ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 41

Question list
Search
Search

List of questions

Search

Related questions











Given the following Information:

Which of the following would cause performance degradation between PC A and PC B'?

A.
Attenuation
A.
Attenuation
Answers
B.
Interference
B.
Interference
Answers
C.
Decibel loss
C.
Decibel loss
Answers
D.
Incorrect pinout
D.
Incorrect pinout
Answers
Suggested answer: A

Explanation:

Attenuation is the loss of signal strength as it travels over a distance or through a medium. It ismeasured in decibels (dB) and can affect the quality and reliability of network communication.In this scenario, the connection from PC A to switch 1 is using a Cat 5 cable with a length of394ft (120m), which exceeds the recommended maximum length of 328ft (100m) for twisted-pair cables. This can cause significant attenuation and performance degradation between PC Aand PC B.To solve this problem, the network technician should either reduce the cable length, use ahigher category cable, or insert a repeater or amplifier device to boost the signal strength.Interference is the unwanted noise or signal that affects the network communication. It can becaused by electromagnetic sources, such as power lines, motors, or wireless devices, or bycrosstalk, which is the interference between adjacent wires in a cable. Interference can alsoaffect the network performance, but it is not the most likely cause in this scenario, as it wouldaffect all the connections, not just the one with the excessive cable length.Decibel loss is another term for attenuation, so it is not a separate option. Incorrect pinout isthe wrong arrangement of wires in a cable connector, which can prevent the network devicesfrom communicating properly. However, this is not the most likely cause in this scenario, as thecable configuration is correct (straight through) for the connection from PC A to switch

A new office space is being designed. The network switches are up. but no services are running yet A network engineer plugs in a laptop configured as a DHCP client to a switch Which ol the following IP addresses should be assigned to the laptop?

A.
10.1.1.1
A.
10.1.1.1
Answers
B.
169.254.1.128
B.
169.254.1.128
Answers
C.
172 16 128 128
C.
172 16 128 128
Answers
D.
192 168.0.1
D.
192 168.0.1
Answers
Suggested answer: B

Explanation:

When a DHCP client is connected to a network and no DHCP server is available, the client can automatically configure a link-local address in the 169.254.0.0/16 range using the Automatic Private IP Addressing (APIPA) feature. So, the correct answer is option B, 169.254.1.128. This is also known as an APIPA address.

Reference: CompTIA Network+ Study Guide, Exam N10-007, Fourth Edition, by Todd Lammle (Chapter 4: IP Addressing)

An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics In the switch's CLI, the administrator discovers the uplink Is at 100% utilization However, the administrator is unsure how to Identify what traffic is causing the saturation. Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?

A.
SNMP
A.
SNMP
Answers
B.
Traps
B.
Traps
Answers
C.
Syslog
C.
Syslog
Answers
D.
NetFlow
D.
NetFlow
Answers
Suggested answer: D

Explanation:

To identify the source and destination addresses of the traffic causing network saturation, the network administrator should use a network protocol analyzer that supports the NetFlow protocol. NetFlow is a network protocol that collects IP traffic information as it enters or exits an interface and sends it to a NetFlow collector for analysis. This data includes the source and destination addresses of the traffic, the ports used, and the number of bytes and packets transferred. Therefore, the correct answer is option D, NetFlow.

Reference: CompTIA Network+ Study Guide, Exam N10-007, Fourth Edition, by Todd Lammle (Chapter 6: Network Devices)

A network technician 13 troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration?

A.
show route
A.
show route
Answers
B.
show Interface
B.
show Interface
Answers
C.
show arp
C.
show arp
Answers
D.
show port
D.
show port
Answers
Suggested answer: B

Explanation:

To see the configuration of a specific port on a switch, the network technician should use the "show interface" command. This command provides detailed information about the interface, including the current configuration, status, and statistics for the interface.

The lack of a formal process to grant network permissions to different profiles of employees and contractors is leading to an increasing number of security incidents Non-uniform and overly permissive network accesses are being granted. Which of the following would be the MOST appropriate method to improve the security of the environment?

A.
Change the default permissions to implicit deny
A.
Change the default permissions to implicit deny
Answers
B.
Configure uniform ACLs to employees and NAC for contractors.
B.
Configure uniform ACLs to employees and NAC for contractors.
Answers
C.
Deploy an RDP server to centralize the access to the network
C.
Deploy an RDP server to centralize the access to the network
Answers
D.
Implement role-based access control
D.
Implement role-based access control
Answers
Suggested answer: D

Explanation:

The most appropriate method to improve the security of the environment would be to implement role-based access control (RBAC). With RBAC, users are granted access to the network based on their role within the organization. This allows for more granular access control, as different roles may require different levels of access. Additionally, this ensures that users only have access to the resources they need and no more. This helps to reduce the risk of unauthorized access or misuse of the network. Reference and further information can be found in the CompTIA Network+ Study Manual, Chapter 8, Access Control.

RBAC is a method of restricting network access based on the roles of individual users within the organization. With RBAC, users are granted access only to the resources they need to perform their specific job functions. This approach reduces the risk of unauthorized access, provides greater visibility into user activity, and simplifies network management. Changing the default permissions to implicit deny may improve security, but it could also cause issues for legitimate users who require access to specific resources. Configuring uniform ACLs and NAC for contractors is a step in the right direction, but it may not be enough to address the overall lack of a formal process for granting network permissions. Deploying an RDP server to centralize access to the network is not a viable solution, as it would not address the root cause of the security incidents.

Therefore, the most appropriate option is to implement role-based access control. Reference:

CompTIA Network+ Study Guide, Fourth Edition, Chapter 7, section 7.4.

An ISP is providing Internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out Which of me following terminations should the technician use when running a cable from the ISP's port lo the front desk?

A.
F-type connector
A.
F-type connector
Answers
B.
TIA/E1A-56S-B
B.
TIA/E1A-56S-B
Answers
C.
LC
C.
LC
Answers
D.
SC
D.
SC
Answers
Suggested answer: B

Explanation:

The termination that the technician should use when running a cable from the ISP’s port to the front desk is B. TIA/EIA-568-B. This is a standard pin-out for Cat 6 cables that is used for Ethernet and other network physical layers1. It specifies how to arrange the eight wires in an RJ45 connector, which is a common type of connector for network cables.

Which of the following BEST describes a spirt-tunnel client-to-server VPN connection?

A.
The client sends an network traffic down the VPN tunnel
A.
The client sends an network traffic down the VPN tunnel
Answers
B.
The client has two different IP addresses that can be connected to a remote site from two different ISPs to ensure availability
B.
The client has two different IP addresses that can be connected to a remote site from two different ISPs to ensure availability
Answers
C.
The client sends some network traffic down the VPN tunnel and other traffic to the local gateway.
C.
The client sends some network traffic down the VPN tunnel and other traffic to the local gateway.
Answers
D.
The client connects to multiple remote sites at the same time
D.
The client connects to multiple remote sites at the same time
Answers
Suggested answer: C

Explanation:

In a split-tunnel VPN, the client can access both the local network and the remote network simultaneously, with some network traffic sent through the VPN tunnel and other traffic sent to the local gateway. This approach allows for more efficient use of bandwidth and reduces the load on the VPN server. It also allows the client to continue accessing local resources while connected to the remote network.

A network administrator is investigating a performance issue on a dual-link connection—VPN and MPLS—to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected tor the VPN connection. Which of the following will MOST likely point to the root cause of the Issue?

A.
Checking the routing tables on both sides to ensure there is no asymmetric routing
A.
Checking the routing tables on both sides to ensure there is no asymmetric routing
Answers
B.
Checking on the partner network for a missing route pointing to the VPN connection
B.
Checking on the partner network for a missing route pointing to the VPN connection
Answers
C.
Running iPerf on both sides to confirm the delay that Is measured is accurate
C.
Running iPerf on both sides to confirm the delay that Is measured is accurate
Answers
D.
Checking for an incorrect VLAN assignment affecting the MPLS traffic
D.
Checking for an incorrect VLAN assignment affecting the MPLS traffic
Answers
Suggested answer: A

Explanation:

Asymmetric routing can occur when two routers have different paths for the same two hosts, resulting in increased latency and possible packet loss. According to the CompTIA Network+ Study Manual, “If the path from the source to the destination is not the same in both directions, the packets will take different routes and the latency can increase significantly.” To confirm this, the network administrator should check the routing tables on both sides of the connection and ensure that the same path is used in both directions.

A company has multiple offices around the world. The computer rooms in some office locations are too warm Dedicated sensors are in each room, but the process of checking each sensor takes a long time. Which of the following options can the company put In place to automate temperature readings with internal resources?

A.
Implement NetFlow.
A.
Implement NetFlow.
Answers
B.
Hire a programmer to write a script to perform the checks
B.
Hire a programmer to write a script to perform the checks
Answers
C.
Utilize ping to measure the response.
C.
Utilize ping to measure the response.
Answers
D.
Use SNMP with an existing collector server
D.
Use SNMP with an existing collector server
Answers
Suggested answer: D

Explanation:

SNMP (Simple Network Management Protocol) is a protocol that allows network devices to communicate with a management server. By using SNMP, the company can set up an SNMP agent on each sensor, which will report its temperature readings to an existing collector server. This will enable the company to monitor the temperatures of all their sensors in real-time without the need for manual checks. Additionally, SNMP's scalability means that even if the company adds more rooms or sensors, the existing system can be easily expanded to accommodate them.

Which of the following is a security flaw in an application or network?

A.
A threat
A.
A threat
Answers
B.
A vulnerability
B.
A vulnerability
Answers
C.
An exploit
C.
An exploit
Answers
D.
A risk
D.
A risk
Answers
Suggested answer: B

Explanation:

A vulnerability is a security flaw in an application or network that can be exploited by an attacker, allowing them to gain access to sensitive data or take control of the system. Vulnerabilities can range from weak authentication methods to unpatched software, allowing attackers to gain access to the system or data they would not otherwise be able to access. Exploits are programs or techniques used to take advantage of vulnerabilities, while threats are potential dangers, and risks are the likelihood of a threat becoming a reality.

Total 865 questions
Go to page: of 87