ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 57

Question list
Search
Search

List of questions

Search

Related questions











The results of a recently completed site survey indicate a significant, undesired RSSI in the parking lot and other exterior areas near the like to mitigate access to the wireless network in exterior access areas. The current access point settings are listed in the following table:

Which of the following is the BEST step for the technician to take to resolve the issue?

A.
Reconfigure AP2 and AP3 for non-overlapping channels
A.
Reconfigure AP2 and AP3 for non-overlapping channels
Answers
B.
Implement directional antennas on AP1 and AP2.
B.
Implement directional antennas on AP1 and AP2.
Answers
C.
Raise the power settings on AP2 and AP3.
C.
Raise the power settings on AP2 and AP3.
Answers
D.
Change the SSID on AP1 and AP2.
D.
Change the SSID on AP1 and AP2.
Answers
Suggested answer: B

Explanation:

Implementing directional antennas on AP1 and AP2 is the best step for the technician to take to resolve the issue of undesired RSSI in the parking lot and other exterior areas near the building. RSSI stands for received signal strength indicator, which is a measure of how well a device can receive a wireless signal from an access point (AP). An AP is a device that provides wireless connectivity to a network. An antenna is a device that radiates or receives electromagnetic waves. A directional antenna is an antenna that focuses the wireless signal in a specific direction, resulting in higher gain and longer range. By using directional antennas on AP1 and AP2, which are located near the exterior walls of the building, the technician can reduce the wireless signal leakage to the outside areas and improve the wireless coverage inside the building. Reference: [CompTIA Network+ Certification Exam Objectives], What Is RSSI and How Does It Affect Wireless Networks?, Directional Antennas:

Everything You Need to Know

Which of the following is an example of on-demand scalable hardware that is typically housed in the vendor's data center?

A.
DaaS
A.
DaaS
Answers
B.
laaS
B.
laaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: B

Explanation:

IaaS is an example of on-demand scalable hardware that is typically housed in the vendor's data center. IaaS stands for Infrastructure as a Service, which is a cloud computing model that provides virtualized computing resources over the internet. IaaS allows customers to rent servers, storage, network devices, and other hardware components from a cloud service provider, rather than purchasing and maintaining them on-premise. IaaS offers advantages such as scalability, flexibility, cost-effectiveness, and reliability. Customers can adjust their hardware resources according to their needs and pay only for what they use. Customers can also access their hardware resources from anywhere via a web browser or an API. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Infrastructure as a Service (IaaS)? | IBM

An application team is deploying a new application. The application team would like the network team to monitor network performance and create alerts if fluctuations in the round-trip time occur for that traffic. Which of the following should the network team monitor to meet this requirement?

A.
Bandwidth
A.
Bandwidth
Answers
B.
Latency
B.
Latency
Answers
C.
Loss
C.
Loss
Answers
D.
Cyclic redundancy check
D.
Cyclic redundancy check
Answers
Suggested answer: B

Explanation:

Latency, also known as round-trip time (RTT), is the time it takes for a data packet to travel from a source to its destination and back again. It is a key indicator of network performance and can be used to identify fluctuations that may impact the user experience of an application.

Bandwidth, loss, and cyclic redundancy check (CRC) are other important network performance metrics, but they are not directly related to the application team's requirement to monitor for fluctuations in RTT.

Reference:

CompTIA Network+ N10-008 Exam Objectives, Objective 1.6: Network Performance Monitoring CompTIA Network+ N10-008 Study Guide, Chapter 10: Network Performance Monitoring and Troubleshooting

Additional Notes:

The network team can use a variety of tools and techniques to monitor RTT, such as ping, traceroute, and network monitoring software.

When setting up alerts, the network team should consider the acceptable range of RTT for the application. They should also configure alerts to trigger at different levels of severity, so that they can take prompt action to resolve any issues.

Which of the following routing protocols has routes that are classified with an administrative distance of 110?

A.
BGP
A.
BGP
Answers
B.
OSPF
B.
OSPF
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
RIP
D.
RIP
Answers
Suggested answer: B

Explanation:

Administrative distance is a measure of the trustworthiness of a routing protocol. The smaller the administrative distance value, the more reliable the protocol. Each routing protocol has its own default administrative distance value. OSPF has a default administrative distance of 110, which means it is more reliable than RIP (120) but less reliable than EIGRP (90) or BGP (20).

Reference := Administrative Distance of Routing Protocols - Networks Training, What is Administrative Distance? - Cisco, Adjust Administrative Distance for Route Selection in Cisco IOS Routers …, Administrative Distance (AD) and Autonomous System (AS)

A network engineer designed and implemented a new office space with the following characteristics:

One month after the office space was implemented, users began reporting dropped signals when entering another room and overall poor connections to the 5GHz network. 'which of the following should the engineer do to best resolve the issue?

A.
use non-overlapping channels
A.
use non-overlapping channels
Answers
B.
Reconfigure the network to support 2.4GHz_
B.
Reconfigure the network to support 2.4GHz_
Answers
C.
Upgrade to WPA3.
C.
Upgrade to WPA3.
Answers
Suggested answer:

Explanation:

The best solution to resolve the issue of dropped signals and poor connections to the 5GHz network is to change to directional antennas. Directional antennas are antennas that focus the wireless signal in a specific direction, increasing the range and strength of the signal. Directional antennas are suitable for environments where there are obstacles or interference that can weaken or block the wireless signal. In the image, the office space has several walls and doors that can reduce the signal quality of the 5GHz network, which has a shorter wavelength and higher frequency than the 2.4GHz network. By using directional antennas, the network engineer can aim the wireless signal towards the desired areas and avoid the signal loss caused by the walls and doors. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 76; The Official CompTIA Network+ Student Guide (Exam N10-008), page 2-19.

Which of the following objectives does an evil twin achieve?

A.
DNS poisoning
A.
DNS poisoning
Answers
B.
Log-in credentials
B.
Log-in credentials
Answers
C.
ARP spoofing
C.
ARP spoofing
Answers
D.
Denial of service
D.
Denial of service
Answers
Suggested answer: B

Explanation:

The objective that an evil twin achieves is log-in credentials. An evil twin is a type of rogue access point that mimics a legitimate wireless network by using the same SSID, encryption, and authentication methods. An evil twin can trick unsuspecting users into connecting to it instead of the real network, and then capture their log-in credentials or other sensitive dat a. An evil twin can also perform man-in-the-middle attacks, redirecting or modifying the user's traffic. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 358; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-1.

A network administrator is connecting two Layer 2 switches in a network These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

A.
Jumbo frames
A.
Jumbo frames
Answers
B.
802. IQ tagging
B.
802. IQ tagging
Answers
C.
Native VLAN
C.
Native VLAN
Answers
D.
Link aggregation
D.
Link aggregation
Answers
Suggested answer: B

Explanation:

The technique that would fulfill the requirement of transferring data in multiple networks is 802.1Q tagging. 802.1Q tagging is a method of adding a tag or identifier to Ethernet frames that indicate which VLAN (Virtual Local Area Network) they belong to. VLANs are logical subdivisions of a network that allow devices in different physical locations or segments to communicate as if they were in the same network. VLANs improve network performance, security, and management by reducing broadcast traffic, isolating sensitive data, and grouping devices by function or department. By using 802.1Q tagging, two Layer 2 switches can exchange data from multiple VLANs over a single trunk link, without mixing or losing the VLAN information. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 64; The Official CompTIA Network+ Student Guide (Exam N10-008), page 2-12.

A network engineer is installing hardware in a newly renovated data center. Major concerns that were addressed during the renovation induded air circulation, building power redundancy, and the need for continuous monitoring. The network engineer IS creating alerts based on the following operation specifications:

Which of the following should the network engineer configure?

A.
Environmental monitoring alerts for humidity greater than 95%
A.
Environmental monitoring alerts for humidity greater than 95%
Answers
B.
SIEM to parse syslog events for a failed power supply
B.
SIEM to parse syslog events for a failed power supply
Answers
C.
SNMP traps to report when the chassis temperature exceeds 950F (3500)
C.
SNMP traps to report when the chassis temperature exceeds 950F (3500)
Answers
D.
UPS monitoring to report when input voltage drops below 220VAC
D.
UPS monitoring to report when input voltage drops below 220VAC
Answers
Suggested answer: C

Explanation:

The alert that the network engineer should configure based on the operation specifications is SNMP traps to report when the chassis temperature exceeds 95°F (35°C). SNMP (Simple Network Management Protocol) is a protocol that allows network devices to communicate their status and performance information to a central management system, called an SNMP manager. SNMP traps are messages that are sent by network devices to notify the SNMP manager of an event or condition that requires attention, such as an error, a failure, or a threshold violation. In this case, the network engineer should configure SNMP traps on the network devices to send an alert when their chassis temperature exceeds 95°F (35°C), which is the maximum operating temperature specified in the table. This alert would help the network engineer monitor and troubleshoot any overheating issues that could affect the network performance or availability. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 228; The Official CompTIA Network+ Student Guide (Exam N10-008), page 8-11.

A network administrator needs to implement a solution to mediate access to the internet- Which of the following should the administrator most likely implement?

A.
Router
A.
Router
Answers
B.
Cloud gateway
B.
Cloud gateway
Answers
C.
proxy
C.
proxy
Answers
D.
Intrusion prevention system
D.
Intrusion prevention system
Answers
Suggested answer: C

Explanation:

A proxy is a solution that can mediate access to the internet. A proxy is a server that acts as an intermediary between a client and a destination server on the internet. A proxy can perform various functions, such as filtering, caching, logging, or modifying requests and responses. A proxy can help improve network performance, security, and privacy by reducing bandwidth consumption, blocking malicious or unwanted content, monitoring network activity, and hiding the client's identity or location. Reference: [CompTIA Network+ Certification Exam Objectives], What Is a Proxy Server? | Proxy Server Definition | Avast

An attacker sends more connection requests than a server can handle, causing the server to crash-Which of the following types of attacks is this an example of?

A.
ARP poisoning
A.
ARP poisoning
Answers
B.
Denial-of-service
B.
Denial-of-service
Answers
C.
MAC flooding
C.
MAC flooding
Answers
D.
On-path
D.
On-path
Answers
Suggested answer: B

Explanation:

A denial-of-service (DoS) attack is an example of an attack where an attacker sends more connection requests than a server can handle, causing the server to crash. A DoS attack is a type of cyberattack that aims to disrupt the normal functioning of a network service or resource by overwhelming it with excessive or malformed traffic. A DoS attack can prevent legitimate users from accessing the service or resource, resulting in degraded performance, unavailability, or data loss. A DoS attack can target various network layers, protocols, or components, such as servers, routers, firewalls, or applications. Reference: [CompTIA Network+ Certification Exam Objectives], What Is a Denial-of-Service (DoS) Attack? | Cisco

Total 865 questions
Go to page: of 87