaming
NIC teaming
Clustering
Clustering
Suggested answer: C
Explanation:

NIC teaming is a technique that combines two or more network interface cards (NICs) on a server into a single logical interface that can increase bandwidth, provide redundancy, and balance traffic. NIC teaming can be configured with different modes and algorithms depending on the desired outcome. Link Aggregation Control Protocol (LACP) is a protocol that enables NIC teaming by dynamically bundling multiple links between two devices into one logical link. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://docs.microsoft.com/en-us/windows-server/networking/technologies/nic- teaming/nic-teaming

asked 02/10/2024
Priya Ketkar
43 questions

Question 24

Report Export Collapse

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?

255.255.128.0
255.255.128.0
255.255.192.0
255.255.192.0
255.255.240.0
255.255.240.0
255.255.248.0
255.255.248.0
Suggested answer: C
Explanation:

A subnet mask is a binary number that indicates which bits of an IP address belong to the network portion and which bits belong to the host portion. A slash notation (/n) indicates how many bits are used for the network portion. A /20 notation means that 20 bits are used for the network portion and 12 bits are used for the host portion. To convert /20 to a dotted decimal notation, we need to write 20 ones followed by 12 zeros in binary and then divide them into four octets separated by dots. This gives us 11111111.11111111.11110000.00000000 or 255.255.240.0 in decimal. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.techopedia.com/definition/950/subnet-mask

asked 02/10/2024
Josef Anwar Panerio
43 questions

Question 25

Report Export Collapse

Which of the following is the LARGEST MTU for a standard Ethernet frame?

1452
1452
1492
1492
1500
1500
2304
2304
Suggested answer: C
Explanation:

The maximum transmission unit (MTU) is the largest size of a data packet that can be transmitted over a network. A standard Ethernet frame supports an MTU of 1500 bytes, which is the default value for most Ethernet networks. Larger MTUs are possible with jumbo frames, but they are not widely supported and may cause fragmentation or compatibility issues. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://en.wikipedia.org/wiki/Maximum_transmission_unit

asked 02/10/2024
PKE Holding AG Leitgeb
43 questions

Question 26

Report Export Collapse

Given the following information:

CompTIA N10-008 image Question 26 95910 10022024175234000000

Which of the following command-line tools would generate this output?

netstat
netstat
Most voted
(1)
Most voted
arp
arp
dig
dig
tracert
tracert
Suggested answer: D
Explanation:

Tracert is a command-line tool that traces the route of a packet from a source to a destination and displays the number of hops and the round-trip time for each hop. The output shown in the question is an example of a tracert output, which shows five hops with their IP addresses and hostnames (if available) and three latency measurements for each hop in milliseconds. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.lumen.com/help/en-us/network/traceroute/understanding-the- traceroute-output.html

asked 02/10/2024
Jose Manuel GONZALEZ BALSEIRO
42 questions

Question 27

Report Export Collapse

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

Establish a plan of action to resolve the issue and identify potential effects
Establish a plan of action to resolve the issue and identify potential effects
Verify full system functionality and, if applicable, implement preventive measures
Verify full system functionality and, if applicable, implement preventive measures
Implement the solution or escalate as necessary
Implement the solution or escalate as necessary
Test the theory to determine the cause
Test the theory to determine the cause
Suggested answer: A
Explanation:

According to troubleshooting methodology, after determining the most likely probable cause of an issue, the next step is to establish a plan of action to resolve the issue and identify potential effects. This step involves defining the steps needed to implement a solution, considering the possible consequences of each step, and obtaining approval from relevant stakeholders if necessary.

Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008- exam-objectives-(2-0), https://www.comptia.org/blog/the-comptia-guide-to-it-troubleshooting

asked 02/10/2024
Paul Tierney
43 questions

Question 28

Report Export Collapse

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

Firewall
Firewall
AP
AP
Proxy server
Proxy server
IDS
IDS
Suggested answer: D
Explanation:

IDS stands for intrusion detection system, which is a network appliance that monitors network traffic and alerts administrators of any suspicious or malicious activity. An IDS can warn of unapproved devices that are accessing the network by detecting anomalies, signatures, or behaviors that indicate unauthorized access attempts or attacks. Reference: https://partners.comptia.org/docs/default- source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.cisco.com/c/en/us/products/security/what-is-an-intrusion-detection-system-ids.html

asked 02/10/2024
ACHILLE CARROLL
46 questions

Question 29

Report Export Collapse

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

Coaxial
Coaxial
Single-mode fiber
Single-mode fiber
Cat 6e
Cat 6e
Multimode fiber
Multimode fiber
Suggested answer: A
Explanation:

Coaxial cable is a type of cable that consists of a central copper conductor surrounded by an insulating layer and a braided metal shield. Coaxial cable is commonly used to connect a cable modem to an ISP by transmitting data over cable television networks. Coaxial cable can support high bandwidth and long distances with minimal interference or attenuation. Reference:

https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam- objectives-(2-0), https://www.techopedia.com/definition/4027/coaxial-cable

asked 02/10/2024
Arkadius Thoma
53 questions

Question 30

Report Export Collapse

A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:

CompTIA N10-008 image Question 30 95914 10022024175234000000

Which of the following metrics confirms there is a cabling issue?

Last cleared
Last cleared
Number of packets output
Number of packets output
CRCs
CRCs
Giants
Giants
Multicasts
Multicasts
Suggested answer: C
Explanation:

CRC stands for Cyclic Redundancy Check, and it is a type of error-detecting code used to detect accidental changes to raw data. If the CRC count is increasing on a particular interface, it indicates that there might be an issue with the cabling, which is causing data corruption. Reference:

Network+ N10-008 Objectives: 2.1 Given a scenario, troubleshoot common physical connectivity issues.

asked 02/10/2024
Bruce Baynes
32 questions
Total 865 questions
Go to page: of 87
Search

Related questions