ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 60

Question list
Search
Search

List of questions

Search

Related questions











A network technician is investigating why a core switch is logging excessive amounts of data to the syslog server. The running configuration of the switch showed the following logging information:

Which of the following changes should the technician make to BEST fix the issue?

A.
Update the logging host IP
A.
Update the logging host IP
Answers
B.
Change lo asynchronous logging.
B.
Change lo asynchronous logging.
Answers
C.
Stop logging SSH events.
C.
Stop logging SSH events.
Answers
D.
Adjust the logging level.
D.
Adjust the logging level.
Answers
Suggested answer: D

Explanation:

The logging level is set to debugging, which is the most verbose and detailed level of logging. This means that the switch will send a lot of information to the syslog server, which can cause excessive network traffic and storage consumption. To fix the issue, the technician should adjust the logging level to a lower value, such as informational or warning, which will reduce the amount of data logged

Two companies want to build an encrypted tunnel between them and use a PSK for initial authentication. Which of the following is the BEST protocol for the companies to use?

A.
VPN
A.
VPN
Answers
B.
SSL
B.
SSL
Answers
C.
TLS
C.
TLS
Answers
D.
IPSec
D.
IPSec
Answers
Suggested answer: D

Explanation:

IPSec is a protocol that provides secure communication between two networks or hosts over an untrusted network, such as the Internet. IPSec uses encryption and authentication to protect the data from eavesdropping, tampering, and replay attacks. IPSec also supports pre-shared key (PSK) as one of the methods for initial authentication between the peers

Which of the following ports is a secure protocol?

A.
20
A.
20
Answers
B.
23
B.
23
Answers
C.
443
C.
443
Answers
D.
445
D.
445
Answers
Suggested answer: C

Explanation:

This is the port number for HTTPS, which stands for Hypertext Transfer Protocol Secure. HTTPS is a secure version of HTTP, which is the protocol used to communicate between web browsers and web servers. HTTPS encrypts the data sent and received using SSL/TLS, which are cryptographic protocols that provide authentication, confidentiality, and integrity. HTTPS is commonly used for online transactions, such as banking and shopping, where security and privacy are important

Which of the following indicates a computer has reached end-of-support?

A.
The computer does not have any users.
A.
The computer does not have any users.
Answers
B.
The antivirus protection is expired.
B.
The antivirus protection is expired.
Answers
C.
The operating system license is expired.
C.
The operating system license is expired.
Answers
D.
No more patches or bug fixes are available indefinitely.
D.
No more patches or bug fixes are available indefinitely.
Answers
Suggested answer: D

Explanation:

No more patches or bug fixes are available indefinitely. This indicates that a computer has reached end-of-support, which means that the manufacturer or vendor of the hardware or software no longer provides technical assistance, updates, or security fixes for the product12. This can expose the computer to potential security risks and compatibility issues with newer technologies

A server application requires large amounts of data to be sent at a consistent rate. Which of the following should an engineer most likely configure to meet these requirements?

A.
Link speed
A.
Link speed
Answers
B.
Jumbo frames
B.
Jumbo frames
Answers
C.
Switch Virtual Interface
C.
Switch Virtual Interface
Answers
D.
Spanning tree
D.
Spanning tree
Answers
Suggested answer: B

Explanation:

Jumbo frames are Ethernet frames that have a payload size greater than the standard 1500 bytes.

Jumbo frames can carry more data in each frame, which reduces the overhead and improves the throughput and efficiency of data transmission. Jumbo frames are commonly used in storage area networks (SANs), where large amounts of data need to be transferred between servers and storage devices

Which of the following is a document that states what the minimum performance expectations are within a network?

A.
Memorandum of understanding
A.
Memorandum of understanding
Answers
B.
Service-level agreement
B.
Service-level agreement
Answers
C.
Non-disclosure agreement
C.
Non-disclosure agreement
Answers
D.
Baseline metrics
D.
Baseline metrics
Answers
Suggested answer: B

Explanation:

A service-level agreement (SLA) is a document that states what the minimum performance expectations are within a network, such as uptime, throughput, latency, and security. An SLA is usually signed between a service provider and a customer, and it specifies the penalties or remedies if the service level is not met

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.
Public
A.
Public
Answers
B.
Hybrid
B.
Hybrid
Answers
C.
SaaS
C.
SaaS
Answers
D.
Private
D.
Private
Answers
Suggested answer: B

Explanation:

A hybrid cloud deployment model is a combination of on-premise and cloud solutions, where some resources are hosted in-house and some are hosted by a cloud provider. A hybrid cloud model can offer the benefits of both public and private clouds, such as scalability, cost-efficiency, security, and control12. A hybrid cloud model can also reduce the impact for users, as they can access the key services from the on-site data center and the enterprise services from the cloud

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

Which of the following is the most likely cause of the user's connection issues?

A.
A port with incorrect VLAN assigned
A.
A port with incorrect VLAN assigned
Answers
B.
A switch with spanning tree conflict
B.
A switch with spanning tree conflict
Answers
C.
Another PC with manually configured IP
C.
Another PC with manually configured IP
Answers
D.
A router with overlapping route tables
D.
A router with overlapping route tables
Answers
Suggested answer: C

Explanation:

This is the most likely cause of the user's connection issues, because the ARP table of the switch shows that there are two devices with the same IP address of 192.168.1.10, but different MAC addresses. This indicates that there is an IP address conflict on the network, where two devices are trying to use the same IP address. This can cause intermittent connectivity issues, as the switch may not be able to forward packets to the correct destination .

A sales team at a company uses a SaaS solution primarily for videoconferencing and a CRM application that connects to a database server in the corporate data center. Which of the following VPN solutions would allow secure, remote access for sales staff to the CRM application without impacting videoconferencing traffic?

A.
Clientless
A.
Clientless
Answers
B.
Site-to-site
B.
Site-to-site
Answers
C.
Split tunnel
C.
Split tunnel
Answers
D.
Full tunnel
D.
Full tunnel
Answers
Suggested answer: A

Explanation:


A network administrator is configuring a firewall to allow for a new cloud-based email server. The company standard is to use SMTP to route email traffic. Which of the following ports, by default, should be reserved for this purpose?

A.
23
A.
23
Answers
B.
25
B.
25
Answers
C.
53
C.
53
Answers
D.
110
D.
110
Answers
Suggested answer: B

Explanation:

Port 25, by default, should be reserved for SMTP traffic to allow for a new cloud-based email server.

SMTP stands for Simple Mail Transfer Protocol, which is a network protocol that enables email communication between mail servers and clients. SMTP uses port 25 as its default port for sending and receiving email messages over TCP/IP networks. A cloud-based email server is an email server that is hosted on a cloud service provider's infrastructure, rather than on-premise or in-house. A cloud-based email server can offer advantages such as scalability, reliability, security, and cost-effectiveness. To allow for a new cloud-based email server, a firewall should be configured to open port 25 for SMTP traffic. Reference: [CompTIA Network+ Certification Exam Objectives], What Is SMTP? | Mailtrap Blog, Cloud Email Server: What Is It & How Does It Work? | Zoho Mail

Total 865 questions
Go to page: of 87