ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organization's requirements?

A.
Cloud site
A.
Cloud site
Answers
B.
Cold site
B.
Cold site
Answers
C.
Warm site
C.
Warm site
Answers
D.
Hot site
D.
Hot site
Answers
Suggested answer: A

Explanation:

A cloud site is a type of disaster recovery site that uses cloud computing services to provide backup and recovery of data and applications in the event of a disaster1. A cloud site does not require a facility agreement or idle hardware, as the cloud provider manages the infrastructure and resources on demand. A cloud site can also offer scalability, flexibility, and cost-effectiveness compared to other types of disaster recovery sites.

A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low.

Which Of the following is the MOST appropriate mechanism to handle this issue?

A.
Traffic shaping
A.
Traffic shaping
Answers
B.
Flow control
B.
Flow control
Answers
C.
NetFIow
C.
NetFIow
Answers
D.
Link aggregation
D.
Link aggregation
Answers
Suggested answer: A

Explanation:

Traffic shaping is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets1. Traffic shaping can help to improve the performance of a videoconferencing application by prioritizing its packets over other types of traffic and smoothing out traffic bursts. Traffic shaping can also help to avoid packet loss and ensure fair allocation of bandwidth among different applications or users. Flow control is a mechanism that prevents a sender from overwhelming a receiver with more data than it can handle. Flow control can help to avoid buffer overflow and data loss, but it does not prioritize different types of traffic or smooth out traffic bursts. Flow control operates at the data link layer or the transport layer, while traffic shaping operates at the network layer or above. NetFlow is a protocol that collects and analyzes network traffic data for monitoring and troubleshooting purposes2. NetFlow can help to identify the sources, destinations, volumes, and types of traffic on a network, but it does not regulate or shape the traffic flow. NetFlow operates at the network layer or above.

Link aggregation is a technique that combines multiple physical links into one logical link for increased bandwidth, redundancy, and load balancing. Link aggregation can help to improve the performance of a videoconferencing application by providing more available bandwidth at the WAN connection, but it does not prioritize different types of traffic or smooth out traffic bursts. Link aggregation operates at the data link layer.

Which of the following protocols can be routed?

A.
FCoE
A.
FCoE
Answers
B.
Fibre Channel
B.
Fibre Channel
Answers
C.
iSCSl
C.
iSCSl
Answers
D.
NetBEUI
D.
NetBEUI
Answers
Suggested answer: C

Explanation:

iSCSI (Internet Small Computer System Interface) is a protocol that allows SCSI commands to be transported over IP networks1. iSCSI can be routed because it contains a network address and a device address, as required by a routable protocol2. iSCSI can be used to access block-level storage devices over a network, such as SAN (Storage Area Network).

FCoE (Fibre Channel over Ethernet) is a protocol that allows Fibre Channel frames to be encapsulated and transported over Ethernet networks1. FCoE cannot be routed because it does not contain a network address, only a device address. FCoE operates at the data link layer and requires special switches and adapters to support it. FCoE can also be used to access block-level storage devices over a network, such as SAN.

Fibre Channel is a protocol that provides high-speed and low-latency communication between servers and storage devices1. Fibre Channel cannot be routed because it does not use IP networks, but rather its own dedicated network infrastructure. Fibre Channel operates at the physical layer and the data link layer and requires special cables, switches, and adapters to support it. Fibre Channel can also be used to access block-level storage devices over a network, such as SAN. NetBEUI (NetBIOS Extended User Interface) is an old protocol that provides session-level communication between devices on a local network1. NetBEUI cannot be routed because it does not contain a network address, only a device address. NetBEUI operates at the transport layer and relies on NetBIOS for name resolution. NetBEUI is obsolete and has been replaced by other protocols, such as TCP/IP.

A technician thinks one of the router ports is flapping. Which of the following available resources should the technician use in order to determine if the router is flapping?

A.
Audit logs
A.
Audit logs
Answers
B.
NetFlow
B.
NetFlow
Answers
C.
Syslog
C.
Syslog
Answers
D.
Traffic logs
D.
Traffic logs
Answers
Suggested answer: C

Explanation:

Syslog is a protocol that allows network devices to send event messages to a centralized server or console for logging and analysis1. Syslog can help a technician to determine if a router port is flapping by providing timestamps, severity levels, and descriptions of the events that occur on the router, such as interface up or down, link state change, or error messages. Syslog can also help to identify the cause and frequency of the port flapping and troubleshoot the issue. Audit logs are records of actions or events that occur on a system or network, such as user login, file access, configuration change, or policy violation. Audit logs can help to monitor and verify the activities and behaviors of users, devices, or applications on a system or network. Audit logs can also help to detect and investigate security incidents, compliance issues, or performance problems. However, audit logs do not provide detailed information about router port flapping. NetFlow is a protocol that collects and analyzes network traffic data for monitoring and troubleshooting purposes2. NetFlow can help to identify the sources, destinations, volumes, and types of traffic on a network. NetFlow can also help to optimize network performance, security, and capacity planning. However, NetFlow does not provide detailed information about router port flapping.

Traffic logs are records of network traffic that pass through a device or application, such as a firewall, proxy, or web server. Traffic logs can help to monitor and filter the network traffic based on rules or policies. Traffic logs can also help to detect and prevent malicious traffic, such as malware, attacks, or unauthorized access. However, traffic logs do not provide detailed information about router port flapping.

Which of the following situations would require an engineer to configure subinterfaces?

A.
In a router-on-a-stick deployment with multiple VLANs
A.
In a router-on-a-stick deployment with multiple VLANs
Answers
B.
In order to enable inter-VLAN routing on a multilayer switch
B.
In order to enable inter-VLAN routing on a multilayer switch
Answers
C.
When configuring VLAN trunk links between switches
C.
When configuring VLAN trunk links between switches
Answers
D.
After connecting a router that does not support 802.1Q VLAN tags
D.
After connecting a router that does not support 802.1Q VLAN tags
Answers
Suggested answer: A

Explanation:

A router-on-a-stick is a configuration that allows a single router interface to route traffic between multiple VLANs on a network1. A router-on-a-stick requires sub-interfaces to be configured on the router interface, one for each VLAN. Each sub-interface is assigned a VLAN ID and an IP address that belongs to the corresponding VLAN subnet. The router interface is connected to a switch port that is configured as a trunk port, which allows traffic from multiple VLANs to pass through. The router then performs inter-VLAN routing by forwarding packets between the sub-interfaces based on their destination IP addresses.

Inter-VLAN routing is a process that allows devices on different VLANs to communicate with each other. Inter-VLAN routing can be performed by a router-on-a-stick configuration, as explained above, or by a multilayer switch that has routing capabilities. A multilayer switch does not require sub- interfaces to be configured for inter-VLAN routing; instead, it uses switch virtual interfaces (SVIs) that are associated with each VLAN. An SVI is a logical interface that represents a VLAN on a switch and has an IP address that belongs to the VLAN subnet. The switch then performs inter-VLAN routing by forwarding packets between the SVIs based on their destination IP addresses. VLAN trunking is a method that allows traffic from multiple VLANs to be carried over a single link between switches or routers. VLAN trunking requires the use of a tagging protocol, such as 802.1Q, that adds a header to each frame that identifies its VLAN ID. VLAN trunking does not require sub- interfaces to be configured on the switches or routers; instead, it uses trunk ports that are configured to allow or deny traffic from specific VLANs. The switches or routers then forward packets between the trunk ports based on their VLAN IDs.

802.1Q is a standard that defines how VLAN tagging and trunking are performed on Ethernet networks. 802.1Q adds a 4-byte header to each frame that contains a 12-bit field for the VLAN ID and a 3-bit field for the priority level. 802.1Q does not require sub-interfaces to be configured on the switches or routers; instead, it uses trunk ports that are configured to support 802.1Q tagging and untagging. The switches or routers then forward packets between the trunk ports based on their VLAN IDs and priority levels.

Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an internet update server without exposing the devices to the public internet?

A.
Allow connections only to an internal proxy server.
A.
Allow connections only to an internal proxy server.
Answers
B.
Deploy an IDS system and place it in line with the traffic.
B.
Deploy an IDS system and place it in line with the traffic.
Answers
C.
Create a screened network and move the devices to it.
C.
Create a screened network and move the devices to it.
Answers
D.
Use a host-based network firewall on each device.
D.
Use a host-based network firewall on each device.
Answers
Suggested answer: A

Explanation:

An internal proxy server is a server that acts as an intermediary between internal devices and external servers on the internet. An internal proxy server can be used to limit the ability of devices to perform only HTTPS connections to an internet update server by filtering and forwarding the requests and responses based on predefined rules or policies. An internal proxy server can also prevent the devices from being exposed to the public internet by hiding their IP addresses and providing a layer of security and privacy.

A customer called the help desk to report a network issue. The customer recently added a hub between the switch and the router in order to duplicate the traffic flow to a logging device. After adding the hub, all the Other network components that were connected to the switch slowed more than expected. Which Of the following is the MOST likely cause Of the issue?

A.
Duplex mismatch
A.
Duplex mismatch
Answers
B.
Flow control failure
B.
Flow control failure
Answers
C.
STP malfunction
C.
STP malfunction
Answers
D.
802.1Q disabled
D.
802.1Q disabled
Answers
Suggested answer: A

Explanation:

A duplex mismatch is a situation where two devices on a network have different duplex settings, such as full-duplex or half-duplex. Full-duplex means that a device can send and receive data simultaneously, while half-duplex means that a device can only send or receive data at a time. A duplex mismatch can cause performance issues, such as collisions, errors, or slow throughput. In this scenario, the customer added a hub between the switch and the router. A hub is a device that operates at half-duplex and broadcasts all traffic to all ports. A switch and a router are devices that operate at full-duplex and forward traffic to specific ports. Therefore, adding a hub between the switch and the router can cause a duplex mismatch and slow down all the other network components that were connected to the switch.

Reference: https://www.comparitech.com/net-admin/hub-vs-switch-vs-router/ https://www.cisco.com/c/en/us/support/docs/lan-switching/ethernet/10561-3.html

A user reports that a crucial fileshare is unreachable following a network upgrade that was completed the night before. A network technician confirms the problem exists. Which of the following troubleshooting Steps should the network technician perform NEXT?

A.
Establish a theory of probable cause.
A.
Establish a theory of probable cause.
Answers
B.
Implement a solution to fix the problem.
B.
Implement a solution to fix the problem.
Answers
C.
Create a plan of action to resolve the problem.
C.
Create a plan of action to resolve the problem.
Answers
D.
Document the problem and the solution.
D.
Document the problem and the solution.
Answers
Suggested answer: A

Explanation:

Establishing a theory of probable cause is the third step in the general troubleshooting process, after identifying the problem and gathering information. Establishing a theory of probable cause involves using the information gathered to formulate one or more possible explanations for the problem and testing them to verify or eliminate them. In this scenario, the network technician has confirmed the problem exists and should proceed to establish a theory of probable cause based on the information available, such as the network upgrade that was completed the night before. Implementing a solution to fix the problem is the fifth step in the general troubleshooting process, after establishing a plan of action. Implementing a solution involves applying the chosen method or technique to resolve the problem and verifying its effectiveness. In this scenario, the network technician has not established a plan of action yet and should not implement a solution without knowing the cause of the problem.

Creating a plan of action to resolve the problem is the fourth step in the general troubleshooting process, after establishing a theory of probable cause. Creating a plan of action involves selecting the best method or technique to address the problem based on the available resources, constraints, and risks. In this scenario, the network technician has not established a theory of probable cause yet and should not create a plan of action without knowing the cause of the problem. Documenting the problem and the solution is the seventh and final step in the general troubleshooting process, after implementing preventive measures. Documenting the problem and the solution involves recording the details of the problem, its symptoms, its cause, its solution, and its preventive measures for future reference and improvement. In this scenario, the network technician has not implemented preventive measures yet and should not document the problem and the solution without resolving and preventing it.

A newly installed multifunction copier needs to be set up so scanned documents can be emailed to recipients. Which of the following ports from the copier's IP address should be allowed?

A.
22
A.
22
Answers
B.
25
B.
25
Answers
C.
53
C.
53
Answers
D.
80
D.
80
Answers
Suggested answer: B

Explanation:

Port 25 is the port number that is commonly used for Simple Mail Transfer Protocol (SMTP), which is a protocol that allows sending and receiving email messages over a network1. Port 25 from the copier’s IP address should be allowed so that scanned documents can be emailed to recipients. Port 22 is the port number that is commonly used for Secure Shell (SSH), which is a protocol that allows secure and encrypted remote access and control of a device over a network1. Port 22 from the copier’s IP address is not necessary for emailing scanned documents. Port 53 is the port number that is commonly used for Domain Name System (DNS), which is a protocol that allows resolving domain names to IP addresses and vice versa on a network1. Port 53 from the copier’s IP address is not necessary for emailing scanned documents. Port 80 is the port number that is commonly used for Hypertext Transfer Protocol (HTTP), which is a protocol that allows transferring web pages and other resources over a network1. Port 80 from the copier’s IP address is not necessary for emailing scanned documents.

A network administrator is investigating reports about network performance and finds high utilization on a switch uplink. The administrator is unsure whether this is an anomaly or normal behavior that will require an upgrade to resolve. Which Of the following should the administrator reference to gain historical perspective?

A.
Device configuration review
A.
Device configuration review
Answers
B.
ARP table export
B.
ARP table export
Answers
C.
Service-level agreement
C.
Service-level agreement
Answers
D.
Network performance baseline
D.
Network performance baseline
Answers
Suggested answer: D

Explanation:

A network performance baseline is a set of metrics that represents the normal or expected behavior of a network under various conditions and scenarios. A network performance baseline can help a network administrator to investigate reports about network performance by comparing the current metrics with the historical metrics and identifying any deviations or anomalies. A network performance baseline can also help to plan and justify network upgrades by showing the trends and patterns of network utilization and performance over time.

A device configuration review is a process that involves checking and verifying the settings and parameters of a network device, such as a switch, router, firewall, or server. A device configuration review can help a network administrator to troubleshoot network issues by finding and fixing any errors, inconsistencies, or vulnerabilities in the device configuration. A device configuration review can also help to ensure compliance with security policies and best practices by applying the latest updates and patches to the device.

An ARP table export is a file that contains the contents of the ARP (Address Resolution Protocol) table of a network device. The ARP table is a data structure that maps IP addresses to MAC addresses on a local network. An ARP table export can help a network administrator to monitor and manage the network devices on a local network by showing their IP addresses and MAC addresses. An ARP table export can also help to detect and prevent ARP spoofing attacks by identifying any duplicate or malicious entries in the ARP table.

A service-level agreement (SLA) is a contract that defines the expectations and responsibilities of both parties in terms of service quality, availability, performance, and response time. An SLA can help a network administrator to provide and maintain a satisfactory level of service to the customers or users of the network by setting and measuring specific goals and metrics. An SLA can also help to resolve any disputes or issues that may arise between the service provider and the service consumer by establishing clear terms and conditions for the service delivery.

Total 865 questions
Go to page: of 87