ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 64

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is most likely to be implemented to actively mitigate intrusions on a host device?

A.
HIDS
A.
HIDS
Answers
B.
MDS
B.
MDS
Answers
C.
HIPS
C.
HIPS
Answers
D.
NIPS
D.
NIPS
Answers
Suggested answer: A

Explanation:

HIDS (host-based intrusion detection system) is a type of security software that monitors and analyzes the activity on a host device, such as a computer or a server. HIDS can detect and alert on intrusions, such as malware infections, unauthorized access, configuration changes, or policy violations.HIDS can also actively mitigate intrusions by blocking or quarantining malicious processes, files, or network connections1.

HIPS (host-based intrusion prevention system) is similar to HIDS, but it can also prevent intrusions from happening in the first place by enforcing security policies and rules on the host device2.MDS (multilayer switch) is a network device that combines the functions of a switch and a router, and it does not directly protect a host device from intrusions3.NIPS (network-based intrusion prevention system) is a network device that monitors and blocks malicious traffic on the network level, and it does not operate on the host device level4.

Following the implementation of a BYOO policy. some users in a high-density environment report slowness over the wireless connection. Some wireless controller reports indicate high latency and airtime contention. Which of the following is the most probable root cause?

A.
The AP is configured with 2.4GHz frequency, which the new personal devices do not support.
A.
The AP is configured with 2.4GHz frequency, which the new personal devices do not support.
Answers
B.
The AP is configured with 2.4GHz frequency without band-steering capabilities.
B.
The AP is configured with 2.4GHz frequency without band-steering capabilities.
Answers
C.
The AP is configured with 5Ghz frequency with band-steering capabities.
C.
The AP is configured with 5Ghz frequency with band-steering capabities.
Answers
D.
The AP is configured with 5Ghz frequency. which the new personal devices do not support
D.
The AP is configured with 5Ghz frequency. which the new personal devices do not support
Answers
Suggested answer: B

Explanation:

Band-steering is a feature that allows an AP to steer dual-band capable clients to the less congested 5GHz frequency, leaving the 2.4GHz frequency for legacy clients. Without band-steering, the AP may have more clients competing for the same channel on the 2.4GHz frequency, resulting in high latency and airtime contention.

According to the CompTIA Network+ Certification Exam Objectives, one of the topics covered in the exam is ''Given a scenario, use appropriate wireless technologies and configurations''.One of the subtopics is ''Band steering''1.

According to the PoliFi: Airtime Policy Enforcement for WiFi paper, ''Band steering allows the access point to disable the 2.4 GHz band from probing the client device, so it responds only to the 5 GHz band, reducing the congestion on the 2.4 GHz band while taking advantage of the faster 5GHz band to improve user's network experience.''2.

According to the Aruba Air Slice Tech Brief, ''Air Slice minimizes airtime contention and efficiently groups Wi-Fi 6 and non-Wi-Fi 6 client devices to guarantee bit rate, and provide bounded latency and jitter simultaneously.''3.

A network administrator needs to monitor traffic on a specific port on a switch. Which of the following should the administrator configure to accomplish the task?

A.
Port security
A.
Port security
Answers
B.
Port tagging
B.
Port tagging
Answers
C.
Port mirroring
C.
Port mirroring
Answers
D.
Media access control
D.
Media access control
Answers
Suggested answer: C

Explanation:

Port mirroring is a feature that allows a switch to copy the traffic from one or more ports to another port for monitoring or analysis purposes. Port mirroring can help a network administrator to troubleshoot network problems, detect security threats, or optimize network performance. Port mirroring can be configured on most switches using the command-line interface (CLI) or a graphical user interface (GUI).

CompTIA Network+ N10-008 Certification Exam Objectives, page 51

CompTIA Network+ N10-008 Cert Guide, Chapter 11: Switching Technologies

Port Mirroring - CompTIA Network+ Certification (N10-008): The Total Course [Video]1

CompTIA Network+ N10-005: 2.1 -- Port Mirroring - Professor Messer IT Certification Training Courses2

CompTIA Network+ N10-005: 1.4 -- Port Mirroring3

A user is tricked into providing log-in credentials to an attacker over the telephone. Which of the following attacks is this an example of?

A.
Shoulder surfing
A.
Shoulder surfing
Answers
B.
Tailgating
B.
Tailgating
Answers
C.
Phishing
C.
Phishing
Answers
D.
Dumpster diving
D.
Dumpster diving
Answers
Suggested answer: C

Explanation:

Phishing is a type of social engineering attack that uses email, phone, SMS, or other forms of personal communication to trick users into revealing sensitive information, such as log-in credentials, to an attacker. In this case, the user was deceived by a phone call that pretended to be from a legitimate source and asked for their log-in details.

Which of the following requires network devices to be managed ustng a different set of IP addresses?

A.
Console
A.
Console
Answers
B.
Split tunnel
B.
Split tunnel
Answers
C.
Jump box
C.
Jump box
Answers
D.
Out of band
D.
Out of band
Answers
Suggested answer: D

Explanation:

Out of band management is a process for accessing and managing network devices and infrastructure at remote locations through a separate management plane from the production network. Out of band management requires network devices to be managed using a different set of IP addresses than the ones used for in-band management or data traffic. This provides a secure and dedicated alternate access method to administer connected devices and IT assets without using the corporate LAN.

Users are reporting performance issues when attempting to access the main fileshare server. Which of the following steps should a network administrator perform next based on the network troubleshooting methodology?

A.
Implement a fix to resolve the connectivity issues.
A.
Implement a fix to resolve the connectivity issues.
Answers
B.
Determine if anything has changed.
B.
Determine if anything has changed.
Answers
C.
Establish a theory of probable cause.
C.
Establish a theory of probable cause.
Answers
D.
Document all findings, actions, and lessons learned.
D.
Document all findings, actions, and lessons learned.
Answers
Suggested answer: B

Explanation:

According to the network troubleshooting methodology, the first step is to identify the problem and gather information about the current state of the network using the network troubleshooting tools that are available1.The next step is to determine if anything has changed in the network configuration, environment, or usage that could have caused or contributed to the performance issues1. This step helps to narrow down the possible causes and eliminate irrelevant factors. For example, the network administrator could check if there were any recent updates, patches, or modifications to the fileshare server or the network devices that connect to it.They could also check if there was an increase in network traffic or demand for the fileshare server resources2.

The other options are not correct because they are not the next steps in the network troubleshooting methodology. Implementing a fix to resolve the connectivity issues (A) is premature without determining the root cause of the problem. Establishing a theory of probable cause is a later step that requires testing and verification.Documenting all findings, actions, and lessons learned (D) is the final step that should be done after resolving the problem and restoring normal network operations1.

Which of the following technologies are certificates most commonly associated with?

A.
PKI
A.
PKI
Answers
B.
VLAN tagging
B.
VLAN tagging
Answers
C.
LDAP
C.
LDAP
Answers
D.
MFA
D.
MFA
Answers
Suggested answer: A

Explanation:

PKI stands for Public Key Infrastructure, which is a system of processes, technologies, and policies that allows you to encrypt and sign data using digital certificates1.Digital certificates are issued by Certificate Authorities (CAs) and authenticate the identity of users, devices, or services that communicate online12.Digital certificates also provide the means to encrypt and decrypt messages between sender and receiver using public and private keys2

A company's VolP phone connection is cutting in and out. Which of the following should be configured to resolve this issue?

A.
802.1 Q tagging
A.
802.1 Q tagging
Answers
B.
Jumbo frames
B.
Jumbo frames
Answers
C.
Native VLAN
C.
Native VLAN
Answers
D.
Link aggregation
D.
Link aggregation
Answers
Suggested answer: A

Explanation:

802.1 Q tagging is a method of adding a VLAN identifier to an Ethernet frame to indicate which VLAN the frame belongs to. This allows different VLANs to share the same physical link and device without interfering with each other.802.1 Q tagging also supports a quality of service (QoS) scheme that can prioritize different classes of traffic based on the priority code point (PCP) field in the tag12

VoIP phone connection issues can be caused by network congestion, packet loss, jitter, or latency, which affect the quality and reliability of voice transmission over the Internet. By using 802.1 Q tagging, VoIP traffic can be separated from other data traffic and assigned a higher priority level, which reduces the chances of dropping or delaying voice packets.802.1 Q tagging can also improve the security and scalability of VoIP networks by isolating different voice domains and preventing unauthorized access34

A network administrator needs to monitor traffic on a specific port on a switch. Which of the following should the administrator configure to accomplish the task?

A.
Port security
A.
Port security
Answers
B.
Port tagging
B.
Port tagging
Answers
C.
Port mirroring
C.
Port mirroring
Answers
D.
Media access control
D.
Media access control
Answers
Suggested answer: C

Explanation:

Port mirroring is a technique that allows a network administrator to monitor the traffic on a specific port on a switch by sending a copy of the packets seen on that port to another port where a monitoring device is connected1.Port mirroring can be used to analyze and debug data, diagnose errors, or perform security audits on the network without affecting the normal operation of the switch

A network administrator needs to set up a file server to allow user access. The organization uses DHCP to assign IP addresses. Which of the following is the best solution for the administrator to set up?

A.
A separate scope for the file server using a 132 subnet
A.
A separate scope for the file server using a 132 subnet
Answers
B.
A reservation for the server based on the MAC address
B.
A reservation for the server based on the MAC address
Answers
C.
A static IP address within the DHCP IP range
C.
A static IP address within the DHCP IP range
Answers
D.
A SLAAC for the server
D.
A SLAAC for the server
Answers
Suggested answer: B

Explanation:

A reservation for the server based on the MAC address means that the DHCP server will assign a specific IP address to the file server every time it requests one, based on its MAC address. This way, the file server will have a consistent IP address that users can access, without the need to manually configure it or use a separate scope.A reservation also ensures that the IP address of the file server will not be given to any other device by the DHCP server

Total 865 questions
Go to page: of 87