ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 70

Question list
Search
Search

List of questions

Search

Related questions











Which of the following protocols should be used when Layer 3 availability is of the highest concern?

A.
LACP
A.
LACP
Answers
B.
LDAP
B.
LDAP
Answers
C.
FHRP
C.
FHRP
Answers
D.
DHCP
D.
DHCP
Answers
Suggested answer: C

Explanation:

FHRP stands for First Hop Redundancy Protocol, which is a group of protocols that allow routers or switches to provide backup or failover for the default gateway in a network. FHRP ensures that the network traffic can reach its destination even if the primary gateway fails or becomes unavailable. Some examples of FHRP protocols are HSRP, VRRP, and GLBP.

Reference

1: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 18

2: CompTIA Network+ N10-008 Certification Practice Test, question 9

3: CompTIA Network+ Study Guide: Exam N10-008, 5th Edition, page 263

4: CompTIA Network+ (N10-008) Practice Exam w/PBQ & Solution, question 5

5: What's on the CompTIA Network+ 008 certification? | CompTIA, section 3.1

An organization has a guest network with a network IP range of 192.168.1.0/28 using a DHCP pool. One visitor reported difficulties connecting and configured a static IP address. Following this action, another visitor reported intermittent connection issues. Which of the following is the most likely reason?

A.
Address pool exhaustion
A.
Address pool exhaustion
Answers
B.
Duplicate IP addresses
B.
Duplicate IP addresses
Answers
C.
Misconfigured default gateway
C.
Misconfigured default gateway
Answers
D.
Incorrect subnet mask
D.
Incorrect subnet mask
Answers
Suggested answer: B

Explanation:

A duplicate IP address occurs when two devices on the same network have the same IP address assigned to them. This can cause intermittent connection issues, as the network devices may not be able to distinguish between the two conflicting devices. A duplicate IP address can be caused by a visitor manually configuring a static IP address that is already in use by another device on the guest network. The network IP range of 192.168.1.0/28 has only 14 usable host addresses, so the chances of a duplicate IP address are higher than a larger network.

Reference

1: Troubleshooting IP Configurations -- CompTIA Network+ N10-006 -- 4.6

2: Troubleshooting Duplicate IP Addresses - CompTIA Network+ N10-005: 2.5

3: Network Address Translation -- N10-008 CompTIA Network+ : 1.4

Which of the following is the first step a network administrator should take in the troubleshooting methodology?

A.
Establish a plan of action.
A.
Establish a plan of action.
Answers
B.
Document findings and outcomes.
B.
Document findings and outcomes.
Answers
C.
Test the theory to determine cause.
C.
Test the theory to determine cause.
Answers
D.
Identify the problem.
D.
Identify the problem.
Answers
Suggested answer: D

Explanation:

According to the network troubleshooting methodology, the first step a network administrator should take is to identify the problem. This involves gathering information from the users, the network devices, and the symptoms of the issue. Identifying the problem helps to narrow down the scope and the possible causes of the network issue.

Reference

1: Network troubleshooting methodology | CompTIA Network+ N10-008 ...

2: Chapter 21. A Network Troubleshooting Methodology - CompTIA Network+ ...

3: Network Troubleshooting Methodology -- N10-008 CompTIA Network+ : 5.1

Which of the following, in addition to a password, can be asked of a user for MFA?

A.
PIN
A.
PIN
Answers
B.
Favorite color
B.
Favorite color
Answers
C.
Hard token
C.
Hard token
Answers
D.
Mother's maiden name
D.
Mother's maiden name
Answers
Suggested answer: A

Explanation:

MFA stands for Multi-Factor Authentication, which is a method of verifying the identity of a user by requiring two or more pieces of evidence that belong to different categories: something the user knows, something the user has, or something the user is. A password is something the user knows, and it is usually combined with another factor such as a PIN (Personal Identification Number) or a hard token (a physical device that generates a one-time code) that the user has. A favorite color or a mother's maiden name are not suitable for MFA, as they are also something the user knows and can be easily guessed or compromised.

Reference

1: Multi-Factor Authentication -- N10-008 CompTIA Network+ : 3.1

2: CompTIA Network+ Certification Exam Objectives, page 13

3: CompTIA Network+ N10-008 Certification Study Guide, page 250

4: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 14

Which of the following routing protocols is hierarchal by nature and uses the router ID to control convergence?

A.
BGP
A.
BGP
Answers
B.
OSPF
B.
OSPF
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
RIP
D.
RIP
Answers
Suggested answer: B

Explanation:

OSPF stands for Open Shortest Path First, which is a link-state routing protocol that is hierarchal by nature and uses the router ID to control convergence. OSPF divides a large network into areas, which are logical groupings of routers that share the same topology information. Each area has a unique identifier and a designated router that connects it to the backbone area (area 0). OSPF uses the router ID, which is a 32-bit number that uniquely identifies each router in the network, to establish adjacencies and exchange routing information. OSPF also uses the router ID to break ties when choosing the best path to a destination. OSPF converges faster than distance-vector routing protocols such as RIP and EIGRP, as it uses the Dijkstra algorithm to calculate the shortest path based on the link cost. BGP, on the other hand, is a path-vector routing protocol that is used to exchange routing information between autonomous systems on the Internet. BGP does not use the router ID to control convergence, but rather uses attributes such as AS path, local preference, and MED to select the best route. BGP is not hierarchal by nature, as it does not divide the network into areas, but rather uses prefixes and policies to control the routing behavior.

Reference

1: OSPF -- N10-008 CompTIA Network+ : 2.1

2: CompTIA Network+ N10-008 Certification Study Guide, page 146-149

3: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 19

4: CompTIA Network+ N10-008 Certification Practice Test, question 8

A network administrator is in the process of installing a new broadband circuit. The administrator assigns the new static IP address with a /30 prefix. However, the administrator is unable to connect to the internet. Given the following information:

IP address: 4.11.17.6

Subnet mask: 255.255.255.252

Default gateway: 4.11.17.1

DNS1: 1.1.1.1

DNS2: 8.8.8.8

Which of the following is the most likely cause?

A.
Routing table
A.
Routing table
Answers
B.
Subnet mask
B.
Subnet mask
Answers
C.
DNS
C.
DNS
Answers
D.
Default gateway
D.
Default gateway
Answers
Suggested answer: D

Explanation:

The most likely cause of the administrator's inability to connect to the internet is the incorrect default gateway. The default gateway is the IP address of the router that connects the local network to the internet. The default gateway should be in the same subnet as the IP address of the device. However, in this case, the IP address of the device is 4.11.17.6 and the subnet mask is 255.255.255.252, which means the subnet has only four addresses: 4.11.17.4, 4.11.17.5, 4.11.17.6, and 4.11.17.7. The first and the last addresses are reserved for the network and the broadcast, respectively, so the only valid addresses for the device and the gateway are 4.11.17.5 and 4.11.17.6. Therefore, the default gateway should be 4.11.17.5, not 4.11.17.1, which is in a different subnet. The routing table, the subnet mask, and the DNS are not the causes of the problem, as they are either correct or irrelevant for the internet connectivity.

Reference

1: CompTIA Network+ N10-008 Certification Study Guide, page 83-84

2: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 8

3: CompTIA Network+ N10-008 Certification Practice Test, question 3

Which of the following cloud components can filter inbound and outbound traffic between cloud resources?

A.
NAT gateways
A.
NAT gateways
Answers
B.
Service endpoints
B.
Service endpoints
Answers
C.
Network security groups
C.
Network security groups
Answers
D.
Virtual private cloud
D.
Virtual private cloud
Answers
Suggested answer: C

Explanation:

Network security groups are cloud components that can filter inbound and outbound traffic between cloud resources based on rules and priorities. Network security groups can be applied to virtual machines, subnets, or network interfaces to control the network access and security. Network security groups can allow or deny traffic based on the source, destination, port, and protocol of the packets. Network security groups are different from NAT gateways, service endpoints, and virtual private clouds, which are other cloud components that have different functions and purposes.

Reference

1: Network Security Groups -- N10-008 CompTIA Network+ : 3.2

2: CompTIA Network+ N10-008 Certification Study Guide, page 329-330

3: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 17

4: CompTIA Network+ N10-008 Certification Practice Test, question 10

A company is sending a switch to a remote site to be reused. An administrator needs to move the switch and ensure no network settings persist. Which of the following databases does the administrator need to delete?

A.
VLAN
A.
VLAN
Answers
B.
STP
B.
STP
Answers
C.
ARP
C.
ARP
Answers
D.
Trunking
D.
Trunking
Answers
Suggested answer: A

Explanation:

The VLAN database is the database that stores the VLAN configuration information on a switch, such as the VLAN IDs, names, and ports. The VLAN database is stored in a separate file from the switch configuration file, and it is not affected by the erase startup-config or reload commands. Therefore, to delete the VLAN database, the administrator needs to use a specific command, such as delete flash:vlan.dat or delete vlan.dat, depending on the switch model. Deleting the VLAN database will ensure that no network settings related to VLANs persist on the switch when it is moved to a remote site.

Reference

1: CompTIA Network+ N10-008 Certification Study Guide, page 163

2: N10-008 CompTIA Network+ : 5.5 - Professor Messer IT Certification Training Courses

3: CompTIA Network+ (N10-008) Practice Exam w/PBQ & Solution, question 6

A virtual machine has the following configuration:

* IPv4 address: 169.254.10.10

* Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the internet. Which of the following is most likely the root cause?

A.
The subnet mask is incorrect.
A.
The subnet mask is incorrect.
Answers
B.
The DHCP server is offline.
B.
The DHCP server is offline.
Answers
C.
The IP address is an RFC1918 private address.
C.
The IP address is an RFC1918 private address.
Answers
D.
The DNS server is unreachable.
D.
The DNS server is unreachable.
Answers
Suggested answer: B

Explanation:

The IP address 169.254.10.10 is an APIPA (Automatic Private IP Addressing) address, which is assigned by the operating system when a DHCP server is not available or reachable. APIPA addresses are in the range of 169.254.0.0/16, and they allow the device to communicate with other devices on the same local network, but not with external networks or the internet. Therefore, the most likely root cause of the virtual machine's connectivity issue is that the DHCP server is offline or malfunctioning, and the virtual machine cannot obtain a valid IP address from it.

Reference

1: CompTIA Network+ N10-008 Certification Study Guide, page 86

2: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 9

3: CompTIA Network+ N10-008 Certification Practice Test, question 4

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

A.
See the solution configuration below in Explanation
A.
See the solution configuration below in Explanation
Answers
Suggested answer: A

Explanation:



Total 865 questions
Go to page: of 87