ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 49

Question list
Search
Search

List of questions

Search

Related questions











A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?

A.
MIMO
A.
MIMO
Answers
B.
TKIP
B.
TKIP
Answers
C.
LTE
C.
LTE
Answers
D.
SSID
D.
SSID
Answers
Suggested answer: D

Explanation:

SSID stands for Service Set Identifier and is the name of a wireless network. A wireless access point (WAP) can support multiple SSIDs, which allows different wireless access through the same equipment. For example, the store owner can create one SSID for business equipment and another SSID for patron use, and assign different security settings and bandwidth limits for each SSID. MIMO stands for Multiple Input Multiple Output and is a technology that uses multiple antennas to improve wireless performance. TKIP stands for Temporal Key Integrity Protocol and is an encryption method for wireless networks. LTE stands for Long Term Evolution and is a cellular network technology.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.1:

Given a scenario, install and configure wireless LAN infrastructure and implement the appropriate technologies in support of wireless capable devices.

A network administrator is troubleshooting a client's device that cannot connect to the network. A physical inspection of the switch shows the RJ45 is connected. The NIC shows no activity lights. The network administrator moves the device to another location and connects to the network without issues. Which Of the following tools would be the BEST option for the network administrator to use to further troubleshoot?

A.
Tone generator
A.
Tone generator
Answers
B.
Multimeter
B.
Multimeter
Answers
C.
Optical time-domain reflectometer
C.
Optical time-domain reflectometer
Answers
D.
Cable tester
D.
Cable tester
Answers
Suggested answer: D

Explanation:

A cable tester is a tool that can verify the integrity and functionality of a network cable. It can measure the electrical characteristics of the cable, such as resistance, capacitance, and impedance, and detect any faults or defects, such as shorts, opens, or crosstalk. A cable tester can help the network administrator troubleshoot the problem by determining if the cable is faulty or not. A tone generator is a tool that can send an audible signal through a cable to help locate and identify it. A multimeter is a tool that can measure voltage, current, and resistance of electrical circuits. An optical time-domain reflectometer (OTDR) is a tool that can test the quality and length of fiber optic cables.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 2.3:

Given a scenario, use the appropriate tool to support wired or wireless networks.

A technician uses a badge to enter a security checkpoint on a corporate campus. An unknown individual quickly walks in behind the technician without speaking. Which of the following types of attacks did the technician experience?

A.
Tailgating
A.
Tailgating
Answers
B.
Evil twin
B.
Evil twin
Answers
C.
On-path
C.
On-path
Answers
D.
Piggybacking
D.
Piggybacking
Answers
Suggested answer: A

Explanation:

Tailgating is a type of physical security attack where an unauthorized person follows an authorized person into a restricted area without their consent or knowledge. Tailgating can allow an attacker to bypass security measures and gain access to sensitive information or resources. In this scenario, the technician experienced tailgating when the unknown individual walked in behind the technician without speaking. Piggybacking is similar to tailgating, but it involves the consent or cooperation of the authorized person. Evil twin is a type of wireless network attack where an attacker sets up a rogue access point that mimics a legitimate one. On-path is a type of network attack where an attacker intercepts and modifies traffic between two parties.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.2:

Given a scenario, use appropriate network hardening techniques.

An IT technician is working on a support ticket regarding an unreachable web-site. The technician has utilized the ping command to the website, but the site is still unreachable. Which of the following tools should the technician use NEXT?

A.
ipconfig
A.
ipconfig
Answers
B.
tracert
B.
tracert
Answers
C.
arp
C.
arp
Answers
D.
netstat
D.
netstat
Answers
Suggested answer: B

Explanation:

tracert is a command-line tool that can trace the route of a packet from the source to the destination. It can show the number of hops, the IP address and hostname of each router, and the round-trip time for each hop. tracert can help the technician troubleshoot the unreachable website by identifying where the packet is dropped or delayed along the path. ipconfig is a command-line tool that can display and configure the IP settings of a network interface. arp is a command-line tool that can display and manipulate the Address Resolution Protocol (ARP) cache, which maps IP addresses to MAC addresses. netstat is a command-line tool that can display network connections, routing tables, and statistics.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 2.4:

Given a scenario, use appropriate software tools to troubleshoot connectivity issues.

A security vendor needs to add a note to the DNS to validate the ownership of a company domain before services begin. Which of the following records did the security company MOST likely ask the company to configure?

A.
TXT
A.
TXT
Answers
B.
AAAA
B.
AAAA
Answers
C.
CNAME
C.
CNAME
Answers
D.
SRV
D.
SRV
Answers
Suggested answer: A

Explanation:

TXT stands for Text and is a type of DNS record that can store arbitrary text data associated with a domain name. TXT records can be used for various purposes, such as verifying the ownership of a domain, providing information about a domain, or implementing security mechanisms such as SPF (Sender Policy Framework) or DKIM (DomainKeys Identified Mail). In this scenario, the security company most likely asked the company to configure a TXT record with a specific value that can prove the ownership of the domain. AAAA stands for IPv6 Address and is a type of DNS record that maps a domain name to an IPv6 address. CNAME stands for Canonical Name and is a type of DNS record that maps an alias name to another name. SRV stands for Service and is a type of DNS record that specifies the location of a service on a network.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.8:

Explain the purposes and use cases for advanced networking devices.

Many IP security cameras use RTSP to control media playback. Which of the following default transport layer port numbers does RTSP use?

A.
445
A.
445
Answers
B.
554
B.
554
Answers
C.
587
C.
587
Answers
D.
5060
D.
5060
Answers
Suggested answer: B

Explanation:

RTSP stands for Real Time Streaming Protocol and is an application-level network protocol designed for controlling media playback on streaming media servers. RTSP uses the default transport layer port number 554 for both TCP and UDP1. Port 445 is used for SMB (Server Message Block), a protocol for file and printer sharing. Port 587 is used for SMTP (Simple Mail Transfer Protocol), a protocol for sending email messages. Port 5060 is used for SIP (Session Initiation Protocol), a protocol for initiating and managing multimedia sessions.

Reference: 1 Real Time Streaming Protocol - Wikipedia

(https://en.wikipedia.org/wiki/Real_Time_Streaming_Protocol)

An IT technician needs to increase bandwidth to a server. The server has multiple gigabit ports. Which of the following can be used to accomplish this without replacing hardware?

A.
STP
A.
STP
Answers
B.
802. IQ
B.
802. IQ
Answers
C.
Duplex
C.
Duplex
Answers
D.
LACP
D.
LACP
Answers
Suggested answer: D

Explanation:

LACP stands for Link Aggregation Control Protocol and is a protocol that allows multiple physical ports to be combined into a single logical port. This can increase bandwidth, redundancy, and load balancing for a server. LACP is part of the IEEE 802.3ad standard for link aggregation. STP stands for Spanning Tree Protocol and is a protocol that prevents loops in a network by blocking redundant links. 802.1Q is a standard for VLAN (Virtual Local Area Network) tagging, which allows multiple logical networks to share the same physical infrastructure. Duplex is a mode of communication that determines how data is transmitted and received on a link. Full duplex allows simultaneous transmission and reception, while half duplex allows only one direction at a time.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.5:

Compare and contrast network cabling types, standards and speeds.

Which of the following protocols uses Dijkstra’s algorithm to calculate the LOWEST cost between routers?

A.
RIP
A.
RIP
Answers
B.
OSPF
B.
OSPF
Answers
C.
BGP
C.
BGP
Answers
D.
EIGRP
D.
EIGRP
Answers
Suggested answer: B

Explanation:

OSPF stands for Open Shortest Path First and is a link-state routing protocol that uses Dijkstra’s algorithm to calculate the lowest cost between routers. OSPF assigns a cost value to each link based on factors such as bandwidth, delay, or reliability, and builds a map of the network topology. OSPF then uses Dijkstra’s algorithm to find the shortest path from each router to every other router in the network1. RIP stands for Routing Information Protocol and is a distance-vector routing protocol that uses hop count as the metric to find the best path. BGP stands for Border Gateway Protocol and is a path-vector routing protocol that uses attributes such as AS path, local preference, or origin to select the best route. EIGRP stands for Enhanced Interior Gateway Routing Protocol and is a hybrid routing protocol that uses a composite metric based on bandwidth, delay, load, and reliability.

Reference: 1 Dijkstra’s algorithm - Wikipedia (https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm)

A PC and a network server have no network connectivity, and a help desk technician is attempting to resolve the issue. The technician plans to run a constant ping command from a Windows workstation while testing various possible reasons for the connectivity issue. Which of the following should the technician use?

A.
ping —w
A.
ping —w
Answers
B.
ping -i
B.
ping -i
Answers
C.
ping —s
C.
ping —s
Answers
D.
ping —t
D.
ping —t
Answers
Suggested answer: D

Explanation:

ping -t is an option for the ping command in Windows that allows the user to send continuous ping requests to a target until stopped by pressing Ctrl-C. This can help the technician run a constant ping command while testing various possible reasons for the connectivity issue. ping -w is an option for the ping command in Windows that allows the user to specify a timeout value in milliseconds for each ping request. ping -i is an option for the ping command in Linux that allows the user to specify the time interval in seconds between each ping request. ping -s is an option for the ping command in Linux that allows the user to specify the size of the data payload in bytes for each ping request.

Reference: How to Use the Ping Command in Windows - Lifewire (https://www.lifewire.com/ping- command-2618099)

A switch is connected to another switch. Incompatible hardware causes a surge in traffic on both switches. Which of the following configurations will cause traffic to pause, allowing the switches to drain buffers?

A.
Speed
A.
Speed
Answers
B.
Flow control
B.
Flow control
Answers
C.
802.1Q
C.
802.1Q
Answers
D.
Duplex
D.
Duplex
Answers
Suggested answer: B

Explanation:

Flow control is a mechanism that allows a network device to regulate the amount of traffic it can receive or send. Flow control can help prevent congestion and buffer overflow by sending pause frames or signals to the sender when the receiver’s buffer is full or nearly full. Flow control can cause traffic to pause, allowing the switches to drain buffers and resume normal operation. Speed is a parameter that determines the data transfer rate of a network link. 802.1Q is a standard for VLAN (Virtual Local Area Network) tagging, which allows multiple logical networks to share the same physical infrastructure. Duplex is a mode of communication that determines how data is transmitted and received on a link. Full duplex allows simultaneous transmission and reception, while half duplex allows only one direction at a time.

Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.5:

Compare and contrast network cabling types, standards and speeds.

Total 865 questions
Go to page: of 87