ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 48

Question list
Search
Search

List of questions

Search

Related questions











A network technician is working at a new office location and needs to connect one laptop to another to transfer files. The laptops are newer models and do not have Ethernet ports. Access points are not available either. Which Of the following types Of wireless network SSIDs does the network technician need to configure to be able to connect the laptops together?

A.
Independent Basic Service Set
A.
Independent Basic Service Set
Answers
B.
Extended Service Set
B.
Extended Service Set
Answers
C.
Distribution System Service
C.
Distribution System Service
Answers
D.
Basic Service Set
D.
Basic Service Set
Answers
Suggested answer: C

Explanation:


An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report.

The tool was configured to scan using the following information:

Network address: 172.28.16.0

CIDR: /22

The engineer collected the following information from the client workstation:

IP address: 172.28.17.206

Subnet mask: 255.255.252.0

Which of the following MOST likely explains why the tool is failing to detect some workstations?

A.
The scanned network range is incorrect.
A.
The scanned network range is incorrect.
Answers
B.
The subnet mask on the client is misconfigured.
B.
The subnet mask on the client is misconfigured.
Answers
C.
The workstation has a firewall enabled.
C.
The workstation has a firewall enabled.
Answers
D.
The tool is unable to scan remote networks.
D.
The tool is unable to scan remote networks.
Answers
Suggested answer: C

Explanation:

A firewall is a device or software that filters and controls the incoming and outgoing network traffic based on predefined rules. A firewall can block ICMP packets, which are used for ping and other diagnostic tools. If the workstation has a firewall enabled, it may not respond to the ICMP sweep and appear as offline. The engineer should check the firewall settings on the workstation and allow ICMP traffic if needed.

Reference: Network+ Study Guide Objective 4.1: Given a scenario, use the appropriate tool.

A technician is equipped with a tablet, a smartphone, and a laptop to troubleshoot a switch with the help of support over the phone. However, the technician is having issues interconnecting all these tools in troubleshooting the switch. Which Of the following should the technician use to gain connectivity?

A.
PAN
A.
PAN
Answers
B.
WAN
B.
WAN
Answers
C.
LAN
C.
LAN
Answers
D.
MAN
D.
MAN
Answers
Suggested answer: A

Explanation:

A PAN stands for Personal Area Network and it is a type of network that connects devices within a small range, such as a few meters. A PAN can use wireless technologies such as Bluetooth or Wi-Fi to interconnect devices such as tablets, smartphones, and laptops. A technician can use a PAN to gain connectivity among these tools and troubleshoot the switch.

Reference: Network+ Study Guide Objective 1.2: Explain devices, applications, protocols and services at their appropriate OSI layers.

A network engineer is designing a wireless network that has the following requirements:

• Network speed must be higher than 100Mbps

• Must use the 2.4GHz and 5GHz bands

Which of the following 802.11 standards should the engineer select?

A.
802. lla
A.
802. lla
Answers
B.
802.11b
B.
802.11b
Answers
C.
802. 11g
C.
802. 11g
Answers
D.
802.11 n
D.
802.11 n
Answers
Suggested answer: D

Explanation:

802.11n is a wireless standard that supports up to 600 Mbps data rate and operates in both the 2.4 GHz and 5 GHz frequency bands. 802.11n uses multiple-input multiple-output (MIMO) technology to increase the number of spatial streams and improve the wireless performance and range. 802.11n meets the requirements of the wireless network design.

Reference: Network+ Study Guide Objective 1.6: Explain the functions of network services.

Which of the following documents is MOST likely to be associated with identifying and documenting critical applications?

A.
Software development life-cycle policy
A.
Software development life-cycle policy
Answers
B.
User acceptance testing plan
B.
User acceptance testing plan
Answers
C.
Change management policy
C.
Change management policy
Answers
D.
Business continuity plan
D.
Business continuity plan
Answers
Suggested answer: D

Explanation:

A business continuity plan (BCP) is a document that outlines the procedures and strategies to ensure the continuity of critical business functions in the event of a disaster or disruption. A BCP is most likely to be associated with identifying and documenting critical applications that are essential for the organization’s operations and recovery. A BCP also defines the roles and responsibilities of the staff, the backup and restore processes, the communication channels, and the testing and maintenance schedules.

Reference: Network+ Study Guide Objective 5.2: Explain disaster recovery and business continuity concepts.

A company is opening a new building on the other side of its campus. The distance from the closest building to the new building is 1,804ft (550m). The company needs to connect the networking equipment in the new building to the Other buildings on the campus without using a repeater. Which Of the following transceivers should the company use?

A.
10GBASE-SW
A.
10GBASE-SW
Answers
B.
10GBASE-LR
B.
10GBASE-LR
Answers
C.
10GBASE-LX4 over multimode fiber
C.
10GBASE-LX4 over multimode fiber
Answers
D.
10GBASE-SR
D.
10GBASE-SR
Answers
Suggested answer: B

Explanation:

10GBASE-LR is a standard for 10 Gbps Ethernet over single-mode fiber optic cable. It can support a maximum distance of 6.2 miles (10 km), which is much longer than the distance between the buildings. 10GBASE-SW, 10GBASE-LX4, and 10GBASE-SR are all standards for 10 Gbps Ethernet over multimode fiber optic cable, which have shorter maximum distances ranging from 984ft (300m) to 1,312ft (400m).

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.5:

Compare and contrast network cabling types, standards and speeds.

An IT technician installs five old switches in a network. In addition to the low port rates on these switches, they also have improper network configurations. After three hours, the network becomes overwhelmed by continuous traffic and eventually shuts down. Which Of the following is causing the issue?

A.
Broadcast storm
A.
Broadcast storm
Answers
B.
Collisions
B.
Collisions
Answers
C.
IP settings
C.
IP settings
Answers
D.
Routing loops
D.
Routing loops
Answers
Suggested answer: A

Explanation:

A broadcast storm is a situation where a network is flooded with broadcast packets, which are sent to all devices on the network. This can consume bandwidth, cause congestion, and degrade performance. A broadcast storm can be caused by improper network configurations, such as loops or misconfigured switches. In this scenario, the old switches may have created loops or failed to filter broadcast packets, resulting in a broadcast storm that overwhelmed the network.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 2.4:

Given a scenario, use appropriate software tools to troubleshoot connectivity issues.

At which of the following OSI model layers does a MAC filter list for a wireless infrastructure operate?

A.
Physical
A.
Physical
Answers
B.
Network
B.
Network
Answers
C.
Session
C.
Session
Answers
D.
Data link
D.
Data link
Answers
Suggested answer: D

Explanation:

A MAC filter list is a security feature that allows or denies access to a wireless network based on the MAC address of the device. A MAC address is a unique identifier assigned to a network interface card (NIC) at the physical layer of the OSI model. However, MAC filtering operates at the data link layer of the OSI model, where MAC addresses are used to encapsulate and deliver data frames between devices on the same network segment.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.1:

Given a scenario, install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices.

A technician is investigating a misconfiguration on a Layer 3 switch. When the technician logs in and runs a command, the following data is shown:

Which of the following commands generated this output?

A.
show route
A.
show route
Answers
B.
show config
B.
show config
Answers
C.
show interface
C.
show interface
Answers
D.
tcpdump
D.
tcpdump
Answers
E.
netstat —s
E.
netstat —s
Answers
Suggested answer: C

Explanation:

The output shown in the image is from the show interface command, which displays information about the status and configuration of a network interface on a switch or router. The output includes the interface name, description, MAC address, IP address, speed, duplex mode, status, and statistics. The show route command displays the routing table of the device. The show config command displays the current configuration of the device. The tcpdump command captures and analyzes network traffic. The netstat -s command displays statistics for each protocol.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 2.4:

Given a scenario, use appropriate software tools to troubleshoot connectivity issues.

A network administrator notices excessive wireless traffic occurring on an access point after normal business hours. The access point is located on an exterior wall. Which of the following should the administrator do to limit wireless access outside the building?

A.
Set up a private VLAN.
A.
Set up a private VLAN.
Answers
B.
Disable roaming on the WAP.
B.
Disable roaming on the WAP.
Answers
C.
Change to a directional antenna.
C.
Change to a directional antenna.
Answers
D.
Stop broadcasting of the SSID.
D.
Stop broadcasting of the SSID.
Answers
Suggested answer: C

Explanation:

A directional antenna is a type of antenna that radiates or receives radio waves in a specific direction. This can help limit wireless access outside the building by focusing the signal towards the intended area and reducing the signal strength in other directions. A private VLAN is a feature that isolates network devices within a VLAN. Disabling roaming on the WAP prevents wireless clients from switching to another WAP when the signal is weak. Stopping broadcasting of the SSID hides the network name from wireless clients, but does not prevent them from connecting if they know the SSID.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.1:

Given a scenario, install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices.

Total 865 questions
Go to page: of 87