ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 67

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a characteristic of the application layer?

A.
It relies upon other layers for packet delivery.
A.
It relies upon other layers for packet delivery.
Answers
B.
It checks independently for packet loss.
B.
It checks independently for packet loss.
Answers
C.
It encrypts data in transit.
C.
It encrypts data in transit.
Answers
D.
It performs address translation.
D.
It performs address translation.
Answers
Suggested answer: A

Explanation:

The application layer is the highest layer of the OSI model, and it provides the interface between the user and the network. It does not handle the details of packet delivery, such as addressing, routing, error checking, or encryption. Those functions are performed by the lower layers of the OSI model. The application layer only focuses on the format, content, and presentation of the data.

Understanding the OSI Model -- N10-008 CompTIA Network+ : 1.11

CompTIA Network+ Certification Exam Objectives, page 92

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

A.
Port mirroring
A.
Port mirroring
Answers
B.
Flow data
B.
Flow data
Answers
C.
Syslog entries
C.
Syslog entries
Answers
D.
SNMP traps
D.
SNMP traps
Answers
Suggested answer: A

Explanation:

Port mirroring is a method of monitoring network traffic by copying the data packets from one port to another port on the same switch or router. This allows the network security administrator to analyze the contents of the data sent between different networks without affecting the performance or security of the original traffic. Port mirroring can be configured to capture all traffic or only specific types of traffic, such as VLANs, protocols, or IP addresses.

Port Mirroring - CompTIA Network+ N10-008 Domain 3.1 - YouTube1

CompTIA Network+ Certification Exam Objectives, page 142

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

A.
Changing the default password
A.
Changing the default password
Answers
B.
Blocking inbound SSH connections
B.
Blocking inbound SSH connections
Answers
C.
Removing the gateway from the network configuration
C.
Removing the gateway from the network configuration
Answers
D.
Restricting physical access to the switch
D.
Restricting physical access to the switch
Answers
Suggested answer: A

Explanation:

Changing the default password is a hardening technique that best mitigates the use of publicly available information, such as vendor documentation, online forums, or hacking tools, that may reveal the default credentials of a commercial switch. By changing the default password to a strong and unique one, the network technician can prevent unauthorized access to the switch configuration and management.

Network Hardening - N10-008 CompTIA Network+ : 4.3 - YouTube1

CompTIA Network+ Certification Exam Objectives, page 151

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.
Web traffic is filtered through a web filter.
A.
Web traffic is filtered through a web filter.
Answers
B.
More bandwidth is required on the company's internet connection.
B.
More bandwidth is required on the company's internet connection.
Answers
C.
Monitoring detects insecure machines on the company's network.
C.
Monitoring detects insecure machines on the company's network.
Answers
D.
Cloud-based traffic flows outside of the company's network.
D.
Cloud-based traffic flows outside of the company's network.
Answers
Suggested answer: D

Explanation:

A split-tunnel VPN is a configuration where only specific traffic is routed through a VPN, while the remaining data is sent directly over the internet. This can reduce the bandwidth consumption and cost of the company's internet connection, as cloud-based traffic does not need to pass through the VPN tunnel. A web filter, monitoring, and security are not advantages of a split-tunnel VPN, as they may require all traffic to go through the VPN.

https://www.auvik.com/franklyit/blog/vpn-split-tunneling/

A network consultant is setting up a new wireless infrastructure. The new infrastructure is primarily focused on supporting legacy equipment that does not support the newest standards. Which of the following frequency ranges will the consultant most likely have to support?

A.
2.4GHz
A.
2.4GHz
Answers
B.
5GHz
B.
5GHz
Answers
C.
5.9GHz
C.
5.9GHz
Answers
D.
6GHz
D.
6GHz
Answers
Suggested answer: A

Explanation:

The most likely frequency range that the network consultant will have to support is2.4GHz.This is because the most common legacy wireless standards, 802.11b and 802.11g, use the 2.4GHz range1. IEEE 802.11a uses 5GHz exclusively, and 5.9GHz and 6GHz are not widely used by legacy equipment. Therefore,

A) 2.4GHz is the correct answer.

https://www.networkcomputing.com/networking/wireless-beginners-part-1-rf-and-waves

Which of the following network cables involves bouncing light off of protective cladding?

A.
Twinaxial
A.
Twinaxial
Answers
B.
Coaxial
B.
Coaxial
Answers
C.
Single-mode
C.
Single-mode
Answers
D.
Multimode
D.
Multimode
Answers
Suggested answer: D

Explanation:

Multimode fiber optic cables use multiple paths of light that bounce off the cladding, which is a layer of glass or plastic that surrounds the core of the cable.

https://www.explainthatstuff.com/fiberoptics.html

Which of the following attacks utilizes a network packet that contains multiple network tags?

A.
MAC flooding
A.
MAC flooding
Answers
B.
VLAN hopping
B.
VLAN hopping
Answers
C.
DNS spoofing
C.
DNS spoofing
Answers
D.
ARP poisoning
D.
ARP poisoning
Answers
Suggested answer: B

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.
255.255.255.128
A.
255.255.255.128
Answers
B.
255.255.255.192
B.
255.255.255.192
Answers
C.
255.255.255.224
C.
255.255.255.224
Answers
D.
255.255.255.240
D.
255.255.255.240
Answers
Suggested answer: C

To find the best subnet mask that meets the requirement of six usable IP addresses, we need to calculate the number of host bits and the number of host addresses for each option. The number of host bits is the number of 0s in the binary representation of the subnet mask, and the number of host addresses is 2^host bits - 2 (the -2 is to exclude the network address and the broadcast address). The option that has the smallest number of host addresses that is greater than or equal to six is the best choice. Here are the calculations for each option:

A.
255.255.255.128 Binary: 11111111.11111111.11111111.10000000 Host bits: 7 Host addresses: 2^7 - 2 = 126 - 2 = 124 This option has too many host addresses for the requirement.
A.
255.255.255.128 Binary: 11111111.11111111.11111111.10000000 Host bits: 7 Host addresses: 2^7 - 2 = 126 - 2 = 124 This option has too many host addresses for the requirement.
Answers
B.
255.255.255.192 Binary: 11111111.11111111.11111111.11000000 Host bits: 6 Host addresses: 2^6 - 2 = 64 - 2 = 62 This option also has too many host addresses for the requirement.
B.
255.255.255.192 Binary: 11111111.11111111.11111111.11000000 Host bits: 6 Host addresses: 2^6 - 2 = 64 - 2 = 62 This option also has too many host addresses for the requirement.
Answers
C.
255.255.255.224 Binary: 11111111.11111111.11111111.11100000 Host bits: 5 Host addresses: 2^5 - 2 = 32 - 2 = 30 This option has the smallest number of host addresses that is greater than or equal to six, so this is the best choice.
C.
255.255.255.224 Binary: 11111111.11111111.11111111.11100000 Host bits: 5 Host addresses: 2^5 - 2 = 32 - 2 = 30 This option has the smallest number of host addresses that is greater than or equal to six, so this is the best choice.
Answers
D.
255.255.255.240 Binary: 11111111.11111111.11111111.11110000 Host bits: 4 Host addresses: 2^4 - 2 = 16 - 2 = 14 This option has fewer host addresses than the requirement, so this is not a valid choice.
D.
255.255.255.240 Binary: 11111111.11111111.11111111.11110000 Host bits: 4 Host addresses: 2^4 - 2 = 16 - 2 = 14 This option has fewer host addresses than the requirement, so this is not a valid choice.
Answers
Suggested answer: C

Explanation:

This subnet mask will allow you to have six usable IP addresses in each subnet, with a minimum of wasted addresses. You can use the following formula to calculate the number of subnets and the subnet ID for each subnet:

Number of subnets = 2^network bits Subnet ID = (subnet number - 1) x number of host addresses + network address

The network bits are the number of 1s in the binary representation of the subnet mask, and the network address is the first address in the range. For example, if your range is 192.168.1.0/27, then the network bits are 27, the network address is 192.168.1.0, and the number of host addresses is 30. Therefore, the number of subnets is 2^27, and the subnet ID for the first subnet is (1 - 1) x 30 + 192.168.1.0 = 192.168.1.0. The subnet ID for the second subnet is (2 - 1) x 30 + 192.168.1.0 = 192.168.1.32, and so on.

Subnet masks are covered in Objective 1.4 of the CompTIA Network+ N10-008 certification exam1.

Subnet masks can be calculated based on binary and CIDR-block notations2.

Subnet masks can be used to determine the number of host bits and host addresses3.

1: CompTIA Network+ Certification Exam Objectives, page 42: IPv4 Subnet Masks -- N10-008 CompTIA Network+ : 1.413: Calculating IPv4 Subnets and Hosts -- N10-008 CompTIA Network+ : 1.44

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface's indicator lights are not blinking on either the computer or the switch. Which of the following is the most likely cause?

A.
The switch failed.
A.
The switch failed.
Answers
B.
The default gateway is wrong.
B.
The default gateway is wrong.
Answers
C.
The port is shut down.
C.
The port is shut down.
Answers
D.
The VLAN assignment is incorrect.
D.
The VLAN assignment is incorrect.
Answers
Suggested answer: C

Explanation:

If the port is shut down, it means that the switch has disabled the port and is not sending or receiving any traffic on it. This would explain why the network interface's indicator lights are not blinking on either the computer or the switch, and why the user cannot access resources on the network. The port could be shut down manually by the network administrator, or automatically by the switch due to security or error conditions.

Reference

Port shutdown is one of the common switch configuration options covered in Objective 2.3 of the CompTIA Network+ N10-008 certification exam1.

Port shutdown can cause the network interface's indicator lights to stop blinking2.

Port shutdown can prevent the user from accessing resources on the network3.

1: CompTIA Network+ Certification Exam Objectives, page 52: CompTIA Network+ N10-008: Switch not forwarding frames on trunked port33: Cable Management -- N10-008 CompTIA Network+ : 1.3

Total 865 questions
Go to page: of 87