ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 61

Question list
Search
Search

List of questions

Search

Related questions











A network administrator is concerned about a rainbow table being used to help access network resources. Which of the following must be addressed to reduce the likelihood of a rainbow table being effective?

A.
Password policy
A.
Password policy
Answers
B.
Remote access policy
B.
Remote access policy
Answers
C.
Acceptable use policy
C.
Acceptable use policy
Answers
D.
Data loss prevention policy
D.
Data loss prevention policy
Answers
Suggested answer: A

Explanation:

A password policy must be addressed to reduce the likelihood of a rainbow table being effective. A rainbow table is a precomputed table of hashed passwords and their corresponding plaintext values.

A rainbow table can be used to crack hashed passwords by performing a reverse lookup of the hash value in the table. A password policy is a set of rules and guidelines that define how passwords should be created, used, and managed in an organization. A password policy can help prevent rainbow table attacks by enforcing strong password requirements, such as length, complexity, expiration, and history. A strong password is one that is hard to guess or crack by using common methods such as brute force or dictionary attacks. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Rainbow Table Attack? | Kaspersky, Password Policy Best Practices | Thycotic

Which of the following would MOST likely be used to review disaster recovery information for a system?

A.
Business continuity plan
A.
Business continuity plan
Answers
B.
System life cycle
B.
System life cycle
Answers
C.
Change management
C.
Change management
Answers
D.
Standard operating procedures
D.
Standard operating procedures
Answers
Suggested answer: A

Explanation:

The document that would most likely be used to review disaster recovery information for a system is a business continuity plan (BCP). A BCP is a document that outlines the procedures and resources needed to maintain or resume critical business functions in the event of a disaster or disruption. A BCP typically includes a disaster recovery plan (DRP), which is a subset of the BCP that focuses on restoring IT systems and data after a disaster. A BCP also covers other aspects of business continuity, such as risk assessment, business impact analysis, emergency response, crisis management, and testing. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 346; The Official CompTIA Network+ Student Guide (Exam N10-008), page 13-9.

Which of the following policies outlines the software and hardware requirements for using personally owned devices to conduct business?

A.
DLP
A.
DLP
Answers
B.
AUP
B.
AUP
Answers
C.
BYOD
C.
BYOD
Answers
D.
NDA
D.
NDA
Answers
Suggested answer: C

Explanation:

The policy that outlines the software and hardware requirements for using personally owned devices to conduct business is BYOD (Bring Your Own Device). BYOD is a practice that allows employees to use their own devices, such as laptops, tablets, or smartphones, to access corporate resources and applications. BYOD can offer benefits such as increased productivity, flexibility, and satisfaction for employees, as well as reduced costs for employers. However, BYOD also poses challenges and risks, such as security, compatibility, and support issues. Therefore, a BYOD policy is needed to define the rules and expectations for using personal devices in a business environment. A BYOD policy typically covers topics such as device eligibility, security requirements, acceptable use, data ownership, privacy, and liability. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 362; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-2.

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A.
Mesh
A.
Mesh
Answers
B.
Ad hoc
B.
Ad hoc
Answers
C.
Point-to-point
C.
Point-to-point
Answers
D.
Infrastructure
D.
Infrastructure
Answers
Suggested answer: A

Explanation:

A mesh network is the best solution for creating a wireless field network to provide reliable service to public safety vehicles. A mesh network is a type of wireless network that consists of multiple nodes that communicate with each other directly or through intermediate nodes, forming a web-like topology. A mesh network does not rely on a central access point or router, but rather on the cooperation and coordination of the nodes themselves. A mesh network has several advantages for public safety applications, such as12:

High availability and resilience: A mesh network can automatically route around failures or congestion, ensuring that the network remains operational even if some nodes are damaged or disconnected. A mesh network can also self-heal and self-configure, adapting to changes in the network topology or environment.

Extended coverage and scalability: A mesh network can extend the wireless signal beyond the range of a single node, by using other nodes as relays or repeaters. A mesh network can also accommodate more nodes and devices, by adding more links and paths between them.

Low cost and easy deployment: A mesh network can reduce the cost and complexity of installing and maintaining a wireless infrastructure, by eliminating the need for expensive cabling, towers, or antennas. A mesh network can also be deployed quickly and flexibly, by simply adding or removing nodes as needed.

A mesh network is especially suitable for public safety vehicles, because it can provide reliable wireless communication in challenging scenarios, such as12:

Disaster response: A mesh network can be deployed rapidly in areas where the existing wireless infrastructure is damaged or unavailable, such as after an earthquake, flood, or fire. A mesh network can also support emergency services, such as fire fighting, search and rescue, or medical assistance, by enabling data, voice, and video transmission among the responders and command centers.

Mobile surveillance: A mesh network can enable real-time monitoring and control of public safety vehicles, such as police cars, ambulances, or drones, by providing high-bandwidth and low-latency wireless connectivity. A mesh network can also support video streaming, location tracking, remote sensing, or analytics applications for public safety purposes.

Event management: A mesh network can enhance the security and efficiency of large-scale events, such as concerts, festivals, or parades, by providing wireless coverage and capacity for the event organizers and participants. A mesh network can also support crowd management, traffic control, or public announcement applications for event management.

The other options are not the best solutions for creating a wireless field network to provide reliable service to public safety vehicles. An ad hoc network is a type of wireless network that consists of devices that communicate with each other directly without any central coordination or infrastructure. An ad hoc network is simple and flexible, but it has limited scalability and performance3. A point-to-point network is a type of wireless network that consists of two devices that communicate with each other over a single link. A point-to-point network is fast and secure, but it has limited coverage and functionality. An infrastructure network is a type of wireless network that consists of devices that communicate with each other through an access point or router. An infrastructure network is stable and robust, but it has high cost and complexity.

Users ate moving back into an office that had been vacant for awhile. Ten workstations are hooked up in the office, but one workstation cannot obtain a link with (he switch. A network engineer checks the documentation and cable labeling, and everything is hooked up as expected. The engineer moves the connection lo a different switchport. but a link still cannot be obtained. When the engineer puts a tone generator on (he infrastructure cable, no tone is heard at the far end. Which of the following issues is the engineer MOST likely trying to find?

A.
A bad switchport
A.
A bad switchport
Answers
B.
A break in the cable
B.
A break in the cable
Answers
C.
A cable short
C.
A cable short
Answers
D.
Cable interference
D.
Cable interference
Answers
Suggested answer: B

Explanation:

A break in the cable means that there is no electrical continuity between the two ends of the cable, which prevents the signal from reaching the switch. A tone generator is a device that sends an audible signal through the cable, and if no tone is heard at the far end, it indicates a break in the cable.

A network administrator is working to configure a new device to provide Layer 2 connectivity to various endpoints including several WAPs. Which of the following devices will the administrator MOST likely configure?

A.
WLAN controller
A.
WLAN controller
Answers
B.
Cable modem
B.
Cable modem
Answers
C.
Load balancer
C.
Load balancer
Answers
D.
Switch
D.
Switch
Answers
E.
Hub
E.
Hub
Answers
Suggested answer: D

Explanation:

A switch is a device that provides Layer 2 connectivity to various endpoints by forwarding frames based on MAC addresses. A switch can also connect to several WAPs (wireless access points) to provide wireless connectivity to wireless devices.

A network deployment engineer is deploying a new single-channel 10G optical connection. Which of the following optics should the engineer MOST likely use to satisfy this requirement?

A.
QSFP
A.
QSFP
Answers
B.
QSFP+
B.
QSFP+
Answers
C.
SFP
C.
SFP
Answers
D.
SFP+
D.
SFP+
Answers
Suggested answer: D

Explanation:

SFP+ is a type of optical transceiver that supports 10G single-channel transmission over fiber optic cables. SFP+ stands for small form-factor pluggable plus, and it is compatible with SFP slots on switches and routers.

A technician is troubleshooting network connectivity from a wall jack. Readings from a multimeter indicate extremely low ohmic values instead of the rated impedance from the switchport. Which of the following is the MOST likely cause of this issue?

A.
Incorrect transceivers
A.
Incorrect transceivers
Answers
B.
Faulty LED
B.
Faulty LED
Answers
C.
Short circuit
C.
Short circuit
Answers
D.
Upgraded OS version on switch
D.
Upgraded OS version on switch
Answers
Suggested answer: C

Explanation:

A short circuit is a condition where two conductors in a circuit are connected unintentionally, creating a low resistance path for the current. This causes the voltage to drop and the current to increase, which can damage the circuit or cause a fire. A multimeter can measure the resistance or impedance of a circuit, and if it shows extremely low values, it indicates a short circuit.

A company has a geographically remote office. In order to connect to the internet, the company has decided to use a satellite WAN link. Which of the following is the GREATEST concern for this type of connection?

A.
Duplex
A.
Duplex
Answers
B.
Collisions
B.
Collisions
Answers
C.
Jitter
C.
Jitter
Answers
D.
Encapsulation
D.
Encapsulation
Answers
Suggested answer: C

Explanation:

itter is the variation in latency or delay of packets in a network. Satellite WAN links have high latency and are prone to jitter, which can affect the quality of voice and video applications. Jitter is the greatest concern for this type of connection

A user stores large graphic files. The lime required to transfer the files to the server is excessive due to network congestion. The user's budget does not allow for the current switches to be replaced.

Which of the following can be used to provide FASTER transfer times?

A.
Half duplex
A.
Half duplex
Answers
B.
Jumbo frames
B.
Jumbo frames
Answers
C.
LACP
C.
LACP
Answers
D.
802.1Q
D.
802.1Q
Answers
Suggested answer: B

Explanation:

Jumbo frames are Ethernet frames that can carry more than 1500 bytes of payload data. Jumbo frames can reduce the overhead and improve the throughput of large file transfers, as fewer frames are needed to send the same amount of data. Jumbo frames can be used to provide faster transfer times, as long as the network devices support them

Total 865 questions
Go to page: of 87