ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 34

Question list
Search
Search

List of questions

Search

Related questions











Which of the following devices Is used to configure and centrally manage access points Installed at different locations?

A.
Wireless controller
A.
Wireless controller
Answers
B.
Load balancer
B.
Load balancer
Answers
C.
Proxy server
C.
Proxy server
Answers
D.
VPN concentrator
D.
VPN concentrator
Answers
Suggested answer: A

Explanation:

Access points (APs) can be configured and centrally managed using a wireless LAN controller (WLC). A WLC is a device that connects to multiple APs and provides centralized management and control of those APs. The WLC can be used to configure settings such as wireless network parameters, security settings, and quality of service (QoS) policies. Additionally, the WLC can be used to monitor the status of connected APs, track client connections, and gather statistics on network usage. Some vendors such as Cisco, Aruba, Ruckus, etc. provide wireless LAN controllers as part of their wireless networking solutions.

Users in a branch can access an ln-house database server, but II is taking too long to fetch records. The analyst does not know whether the Issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?

A.
SNMP
A.
SNMP
Answers
B.
Link state
B.
Link state
Answers
C.
Syslog
C.
Syslog
Answers
D.
QoS
D.
QoS
Answers
E.
Traffic shaping
E.
Traffic shaping
Answers
Suggested answer: A

A network administrator is decommissioning a server. Which of the following will the network administrator MOST likely consult?

A.
Onboarding and off boarding policies
A.
Onboarding and off boarding policies
Answers
B.
Business continuity plan
B.
Business continuity plan
Answers
C.
Password requirements
C.
Password requirements
Answers
D.
Change management documentation
D.
Change management documentation
Answers
Suggested answer: D

A user calls the help desk to report being unable to reach a file server. The technician logs in to the user's computer and verifies that pings fall to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable?

A.
netstat
A.
netstat
Answers
B.
ipconfig
B.
ipconfig
Answers
C.
nslookup
C.
nslookup
Answers
D.
traceroute
D.
traceroute
Answers
Suggested answer: D

Explanation:

Traceroute is a network diagnostic tool that allows you to trace the path that network packets take from one device to another. By running traceroute to the file server, the technician can see the sequence of devices and networks that the packets pass through on their way to the file server. This can help the technician to determine if there is a problem with the network connection between the user's computer and the file server, or if the issue is with the file server itself.

A technician is contracted to install a redundant cluster of devices from the ISP In case of a hardware failure within the network. Which of the following would provide the BEST redundant solution in Layer 2 devices?

A.
Multiple routers
A.
Multiple routers
Answers
B.
Multiple switches
B.
Multiple switches
Answers
C.
Multiple firewalls
C.
Multiple firewalls
Answers
D.
Multiple budges
D.
Multiple budges
Answers
Suggested answer: B

A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections After troubleshooting, the administrator determines that moving from one location to another causes the disconnection Which of the following settings should provide better network stability?

A.
Client association timeout
A.
Client association timeout
Answers
B.
RSSl roaming threshold
B.
RSSl roaming threshold
Answers
C.
RF attenuation ratio
C.
RF attenuation ratio
Answers
D.
EIRP power setting
D.
EIRP power setting
Answers
Suggested answer: B

Explanation:

In this case, the most likely cause of the constant disconnections when moving from one location to another is likely due to a problem with the roaming functionality of the wireless network. The setting that would likely provide better network stability in this situation is the RSSI roaming threshold, which determines the signal strength required for a client device to remain connected to the wireless network. If the roaming threshold is set too low, the client device may disconnect and reconnect to the network too frequently as it moves between different access points. On the other hand, if the threshold is set too high, the client device may not roam to a new access point when necessary, leading to a loss of connectivity. Adjusting the RSSI roaming threshold to an appropriate value may help to improve the stability of the wireless network in this situation.

A company is reviewing ways to cut the overall cost of Its IT budget. A network technician suggests removing various computer programs from the IT budget and only providing these programs on an as-needed basis. Which of the following models would meet this requirement?

A.
Multitinency
A.
Multitinency
Answers
B.
laaS
B.
laaS
Answers
C.
SaaS
C.
SaaS
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: C

Explanation:

SaaS stands for Software as a Service and is a cloud computing model where software applications are hosted and delivered over the internet by a service provider. SaaS can help the company cut the overall cost of its IT budget by eliminating the need to purchase, install, update, and maintain various computer programs on its own devices. The company can access the programs on an as-needed basis and pay only for what it uses. Multitenancy is a feature of cloud computing where multiple customers share the same physical or virtual resources. IaaS stands for Infrastructure as a Service and is a cloud computing model where computing resources such as servers, storage, and networking are provided over the internet by a service provider. VPN stands for Virtual Private Network and is a technology that creates a secure and encrypted connection over a public network.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.9:

Compare and contrast common network service types.

A technician discovered that some information on the local database server was changed during a tile transfer to a remote server. Which of the following should concern the technician the MOST?

A.
Confidentiality
A.
Confidentiality
Answers
B.
Integrity
B.
Integrity
Answers
C.
DDoS
C.
DDoS
Answers
D.
On-path attack
D.
On-path attack
Answers
Suggested answer: B

Explanation:

The technician should be most concerned about data integrity and security. If information on the local database server was changed during a file transfer to a remote server, it could indicate that unauthorized access or modifications were made to the data. It could also indicate a failure in the file transfer process, which could result in data loss or corruption. The technician should investigate the cause of the changes and take steps to prevent it from happening again in the future. Additionally, they should verify the integrity of the data and restore it from a backup if necessary to ensure that the correct and complete data is available. The technician should also take appropriate actions such as notifying the system administrator and management of the incident, and following the incident management process to minimize the damage caused by the incident.

A network technician is troubleshooting an area where the wireless connection to devices is poor. The technician theorizes that the signal-to-noise ratio in the area is causing the issue. Which of the following should the technician do NEXT?

A.
Run diagnostics on the relevant devices.
A.
Run diagnostics on the relevant devices.
Answers
B.
Move the access point to a different location.
B.
Move the access point to a different location.
Answers
C.
Escalate the issue to the vendor's support team.
C.
Escalate the issue to the vendor's support team.
Answers
D.
Remove any electronics that might be causing interference.
D.
Remove any electronics that might be causing interference.
Answers
Suggested answer: D

During a recent security audit, a contracted penetration tester discovered the organization uses a number of insecure protocols. Which of the following ports should be disallowed so only encrypted protocols are allowed? (Select TWO).

A.
22
A.
22
Answers
B.
23
B.
23
Answers
C.
69
C.
69
Answers
D.
443
D.
443
Answers
E.
587
E.
587
Answers
F.
8080
F.
8080
Answers
Suggested answer: B, C
Total 865 questions
Go to page: of 87