ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











A network administrator is setting up a new phone system and needs to define the location where VoIP phones can download configuration files. Which of the following DHCP services can be used to accomplish this task?

A.
Scope options
A.
Scope options
Answers
B.
Exclusion ranges
B.
Exclusion ranges
Answers
C.
Lease time
C.
Lease time
Answers
D.
Relay
D.
Relay
Answers
Suggested answer: A

Explanation:

To define the location where VoIP phones can download configuration files, the network administrator can use scope options within the Dynamic Host Configuration Protocol (DHCP) service. Scope options are a set of values that can be configured within a DHCP scope, which defines a range of IP addresses that can be leased to clients on a network. One of the scope options that can be configured is the option for the location of the configuration file server, which specifies the URL or IP address of the server where the configuration files can be downloaded. https://pbxbook.com/voip/dhcpcfg.html

An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?

A.
Private VLANs
A.
Private VLANs
Answers
B.
Access control lists
B.
Access control lists
Answers
C.
Firewalls
C.
Firewalls
Answers
D.
Control plane policing
D.
Control plane policing
Answers
Suggested answer: A

Explanation:

"Use private VLANs: Also known as port isolation, creating a private VLAN is a method of restricting switch ports (now called private ports) so that they can communicate only with a particular uplink. The private VLAN usually has numerous private ports and only one uplink, which is usually connected to a router, or firewall."

The following DHCP scope was configured for a new VLAN dedicated to a large deployment of 325 loT sensors:

The first 244 loT sensors were able to connect to the TFTP server, download the configuration file, and register to an loT management system. The other sensors are being shown as offline. Which of the following should be performed to determine the MOST likely cause of the partial deployment of the sensors?

A.
Check the gateway connectivity to the TFTP server.
A.
Check the gateway connectivity to the TFTP server.
Answers
B.
Check the DHCP network scope.
B.
Check the DHCP network scope.
Answers
C.
Check whether the NTP server is online.
C.
Check whether the NTP server is online.
Answers
D.
Check the loT devices for a hardware failure.
D.
Check the loT devices for a hardware failure.
Answers
Suggested answer: B

A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect; however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information:

Which of the following is MOST likely causing this connection failure?

A.
Transmission speed
A.
Transmission speed
Answers
B.
Incorrect passphrase
B.
Incorrect passphrase
Answers
C.
Channel overlap
C.
Channel overlap
Answers
D.
Antenna cable attenuation/signal loss
D.
Antenna cable attenuation/signal loss
Answers
Suggested answer: B

A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?

A.
Flow control
A.
Flow control
Answers
B.
Jumbo frames
B.
Jumbo frames
Answers
C.
Duplex
C.
Duplex
Answers
D.
Port mirroring
D.
Port mirroring
Answers
Suggested answer: A

Explanation:

Ethernet flow control is a mechanism for temporarily stopping the transmission of data on Ethernet family computer networks. The goal of this mechanism is to avoid packet loss in the presence of network congestion.

Flow control is a mechanism that allows a device to regulate the amount of data it receives from another device, ensuring that the receiving device is not overwhelmed with data. If the device experiencing packet loss is receiving large bursts of data at times when it is not able to process it quickly enough, configuring flow control could help prevent packets from being lost.

"In theory, flow control can help with situations like a host that can’t keep up with the flow of traffic. It enables the host to send an Ethernet PAUSE frame, which asks the switch to hold up for some amount of time so the host can catch its breath. If the switch can, it’ll buffer transmissions until the pause expires, and then start sending again. If the host catches up early, it can send another PAUSE frame with a delay of zero to ask the switch to resume. In practice, flow control can cause latency trouble for modern real-time applications such as VoIP, and the same needs are usually met by QoS"

A network administrator needs to provide evidence to confirm that recent network outages were caused by increased traffic generated by a recently released application. Which of the following actions will BEST support the administrator's response?

A.
Generate a network baseline report for comparison.
A.
Generate a network baseline report for comparison.
Answers
B.
Export the firewall traffic logs.
B.
Export the firewall traffic logs.
Answers
C.
Collect the router's NetFlow data.
C.
Collect the router's NetFlow data.
Answers
D.
Plot interface statistics for dropped packets.
D.
Plot interface statistics for dropped packets.
Answers
Suggested answer: C

A network technician is selecting a replacement for a damaged fiber cable that goes directly to an SFP transceiver on a network switch. Which of the following cable connectors should be used?

A.
RJ45
A.
RJ45
Answers
B.
LC
B.
LC
Answers
C.
MT
C.
MT
Answers
D.
F-type
D.
F-type
Answers
Suggested answer: B

Explanation:

SFP stands for Small Form-factor Pluggable, which is a compact, hot-swappable networkinterface module that can be used for both telecommunication and data communicationsapplications1.SFP transceivers can support different types of media and interfaces, such as copper or fibercables, and have different data rates and distances1.Depending on the type of cable used, SFP transceivers feature different connectors.Generallyspeaking, SFP, SFP+ and SFP28 modules will use either LC or RJ45 connectors, depending onwhether the cable is copper or fiber2.LC stands for Lucent Connector, which is a small form-factor fiber-optic connector that has a1.25 mm ferrule and a push-pull coupling mechanism3.LC connectors are widely used for SFPtransceivers that operate on fiber-optic cables14.RJ45 stands for Registered Jack 45, which is a standard connector for twisted pair copper cablesthat has eight pins and a modular design3.RJ45 connectors are used for SFP transceivers thatoperate on copper cables, such as 1000BASE-T SFP14.MT stands for Mechanical Transfer, which is a type of fiber-optic connector that has multiplefibers aligned in a ferrule and a pin-and-guide-hole alignment mechanism3.MT connectors areused for high-density applications, such as QSFP transceivers that operate on fiber-opticcables2.

F-type stands for Female Type, which is a coaxial cable connector that has a screw-on designand a 75-ohm impedance3.F-type connectors are used for cable television, satellite television,and other radio frequency applications3.Therefore, the correct answer is B. LC, because it is the most common connector for SFPtransceivers that operate on fiber-optic cables, which is the case in the question.1:Small Form-factor Pluggable - Wikipedia

A network security engineer locates an unapproved wireless bridge connected to the corporate LAN that is broadcasting a hidden SSID, providing unauthenticated access to internal resources. Which of the following types of attacks BEST describes this finding?

A.
Rogue access point Most Voted
A.
Rogue access point Most Voted
Answers
B.
Evil twin
B.
Evil twin
Answers
C.
ARP spoofing
C.
ARP spoofing
Answers
D.
VLAN hopping
D.
VLAN hopping
Answers
Suggested answer: A

Explanation:

A rogue access point is an illegitimate access point plugged into a network to create a bypass from outside into the legitimate network. By contrast, an evil twin is a copy of a legitimate access point.

Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor's data center?

A.
DaaS
A.
DaaS
Answers
B.
IaaS
B.
IaaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: B

A network device needs to discover a server that can provide it with an IPv4 address. Which of the following does the device need to send the request to?

A.
Default gateway
A.
Default gateway
Answers
B.
Broadcast address
B.
Broadcast address
Answers
C.
Unicast address
C.
Unicast address
Answers
D.
Link local address
D.
Link local address
Answers
Suggested answer: B

Explanation:

The DHCP client sends broadcast request packets to the network; the DHCP servers respond with broadcast packets that offer IP parameters, such as an IP address for the client. After the client chooses the IP parameters, communication between the client and server is by unicast packets. "When a DHCP client boots up, it automatically sends out a DHCP Discover UDP datagram to the broadcast address, 255.255.255.255. This DHCP Discover message asks “Are there any DHCP servers out there?” The client can’t send unicast traffic yet, as it doesn’t have a valid IP address that can be used."

Total 865 questions
Go to page: of 87