ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 42

Question list
Search
Search

List of questions

Search

Related questions











Which of the following architectures is used for FTP?

A.
Client-server
A.
Client-server
Answers
B.
Service-oriented
B.
Service-oriented
Answers
C.
Connection-oriented
C.
Connection-oriented
Answers
D.
Data-centric
D.
Data-centric
Answers
Suggested answer: A

Explanation:

FTP (File Transfer Protocol) is a client-server based protocol, meaning that the two computers involved communicate with each other in a request-response pattern. The client sends a request to the server and the server responds with the requested data. This type of architecture is known as client-server, and it is used for many different types of applications, including FTP. Other architectures, such as service-oriented, connection-oriented, and data-centric, are not used for FTP.

A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?

A.
Capture a network baseline
A.
Capture a network baseline
Answers
B.
Perform an environmental review.
B.
Perform an environmental review.
Answers
C.
Read the network logs
C.
Read the network logs
Answers
D.
Run a bandwidth test
D.
Run a bandwidth test
Answers
Suggested answer: A

Explanation:

Before making any recommendations, a network technician should first capture a network baseline, which is a snapshot of the current performance of the network. This will give the technician a baseline to compare against after any changes are made. According to the CompTIA Network+ Study Manual, the technician should "capture the state of the network before making any changes and then compare the performance after the changes have been made. This will provide an accurate baseline to compare the performance of the network before and after the changes have been made."

A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?

A.
Warnings
A.
Warnings
Answers
B.
Notifications
B.
Notifications
Answers
C.
Alert
C.
Alert
Answers
D.
Errors
D.
Errors
Answers
Suggested answer: B

Explanation:

Notifications are the lowest logging level and will provide the desired information regarding switch port up/down activity. According to the CompTIA Network+ Study Manual, notifications "are used for logging normal activities, such as port up/down events, link changes, and link flaps."

A technician is investigating an issue with connectivity at customer's location. The technician confirms that users can access resources locally but not over the internet The technician theorizes that the local router has failed and investigates further. The technician's testing results show that the route is functional: however, users still are unable to reach resources on the internal. Which of the following describes what the technician should do NEXT?

A.
Document the lessons learned
A.
Document the lessons learned
Answers
B.
Escalate the issue
B.
Escalate the issue
Answers
C.
identify the symptoms.
C.
identify the symptoms.
Answers
D.
Question users for additional information
D.
Question users for additional information
Answers
Suggested answer: C

Explanation:

According to the CompTIA Network+ troubleshooting model123, this is the first step in troubleshooting a network problem. The technician should gather information about the current state of the network, such as error messages, device status, network topology, and user feedback. This can help narrow down the scope of the problem and eliminate possible causes.

A network technician 13 troubleshooting a network issue for employees who have reported Issues with speed when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the employees' building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?

A.
The connection type is not rated for that distance
A.
The connection type is not rated for that distance
Answers
B.
A broadcast storm is occurring on the subnet.
B.
A broadcast storm is occurring on the subnet.
Answers
C.
The cable run has interference on it
C.
The cable run has interference on it
Answers
D.
The connection should be made using a Cat 6 cable
D.
The connection should be made using a Cat 6 cable
Answers
Suggested answer: D

Explanation:

The 10GBASE-T connection between the two buildings uses Cat 5e, which is not rated for a distance of 410ft (125m). According to the CompTIA Network+ Study Manual, for 10GBASE-T connections, "Cat 5e is rated for up to 55m, Cat 6a is rated for 100m, and Cat 7 is rated for 150m." Therefore, the speed issue is likely due to the fact that the connection type is not rated for the distance between the two buildings. To resolve the issue, the technician should consider using a Cat 6a or Cat 7 cable to increase the distance the connection is rated for.

A technician is checking network devices to look for opportunities to improve security Which of the following toots would BEST accomplish this task?

A.
Wi-Fi analyzer
A.
Wi-Fi analyzer
Answers
B.
Protocol analyzer
B.
Protocol analyzer
Answers
C.
Nmap
C.
Nmap
Answers
D.
IP scanner
D.
IP scanner
Answers
Suggested answer: B

Explanation:

A protocol analyzer is a tool that can capture and analyze network traffic and identify security issues such as unauthorized devices, malicious packets, or misconfigured settings. A Wi-Fi analyzer is a tool that can measure the signal strength, interference, and channel usage of wireless networks, but it cannot provide detailed information about network security. Nmap and IP scanner are tools that can scan network hosts and ports for open services, vulnerabilities, or operating systems, but they cannot monitor network traffic in real time.

Which of the following is an advanced distance vector routing protocol that automates routing tables and also uses some features of link-state routing protocols?

A.
OSPF
A.
OSPF
Answers
B.
RIP
B.
RIP
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
BGP
D.
BGP
Answers
Suggested answer: C

Explanation:


A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?

A.
Multifactor authentication
A.
Multifactor authentication
Answers
B.
Single sign-on
B.
Single sign-on
Answers
C.
RADIUS
C.
RADIUS
Answers
D.
VPN
D.
VPN
Answers
Suggested answer: A

Explanation:

Multifactor authentication is a security measure that requires users to provide multiple pieces of evidence before they can access a network resource. This could include requiring users to enter a username, password, and a code sent to the user's mobile phone before they are allowed access. This ensures that the user is who they say they are, reducing the risk of malicious actors gaining access to network resources as a result of a successful phishing campaign.

Which of the following devices would be used to extend the range of a wireless network?

A.
A repeater
A.
A repeater
Answers
B.
A media converter
B.
A media converter
Answers
C.
A router
C.
A router
Answers
D.
A switch
D.
A switch
Answers
Suggested answer: A

Explanation:

A repeater is a device used to extend the range of a wireless network by receiving, amplifying, and retransmitting wireless signals. It is typically used to extend the range of a wireless network in a large area, such as an office building or a campus. Repeaters can also be used to connect multiple wireless networks together, allowing users to move seamlessly between networks. As stated in the CompTIA Network+ Study Manual, "a wireless repeater is used to extend the range of a wireless network by repeating the signal from one access point to another."

Which of the following describes when an active exploit is used to gain access to a network?

A.
Penetration testing
A.
Penetration testing
Answers
B.
Vulnerability testing
B.
Vulnerability testing
Answers
C.
Risk assessment
C.
Risk assessment
Answers
D.
Posture assessment
D.
Posture assessment
Answers
E.
Baseline testing
E.
Baseline testing
Answers
Suggested answer: A

Explanation:

Penetration testing is a type of security testing that is used to assess the security of a system or network by actively exploiting known vulnerabilities. It is used to simulate an attack on the system and identify any weaknesses that may be exploited by malicious actors. As stated in the CompTIA Security+ Study Guide, "penetration testing is a type of security assessment that attempts to gain unauthorized access to networks and systems by exploiting security vulnerabilities."

Total 865 questions
Go to page: of 87