ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would be the MOST likely attack used to bypass an access control vestibule?

A.
Tailgating
A.
Tailgating
Answers
B.
Phishing
B.
Phishing
Answers
C.
Evil twin
C.
Evil twin
Answers
D.
Brute-force
D.
Brute-force
Answers
Suggested answer: A

Explanation:

Tailgating is when someone follows an authorized person into a restricted area without having the proper credentials. This is usually done by pretending to be with the authorized person, or by offering assistance. Tailgating is a social engineering attack and does not require any technical skill.

A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?

A.
Check for the existence of a known exploit in order to assess the risk
A.
Check for the existence of a known exploit in order to assess the risk
Answers
B.
Immediately shut down the vulnerable application server.
B.
Immediately shut down the vulnerable application server.
Answers
C.
Install a network access control agent on the server.
C.
Install a network access control agent on the server.
Answers
D.
Deploy a new server to host the application.
D.
Deploy a new server to host the application.
Answers
Suggested answer: A

Explanation:

The appropriate next step in this situation would be to check for the existence of a known exploit in order to assess the risk. This is important because it will help the network administrator determine the severity of the vulnerability and the potential impact it could have on the organization. Once the network administrator has assessed the risk, they can then take appropriate action to address the vulnerability. This might include patching the application, deploying a new server to host the application, or implementing other security measures to mitigate the risk. It is generally not advisable to immediately shut down the vulnerable application server, as this could disrupt business operations and cause significant downtime. Similarly, installing a network access control agent on the server may not be the most effective solution, as it would not address the underlying vulnerability.

While waking from the parking lot lo an access-controlled door an employee sees an authorized user open the door. Then the employee notices that another person catches the door before It closes and goes inside Which of the following attacks Is taking place?

A.
Tailgating
A.
Tailgating
Answers
B.
Pipgybacking
B.
Pipgybacking
Answers
C.
Shoulder surfing
C.
Shoulder surfing
Answers
D.
Phisning
D.
Phisning
Answers
Suggested answer: A

Explanation:

The difference between piggybacking and tailgaiting is that with piggybacking, the person is willfully and intentionally letting you in. In this particular case, the person caught the door before it closed, so it is tailgating.

Tailgating is a physical security attack that occurs when an unauthorized person follows an authorized person through a secured door or gate without their knowledge or consent. Tailgating can allow an attacker to bypass access control mechanisms and gain entry to restricted areas or resources. Tailgating can also pose a safety risk for the authorized person and other occupants of the facility. Piggybacking is a physical security attack that occurs when an unauthorized person follows an authorized person through a secured door or gate with their knowledge or consent. Piggybacking can also allow an attacker to bypass access control mechanisms and gain entry to restricted areas or resources. Piggybacking can also violate security policies and compromise the accountability of the authorized person.

Shoulder surfing is a physical security attack that occurs when an unauthorized person observes or records an authorized person’s confidential information, such as passwords, PINs, or credit card numbers. Shoulder surfing can allow an attacker to steal credentials and access sensitive data or systems. Shoulder surfing can also violate privacy and confidentiality rights of the authorized person. Phishing is a cyber security attack that occurs when an unauthorized person sends fraudulent emails or messages that appear to come from legitimate sources, such as banks, companies, or government agencies. Phishing can trick recipients into clicking on malicious links, opening malicious attachments, or providing personal or financial information. Phishing can allow an attacker to install malware, steal credentials, or perform identity theft. Phishing does not involve physical access to secured doors or gates.

Which of the Mowing architectures reduces network latency by enforcing a limit on the number of switching devices on the frame's path between any internal hosts?

A.
Spine and leaf
A.
Spine and leaf
Answers
B.
Software-defined network
B.
Software-defined network
Answers
C.
Three-tiered
C.
Three-tiered
Answers
D.
Collapsed core
D.
Collapsed core
Answers
Suggested answer: A

Explanation:

It does this by using a two-level hierarchy of switches, where the spine switches connect to the leaf switches, which in turn connect to the end hosts. This reduces the number of hops a packet must take from one host to another, thus reducing latency. According to the CompTIA Network+ N10-008 Exam Guide, the Spine and Leaf topology is a modern architecture that is used to reduce latency in large networks.

A network engineer needs to create a subnet that has the capacity for five VLANs. with the following number of clients lo be allowed on each:

Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?

A.
10.0.0.0/21
A.
10.0.0.0/21
Answers
B.
10.0.0.0/22
B.
10.0.0.0/22
Answers
C.
10.0.0.0/23
C.
10.0.0.0/23
Answers
D.
10.0.0.0/24
D.
10.0.0.0/24
Answers
Suggested answer: B

An engineer recently decided to upgrade the firmware on a router. During the upgrade, the help desk received calls about a network outage, and a critical ticket was opened. The network manager would like to create a policy to prevent this from happening in the future. Which of the following documents should the manager create?

A.
Change management
A.
Change management
Answers
B.
incident response
B.
incident response
Answers
C.
Standard operating procedure
C.
Standard operating procedure
Answers
D.
System life cycle
D.
System life cycle
Answers
Suggested answer: A

Which of the following bandwidth management techniques uses buffers al the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?

A.
Traffic shaping
A.
Traffic shaping
Answers
B.
Traffic policing
B.
Traffic policing
Answers
C.
Traffic marking
C.
Traffic marking
Answers
D.
Traffic prioritization
D.
Traffic prioritization
Answers
Suggested answer: A

Explanation:

Traffic shaping is a bandwidth management technique that uses buffers at the client side toprevent TCP retransmissions from occurring when the ISP starts to drop packets of specifictypes that exceed the agreed traffic rate. Traffic shaping delays or queues packets that exceedthe traffic rate, instead of dropping them, and sends them later when the traffic rate is lower.This reduces the number of TCP retransmissions and improves the overall networkperformance. Traffic shaping can also prioritize packets based on their type, source,destination, or other criteria.Reference:Routing Technologies and Bandwidth Management |Foundation Topics | Pearson IT Certification,CompTIA Network+ Certification Exam Objectives

A network administrator is getting reports of some internal users who cannot connect to network resources. The users slate they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks. Which of the following is the MOST likely cause of the issue?

A.
The client DHCP scope is fully utilized
A.
The client DHCP scope is fully utilized
Answers
B.
The wired network is experiencing electrical interference
B.
The wired network is experiencing electrical interference
Answers
C.
The captive portal is down and needs to be restarted
C.
The captive portal is down and needs to be restarted
Answers
D.
SNMP traps are being received
D.
SNMP traps are being received
Answers
E.
The packet counter on the router interface is high.
E.
The packet counter on the router interface is high.
Answers
Suggested answer: A

A company is deploying a SAN at headquarters and a branch office 1, 000ml (1,609km) away that w« access small amounts of dat

A.
Which of the following types of connections would be MOST cost effective to implement?
A.
Which of the following types of connections would be MOST cost effective to implement?
Answers
B.
ISCSI
B.
ISCSI
Answers
C.
FCoE
C.
FCoE
Answers
D.
Ethernet
D.
Ethernet
Answers
E.
FC
E.
FC
Answers
Suggested answer: A

Explanation:

Mike Meyers

"Internet Small Computer Systems Interface (iSCSI) is built on top of TCP/IP, enabling devices that use the SCSI protocol to communicate across existing networks using cheap, readily available hardware."

Jason Dion

"iSCSI (IP Small Computer System Interface)

- Lower cost, built using Ethernet switches (<10 Gbps)

- Relies on configuration allowing jumbo frames over the network"

Users within a corporate network need to connect to the Internet, but corporate network policy does not allow direct connections. Which of the following is MOST likely to be used?

A.
Proxy server
A.
Proxy server
Answers
B.
VPN client
B.
VPN client
Answers
C.
Bridge
C.
Bridge
Answers
D.
VLAN
D.
VLAN
Answers
Suggested answer: A
Total 865 questions
Go to page: of 87