ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 50

Question list
Search
Search

List of questions

Search

Related questions











Classification using labels according to information sensitivity and impact in case of unauthorized access or leakage is a mandatory component of:

A.
an acceptable use policy.
A.
an acceptable use policy.
Answers
B.
a memorandum of understanding.
B.
a memorandum of understanding.
Answers
C.
data loss prevention,
C.
data loss prevention,
Answers
D.
a non-disclosure agreement.
D.
a non-disclosure agreement.
Answers
Suggested answer: C

Explanation:

Data loss prevention (DLP) is a set of tools and processes that aim to prevent unauthorized access or leakage of sensitive information. One of the components of DLP is data classification, which involves labeling data according to its information sensitivity and impact in case of unauthorized disclosure. Data classification helps to identify and protect the most critical and confidential data and apply appropriate security controls and policies. Reference: Network+ Study Guide Objective 5.1: Explain the importance of policies, processes and procedures for IT governance. Subobjective: Data loss prevention.

A network technician needs to select an AP that will support at least 1.3Gbps and 5GHz only. Which of the following wireless standards must the AP support to meet the requirements?

A.
B
A.
B
Answers
B.
AC
B.
AC
Answers
C.
AX
C.
AX
Answers
D.
N
D.
N
Answers
E.
G
E.
G
Answers
Suggested answer: B

Explanation:

Wireless AC is a wireless standard that supports up to 1.3Gbps data rate and operates in the 5GHz frequency band only. Wireless AC is also backward compatible with wireless A and N devices that use the 5GHz band. Wireless AC is suitable for high-performance applications such as HD video streaming and online gaming. Reference: Network+ Study Guide Objective 2.2: Explain the purposes and properties of routing and switching. Subobjective: Wireless standards and their characteristics.

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum The Access Points should be configured to only support TKIP clients at a maximum speed INSTRUCTONS Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.





A.
See explanation below.
A.
See explanation below.
Answers
Suggested answer: A

Explanation:

On the first exhibit, the layout should be as follows

Exhibit 2 as follows

Access Point Name AP2



Exhibit 3 as follows

Access Point Name AP3





SIMULATION

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

- Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage - Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic Building A

- Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

- Provide devices to support 5 additional different office users

- Add an additional mobile user

- Replace the Telnet server with a more secure solution Screened subnet

- Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

- Provide a server to handle external 80/443 traffic - Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


A.
See explanation below.
A.
See explanation below.
Answers
Suggested answer: A

Explanation:

Top left subnet – 206.208.134.0/28

Top right subnet – 10.72.63.0/28

Bottom subnet – 192.168.11.0/28

Screened Subnet devices – Web server, FTP server

Building A devices – SSH server top left, workstations on all 5 on the right, laptop on bottom left DataCenter devices – DNS server.


SIMULATION

A network technician replaced a switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the correct settings:

•bullet Ensure each device accesses only its correctly associated network

•bullet Disable all unused switch ports

•bullet Require fault-tolerant connections between the switches

•bullet Only make necessary changes to complete the above requirements

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.


A.
See the explanation for this solution
A.
See the explanation for this solution
Answers
B.
B.
Answers
C.
C.
Answers
D.
D.
Answers
Suggested answer: A

Explanation:

Explanation:

Switch 1 and Switch 2 is the only two switches that can be configured. Only switches linked together with there switch ports needs to be "tagged" and "LACP" needs to be enabled. The other ports must be untagged with no LACP enabled. You only need to assign the correct vlan via each port. 'Speed and Duplex' needs to be Speed=1000 and Duplex=Full, with is by default.

https://resources.infosecinstitute.com/topic/what-are-tagged-and-untagged-ports/


An administrator would like to have two servers at different geographical locations provide fault tolerance and high performance while appearing as one URL to users. Which of the following should the administrator implement?

A.
Load balancing
A.
Load balancing
Answers
B.
Multipathing
B.
Multipathing
Answers
C.
NIC teaming
C.
NIC teaming
Answers
D.
Warm site
D.
Warm site
Answers
Suggested answer: A

Explanation:

Load balancing is a technique that can be used to provide fault tolerance and high performance while appearing as one URL to users. It is achieved by distributing the workload across multiple servers, which are usually located in different geographical locations. This allows for high performance and fault tolerance, as if one server fails, the other will take its place. Additionally, the multiple servers appear as one URL to the users, eliminating the need for the users to switch between servers.

Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?

A.
SDWAN
A.
SDWAN
Answers
B.
MAN
B.
MAN
Answers
C.
PAN
C.
PAN
Answers
D.
MPLS
D.
MPLS
Answers
Suggested answer: A

A network technician receives a report from the server team that a server's network connection is not working correctly. The server team confirms the server is operating correctly except for the network connection. The technician checks the switchport connected to the server and reviews the following data;

Which of the following should the network technician perform to correct the issue?

A.
Replace the Cat 5 patch cable with a Cat 6 cable
A.
Replace the Cat 5 patch cable with a Cat 6 cable
Answers
B.
Install a crossover cable between the server and the switch
B.
Install a crossover cable between the server and the switch
Answers
C.
Reset the switchport configuration.
C.
Reset the switchport configuration.
Answers
D.
Use NetFlow data from the switch to isolate the issue.
D.
Use NetFlow data from the switch to isolate the issue.
Answers
E.
Disable MDIX on the switchport and reboot the server.
E.
Disable MDIX on the switchport and reboot the server.
Answers
Suggested answer: A

Explanation:

"Bad cables, incorrect pinouts, or bent pins: Faulty cables (with electrical characteristics preventing successful transmission) or faulty connectors (which do not properly make connections) can prevent successful data transmission at Layer 1. A bad cable could simply be an incorrect category of cable being used for a specific purpose. For example, using a Cat 5 cable (instead of a Cat 6 or higher cable) to connect two 1000BASE-TX devices would result in data corruption. Bent pins in a connector or incorrect pinouts could also cause data to become corrupted."

An engineer was asked to update an MX record for an upcoming project. Which of the following server types is MOST likely to be in scope for the project?

A.
Email
A.
Email
Answers
B.
Web
B.
Web
Answers
C.
File
C.
File
Answers
D.
Database
D.
Database
Answers
Suggested answer: A

Explanation:

An MX record is a type of DNS record that specifies the mail server responsible for accepting email messages on behalf of a domain name. Therefore, an engineer who needs to update an MX record is most likely working on an email server project

A technician is tasked with setting up a mail server and a DNS server. The mail port should be secured and have the ability to transfer large files. Which of the following ports should be opened? (Select TWO).

A.
22
A.
22
Answers
B.
53
B.
53
Answers
C.
110
C.
110
Answers
D.
389
D.
389
Answers
E.
995
E.
995
Answers
F.
3389
F.
3389
Answers
Suggested answer: B, E

Explanation:

Port 53 is used for DNS, which is a service that translates domain names into IP addresses. Port 995 is used for POP3S, which is a protocol for receiving email messages securely. POP3S supports large file transfers and encryption. Therefore, these two ports should be opened for the mail server and the

DNS server project

Total 865 questions
Go to page: of 87