ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 47

Question list
Search
Search

List of questions

Search

Related questions











An AP uses a 98ft (30m) Cat 6 cable to connect to an access switch. The cable is wired through a duct close to a three-phase motor installation. Anytime the three-phase is turned on, all users connected to the switch experience high latency on the network. Which Of the following is MOST likely the cause Of the issue?

A.
Interference
A.
Interference
Answers
B.
Attenuation
B.
Attenuation
Answers
C.
Open circuit
C.
Open circuit
Answers
D.
Short circuit
D.
Short circuit
Answers
Suggested answer: A

Explanation:

Interference is a phenomenon that occurs when unwanted signals or noise affect the transmission or reception of data signals on a network. Interference can cause network issues such as high latency, low throughput, packet loss, or errors. Interference can be caused by various sources, such as electromagnetic fields, radio waves, power lines, or electrical devices. In this scenario, the three- phase motor installation is a source of interference that affects the Cat 6 cable that connects the AP to the access switch. The cable is wired through a duct close to the motor installation, which exposes it to the electromagnetic fields generated by the motor. Anytime the motor is turned on, the interference causes high latency for all users connected to the switch.

A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?

A.
Network performance baselines
A.
Network performance baselines
Answers
B.
VLAN assignments
B.
VLAN assignments
Answers
C.
Routing table
C.
Routing table
Answers
D.
Device configuration review
D.
Device configuration review
Answers
Suggested answer: D

Explanation:

The most likely cause of outages due to newly installed hardware is a misconfiguration of the device settings. Therefore, the first step should be to review the device configuration and check for any errors or inconsistencies that might affect the WAN connectivity.

Reference: Network+ Study Guide Objective 2.1: Explain the importance of network documentation.

Which of the following routing protocols is BEST suited for use on a perimeter router?

A.
OSPF
A.
OSPF
Answers
B.
RIPv2
B.
RIPv2
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
BGP
D.
BGP
Answers
Suggested answer: D

Explanation:

BGP stands for Border Gateway Protocol and it is used to exchange routing information between autonomous systems (AS) on the Internet. A perimeter router is a router that connects an AS to another AS or to the Internet. Therefore, BGP is the best suited routing protocol for a perimeter router.

Reference: Network+ Study Guide Objective 2.4: Compare and contrast the characteristics of network topologies, types and technologies.

The Chief Executive Officer of a company wants to ensure business operations are not disrupted in the event of a disaster. The solution must have fully redundant equipment, real-time synchronization, and zero data loss. Which Of the following should be prepared?

A.
Cloud site
A.
Cloud site
Answers
B.
Warm site
B.
Warm site
Answers
C.
Hot site
C.
Hot site
Answers
D.
Cold site
D.
Cold site
Answers
Suggested answer: C

Explanation:

A hot site is a backup site that is fully equipped and ready to take over the operations of the primary site in the event of a disaster. A hot site has real-time synchronization with the primary site and can provide zero data loss. A hot site is the most expensive and reliable option for disaster recovery.

Reference: Network+ Study Guide Objective 5.3: Explain common scanning, monitoring and patching processes and summarize their expected outputs.

An engineer is designing a network topology for a company that maintains a large on-premises private cloud. A design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal server IP ranges. Which Of the following defense strategies helps meet this requirement?

A.
Implementing a screened subnet
A.
Implementing a screened subnet
Answers
B.
Deploying a honeypot
B.
Deploying a honeypot
Answers
C.
Utilizing network access control
C.
Utilizing network access control
Answers
D.
Enforcing a Zero Trust model
D.
Enforcing a Zero Trust model
Answers
Suggested answer: A

Explanation:

A screened subnet is a network segment that is isolated from both the internal LAN and the Internet by firewalls. A screened subnet can be used to host internet-facing hosts such as web servers, email servers, or DNS servers. A screened subnet provides an additional layer of security and prevents direct access to the internal network from the Internet.

Reference: Network+ Study Guide Objective 3.1: Explain the purposes and use cases for advanced networking devices.

A non-employee was able to enter a server room. Which of the following could have prevented this from happening?

A.
A security camera
A.
A security camera
Answers
B.
A biometric reader
B.
A biometric reader
Answers
C.
OTP key fob
C.
OTP key fob
Answers
D.
Employee training
D.
Employee training
Answers
Suggested answer: B

Explanation:

A biometric reader is a device that scans a person’s physical characteristics, such as fingerprints, iris, or face, and compares them to a database of authorized users. A biometric reader can be used to restrict access to a server room and prevent unauthorized entry. A biometric reader provides a high level of security and cannot be easily bypassed or duplicated.

Reference: Network+ Study Guide Objective 5.1: Summarize the importance of physical security controls.

A company has wireless APS that were deployed with 802.11g. A network engineer has noticed more frequent reports of wireless performance issues during the lunch hour in comparison to the rest of the day. The engineer thinks bandwidth consumption will increase while users are on their breaks, but network utilization logs do not show increased bandwidth numbers. Which Of the following would MOST likely resolve this issue?

A.
Adding more wireless APS
A.
Adding more wireless APS
Answers
B.
Increasing power settings to expand coverage
B.
Increasing power settings to expand coverage
Answers
C.
Configuring the APS to be compatible with 802.1la
C.
Configuring the APS to be compatible with 802.1la
Answers
D.
Changing the wireless channel used
D.
Changing the wireless channel used
Answers
Suggested answer: C

Explanation:

802.11g is an older wireless standard that operates in the 2.4 GHz frequency band and has a maximum data rate of 54 Mbps. 802.11a is a newer wireless standard that operates in the 5 GHz frequency band and has a maximum data rate of 54 Mbps. By configuring the APS to be compatible with 802.11a, the network engineer can reduce interference and congestion in the 2.4 GHz band and improve wireless performance.

Reference: Network+ Study Guide Objective 2.5: Implement network troubleshooting methodologies

A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?

A.
Site-to-site
A.
Site-to-site
Answers
B.
Secure Shell
B.
Secure Shell
Answers
C.
In-band management
C.
In-band management
Answers
D.
Remote desktop connection
D.
Remote desktop connection
Answers
Suggested answer: A

Explanation:

A site-to-site VPN is a type of VPN that connects two or more networks over the Internet using a secure tunnel. A site-to-site VPN allows users to access network resources on a laptop without logging in to the VPN application, as long as the laptop is connected to one of the networks in the VPN. A site-to-site VPN is transparent to the users and does not require any additional software or configuration on the client devices.

Reference: Network+ Study Guide Objective 3.4: Explain the purposes and use cases for VPNs.

Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices?

A.
WLAN controller
A.
WLAN controller
Answers
B.
Load balancer
B.
Load balancer
Answers
C.
SIEM solution
C.
SIEM solution
Answers
D.
Syslog server
D.
Syslog server
Answers
Suggested answer: A

Explanation:

A WLAN controller is a device that manages and controls multiple wireless access points (WAPs) in a wireless LAN (WLAN). A WLAN controller has the capability to centrally manage configuration, logging, and firmware versioning for distributed WAPs. A WLAN controller can also provide load balancing, security, and quality of service (QoS) for the WLAN.

Reference: Network+ Study Guide Objective 3.1: Explain the purposes and use cases for advanced networking devices.

An ISP configured an internet connection to provide 20Mbps, but actual data rates are occurring at 10Mbps and causing a significant delay in data transmission. Which of the following specifications should the ISP check?

A.
Throughput
A.
Throughput
Answers
B.
Latency
B.
Latency
Answers
C.
Bandwidth
C.
Bandwidth
Answers
D.
Jitter
D.
Jitter
Answers
Suggested answer: A

Explanation:

Throughput is the actual amount of data that can be transferred over a network in a given time. Throughput can be affected by various factors such as congestion, interference, errors, or hardware limitations. If the throughput is lower than the configured internet connection speed, it can cause a significant delay in data transmission. The ISP should check the throughput and identify the source of the problem.

Reference: Network+ Study Guide Objective 2.2: Explain the concepts and characteristics of routing and switching.

Total 865 questions
Go to page: of 87