ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 65

Question list
Search
Search

List of questions

Search

Related questions











Which of the following does OSPF use to communicate routing updates?

A.
Unicast
A.
Unicast
Answers
B.
Anycast
B.
Anycast
Answers
C.
Multicast
C.
Multicast
Answers
D.
Broadcast
D.
Broadcast
Answers
Suggested answer: C

Explanation:

OSPF uses multicast to communicate routing updates among routers within the same are a.OSPF routers send and receive link-state advertisements (LSAs) using IP multicast addresses 224.0.0.5 (all OSPF routers) and 224.0.0.6 (all OSPF designated routers)1.Multicast allows OSPF to send routing updates efficiently and selectively, without flooding the entire network or requiring acknowledgments from every router

A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install?

A.
110
A.
110
Answers
B.
66
B.
66
Answers
C.
BiX
C.
BiX
Answers
D.
Krone
D.
Krone
Answers
Suggested answer: A

Explanation:

A 110 block is a type of punch-down block that is used to terminate twisted-pair cables in Ethernet networks. It is a non-proprietary standard that is widely used in structured cabling systems for voice and data applications.A 110 block can support up to 100 MHz of bandwidth and can be used with Cat 3, Cat 5, Cat 5e, and Cat 6 cables12.

A 66 block is another type of punch-down block that is mainly used for telephone wiring.It is an older and less reliable standard than the 110 block and does not support high-speed data transmission3. A BiX block is a proprietary punch-down block that is developed by NORDX/CDT and is mostly used in Canada.It can support up to 250 MHz of bandwidth and can be used with Cat 5e and Cat 6 cables4. A Krone block is another proprietary punch-down block that is developed by ADC Krone and is mostly used in Europe. It can support up to 100 MHz of bandwidth and can be used with Cat 5 and Cat 5e cables.

Therefore, the best option for the customer who wants to use non-proprietary standards is the 110 block.

A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10Gb connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?

A.
Port mirroring
A.
Port mirroring
Answers
B.
Log aggregation
B.
Log aggregation
Answers
C.
Flow data
C.
Flow data
Answers
D.
Packet capture
D.
Packet capture
Answers
Suggested answer: C

Explanation:

Flow data is a summary of network traffic that can be used to monitor and analyze network performance, utilization, and security. Flow data can provide information such as source and destination IP addresses, ports, protocols, bytes, packets, and timestamps. Flow data can be collected using protocols such as NetFlow, sFlow, or IPFIX. Flow data can help identify the source of network saturation without requiring a full packet capture, which would be impractical on a 40Gb connection with a 10Gb server.

CompTIA Network+ N10-008 Certification Exam Objectives, page 51

CompTIA Network+ N10-008 Cert Guide, Chapter 11: Switching Technologies2

A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:

A.
a divide-and-conquer approach.
A.
a divide-and-conquer approach.
Answers
B.
a bottom-up approach.
B.
a bottom-up approach.
Answers
C.
a top-to-bottom approach.
C.
a top-to-bottom approach.
Answers
D.
implementing a solution.
D.
implementing a solution.
Answers
Suggested answer: A

Explanation:

A divide-and-conquer approach is a troubleshooting method that involves breaking a complex problem into smaller and more manageable parts, and then testing each part to isolate the cause of the problem. In this scenario, the technician is using a divide-and-conquer approach by pinging the default gateway and DNS server of the workstation, which are two possible sources of connectivity issues. By pinging these devices, the technician can determine if the problem is related to the local network or the external network.

Which of the following best describes what an organization would use port address translation for?

A.
VLANs on the perimeter
A.
VLANs on the perimeter
Answers
B.
Public address on the perimeter router
B.
Public address on the perimeter router
Answers
C.
Non-routable address on the perimeter router
C.
Non-routable address on the perimeter router
Answers
D.
Servers on the perimeter
D.
Servers on the perimeter
Answers
Suggested answer: B

Explanation:

The best answer is B. Public address on the perimeter router.

Port address translation (PAT) is a function that allows multiple users within a private network to make use of a minimal number of IP addresses. Its basic function is to share a single IP public address between multiple clients who need to use the Internet publicly. It is an extension of network address translation (NAT)1.

PAT works by creating dynamic NAT mapping, in which a global (public) IP address and a unique port number are selected. The router keeps a NAT table entry for every unique combination of the private IP address and port, with translation to the global address and a unique port number2.

Therefore, an organization would use PAT for having a public address on the perimeter router, which can be shared by many hosts on the private network using different port numbers. This can reduce the bandwidth consumption and cost of the organization's internet connection, as well as provide some security benefits by hiding the internal network structure3.

The other options are not correct because:

VLANs on the perimeter are not related to PAT, as they are used to segment the network into logical groups based on different criteria, such as function, security, or performance4.

Non-routable address on the perimeter router would not allow the organization to access the Internet or the cloud, as non-routable addresses are not valid on the public network and cannot be translated by PAT5.

Servers on the perimeter are not a reason to use PAT, as servers usually have static IP addresses and do not need to share a public address with other hosts. Servers on the perimeter may use NAT, but not PAT, to map their private IP addresses to a public IP address2.

Which of the following should a network administrator configure when adding OT devices to an organization's architecture?

A.
Honeynet
A.
Honeynet
Answers
B.
Data-at-rest encryption
B.
Data-at-rest encryption
Answers
C.
Time-based authentication
C.
Time-based authentication
Answers
D.
Network segmentation
D.
Network segmentation
Answers
Suggested answer: D

Explanation:

Network segmentation is the process of dividing a network into smaller subnets or segments, each with its own security policies and access controls. This can help isolate OT devices from IT devices, guest networks, and other potential threats, as well as improve network performance and efficiency. Network segmentation is a recommended security practice for OT environments, as it can limit the attack surface, contain the damage of a breach, and comply with regulatory standards.

https://sectrio.com/complete-guide-to-ot-network-segmentation/

Which of the following functions is used to prioritize network traffic based on the type of traffic?

A.
QoS
A.
QoS
Answers
B.
VPN
B.
VPN
Answers
C.
CDN
C.
CDN
Answers
D.
TTL
D.
TTL
Answers
Suggested answer: A

Explanation:

QoS stands for Quality of Service, which is a feature that allows you to prioritize network traffic based on the type of traffic, such as voice, video, data, or gaming.QoS can help improve the performance and reliability of critical applications by allocating more bandwidth and lower latency to them, while reducing the impact of less important or non-essential traffic1.

VPN stands for Virtual Private Network, which is a technology that creates a secure and encrypted connection between two or more devices over the Internet.VPN can help protect your privacy and data from hackers, ISPs, and government surveillance, as well as access geo-restricted content and services2.

CDN stands for Content Delivery Network, which is a network of servers that deliver web content to users based on their geographic location, the origin of the content, and the performance of the network.CDN can help improve the speed and availability of web content, such as images, videos, and scripts, by caching them on servers closer to the users3.

TTL stands for Time To Live, which is a value that determines how long a packet can stay in a network before it is discarded or returned.TTL can help prevent network congestion and loops by limiting the lifespan of packets that are lost, corrupted, or delayed4.

Which of the following network management methods is able to perform various automated tasks?

A.
SSH
A.
SSH
Answers
B.
CLI
B.
CLI
Answers
C.
GUI
C.
GUI
Answers
D.
API
D.
API
Answers
Suggested answer: D

Explanation:

API stands for Application Programming Interface, which is a set of rules and protocols that allow different software applications to communicate and exchange dat a. Network automation can use APIs to perform various automated tasks, such as configuring devices, provisioning resources, monitoring performance, and optimizing networks.APIs can enable network automation to interact with different network elements, platforms, and services, regardless of their vendor, technology, or architecture.

The other options are not correct because:

SSH stands for Secure Shell, which is a protocol that allows secure remote access to a network device. SSH can be used to manually configure and manage a network device, but it does not automate network tasks by itself.

CLI stands for Command-Line Interface, which is a text-based interface that allows users to interact with a network device by typing commands. CLI can be used to manually configure and manage a network device, but it does not automate network tasks by itself.

GUI stands for Graphical User Interface, which is a visual interface that allows users to interact with a network device by using icons, menus, and windows. GUI can be used to manually configure and manage a network device, but it does not automate network tasks by itself.

A network contains 25 access points. Which of the following devices would be best to change configurations on all the devices remotely?

A.
WLAN controller
A.
WLAN controller
Answers
B.
Load balancer
B.
Load balancer
Answers
C.
Bridge
C.
Bridge
Answers
D.
Layer 3 switch
D.
Layer 3 switch
Answers
Suggested answer: A

Explanation:

A WLAN controller is a device that can centrally manage and configure multiple access points in a wireless network. A WLAN controller can change settings on all the devices remotely, such as SSIDs, security policies, firmware updates, and channel assignments.A WLAN controller can also monitor the performance and status of the access points and provide load balancing and fault tolerance

A network technician is investigating why a core switch is logging excessive amounts of data to the syslog server. The running configuration of the switch showed the following logging information:

ip ssh logging events

logging level debugging

logging host 192.168.1.100

logging synchronous

Which of the following changes should the technician make to best fix the issue?

A.
Update the logging host IP.
A.
Update the logging host IP.
Answers
B.
Change to asynchronous logging.
B.
Change to asynchronous logging.
Answers
C.
Stop logging SSH events.
C.
Stop logging SSH events.
Answers
D.
Adjust the logging level.
D.
Adjust the logging level.
Answers
Suggested answer: D

Explanation:

The logging level debugging is the highest level of logging, which means that the switch will log every possible event, including low-priority and verbose messages. This can result in excessive amounts of data being sent to the syslog server, which can affect the performance and storage of the server. To fix the issue, the technician should adjust the logging level to a lower value, such as informational, warning, or error, depending on the desired level of detail and severity. This will reduce the amount of log data generated by the switch and only send the relevant and necessary messages to the syslog server.

https://betterstack.com/community/guides/logging/log-levels-explained/

Total 865 questions
Go to page: of 87