ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Which of the following technologies provides a failover mechanism for the default gateway?

FHRP
FHRP
LACP
LACP
OSPF
OSPF
STP
STP
Suggested answer: A
Explanation:

First Hop Redundancy Protocol (FHRP) provides a failover mechanism for the default gateway, allowing a backup gateway to take over if the primary gateway fails. Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.

asked 02/10/2024
Donovan Rodriguez
40 questions

Question 52

Report Export Collapse

The following configuration is applied to a DHCP server connected to a VPN concentrator:

CompTIA N10-008 image Question 52 95936 10022024175234000000

There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?

Decrease the lease duration
Decrease the lease duration
Reboot the DHCP server
Reboot the DHCP server
Install a new VPN concentrator
Install a new VPN concentrator
Configure a new router
Configure a new router
Suggested answer: A
Explanation:

Decreasing the lease duration on the DHCP server will cause clients to renew their IP address leases more frequently, freeing up IP addresses for other clients to use. Reference: CompTIA Network+ Certification Study Guide, Chapter 3: IP Addressing.

asked 02/10/2024
Narmada Balaji
34 questions

Question 53

Report Export Collapse

A technician needs to configure a Linux computer for network monitoring. The technician has the following information:

Linux computer details:

CompTIA N10-008 image Question 53 95937 10022024175234000000

Switch mirror port details:

CompTIA N10-008 image Question 53 95937 10022024175234000000

After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?

ifconfig ecth0 promisc
ifconfig ecth0 promisc
ifconfig eth1 up
ifconfig eth1 up
ifconfig eth0 10.1.2.3
ifconfig eth0 10.1.2.3
ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
Suggested answer: A
Explanation:

The ifconfig eth0 promisc command should be run on the Linux computer to enable promiscuous mode, which allows the computer to capture all network traffic passing through the switch mirror port. Reference: CompTIA Network+ Certification Study Guide, Chapter 7: Network Devices.

asked 02/10/2024
Raphael Oliveir
51 questions

Question 54

Report Export Collapse

A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?

Increased CRC errors
Increased CRC errors
Increased giants and runts
Increased giants and runts
Increased switching loops
Increased switching loops
Increased device temperature
Increased device temperature
Suggested answer: A
Explanation:

Mismatched duplex settings can cause an increase in CRC errors, which are errors in data transmission that can result in corrupted data. Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.

asked 02/10/2024
Rakesh Sonawane
35 questions

Question 55

Report Export Collapse

Which of the following devices would be used to manage a corporate WLAN?

A wireless NAS
A wireless NAS
A wireless bridge
A wireless bridge
A wireless router
A wireless router
A wireless controller
A wireless controller
Suggested answer: D
Explanation:

A wireless controller is used to manage a corporate WLAN, providing centralized management and configuration of access points. Reference: CompTIA Network+ Certification Study Guide, Chapter 8:

Wireless Networks.

asked 02/10/2024
Russell James
44 questions

Question 56

Report Export Collapse

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Layer 3 switch
Layer 3 switch
VPN headend
VPN headend
Next-generation firewall
Next-generation firewall
Proxy server
Proxy server
Intrusion prevention
Intrusion prevention
Suggested answer: C
Explanation:

Next-generation firewalls can provide content filtering and threat protection, and can manage multiple IPSec site-to-site connections. Reference: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.

asked 02/10/2024
George Weine Paulino Chaves
51 questions

Question 57

Report Export Collapse

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?

The link is improperly terminated
The link is improperly terminated
One of the devices is misconfigured
One of the devices is misconfigured
The cable length is excessive
The cable length is excessive
One of the devices has a hardware issue
One of the devices has a hardware issue
Suggested answer: C
Explanation:

In a half-duplex link, devices can only send or receive data at one time, not simultaneously. Late collisions occur when devices transmit data at the same time after waiting for a clear channel. One of the causes of late collisions is excessive cable length, which increases the propagation delay and makes it harder for devices to detect collisions. The link termination, device configuration, and device hardware are not likely to cause late collisions on a half-duplex link.

asked 02/10/2024
colin ciallella
35 questions

Question 58

Report Export Collapse

A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?

VIP
VIP
NAT
NAT
APIPA
APIPA
IPv6 tunneling
IPv6 tunneling
Broadcast IP
Broadcast IP
Suggested answer: A
Explanation:

A virtual IP (VIP) address must be configured to ensure connectivity during a failover. A VIP address is a single IP address that is assigned to a group of servers or network devices. When one device fails, traffic is automatically rerouted to the remaining devices, and the VIP address is reassigned to the backup device, allowing clients to continue to access the service without interruption.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 6: Network Servers, p. 300

asked 02/10/2024
Do Hien
52 questions

Question 59

Report Export Collapse

A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?

The AP association time is set too low
The AP association time is set too low
EIRP needs to be boosted
EIRP needs to be boosted
Channel overlap is occurring
Channel overlap is occurring
The RSSI is misreported
The RSSI is misreported
Suggested answer: C
Explanation:

Channel overlap is a common cause of wireless connectivity issues, especially in high-density environments where multiple APs are operating on the same or adjacent frequencies. Channel overlap can cause interference, signal degradation, and performance loss for wireless devices. The AP association time, EIRP, and RSSI are not likely to cause frequent disconnects and reconnects for wireless users.

asked 02/10/2024
Ibrahim Isaaq
36 questions

Question 60

Report Export Collapse

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

Ensure an implicit permit rule is enabled
Ensure an implicit permit rule is enabled
Configure the log settings on the firewalls to the central syslog server
Configure the log settings on the firewalls to the central syslog server
Update the firewalls with current firmware and software
Update the firewalls with current firmware and software
Use the same complex passwords on all firewalls
Use the same complex passwords on all firewalls
Suggested answer: C
Explanation:

Updating the firewalls with current firmware and software is an important step to ensure all the firewalls are hardened successfully, as it can fix any known vulnerabilities or bugs and provide new features or enhancements. Enabling an implicit permit rule is not a good practice for firewall hardening, as it can allow unwanted traffic to pass through the firewall. Configuring the log settings on the firewalls to the central syslog server is a good practice for monitoring and auditing purposes, but it does not harden the firewalls themselves. Using the same complex passwords on all firewalls is not a good practice for password security, as it can increase the risk of compromise if one firewall is breached. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number:

N10-006), Domain 3.0 Network Security, Objective 3.3 Given a scenario, implement network hardening techniques.

asked 02/10/2024
adir tamam
44 questions
Total 865 questions
Go to page: of 87
Search

Related questions