ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 59

Question list
Search
Search

List of questions

Search

Related questions











A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not come on. Which of the following should a technician try first to troubleshoot this issue?

A.
Reverse the fibers.
A.
Reverse the fibers.
Answers
B.
Reterminate the fibers.
B.
Reterminate the fibers.
Answers
C.
Verify the fiber size.
C.
Verify the fiber size.
Answers
D.
Examine the cable runs for visual faults.
D.
Examine the cable runs for visual faults.
Answers
Suggested answer: A

Explanation:

One of the most common causes of fiber connectivity issues is the reversal of the fibers. This means that the transmit (TX) and receive (RX) ports on one end of the fiber link are not matched with the corresponding ports on the other end. For example, if the TX port on one device is connected to the TX port on another device, and the same for the RX ports, then the devices will not be able to communicate with each other. This can result in no indicator light, no link, or no data transmission12.

To troubleshoot this issue, the technician should first try to reverse the fibers. This can be done by swapping the connectors at one end of the fiber patch cable, or by using a crossover adapter or cable that reverses the polarity of the fibers. The technician should then check if the indicator light comes on and if the devices can communicate properly12.

The other options are not the first steps to troubleshoot this issue. Reterminating the fibers is a time-consuming and costly process that should be done only if there is evidence of physical damage or poor quality of the termination. Verifying the fiber size is not relevant in this scenario, as multimode fiber is compatible with multimode fiber, and any mismatch in core diameter or bandwidth would result in high attenuation, not complete loss of signal. Examining the cable runs for visual faults is a useful technique, but it requires a special tool called a visual fault locator (VFL) that emits a visible red light through the fiber and shows any breaks or bends along the cable. However, a VFL cannot detect polarity issues or connector problems, so it is not sufficient to troubleshoot this issue

A customer is hosting an internal database server. None of the users are able to connect to the server, even though it appears to be working properly. Which of the following is the best way to verify traffic to and from the server?

A.
Protocol analyzer
A.
Protocol analyzer
Answers
B.
nmap
B.
nmap
Answers
C.
ipconfig
C.
ipconfig
Answers
D.
Speed test
D.
Speed test
Answers
Suggested answer: A

Explanation:

A protocol analyzer is the best way to verify traffic to and from the server. A protocol analyzer, also known as a packet sniffer or network analyzer, is a tool that captures and analyzes the network packets that are sent and received by a device. A protocol analyzer can show the source and destination IP addresses, ports, protocols, and payload of each packet, as well as any errors or anomalies in the network communication. A protocol analyzer can help troubleshoot network connectivity issues by identifying the root cause of the problem, such as misconfigured firewall rules, incorrect routing, or faulty network devices12.

To use a protocol analyzer to verify traffic to and from the server, the customer can follow these steps:

Install a protocol analyzer tool on a device that is connected to the same network as the server, such as Wireshark3 or Microsoft Network Monitor4.

Select the network interface that is used to communicate with the server, and start capturing the network traffic.

Filter the captured traffic by using the IP address or hostname of the server, or by using a specific port or protocol that is used by the database service.

Analyze the filtered traffic and look for any signs of successful or failed connection attempts, such as TCP SYN, ACK, or RST packets, or ICMP messages.

If there are no connection attempts to or from the server, then there may be a problem with the network configuration or device settings that prevent the traffic from reaching the server.

If there are connection attempts but they are rejected or dropped by the server, then there may be a problem with the server configuration or service settings that prevent the traffic from being accepted by the server.

The other options are not the best ways to verify traffic to and from the server. nmap is a tool that can scan a network and discover hosts and services, but it cannot capture and analyze the network packets in detail. ipconfig is a command that can display and configure the IP settings of a device, but it cannot monitor or test the network communication with another device. Speed test is a tool that can measure the bandwidth and latency of a network connection, but it cannot diagnose or troubleshoot specific network problems.

A security team updated a web server to require https:// in the URL. Although the IP address did not change, users report being unable to reach the site. Which of the following should the security team do to allow users to reach the server again?

A.
Configure the switch port with the correct VLAN.
A.
Configure the switch port with the correct VLAN.
Answers
B.
Configure inbound firewall rules to allow traffic to port 443.
B.
Configure inbound firewall rules to allow traffic to port 443.
Answers
C.
Configure the router to include the subnet of the server.
C.
Configure the router to include the subnet of the server.
Answers
D.
Configure the server with a default route.
D.
Configure the server with a default route.
Answers
Suggested answer: B

Explanation:

One possible reason why users are unable to reach the site after the security team updated the web server to require https:// in the URL is that the firewall rules are blocking the traffic to port 443. Port 443 is the default port for HTTPS, which is the protocol that encrypts and secures the web communication. If the firewall rules do not allow inbound traffic to port 443, then users will not be able to access the web server using HTTPS12.

To troubleshoot this issue, the security team should configure inbound firewall rules to allow traffic to port 443. This can be done by using the firewall-cmd command on RHEL 8.2, which is a tool that manages firewalld, the default firewall service on RHEL. The command to add a rule to allow traffic to port 443 is:

firewall-cmd --permanent --add-port=443/tcp

The --permanent option makes the rule persistent across reboots, and the --add-port option specifies the port number and protocol (TCP) to allow. After adding the rule, the security team should reload the firewalld service to apply the changes:

firewall-cmd --reload

The security team can verify that the rule is active by using this command:

firewall-cmd --list-ports

The output should show 443/tcp among the ports that are allowed34.

The other options are not relevant to troubleshooting this issue. Configuring the switch port with the correct VLAN may help with network segmentation or isolation, but it will not affect the HTTPS protocol or port. Configuring the router to include the subnet of the server may help with network routing or connectivity, but it will not enable HTTPS communication. Configuring the server with a default route may help with network access or reachability, but it will not allow HTTPS traffic.

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

A.
Traffic analysis
A.
Traffic analysis
Answers
B.
Availability monitoring
B.
Availability monitoring
Answers
C.
Baseline metrics
C.
Baseline metrics
Answers
D.
Network discovery
D.
Network discovery
Answers
Suggested answer: A

Explanation:

One possible process that the administrator used to identify the root cause of the spam issue is traffic analysis. Traffic analysis is a technique that monitors and analyzes the network traffic that flows between devices or applications. Traffic analysis can help troubleshoot network problems by identifying the source, destination, volume, frequency, and content of the network packets12.

To use traffic analysis to identify the root cause of the spam issue, the administrator could follow these steps:

Install a traffic analysis tool on the server or a device that is connected to the same network as the server, such as Wireshark3, tcpdump4, or Microsoft Network Monitor5.

Start capturing the network traffic and filter it by using the IP address or hostname of the server, or by using a specific port or protocol that is used by the email service, such as SMTP (port 25), POP3 (port 110), or IMAP (port 143).

Analyze the filtered traffic and look for any signs of abnormal or malicious activity, such as high volume of outgoing emails, unknown recipients, suspicious attachments, or spam keywords.

Trace back the source of the spam emails to the infected workstation by using its IP address or MAC address.

Isolate and clean up the infected workstation by using an antivirus or malware removal tool.

The other options are not processes that the administrator used to identify the root cause of the spam issue. Availability monitoring is a technique that measures and reports the uptime and downtime of a network device or service. Availability monitoring can help troubleshoot network problems by detecting any failures or outages that affect the network performance. Baseline metrics are a set of standard measurements that establish the normal behavior or performance of a network device or service. Baseline metrics can help troubleshoot network problems by comparing the current state of the network with the expected state and identifying any deviations or anomalies.

Network discovery is a technique that scans and maps the network devices and services that are connected to a network. Network discovery can help troubleshoot network problems by providing a comprehensive and updated view of the network topology and configuration.

Which of the following refers to a weakness in a mechanism or technical process?

A.
Vulnerability
A.
Vulnerability
Answers
B.
Risk
B.
Risk
Answers
C.
Exploit
C.
Exploit
Answers
D.
Threat
D.
Threat
Answers
Suggested answer: A

Explanation:

The term that refers to a weakness in a mechanism or technical process is vulnerability. A vulnerability is a flaw or gap in a system's security that can be exploited by an attacker to gain unauthorized access, compromise data, or cause damage. A vulnerability can be caused by design errors, configuration errors, software bugs, human errors, or environmental factors. For example, an outdated software version that has known security holes is a vulnerability that can be exploited by malware or hackers. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 342; The Official CompTIA Network+ Student Guide (Exam N10-008), page 13-7.

A security team would like to use a system in an isolated network to record the actions of potential attackers. Which of the following solutions is the security team implementing?

A.
Perimeter network
A.
Perimeter network
Answers
B.
Honeypot
B.
Honeypot
Answers
C.
Zero trust infrastructure
C.
Zero trust infrastructure
Answers
D.
Network segmentation
D.
Network segmentation
Answers
Suggested answer: B

Explanation:

The solution that the security team is implementing to record the actions of potential attackers in an isolated network is a honeypot. A honeypot is a decoy system that simulates a real network or service, but has no actual value or function. A honeypot is designed to attract and trap attackers who try to infiltrate or compromise the network, and then monitor and analyze their behavior and techniques. A honeypot can help the security team learn about the attackers' motives, methods, and tools, and improve their defense strategies accordingly. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 358; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-1.

Which of the following disaster recovery metrics describes the average length of time a piece of equipment can be expected to operate normally?

A.
RPO
A.
RPO
Answers
B.
RTO
B.
RTO
Answers
C.
MTTR
C.
MTTR
Answers
D.
MTBF
D.
MTBF
Answers
Suggested answer: D

Explanation:

MTBF is the disaster recovery metric that describes the average length of time a piece of equipment can be expected to operate normally. MTBF stands for mean time between failures, which is a measure of the reliability and availability of a device or system. MTBF is calculated by dividing the total operating time by the number of failures that occurred during that time. MTBF indicates how often a device or system fails and how long it can run without interruption. A higher MTBF means a lower failure rate and a longer operational life span. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Mean Time Between Failures (MTBF)? | Definition & Examples | Forcepoint

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. Which of the following is the most likely cause?

A.
The DHCP server is not available.
A.
The DHCP server is not available.
Answers
B.
An RFC1918 address is being used
B.
An RFC1918 address is being used
Answers
C.
The VLAN is incorrect.
C.
The VLAN is incorrect.
Answers
D.
A static IP is assigned.
D.
A static IP is assigned.
Answers
Suggested answer: A

Explanation:

The DHCP server is not available is the most likely cause of the issue where a new computer is unable to ping the default gateway. DHCP stands for Dynamic Host Configuration Protocol, which is a network protocol that automatically assigns IP addresses and other configuration parameters to clients on a network. The default gateway is the IP address of the router or device that connects a local network to other networks, such as the internet. Pinging is a network utility that tests the connectivity and reachability between two devices by sending and receiving echo packets. If the DHCP server is not available, the new computer will not be able to obtain an IP address or other configuration parameters, such as the default gateway, from the DHCP server. This will prevent the new computer from communicating with other devices on the network or the internet, resulting in ping failure. Reference: [CompTIA Network+ Certification Exam Objectives], What Is DHCP? | How DHCP Works | SolarWinds MSP

A network technician is investigating a trouble ticket for a user who does not have network connectivity. All patch cables between the wall jacks and computers in the building were upgraded over the weekend from Cat 5 to Cat 6. The newly installed cable is crimped With a TIA/EIA 568A on one end and a TIA/EIA 568B on the other end. Which of the following should the technician do to most likely fix the issue?

A.
Ensure the switchport has POE enabled.
A.
Ensure the switchport has POE enabled.
Answers
B.
Crimp the cable as a straight-through cable.
B.
Crimp the cable as a straight-through cable.
Answers
C.
Ensure the switchport has STP enabled.
C.
Ensure the switchport has STP enabled.
Answers
D.
Crimp the cable as a rollover cable.
D.
Crimp the cable as a rollover cable.
Answers
Suggested answer: B

Explanation:

Crimping the cable as a straight-through cable is the most likely fix for the issue where users are unable to access any network resources after upgrading from Cat 5 to Cat 6 cables. Crimping is a process of attaching connectors to the ends of cables using a tool called a crimper. A straight-through cable is a type of twisted-pair cable that has the same wiring scheme on both ends, meaning that each pin on one end is connected to the same pin on the other end. A straight-through cable is used to connect devices that operate on different layers of the OSI model, such as a computer and a switch, or a switch and a router. If the newly installed cable is crimped with TIA/EIA 568A on one end and TIA/EIA 568B on the other end, it becomes a crossover cable. A crossover cable is a type of twisted-pair cable that has opposite wiring schemes on both ends, meaning that each pin on one end is connected to a different pin on the other end. A crossover cable is used to connect devices that operate on the same layer of the OSI model, such as two computers or two switches. Using a crossover cable instead of a straight-through cable can cause network communication errors or failures. Reference: [CompTIA Network+ Certification Exam Objectives], Straight Through vs Crossover Cable: What's The Difference?

A wireless technician is working to upgrade the wireless infrastructure for a company. The company currently uses the 802.11g wireless standard on all access points. The company requires backward compatibility and is requesting the least expensive solution. Which of the following should the technician recommend to the company?

A.
802.11a
A.
802.11a
Answers
B.
802.11ac
B.
802.11ac
Answers
C.
802Hax
C.
802Hax
Answers
D.
802.11n
D.
802.11n
Answers
Suggested answer: D

Explanation:

802.11n is a wireless standard that supports data rates up to 600 Mbps and operates in both 2.4 GHz and 5 GHz frequency bands. 802.11n is backward compatible with 802.11g, which operates only in 2.4 GHz band. 802.11n is the least expensive solution that can upgrade the wireless infrastructure for the company, as it does not require replacing all the access points or wireless devices

Total 865 questions
Go to page: of 87