ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 6

Question list
Search
Search

List of questions

Search

Related questions











Which of the following technologies provides a failover mechanism for the default gateway?

A.
FHRP
A.
FHRP
Answers
B.
LACP
B.
LACP
Answers
C.
OSPF
C.
OSPF
Answers
D.
STP
D.
STP
Answers
Suggested answer: A

Explanation:

First Hop Redundancy Protocol (FHRP) provides a failover mechanism for the default gateway, allowing a backup gateway to take over if the primary gateway fails. Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.

The following configuration is applied to a DHCP server connected to a VPN concentrator:

There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?

A.
Decrease the lease duration
A.
Decrease the lease duration
Answers
B.
Reboot the DHCP server
B.
Reboot the DHCP server
Answers
C.
Install a new VPN concentrator
C.
Install a new VPN concentrator
Answers
D.
Configure a new router
D.
Configure a new router
Answers
Suggested answer: A

Explanation:

Decreasing the lease duration on the DHCP server will cause clients to renew their IP address leases more frequently, freeing up IP addresses for other clients to use. Reference: CompTIA Network+ Certification Study Guide, Chapter 3: IP Addressing.

A technician needs to configure a Linux computer for network monitoring. The technician has the following information:

Linux computer details:

Switch mirror port details:

After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?

A.
ifconfig ecth0 promisc
A.
ifconfig ecth0 promisc
Answers
B.
ifconfig eth1 up
B.
ifconfig eth1 up
Answers
C.
ifconfig eth0 10.1.2.3
C.
ifconfig eth0 10.1.2.3
Answers
D.
ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
D.
ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6
Answers
Suggested answer: A

Explanation:

The ifconfig eth0 promisc command should be run on the Linux computer to enable promiscuous mode, which allows the computer to capture all network traffic passing through the switch mirror port. Reference: CompTIA Network+ Certification Study Guide, Chapter 7: Network Devices.

A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?

A.
Increased CRC errors
A.
Increased CRC errors
Answers
B.
Increased giants and runts
B.
Increased giants and runts
Answers
C.
Increased switching loops
C.
Increased switching loops
Answers
D.
Increased device temperature
D.
Increased device temperature
Answers
Suggested answer: A

Explanation:

Mismatched duplex settings can cause an increase in CRC errors, which are errors in data transmission that can result in corrupted data. Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.

Which of the following devices would be used to manage a corporate WLAN?

A.
A wireless NAS
A.
A wireless NAS
Answers
B.
A wireless bridge
B.
A wireless bridge
Answers
C.
A wireless router
C.
A wireless router
Answers
D.
A wireless controller
D.
A wireless controller
Answers
Suggested answer: D

Explanation:

A wireless controller is used to manage a corporate WLAN, providing centralized management and configuration of access points. Reference: CompTIA Network+ Certification Study Guide, Chapter 8:

Wireless Networks.

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

A.
Layer 3 switch
A.
Layer 3 switch
Answers
B.
VPN headend
B.
VPN headend
Answers
C.
Next-generation firewall
C.
Next-generation firewall
Answers
D.
Proxy server
D.
Proxy server
Answers
E.
Intrusion prevention
E.
Intrusion prevention
Answers
Suggested answer: C

Explanation:

Next-generation firewalls can provide content filtering and threat protection, and can manage multiple IPSec site-to-site connections. Reference: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?

A.
The link is improperly terminated
A.
The link is improperly terminated
Answers
B.
One of the devices is misconfigured
B.
One of the devices is misconfigured
Answers
C.
The cable length is excessive
C.
The cable length is excessive
Answers
D.
One of the devices has a hardware issue
D.
One of the devices has a hardware issue
Answers
Suggested answer: C

Explanation:

In a half-duplex link, devices can only send or receive data at one time, not simultaneously. Late collisions occur when devices transmit data at the same time after waiting for a clear channel. One of the causes of late collisions is excessive cable length, which increases the propagation delay and makes it harder for devices to detect collisions. The link termination, device configuration, and device hardware are not likely to cause late collisions on a half-duplex link.

A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?

A.
VIP
A.
VIP
Answers
B.
NAT
B.
NAT
Answers
C.
APIPA
C.
APIPA
Answers
D.
IPv6 tunneling
D.
IPv6 tunneling
Answers
E.
Broadcast IP
E.
Broadcast IP
Answers
Suggested answer: A

Explanation:

A virtual IP (VIP) address must be configured to ensure connectivity during a failover. A VIP address is a single IP address that is assigned to a group of servers or network devices. When one device fails, traffic is automatically rerouted to the remaining devices, and the VIP address is reassigned to the backup device, allowing clients to continue to access the service without interruption.

Reference:

CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 6: Network Servers, p. 300

A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?

A.
The AP association time is set too low
A.
The AP association time is set too low
Answers
B.
EIRP needs to be boosted
B.
EIRP needs to be boosted
Answers
C.
Channel overlap is occurring
C.
Channel overlap is occurring
Answers
D.
The RSSI is misreported
D.
The RSSI is misreported
Answers
Suggested answer: C

Explanation:

Channel overlap is a common cause of wireless connectivity issues, especially in high-density environments where multiple APs are operating on the same or adjacent frequencies. Channel overlap can cause interference, signal degradation, and performance loss for wireless devices. The AP association time, EIRP, and RSSI are not likely to cause frequent disconnects and reconnects for wireless users.

A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

A.
Ensure an implicit permit rule is enabled
A.
Ensure an implicit permit rule is enabled
Answers
B.
Configure the log settings on the firewalls to the central syslog server
B.
Configure the log settings on the firewalls to the central syslog server
Answers
C.
Update the firewalls with current firmware and software
C.
Update the firewalls with current firmware and software
Answers
D.
Use the same complex passwords on all firewalls
D.
Use the same complex passwords on all firewalls
Answers
Suggested answer: C

Explanation:

Updating the firewalls with current firmware and software is an important step to ensure all the firewalls are hardened successfully, as it can fix any known vulnerabilities or bugs and provide new features or enhancements. Enabling an implicit permit rule is not a good practice for firewall hardening, as it can allow unwanted traffic to pass through the firewall. Configuring the log settings on the firewalls to the central syslog server is a good practice for monitoring and auditing purposes, but it does not harden the firewalls themselves. Using the same complex passwords on all firewalls is not a good practice for password security, as it can increase the risk of compromise if one firewall is breached. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number:

N10-006), Domain 3.0 Network Security, Objective 3.3 Given a scenario, implement network hardening techniques.

Total 865 questions
Go to page: of 87