ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?

A.
Replication traffic between an on-premises server and a remote backup facility
A.
Replication traffic between an on-premises server and a remote backup facility
Answers
B.
Traffic between VMs running on different hosts
B.
Traffic between VMs running on different hosts
Answers
C.
Concurrent connections generated by Internet DDoS attacks
C.
Concurrent connections generated by Internet DDoS attacks
Answers
D.
VPN traffic from remote offices to the datacenter’s VMs
D.
VPN traffic from remote offices to the datacenter’s VMs
Answers
Suggested answer: B

Explanation:

When evaluating a firewall to protect a datacenter’s east-west traffic, it is important to consider traffic between VMs running on different hosts. This type of traffic is referred to as east-west traffic and is often protected by internal firewalls. By implementing firewalls, an organization can protect their internal network against threats such as lateral movement, which can be caused by attackers who have breached a perimeter firewall. Reference: Network+ Certification Study Guide, Chapter 5:

Network Security

Which of the following is used to prioritize Internet usage per application and per user on the network?

A.
Bandwidth management
A.
Bandwidth management
Answers
B.
Load balance routing
B.
Load balance routing
Answers
C.
Border Gateway Protocol
C.
Border Gateway Protocol
Answers
D.
Administrative distance
D.
Administrative distance
Answers
Suggested answer: A

Explanation:

Bandwidth management is used to prioritize Internet usage per application and per user on the network. This allows an organization to allocate network resources to mission-critical applications and users, while limiting the bandwidth available to non-business-critical applications. Reference:

Network+ Certification Study Guide, Chapter 2: Network Operations

A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?

A.
dig
A.
dig
Answers
B.
arp
B.
arp
Answers
C.
show interface
C.
show interface
Answers
D.
hostname
D.
hostname
Answers
Suggested answer: A

Explanation:

The dig command is used to query the NSs for a remote application. It is a command-line tool that is commonly used to troubleshoot DNS issues. When used with specific options, dig can be used to obtain information about domain names, IP addresses, and DNS records. Reference: Network+ Certification Study Guide, Chapter 3: Network Infrastructure

Which of the following would MOST likely be used to review previous upgrades to a system?

A.
Business continuity plan
A.
Business continuity plan
Answers
B.
Change management
B.
Change management
Answers
C.
System life cycle
C.
System life cycle
Answers
D.
Standard operating procedures
D.
Standard operating procedures
Answers
Suggested answer: B

Explanation:

Change management is the process of reviewing previous upgrades to a system. It is a systematic approach to managing changes to an organization's IT systems and infrastructure. Change management involves the assessment of potential risks associated with a change, as well as the identification of any necessary resources required to implement the change. Reference: Network+ Certification Study Guide, Chapter 8: Network Troubleshooting

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?

A.
MIB
A.
MIB
Answers
B.
Trap
B.
Trap
Answers
C.
Syslog
C.
Syslog
Answers
D.
Audit log
D.
Audit log
Answers
Suggested answer: A

Explanation:

To determine what metrics can be gathered from a given switch, a technician should utilize the Management Information Base (MIB). The MIB is a database of network management information that is used to manage and monitor network devices. It contains information about device configuration, status, and performance. Reference: Network+ Certification Study Guide, Chapter 5:

Network Security

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:

Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down

Which of the following describes the reason why the events are not being received?

A.
The network device is not configured to log that level to the syslog server
A.
The network device is not configured to log that level to the syslog server
Answers
B.
The network device was down and could not send the event
B.
The network device was down and could not send the event
Answers
C.
The syslog server is not compatible with the network device
C.
The syslog server is not compatible with the network device
Answers
D.
The syslog server did not have the correct MIB loaded to receive the message
D.
The syslog server did not have the correct MIB loaded to receive the message
Answers
Suggested answer: A

Explanation:

The reason why the alerts are not being received is that the network device is not configured to log that level to the syslog server. The severity level for the events may need to be adjusted in order for them to be sent to the syslog server. Reference: Network+ Certification Study Guide, Chapter 8:

Network Troubleshooting

A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?

A.
A Layer 3 switch
A.
A Layer 3 switch
Answers
B.
A proxy server
B.
A proxy server
Answers
C.
A NGFW
C.
A NGFW
Answers
D.
A WLAN controller
D.
A WLAN controller
Answers
Suggested answer: A

Explanation:

A Layer 3 switch will likely replace all the company's hubs when implementing OSPF on all of its network devices. A Layer 3 switch combines the functionality of a traditional Layer 2 switch with the routing capabilities of a router. By implementing OSPF on a Layer 3 switch, an organization can improve network performance and reduce the risk of network congestion. Reference: Network+ Certification Study Guide, Chapter 5: Network Security

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?

A.
Reduce the wireless power levels
A.
Reduce the wireless power levels
Answers
B.
Adjust the wireless channels
B.
Adjust the wireless channels
Answers
C.
Enable wireless client isolation
C.
Enable wireless client isolation
Answers
D.
Enable wireless port security
D.
Enable wireless port security
Answers
Suggested answer: A

Explanation:

Reducing the wireless power levels can limit the range of the guest wireless network and prevent users in an adjacent building from connecting to it. Adjusting the wireless channels or enabling wireless client isolation will not affect the signal strength or coverage of the guest network. Enabling wireless port security will not work on a guest network that does not use authentication or MAC address filtering. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 2.0 Network Operations, Objective 2.5 Given a scenario, implement appropriate wireless configuration settings; Guest WiFi Security - Cisco Umbrella

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?

A.
Virtual network computing
A.
Virtual network computing
Answers
B.
Secure Socket Shell
B.
Secure Socket Shell
Answers
C.
In-band connection
C.
In-band connection
Answers
D.
Site-to-site VPN
D.
Site-to-site VPN
Answers
Suggested answer: D

Explanation:

Site-to-site VPN provides the best security for connecting a new datacenter to an old one because it creates a secure tunnel between the two locations, protecting data in transit. Reference: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?

A.
Pass-the-hash attack
A.
Pass-the-hash attack
Answers
B.
Rainbow table attack
B.
Rainbow table attack
Answers
C.
Brute-force attack
C.
Brute-force attack
Answers
D.
Dictionary attack
D.
Dictionary attack
Answers
Suggested answer: D

Explanation:

The attacker attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt is using a dictionary attack. Reference: CompTIA Network+ Certification Study Guide, Chapter 6: Network Attacks and Mitigation.

Total 865 questions
Go to page: of 87