ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











Network traffic is being compromised by DNS poisoning every time a company's router is connected to the internet. The network team detects a non-authorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router?

A.
Change the device's default password.
A.
Change the device's default password.
Answers
B.
Disable router advertisement guard.
B.
Disable router advertisement guard.
Answers
C.
Activate control plane policing.
C.
Activate control plane policing.
Answers
D.
Disable unneeded network services.
D.
Disable unneeded network services.
Answers
Suggested answer: A

Which of the following can be used to validate domain ownership by verifying the presence of pre- agreed content contained in a DNS record?

A.
SOA
A.
SOA
Answers
B.
SRV
B.
SRV
Answers
C.
AAA
C.
AAA
Answers
D.
TXT
D.
TXT
Answers
Suggested answer: D

Explanation:

"One final usage of the TXT resource record is how some cloud service providers, such as Azure, validate ownership of custom domains. You are provided with data to include in your TXT record, and once that is created, the domain is verified and able to be used. The thought is that if you control the DNS, then you own the domain name."

An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?

A.
DNS poisoning
A.
DNS poisoning
Answers
B.
On-path
B.
On-path
Answers
C.
IP spoofing
C.
IP spoofing
Answers
D.
Rogue DHCP
D.
Rogue DHCP
Answers
Suggested answer: A

An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?

A.
Subinterfaces
A.
Subinterfaces
Answers
B.
Link aggregation
B.
Link aggregation
Answers
C.
Load balancing
C.
Load balancing
Answers
D.
Tunneling
D.
Tunneling
Answers
Suggested answer: A

An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations?

A.
MTTR
A.
MTTR
Answers
B.
RTO
B.
RTO
Answers
C.
MTBF
C.
MTBF
Answers
D.
RPO
D.
RPO
Answers
Suggested answer: B

Explanation:

The maximum duration that a given service can be down before it impacts operations is often referred to as the Recovery Time Objective (RTO). RTO is a key consideration in any backup and disaster recovery plan, as it determines how quickly the organization needs to be able to recover from a disruption or failure. It is typically expressed in terms of time, and it helps to inform the design and implementation of the backup solution. For example, if an organization has a critical service that must be available 24/7, it may have a very low RTO, requiring that the service be restored within a matter of minutes or even seconds. On the other hand, if the service can be down for a longer period of time without significantly impacting operations, the organization may have a higher RTO. When selecting a backup solution, it is important to consider the organization's RTO requirements and ensure that the solution is capable of meeting those needs. A solution that does not meet the organization's RTO requirements may not be sufficient to ensure the availability of critical services in the event of a disruption or failure.

A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode, but it contains sensitive information about clients and vendors. Which of the following should also be enabled?

A.
Factory reset
A.
Factory reset
Answers
B.
Autolock
B.
Autolock
Answers
C.
Encryption
C.
Encryption
Answers
D.
Two-factor authentication
D.
Two-factor authentication
Answers
Suggested answer: C

A corporation is looking for a method to secure all traffic between a branch office and its data center in order to provide a zero-touch experience for all staff members who work there. Which of the following would BEST meet this requirement?

A.
Site-to-site VPN
A.
Site-to-site VPN
Answers
B.
VNC
B.
VNC
Answers
C.
Remote desktop gateway
C.
Remote desktop gateway
Answers
D.
Virtual LANs
D.
Virtual LANs
Answers
Suggested answer: A

Explanation:

A site-to-site VPN is a method that creates a secure and encrypted connection between two internet gateways, such as routers or firewalls, that belong to different networks1. A site-to-site VPN can secure all traffic between a branch office and its data center by creating a virtual tunnel that protects the data from interception or tampering. A site-to-site VPN can also provide a zero-touch experience for all staff members who work there, as they do not need to install any software or configure any settings on their devices to access the data center resources. They can simply use their local network as if they were physically connected to the data center network. VNC (Virtual Network Computing) is a method that allows remote access and control of a computer’s desktop from another device over a network2. VNC can enable staff members to work remotely by accessing their office computers from their home computers or mobile devices. However, VNC does not secure all traffic between a branch office and its data center, as it only works at the application layer and does not encrypt the network layer. VNC also does not provide a zero-touch experience for staff members, as they need to install software and configure settings on both the host and the client devices.

Remote desktop gateway is a method that allows remote access and control of a computer’s desktop from another device over a network using the Remote Desktop Protocol (RDP). Remote desktop gateway can also enable staff members to work remotely by accessing their office computers from their home computers or mobile devices. However, remote desktop gateway does not secure all traffic between a branch office and its data center, as it only works at the application layer and does not encrypt the network layer. Remote desktop gateway also does not provide a zero-touch experience for staff members, as they need to install software and configure settings on both the host and the client devices.

Virtual LANs (VLANs) are methods that create logical subdivisions of a physical network based on criteria such as function, department, or security level. VLANs can improve network performance, security, and management by reducing broadcast domains, isolating traffic, and enforcing policies. However, VLANs do not secure all traffic between a branch office and its data center, as they only work at the data link layer and do not encrypt the network layer. VLANs also do not provide a zero- touch experience for staff members, as they need to configure settings on their network devices to join or leave a VLAN.

ARP spoofing would normally be a part of:

A.
an on-path attack.
A.
an on-path attack.
Answers
B.
DNS poisoning.
B.
DNS poisoning.
Answers
C.
a DoS attack.
C.
a DoS attack.
Answers
D.
a rogue access point.
D.
a rogue access point.
Answers
Suggested answer: A

Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?

A.
SDWAN
A.
SDWAN
Answers
B.
MAN
B.
MAN
Answers
C.
PAN
C.
PAN
Answers
D.
MPLS
D.
MPLS
Answers
Suggested answer: A

Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network?

A.
Layer 1
A.
Layer 1
Answers
B.
Layer 3
B.
Layer 3
Answers
C.
Layer 6
C.
Layer 6
Answers
D.
Layer 7
D.
Layer 7
Answers
Suggested answer: C
Total 865 questions
Go to page: of 87