ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 58

Question list
Search
Search

List of questions

Search

Related questions











Which of the following security concepts is related to ensuring that encrypted data is not edited while in transit?

A.
Zero trust
A.
Zero trust
Answers
B.
Integrity
B.
Integrity
Answers
C.
Availability
C.
Availability
Answers
D.
Confidentiality
D.
Confidentiality
Answers
Suggested answer: B

Explanation:

Integrity is the security concept that is related to ensuring that encrypted data is not edited while in transit. Integrity is one of the three main goals of information security, along with confidentiality and availability. Integrity means that data is protected from unauthorized modification or corruption during storage, processing, or transmission. Integrity can be achieved by using various techniques, such as hashing, digital signatures, checksums, or message authentication codes (MACs). These techniques can verify the authenticity and validity of the data by detecting any changes or tampering that may have occurred. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Data Integrity? | Definition & Examples | Forcepoint

Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?

A.
The switch is oversubscribed and cannot handle the additional throughput.
A.
The switch is oversubscribed and cannot handle the additional throughput.
Answers
B.
The printer is tying up the server with DHCP discover messages
B.
The printer is tying up the server with DHCP discover messages
Answers
C.
The web server's back end was designed for only single-threaded applications.
C.
The web server's back end was designed for only single-threaded applications.
Answers
D.
The workstation was configured with a static IP that is the same as the server.
D.
The workstation was configured with a static IP that is the same as the server.
Answers
Suggested answer: D

Explanation:

The workstation was configured with a static IP that is the same as the server is the most likely cause of the issue where users are unable to access any network resources. A static IP address is an IP address that is manually assigned to a device and does not change over time. A static IP address can be useful for devices that need to be easily identified or accessed on a network, such as servers or printers. However, if two devices on the same network have the same static IP address, it can cause an IP address conflict. An IP address conflict occurs when two devices try to use the same IP address at the same time, resulting in network communication errors or failures. An IP address conflict can prevent users from accessing any network resources that rely on the IP address for identification or routing. Reference: [CompTIA Network+ Certification Exam Objectives], What Is an IP Address Conflict? | HowStuffWorks

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels.

Which of the following would be the best choice?

A.
802.11a
A.
802.11a
Answers
B.
802.11b
B.
802.11b
Answers
C.
802.11g
C.
802.11g
Answers
D.
802.11n
D.
802.11n
Answers
Suggested answer: D

Explanation:

802.11n is the best choice for setting up a wireless connection that utilizes MIMO on non-overlapping channels. 802.11n is a wireless standard that offers faster speeds and longer range than previous standards. 802.11n uses multiple-input multiple-output (MIMO) technology, which allows multiple antennas to transmit and receive multiple spatial streams of data simultaneously. MIMO can improve wireless performance, reliability, and capacity by exploiting multipath propagation and spatial diversity. 802.11n also uses non-overlapping channels in both the 2.4 GHz and 5 GHz frequency bands to avoid interference and increase bandwidth. Non-overlapping channels are channels that do not share any part of their frequency spectrum with other channels. Reference:

[CompTIA Network+ Certification Exam Objectives], 802.11n - Wikipedia

Which of the following focuses on application delivery?

A.
DaaS
A.
DaaS
Answers
B.
laaS
B.
laaS
Answers
C.
SaaS
C.
SaaS
Answers
D.
PaaS
D.
PaaS
Answers
Suggested answer: C

Explanation:

SaaS is the cloud computing model that focuses on application delivery. SaaS stands for Software as a Service, which is a cloud computing model that provides software applications over the internet.

SaaS allows customers to access and use software applications without installing or maintaining them on their own devices or servers. SaaS offers advantages such as scalability, accessibility, compatibility, and cost-effectiveness. Customers can use SaaS applications on demand and pay only for what they use. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Software as a Service (SaaS)? | IBM

A customer calls the help desk to report that users are unable to access any network resources_ The issue started earlier in the day when an employee rearranged the wiring closet A technician goes to the site but does not observe any obvious damage. The statistics output on the switch indicates high

CPI-J usage, and all the lights on the switch are blinking rapidly in unison_ Which of the following is the most likely explanation for these symptoms?

A.
The switch was rebooted and set to run in safe mode.
A.
The switch was rebooted and set to run in safe mode.
Answers
B.
The line between the switch and the upstream router was removed
B.
The line between the switch and the upstream router was removed
Answers
C.
A cable was looped and created a broadcast storm.
C.
A cable was looped and created a broadcast storm.
Answers
D.
A Cat 6 cable from the modem to the router was replaced with Cat 5e.
D.
A Cat 6 cable from the modem to the router was replaced with Cat 5e.
Answers
Suggested answer: C

Explanation:

A cable was looped and created a broadcast storm is the most likely explanation for the symptoms of high CPU usage and blinking lights on the switch. A cable loop is a situation where a switch port is connected to another switch port on the same switch or another switch, creating a circular path for network traffic. A cable loop can cause a broadcast storm, which is a network phenomenon where a large number of broadcast or multicast packets are flooded on the network, consuming bandwidth and CPU resources. A broadcast storm can cause network congestion, performance degradation, or failure. A cable loop can occur when an employee rearranges the wiring closet without proper documentation or verification. A cable loop can be prevented or detected by using Spanning Tree

Protocol (STP) or loop detection features on the switch. Reference: [CompTIA Network+ Certification Exam Objectives], What Is a Broadcast Storm? | Definition & Examples | Forcepoint

Which of the following OSI model layers are responsible for handling packets from the sources to the destination and checking for errors? (Select two).

A.
Physical
A.
Physical
Answers
B.
Session
B.
Session
Answers
C.
Data link
C.
Data link
Answers
D.
Network
D.
Network
Answers
E.
Presentation
E.
Presentation
Answers
F.
Application
F.
Application
Answers
Suggested answer: C, D

Explanation:

The data link and network layers are responsible for handling packets from the source to the destination and checking for errors. The data link layer is the second layer of the OSI model, which is a conceptual framework that describes how different network functions are organized and interact.

The data link layer is responsible for providing reliable and efficient data transmission between two adjacent nodes on a network. The data link layer uses frames as its unit of data, and adds a header and a trailer to each frame that contain information such as source and destination MAC addresses, frame type, and error detection code. The data link layer can check for errors by using techniques such as parity check, checksum, or cyclic redundancy check (CRC). The network layer is the third layer of the OSI model, which is responsible for providing logical addressing and routing of packets across different networks. The network layer uses packets as its unit of data, and adds a header to each packet that contains information such as source and destination IP addresses, protocol type, and hop count. The network layer can check for errors by using techniques such as Internet Control Message Protocol (ICMP), which can send and receive error messages or diagnostic information. Reference:

[CompTIA Network+ Certification Exam Objectives], Data Link Layer - an overview | ScienceDirect Topics, Network Layer - an overview | ScienceDirect Topics

Which of the following network topologies best describes a central device connected to multiple independent devices?

A.
Mesh
A.
Mesh
Answers
B.
ing
B.
ing
Answers
C.
Hub-and-spoke
C.
Hub-and-spoke
Answers
D.
Bus
D.
Bus
Answers
Suggested answer: C

Explanation:

Hub-and-spoke is the network topology that best describes a central device connected to multiple independent devices. A network topology is the physical or logical arrangement of devices and links on a network. A hub-and-spoke topology is a type of star topology, where a central device, such as a switch or a router, acts as a hub that connects to multiple devices, such as computers or printers, that act as spokes. A hub-and-spoke topology can offer advantages such as simplicity, scalability, and reliability, but also disadvantages such as single point of failure, high dependency on the hub, and increased latency. Reference: [CompTIA Network+ Certification Exam Objectives], Hub-and-Spoke Topology: What Is It? (Diagram Included) | SolarWinds MSP

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?

A.
dig
A.
dig
Answers
B.
nmap
B.
nmap
Answers
C.
tracert
C.
tracert
Answers
D.
nslookup
D.
nslookup
Answers
Suggested answer: B

Explanation:

nmap is the tool that would help identify which ports are open on the remote file server. nmap stands for Network Mapper, which is a free and open-source tool that can perform various network scanning and discovery tasks. nmap can help identify which ports are open on a remote device by sending probes or packets to different ports and analyzing the responses. nmap can also provide information about the operating system, services, versions, firewalls, or vulnerabilities of the remote device. nmap can be useful for network administrators, security professionals, or hackers to monitor, audit, or attack network devices. Reference: [CompTIA Network+ Certification Exam Objectives], Nmap - Free Security Scanner For Network Exploration & Security Audits

While working in a coffee shop, an attacker watches a user log in to a corporate system and writes down the user's log-in credentials. Which of the following social engineering attacks is this an example of?

A.
Shoulder surfing
A.
Shoulder surfing
Answers
B.
Dumpster diving
B.
Dumpster diving
Answers
C.
Phishing
C.
Phishing
Answers
D.
Tailgating
D.
Tailgating
Answers
Suggested answer: A

Explanation:

Shoulder surfing is the social engineering attack where an attacker watches a user log in to a corporate system and writes down the user's log-in credentials. Social engineering is a type of attack that exploits human psychology and behavior to manipulate or trick people into revealing sensitive information or performing malicious actions. Shoulder surfing is a form of social engineering that involves observing or eavesdropping on someone's screen, keyboard, or paper documents to obtain confidential information such as passwords, PINs, or credit card numbers. Shoulder surfing can be done in person or remotely using cameras or other devices. Shoulder surfing can be prevented by using privacy filters, locking screens, shielding keyboards, or being aware of one's surroundings. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Shoulder Surfing? | Definition & Examples | Forcepoint

A network technician is troubleshooting internet connectivity issues with users in a subnet. From a host, the technician runs and then attempts to navigate to a website using a web browser.

The technician receives the following output:

Afterward, the browser displays an error. Which of the following explains this issue?

A.
A routing loop is within the network.
A.
A routing loop is within the network.
Answers
B.
The host is configured with incorrect DNS settings
B.
The host is configured with incorrect DNS settings
Answers
C.
A broadcast storm is occurring on the subnet
C.
A broadcast storm is occurring on the subnet
Answers
D.
The host is missing a route to the website.
D.
The host is missing a route to the website.
Answers
Suggested answer: B

Explanation:

The issue is that the host is configured with incorrect DNS settings. DNS (Domain Name System) is a service that resolves domain names to IP addresses. For example, the domain name www.comptia.org is resolved to the IP address 104.18.25.140 by a DNS server. If the host has incorrect DNS settings, such as an invalid or unreachable DNS server address, it will not be able to resolve domain names to IP addresses, and therefore it will not be able to access websites by their names. The output in the image shows that the host can ping the IP address of www.comptia.org, but it cannot ping the domain name itself, indicating a DNS problem. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 154; The Official CompTIA Network+ Student Guide (Exam N10-008), page 6-8.

Total 865 questions
Go to page: of 87