ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?

A.
Packet capture
A.
Packet capture
Answers
B.
IPerf
B.
IPerf
Answers
C.
SIEM log review
C.
SIEM log review
Answers
D.
Internet speed test
D.
Internet speed test
Answers
Suggested answer: B

Explanation:

An engineer will most likely use IPerf to get detailed measurement data about the user's slow file transfers. IPerf is a tool used for measuring network performance and bandwidth, and it can be used to measure the speed and throughput of file transfers from the remote office. It can also provide detailed information about the latency and jitter of the connection, which can be used to troubleshoot the slow file transfers. Reference: CompTIA Network+ Study Manual (Chapter 10, Page 214).

A computer engineer needs to ensure that only a specific workstation can connect to port 1 on a switch. Which of the following features should the engineer configure on the switch interface?

A.
Port tagging
A.
Port tagging
Answers
B.
Port security
B.
Port security
Answers
C.
Port mirroring
C.
Port mirroring
Answers
D.
Port aggregation
D.
Port aggregation
Answers
Suggested answer: B

Explanation:

Port security is a feature that can be configured on a switch interface to limit and identify the MAC addresses of workstations that are allowed to connect to that specific port. This can help ensure that only a specific workstation (or workstations) can connect to the interface. According to the CompTIA Network+ Study Manual, “Port security can be used to specify which MAC addresses are allowed to connect to a particular switch port. If a port security violation is detected, the switch can take a number of different actions, such as shutting down the port, sending an SNMP trap, or sending an email alert.”

A technician notices that equipment is being moved around and misplaced in the server room, even though the room has locked doors and cabinets. Which of the following would be the BEST solution to identify who is responsible?

A.
Install motion detection
A.
Install motion detection
Answers
B.
Install cameras.
B.
Install cameras.
Answers
C.
Install tamper detection.
C.
Install tamper detection.
Answers
D.
Hire a security guard.
D.
Hire a security guard.
Answers
Suggested answer: B

Explanation:

Installing cameras in the server room is the best solution to identify who is responsible for the equipment being moved and misplaced. Cameras provide a way to monitor the server room in real time and can be used to identify suspicious activity. Additionally, they provide a way to review past activity and allow you to review footage to determine who may be responsible for the misplacement of equipment.

An engineer needs to verity the external record tor SMTP traffic. The engineer logged in to the server and entered the nslookup command. Which of the following commands should the engineer send before entering the DNS name?

A.
set type=A
A.
set type=A
Answers
B.
is -d company-mail.com
B.
is -d company-mail.com
Answers
C.
set domain=company.mail.com
C.
set domain=company.mail.com
Answers
D.
set querytype=Mx
D.
set querytype=Mx
Answers
Suggested answer: D

A network administrator Is looking at switch features and is unsure whether to purchase a model with PoE Which of the following devices that commonly utilize PoE should the administrator consider? (Select TWO)

A.
VoIP phones
A.
VoIP phones
Answers
B.
Cameras
B.
Cameras
Answers
C.
Printers
C.
Printers
Answers
D.
Cable modems
D.
Cable modems
Answers
E.
Laptops
E.
Laptops
Answers
F.
UPSs
F.
UPSs
Answers
Suggested answer: A, B

Explanation:

Power over Ethernet (PoE) is a technology that allows network-connected devices to receive power over the same Ethernet cables that are used for data transfer. PoE is commonly used to power devices such as VoIP phones and cameras, making it an ideal choice for network administrators looking for a cost-effective solution. PoE is not typically used for other devices such as printers, cable modems, laptops, and UPSs.

Which of the following allows for an devices within a network to share a highly reliable time source?

A.
NTP
A.
NTP
Answers
B.
SNMP
B.
SNMP
Answers
C.
SIP
C.
SIP
Answers
D.
DNS
D.
DNS
Answers
Suggested answer: A

Explanation:

Network Time Protocol (NTP) is a protocol used to maintain a highly accurate and reliable clock time on all devices within a network. NTP works by synchronizing the time of all the devices within a network to a single, highly accurate time source. This allows for the time of all the devices to be kept in sync with each other, ensuring a consistent and reliable time source for all devices within the network.

Which of the following describes the ability of a corporate IT department to expand its cloud-hosted VM environment with minimal effort?

A.
Scalability
A.
Scalability
Answers
B.
Load balancing
B.
Load balancing
Answers
C.
Multitenancy
C.
Multitenancy
Answers
D.
Geo-redundancy
D.
Geo-redundancy
Answers
Suggested answer: A

Explanation:

Scalability is the ability of a corporate IT department to expand its cloud-hosted virtual machine (VM) environment with minimal effort. This allows IT departments to quickly and easily scale up their cloud environment to meet increased demand. Scalability also allows for the efficient use of resources, as IT departments can quickly and easily scale up or down as needed.

A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?

A.
NFV
A.
NFV
Answers
B.
SDWAN
B.
SDWAN
Answers
C.
VIP
C.
VIP
Answers
D.
MPLS
D.
MPLS
Answers
Suggested answer: A

Explanation:

Network Function Virtualization (NFV) is a technology that allows for the virtualization of a replica of a network's physical topology and the way it behaves without changing the logical topology and the way that devices are managed. NFV allows for the virtualization of network functions such as routers, firewalls, and switches, resulting in increased flexibility and scalability. This makes NFV an ideal technology for companies looking to virtualize a replica of their internal physical network.

An IT administrator received an assignment with the following objectives

• Conduct a total scan within the company's network tor all connected hosts

• Detect all the types of operating systems running on all devices

• Discover all services offered by hosts on the network

• Find open ports and detect security risks.

Which of the following command-line tools can be used to achieve these objectives?

A.
nmap
A.
nmap
Answers
B.
arp
B.
arp
Answers
C.
netatat
C.
netatat
Answers
D.
tcpdump
D.
tcpdump
Answers
Suggested answer: A

Explanation:

Nmap (Network Mapper) is a free and open source command line tool that can be used to scan a network for all connected hosts, detect the types of operating systems running on all devices, discover all services offered by hosts on the network, find open ports, and detect security risks. Nmap is commonly used by system administrators and security professionals to audit a network’s security and identify possible vulnerabilities. Nmap can be used to discover active hosts, scan ports, fingerprint operating systems, detect running services, and more. Reference: CompTIA Network+ Study Manual, 8th Edition, page 592.

Which of the following is a requirement when certifying a network cabling as Cat 7?

A.
Ensure the patch panel is certified for the same category.
A.
Ensure the patch panel is certified for the same category.
Answers
B.
Limit 10Gb transmissions to 180ft (55m).
B.
Limit 10Gb transmissions to 180ft (55m).
Answers
C.
Use F-type connectors on the network terminations.
C.
Use F-type connectors on the network terminations.
Answers
D.
Ensure the termination standard is TIA/EIA-568-A.
D.
Ensure the termination standard is TIA/EIA-568-A.
Answers
Suggested answer: D

Explanation:

Category 7 (Cat 7) is a cabling standard that supports 10GBASE-T Ethernet connections up to 100 meters (328 feet). In order for a cabling system to be certified as Cat 7, all components, including the patch panel, must meet the TIA/EIA-568-A standard. This standard requires the use of shielded cables with F-type connectors for the network terminations. Reference: CompTIA Network+ Study Manual, 8th Edition, page 158.

Total 865 questions
Go to page: of 87