ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 32

Question list
Search
Search

List of questions

Search

Related questions











A technician wants to monitor and provide traffic segmentation across the network. The technician would like to assign each department a specific identifier. Which of the following will the technician MOST likely use?

A.
Flow control
A.
Flow control
Answers
B.
Traffic shaping
B.
Traffic shaping
Answers
C.
VLAN tagging
C.
VLAN tagging
Answers
D.
Network performance baselines
D.
Network performance baselines
Answers
Suggested answer: C

Explanation:

To monitor and provide traffic segmentation across the network, a technician may use the concept of VLANs (Virtual Local Area Networks). VLANs are a way of dividing a single physical network into multiple logical networks, each with its own unique identifier or "tag."

By assigning each department a specific VLAN identifier, the technician can segment the network traffic and ensure that the different departments' traffic is kept separate from one another. This can help to improve network security, performance, and scalability, as well as allowing for better monitoring and control of the network traffic.

To implement VLANs, the technician will need to configure VLAN tagging on the network devices, such as switches and routers, and assign each department's devices to the appropriate VLAN. The technician may also need to configure VLAN trunking to allow the different VLANs to communicate with each other.

By using VLANs, the technician can effectively monitor and segment the network traffic, providing better control and visibility into the network.

Which of the following is used to elect an STP root?

A.
A bridge ID
A.
A bridge ID
Answers
B.
A bridge protocol data unit
B.
A bridge protocol data unit
Answers
C.
Interface port priority
C.
Interface port priority
Answers
D.
A switch's root port
D.
A switch's root port
Answers
Suggested answer: B

Explanation:

"Using special STP frames known as bridge protocol data units (BPDUs), switches communicate with other switches to prevent loops from happening in the first place. Configuration BPDUs establish the topology, where one switch is elected root bridge and acts as the center of the STP universe. Each switch then uses the root bridge as a reference point to maintain a loop-free topology."

A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?

A.
FTP
A.
FTP
Answers
B.
TFTP
B.
TFTP
Answers
C.
SMTP
C.
SMTP
Answers
D.
SFTP
D.
SFTP
Answers
Suggested answer: D

Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?

A.
Traffic shaping
A.
Traffic shaping
Answers
B.
Traffic policing
B.
Traffic policing
Answers
C.
Traffic marking
C.
Traffic marking
Answers
D.
Traffic classification
D.
Traffic classification
Answers
Suggested answer: B

Explanation:

Traffic policing is a mechanism that monitors the traffic in any network and enforces a bandwidth limit by discarding packets that exceed a certain rate1. This can reduce congestion and ensure fair allocation of bandwidth among different applications or users. However, discarding packets can also affect the performance and quality of some applications, especially those that are sensitive to packet loss, such as voice or video.

Traffic shaping is a congestion control mechanism that delays packets that exceed a certain rate instead of discarding them1. This can smooth out traffic bursts and avoid packet loss, but it also introduces latency and jitter. Traffic shaping can be beneficial for applications that can tolerate some delay but not packet loss, such as file transfers or streaming. Traffic marking is a mechanism that assigns different priority levels to packets based on their type, source, destination, or other criteria2. This can help to differentiate between different classes of service and apply different policies or treatments to them. However, traffic marking does not enforce bandwidth limits by itself; it only provides information for other mechanisms to act upon. Traffic classification is a process that identifies and categorizes packets based on their characteristics, such as protocol, port number, payload, or behavior. This can help to distinguish between different types of traffic and apply appropriate policies or actions to them. However, traffic classification does not enforce bandwidth limits by itself; it only provides input for other mechanisms to use.

Which of the following documents would be used to define uptime commitments from a provider, along with details on measurement and enforcement?

A.
NDA
A.
NDA
Answers
B.
SLA
B.
SLA
Answers
C.
MOU
C.
MOU
Answers
D.
AUP
D.
AUP
Answers
Suggested answer: B

Explanation:

A service level agreement (SLA) is a document that is used to define uptime commitments from a provider, along with details on measurement and enforcement. An SLA is a contract between a service provider and a customer that outlines the level of service that the provider is committed to providing and the terms under which that service will be delivered.

A company ranis out a largo event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID However, all users share the company's network hardware.

The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network Upon investigation, the support teams discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.

The following settings are common lo all network configurations:

Which of the following actions would MOST likely reduce this Issue? (Select TWO).

A.
Change to WPA encryption
A.
Change to WPA encryption
Answers
B.
Change the DNS server to 10.1.10.1.
B.
Change the DNS server to 10.1.10.1.
Answers
C.
Change the default gateway to 10.0.0.1.
C.
Change the default gateway to 10.0.0.1.
Answers
D.
Change the DHCP scope end to 10.1.10.250
D.
Change the DHCP scope end to 10.1.10.250
Answers
E.
Disable AP isolation
E.
Disable AP isolation
Answers
F.
Change the subnet mask lo 255.255.255.192.
F.
Change the subnet mask lo 255.255.255.192.
Answers
G.
Reduce the DHCP lease time to four hours.
G.
Reduce the DHCP lease time to four hours.
Answers
Suggested answer: D, G

Which of the following would be increased by adding encryption to data communication across the network?

A.
Availability
A.
Availability
Answers
B.
Integrity
B.
Integrity
Answers
C.
Accountability
C.
Accountability
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: D

Explanation:

Confidentiality is the property of preventing unauthorized access or disclosure of data. Encryption is a method of transforming data into an unreadable format that can only be decrypted by authorized parties who have the correct key. Encryption can increase the confidentiality of data communication across the network by making it harder for attackers to intercept or eavesdrop on the data.

Reference: Network+ Study Guide Objective 4.1: Summarize the purposes of physical security devices. Subobjective: Encryption.

Which of the following uses the link-state routing algorithm and operates within a single autonomous system?

A.
EIGRP
A.
EIGRP
Answers
B.
OSPF
B.
OSPF
Answers
C.
RIP
C.
RIP
Answers
D.
BGP
D.
BGP
Answers
Suggested answer: B

Explanation:

OSPF uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system (AS). OSPF is perhaps the most widely used interior gateway protocol (IGP) in large enterprise networks

A large metropolitan city is looking to standardize the ability tor police department laptops to connect to the city government's VPN The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city's needs?

A.
5G
A.
5G
Answers
B.
LTE
B.
LTE
Answers
C.
Wi-Fi 4
C.
Wi-Fi 4
Answers
D.
Wi-Fi 5
D.
Wi-Fi 5
Answers
E.
Wi-Fi 6
E.
Wi-Fi 6
Answers
Suggested answer: B

A customer wants to log in t o a vendor's server using a web browser on a laptop. Which of the following would require the LEAST configuration to allow encrypted access to the server?

A.
Secure Sockets Layer
A.
Secure Sockets Layer
Answers
B.
Site-to-site VPN
B.
Site-to-site VPN
Answers
C.
Remote desktop gateway
C.
Remote desktop gateway
Answers
D.
Client-to-site VPN
D.
Client-to-site VPN
Answers
Suggested answer: A

Explanation:

SSL is a widely used protocol for establishing secure, encrypted connections between devices over the Internet. It is typically used to secure communication between web browsers and servers, and can be easily enabled on a server by installing an SSL certificate.

Total 865 questions
Go to page: of 87