ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue?

A.
Traps
A.
Traps
Answers
B.
MIB
B.
MIB
Answers
C.
OID
C.
OID
Answers
D.
Baselines
D.
Baselines
Answers
Suggested answer: A

Explanation:

Traps are unsolicited messages sent by network devices to a network management system (NMS) when an event or a change in status occurs. Traps can help notify the network management team of any issues or problems on the network, such as a link failure or a device reboot. Traps can also trigger actions or alerts on the NMS, such as sending an email or logging the event. MIB stands for Management Information Base and is a database of information that can be accessed and managed by an NMS using SNMP (Simple Network Management Protocol). OID stands for Object Identifier and is a unique name that identifies a specific variable in the MIB. Baselines are measurements of normal network performance and behavior that can be used for comparison and analysis.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 2.5:

Given a scenario, use remote access methods.

A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?

A.
Disable unneeded ports
A.
Disable unneeded ports
Answers
B.
Disable SSH service
B.
Disable SSH service
Answers
C.
Disable MAC filtering
C.
Disable MAC filtering
Answers
D.
Disable port security
D.
Disable port security
Answers
Suggested answer: A

A technician is installing the Wi-Fi infrastructure for legacy industrial machinery at a warehouse. The equipment only supports 802.11a and 802.11b standards. Speed of transmission is the top business requirement. Which of the following is the correct maximum speed for this scenario?

A.
11Mbps
A.
11Mbps
Answers
B.
54Mbps
B.
54Mbps
Answers
C.
128Mbps
C.
128Mbps
Answers
D.
144Mbps
D.
144Mbps
Answers
Suggested answer: B

Explanation:

802.11b (Wi-Fi 1)

11 Mbps

100 meter maximum effective range

802.11a (Wi-Fi 2)

54 Mbps

50 meter maximum effective range

A network team is getting reports that air conditioning is out in an IDF. The team would like to determine whether additional network issues are occurring. Which of the following should the network team do?

A.
Confirm that memory usage on the network devices in the IDF is normal.
A.
Confirm that memory usage on the network devices in the IDF is normal.
Answers
B.
Access network baseline data for references to an air conditioning issue.
B.
Access network baseline data for references to an air conditioning issue.
Answers
C.
Verify severity levels on the corporate syslog server.
C.
Verify severity levels on the corporate syslog server.
Answers
D.
Check for SNMP traps from a network device in the IDF.
D.
Check for SNMP traps from a network device in the IDF.
Answers
E.
Review interface statistics looking for cyclic redundancy errors.
E.
Review interface statistics looking for cyclic redundancy errors.
Answers
Suggested answer: D

Explanation:

"Baselines play an integral part in network documentation because they let you monitor the network’s overall performance. In simple terms, a baseline is a measure of performance that indicates how hard the network is working and where network resources are spent. The purpose of a baseline is to provide a basis of comparison. For example, you can compare the network’s performance results taken in March to results taken in June, or from one year to the next. More commonly, you would compare the baseline information at a time when the network is having a problem to information recorded when the network was operating with greater efficiency. Such comparisons help you determine whether there has been a problem with the network, how significant that problem is, and even where the problem lies."

Which of the following is the NEXT step to perform network troubleshooting after identifying an issue?

A.
Implement a solution.
A.
Implement a solution.
Answers
B.
Establish a theory.
B.
Establish a theory.
Answers
C.
Escalate the issue.
C.
Escalate the issue.
Answers
D.
Document the findings.
D.
Document the findings.
Answers
Suggested answer: B

Explanation:

1 Identify the Problem.

2 Develop a Theory.

3 Test the Theory.

4 Plan of Action.

5 Implement the Solution.

6 Verify System Functionality.

7 Document the Issue.

Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?

A.
Data link
A.
Data link
Answers
B.
Network
B.
Network
Answers
C.
Transport
C.
Transport
Answers
D.
Session
D.
Session
Answers
Suggested answer: A

Explanation:

"The Data Link layer also determines how data is placed on the wire by using an access method. The wired access method, carrier-sense multiple access with collision detection (CSMA/CD), was once used by all wired Ethernet networks, but is automatically disabled on switched full-duplex links, which have been the norm for decades. Carrier-sense multiple access with collision avoidance (CSMA/CA) is used by wireless networks, in a similar fashion."

A network administrator is preparing answers for an annual risk assessment that is required for compliance purposes. Which of the following would be an example of an internal threat?

A.
An approved vendor with on-site offices
A.
An approved vendor with on-site offices
Answers
B.
An infected client that pulls reports from the firm
B.
An infected client that pulls reports from the firm
Answers
C.
A malicious attacker from within the same country
C.
A malicious attacker from within the same country
Answers
D.
A malicious attacker attempting to socially engineer access into corporate offices
D.
A malicious attacker attempting to socially engineer access into corporate offices
Answers
Suggested answer: A

Explanation:

Insider threat= insider threat is defined as the threat that an employee or a contractor will use his or her authorized access, wittingly or unwittingly, to do harm

A company's primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?

A.
Diverse paths
A.
Diverse paths
Answers
B.
Load balancing
B.
Load balancing
Answers
C.
Multipathing
C.
Multipathing
Answers
D.
Virtual Router Redundancy Protocol
D.
Virtual Router Redundancy Protocol
Answers
Suggested answer: A

Network users reported that a recent firmware upgrade to a firewall did not resolve the issue that prompted the upgrade. Which of the following should be performed NEXT?

A.
Reopen the service ticket, request a new maintenance window, and roll back to the anterior firmware version.
A.
Reopen the service ticket, request a new maintenance window, and roll back to the anterior firmware version.
Answers
B.
Gather additional information to ensure users' concerns are not been caused by a different issue with similar symptoms.
B.
Gather additional information to ensure users' concerns are not been caused by a different issue with similar symptoms.
Answers
C.
Employ a divide-and-conquer troubleshooting methodology by engaging the firewall vendor's support.
C.
Employ a divide-and-conquer troubleshooting methodology by engaging the firewall vendor's support.
Answers
D.
Escalate the issue to the IT management team in order to negotiate a new SLA with the user's manager.
D.
Escalate the issue to the IT management team in order to negotiate a new SLA with the user's manager.
Answers
Suggested answer: B

Explanation:

Before taking any further action, it is important to verify that the problem reported by the users is the same as the one that prompted the firmware upgrade. It is possible that the firmware upgrade did resolve the original issue, but a new or different issue has arisen with similar symptoms. By gathering additional information from the users, such as error messages, screenshots, logs, or network traces, the technician can confirm or rule out this possibility and avoid wasting time and resources on unnecessary steps.

Reopening the service ticket, requesting a new maintenance window, and rolling back to the anterior firmware version (A) is a possible option if the firmware upgrade did not resolve the original issue and caused more problems. However, this should not be done without first verifying that the users’ concerns are related to the firmware upgrade and not a different issue. Employing a divide-and-conquer troubleshooting methodology by engaging the firewall vendor’s support © is another possible option if the technician needs assistance from the vendor to diagnose or resolve the issue. However, this should also not be done without first gathering additional information from the users to narrow down the scope of the problem and provide relevant details to the vendor.

Escalating the issue to the IT management team in order to negotiate a new SLA with the user’s manager (D) is not a relevant option at this stage. An SLA (Service Level Agreement) is a contract that defines the expectations and responsibilities of both parties in terms of service quality, availability, performance, and response time. Negotiating a new SLA does not address the root cause of the issue or help to resolve it. Moreover, escalating an issue to management should only be done when all other options have been exhausted or when there is a significant impact or risk to the business.

A technician manages a DHCP scope but needs to allocate a portion of the scope’s subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts?

A.
Dynamic assignment
A.
Dynamic assignment
Answers
B.
Exclusion range
B.
Exclusion range
Answers
C.
Address reservation
C.
Address reservation
Answers
D.
IP helper
D.
IP helper
Answers
Suggested answer: B

Explanation:

To prevent IP address conflicts when allocating a portion of a DHCP scope's subnet for statically assigned devices, it is recommended to use the concept of DHCP exclusion ranges. DHCP exclusion ranges allow a DHCP administrator to specify a range of IP addresses within the scope that should not be assigned to DHCP clients. This can be useful in situations where some devices on the network need to be assigned static IP addresses, as it ensures that the statically assigned addresses do not overlap with addresses assigned by the DHCP server. To set up a DHCP exclusion range, the administrator needs to specify the start and end IP addresses of the range, as well as the subnet mask. The DHCP server will then exclude the specified range of addresses from its pool of available addresses, and will not assign them to DHCP clients. By using DHCP exclusion ranges, the technician can ensure that the statically assigned addresses do not conflict with addresses assigned by the DHCP server, and can prevent IP address conflicts on the network.

Anthony Sequeira

"Another frequent configuration you might make in a DHCP implementation is to configure an exclusion range. This is a portion of the address pool that you never want leased out to clients in the network. Perhaps you have numbered your servers 192.168.1.1–192.168.1.10. Because the servers are statically configured with these addresses, you exclude these addresses from the 192.168.1.0/24 pool of addresses."

Mike Meyers

"Exclusion ranges represent an IP address or range of IP addresses from the pool of addresses that are not to be given out by the DHCP server. Exclusions should be made for the static addresses manually configured on servers and router interfaces, so these IP addresses won’t be offered to DHCP clients."

Total 865 questions
Go to page: of 87