ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?

Replication traffic between an on-premises server and a remote backup facility
Replication traffic between an on-premises server and a remote backup facility
Traffic between VMs running on different hosts
Traffic between VMs running on different hosts
Concurrent connections generated by Internet DDoS attacks
Concurrent connections generated by Internet DDoS attacks
VPN traffic from remote offices to the datacenter’s VMs
VPN traffic from remote offices to the datacenter’s VMs
Suggested answer: B
Explanation:

When evaluating a firewall to protect a datacenter’s east-west traffic, it is important to consider traffic between VMs running on different hosts. This type of traffic is referred to as east-west traffic and is often protected by internal firewalls. By implementing firewalls, an organization can protect their internal network against threats such as lateral movement, which can be caused by attackers who have breached a perimeter firewall. Reference: Network+ Certification Study Guide, Chapter 5:

Network Security

asked 02/10/2024
matthew kim
44 questions

Question 42

Report Export Collapse

Which of the following is used to prioritize Internet usage per application and per user on the network?

Bandwidth management
Bandwidth management
Load balance routing
Load balance routing
Border Gateway Protocol
Border Gateway Protocol
Administrative distance
Administrative distance
Suggested answer: A
Explanation:

Bandwidth management is used to prioritize Internet usage per application and per user on the network. This allows an organization to allocate network resources to mission-critical applications and users, while limiting the bandwidth available to non-business-critical applications. Reference:

Network+ Certification Study Guide, Chapter 2: Network Operations

asked 02/10/2024
Miguel Tuimil Galdo
43 questions

Question 43

Report Export Collapse

A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?

dig
dig
arp
arp
show interface
show interface
hostname
hostname
Suggested answer: A
Explanation:

The dig command is used to query the NSs for a remote application. It is a command-line tool that is commonly used to troubleshoot DNS issues. When used with specific options, dig can be used to obtain information about domain names, IP addresses, and DNS records. Reference: Network+ Certification Study Guide, Chapter 3: Network Infrastructure

asked 02/10/2024
Mark Green
55 questions

Question 44

Report Export Collapse

Which of the following would MOST likely be used to review previous upgrades to a system?

Business continuity plan
Business continuity plan
Change management
Change management
System life cycle
System life cycle
Standard operating procedures
Standard operating procedures
Suggested answer: B
Explanation:

Change management is the process of reviewing previous upgrades to a system. It is a systematic approach to managing changes to an organization's IT systems and infrastructure. Change management involves the assessment of potential risks associated with a change, as well as the identification of any necessary resources required to implement the change. Reference: Network+ Certification Study Guide, Chapter 8: Network Troubleshooting

asked 02/10/2024
João Faria
40 questions

Question 45

Report Export Collapse

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?

MIB
MIB
Trap
Trap
Syslog
Syslog
Audit log
Audit log
Suggested answer: A
Explanation:

To determine what metrics can be gathered from a given switch, a technician should utilize the Management Information Base (MIB). The MIB is a database of network management information that is used to manage and monitor network devices. It contains information about device configuration, status, and performance. Reference: Network+ Certification Study Guide, Chapter 5:

Network Security

asked 02/10/2024
Marcin Golec
38 questions

Question 46

Report Export Collapse

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:

Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down

Which of the following describes the reason why the events are not being received?

The network device is not configured to log that level to the syslog server
The network device is not configured to log that level to the syslog server
The network device was down and could not send the event
The network device was down and could not send the event
The syslog server is not compatible with the network device
The syslog server is not compatible with the network device
The syslog server did not have the correct MIB loaded to receive the message
The syslog server did not have the correct MIB loaded to receive the message
Suggested answer: A
Explanation:

The reason why the alerts are not being received is that the network device is not configured to log that level to the syslog server. The severity level for the events may need to be adjusted in order for them to be sent to the syslog server. Reference: Network+ Certification Study Guide, Chapter 8:

Network Troubleshooting

asked 02/10/2024
TREVOR COLLEDGE
48 questions

Question 47

Report Export Collapse

A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?

A Layer 3 switch
A Layer 3 switch
A proxy server
A proxy server
A NGFW
A NGFW
A WLAN controller
A WLAN controller
Suggested answer: A
Explanation:

A Layer 3 switch will likely replace all the company's hubs when implementing OSPF on all of its network devices. A Layer 3 switch combines the functionality of a traditional Layer 2 switch with the routing capabilities of a router. By implementing OSPF on a Layer 3 switch, an organization can improve network performance and reduce the risk of network congestion. Reference: Network+ Certification Study Guide, Chapter 5: Network Security

asked 02/10/2024
Marcel Janssen
41 questions

Question 48

Report Export Collapse

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?

Reduce the wireless power levels
Reduce the wireless power levels
Adjust the wireless channels
Adjust the wireless channels
Enable wireless client isolation
Enable wireless client isolation
Enable wireless port security
Enable wireless port security
Suggested answer: A
Explanation:

Reducing the wireless power levels can limit the range of the guest wireless network and prevent users in an adjacent building from connecting to it. Adjusting the wireless channels or enabling wireless client isolation will not affect the signal strength or coverage of the guest network. Enabling wireless port security will not work on a guest network that does not use authentication or MAC address filtering. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 2.0 Network Operations, Objective 2.5 Given a scenario, implement appropriate wireless configuration settings; Guest WiFi Security - Cisco Umbrella

asked 02/10/2024
Franco Santos
45 questions

Question 49

Report Export Collapse

A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?

Virtual network computing
Virtual network computing
Secure Socket Shell
Secure Socket Shell
In-band connection
In-band connection
Site-to-site VPN
Site-to-site VPN
Suggested answer: D
Explanation:

Site-to-site VPN provides the best security for connecting a new datacenter to an old one because it creates a secure tunnel between the two locations, protecting data in transit. Reference: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.

asked 02/10/2024
Justin Kim
47 questions

Question 50

Report Export Collapse

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?

Pass-the-hash attack
Pass-the-hash attack
Rainbow table attack
Rainbow table attack
Brute-force attack
Brute-force attack
Dictionary attack
Dictionary attack
Suggested answer: D
Explanation:

The attacker attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt is using a dictionary attack. Reference: CompTIA Network+ Certification Study Guide, Chapter 6: Network Attacks and Mitigation.

asked 02/10/2024
JED MEDIA
39 questions
Total 865 questions
Go to page: of 87
Search

Related questions