ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 71

Question list
Search
Search

List of questions

Search

Related questions











A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

A.
MAC security
A.
MAC security
Answers
B.
Content filtering
B.
Content filtering
Answers
C.
Screened subnet
C.
Screened subnet
Answers
D.
Perimeter network
D.
Perimeter network
Answers
Suggested answer: B

Explanation:

Content filtering is a technique that blocks or allows access to certain types of web content, based on predefined criteria or policies. Content filtering can be used to comply with the cease-and-desist order by preventing users from accessing torrent sites or downloading torrent files, which are often used for illegal file sharing or piracy. Content filtering can also protect the network from malware, phishing, or inappropriate content.Reference:CompTIA Network+ N10-008 Cert Guide - O'Reilly Media, Chapter 14: Securing a Basic Network, page 520

An on-call network technician receives an automated email alert stating that a power supply on a firewall has just powered down. Which of the following protocols would best allow for this level of detailed device monitoring?

A.
TFTP
A.
TFTP
Answers
B.
TLS
B.
TLS
Answers
C.
SSL
C.
SSL
Answers
D.
SNMP
D.
SNMP
Answers
Suggested answer: D

Explanation:

SNMP stands for Simple Network Management Protocol, and it is a protocol that allows network devices to communicate their status, performance, and configuration information to a central management system. SNMP can be used to monitor and manage various aspects of network devices, such as CPU usage, memory utilization, interface statistics, temperature, voltage, power supply, etc. SNMP can also generate alerts or notifications when certain events or thresholds are reached, such as a power supply failure, a link down, or a high traffic volume. SNMP is widely used for network monitoring and troubleshooting purposes, as it provides a comprehensive and detailed view of the network health and performance.

The other options are not correct because they are not protocols that allow for detailed device monitoring. They are:

TFTP. TFTP stands for Trivial File Transfer Protocol, and it is a protocol that allows for simple and fast file transfer between network devices. TFTP is often used to transfer configuration files, firmware updates, or boot images to network devices, such as routers, switches, or firewalls. TFTP does not provide any monitoring or management capabilities for network devices, nor does it generate any alerts or notifications.

TLS. TLS stands for Transport Layer Security, and it is a protocol that provides encryption and authentication for data transmission over a network. TLS is often used to secure web traffic, email, or other applications that use TCP as the transport protocol. TLS does not provide any monitoring or management capabilities for network devices, nor does it generate any alerts or notifications.

SSL. SSL stands for Secure Sockets Layer, and it is a protocol that provides encryption and authentication for data transmission over a network. SSL is the predecessor of TLS, and it is still used to secure some web traffic, email, or other applications that use TCP as the transport protocol. SSL does not provide any monitoring or management capabilities for network devices, nor does it generate any alerts or notifications.

Reference 1:What is SNMP? - Definition from WhatIs.com 2:Network+ (Plus) Certification | CompTIA IT Certifications 3:What is TFTP? - Definition from WhatIs.com 4:What is TLS? - Definition from WhatIs.com 5:What is SSL? - Definition from WhatIs.com

A local service provider connected 20 schools in a large city with a fiber-optic switched network. Which of the following network types did the provider set up?

A.
LAN
A.
LAN
Answers
B.
MAN
B.
MAN
Answers
C.
CAN
C.
CAN
Answers
D.
WAN
D.
WAN
Answers
Suggested answer: B

Explanation:

MAN stands for Metropolitan Area Network, and it is a type of network that covers a large geographic area, such as a city or a county. MANs are often used to connect multiple LANs (Local Area Networks) within a region, such as schools, offices, or government buildings. MANs typically use high-speed and high-capacity transmission media, such as fiber-optic cables, to provide fast and reliable data communication. MANs can also provide access to WANs (Wide Area Networks), such as the Internet, or other services, such as cable TV or VoIP.

The other options are not correct because they are not the type of network that covers a large city. They are:

LAN. LAN stands for Local Area Network, and it is a type of network that covers a small geographic area, such as a home, an office, or a building. LANs are often used to connect multiple devices, such as computers, printers, or phones, within a single network. LANs typically use low-cost and low-capacity transmission media, such as twisted-pair cables, to provide data communication. LANs can also provide access to other networks, such as MANs or WANs, through routers or gateways.

CAN. CAN stands for Campus Area Network, and it is a type of network that covers a moderate geographic area, such as a university, a hospital, or a military base. CANs are often used to connect multiple LANs within a campus, such as different departments, buildings, or facilities. CANs typically use medium-cost and medium-capacity transmission media, such as coaxial cables, to provide data communication. CANs can also provide access to other networks, such as MANs or WANs, through routers or gateways.

WAN. WAN stands for Wide Area Network, and it is a type of network that covers a very large geographic area, such as a country, a continent, or the world. WANs are often used to connect multiple MANs or LANs across different regions, such as different cities, states, or countries. WANs typically use high-cost and high-capacity transmission media, such as satellite links, to provide data communication. WANs can also provide access to various services, such as the Internet, email, or VPN.

Reference 1:What is a Metropolitan Area Network (MAN)? - Definition from Techopedia 2:Network+ (Plus) Certification | CompTIA IT Certifications 3:What is a Local Area Network (LAN)? - Definition from Techopedia 4:What is a Campus Area Network (CAN)? - Definition from Techopedia 5:What is a Wide Area Network (WAN)? - Definition from Techopedia

An organization has experienced an increase in malicious spear-phishing campaigns and wants to mitigate the risk of hyperlinks from inbound emails.

Which of the following appliances would best enable this capability?

A.
Email protection gateway
A.
Email protection gateway
Answers
B.
DNS server
B.
DNS server
Answers
C.
Proxy server
C.
Proxy server
Answers
D.
Endpoint email client
D.
Endpoint email client
Answers
E.
Sandbox
E.
Sandbox
Answers
Suggested answer: A

Explanation:

An email protection gateway is an appliance that can filter and block malicious emails and attachments before they reach the recipients. An email protection gateway can mitigate the risk of hyperlinks from inbound emails by scanning the links for malicious content, rewriting the links to point to a safe domain, or blocking the links altogether. An email protection gateway can also perform other functions such as spam filtering, antivirus scanning, encryption, and data loss prevention. A DNS server, a proxy server, an endpoint email client, and a sandbox are not appliances that can enable this capability, as they have different purposes and functions.

Reference

1: CompTIA Network+ N10-008 Certification Study Guide, page 304

2: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 15

3: CompTIA Network+ N10-008 Certification Practice Test, question 5

4: Email Protection Gateway -- N10-008 CompTIA Network+ : 3.2

An organization has a security staff shortage and must prioritize efforts in areas where the staff will have the most impact. In particular, the focus is to avoid expending resources on identifying non-relevant events. A security analyst is reviewing web server logs and sees the following:

Which of the following should the analyst recommend?

A.
Configuring the web server log to filter out 404 errors on image files
A.
Configuring the web server log to filter out 404 errors on image files
Answers
B.
Updating firewall rules to block 202.180.155.1
B.
Updating firewall rules to block 202.180.155.1
Answers
C.
Resyncing the network time server and monitoring logs for future anomalous behavior
C.
Resyncing the network time server and monitoring logs for future anomalous behavior
Answers
D.
Checking with the penetration testing team to see if the team ran any scans on January 14, 2021
D.
Checking with the penetration testing team to see if the team ran any scans on January 14, 2021
Answers
Suggested answer: A

Explanation:

This answer will help the organization to avoid expending resources on identifying non-relevant events, as the 404 errors on image files are not indicative of any security threat or issue, but rather a misconfiguration or a broken link on the web server. The 404 errors on image files are also very frequent and repetitive, as shown by the web server log, which can clutter the log and make it harder to spot any relevant events. By filtering out these errors, the analyst can focus on more important events and reduce the noise in the log.

The other answers are not as good as A, because they either do not address the problem of identifying non-relevant events, or they are based on incorrect assumptions or information. For example:

B) Updating firewall rules to block 202.180.155.1 is not a good answer, because the IP address 202.180.155.1 is not doing anything malicious or suspicious, but rather requesting image files that do not exist on the web server. Blocking this IP address will not improve the security of the web server, but rather create unnecessary firewall rules and possibly deny legitimate access to the web server.

C) Resyncing the network time server and monitoring logs for future anomalous behavior is not a good answer, because there is no evidence that the network time server is out of sync or causing any problems. The web server log shows that the entries are all within a few minutes of each other, which is normal and expected. Resyncing the network time server will not help the analyst to identify non-relevant events, but rather waste time and resources on an unrelated task.

D) Checking with the penetration testing team to see if the team ran any scans on January 14, 2021 is not a good answer, because the web server log does not show any signs of a penetration test or a scan. The log shows only 404 errors on image files, which are not typical of a penetration test or a scan, which would usually target different types of files, ports, or vulnerabilities. Checking with the penetration testing team will not help the analyst to identify non-relevant events, but rather distract the analyst from the actual events and possibly create false alarms.

https://www.professormesser.com/network-plus/n10-008/n10-008-video/general-network-troubleshooting-n10-008/

Which of the following is most likely responsible for the security and handling of personal data in Europe?

A.
GDPR
A.
GDPR
Answers
B.
SCADA
B.
SCADA
Answers
C.
SAML
C.
SAML
Answers
D.
PCI DSS
D.
PCI DSS
Answers
Suggested answer: A

Explanation:

GDPR stands for General Data Protection Regulation, which is a European Union regulation on information privacy and security.It applies to any organization that collects or processes personal data of individuals in the EU, and it sets out rules and requirements for data protection, consent, breach notification, and enforcement1

Reference 1: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation

A network technician needs to use an RFC1918 IP space for a new office that only has a single public IP address. Which of the following subnets should the technician use for the LAN?

A.
10.10.10.0/24
A.
10.10.10.0/24
Answers
B.
127.16.10.0/24
B.
127.16.10.0/24
Answers
C.
174.16.10.0/24
C.
174.16.10.0/24
Answers
D.
198.18.10.0/24
D.
198.18.10.0/24
Answers
Suggested answer: A

Explanation:

The RFC1918 IP space is a set of private IP addresses that are not routable on the public Internet and can be used for internal networks.The RFC1918 IP space consists of three ranges: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/161Out of the four options, only A) 10.10.10.0/24 belongs to one of these ranges, specifically the 10.0.0.0/8 range. Therefore, the technician should use this subnet for the LAN.

Reference 1: https://en.wikipedia.org/wiki/Private_network

A network technician wants to deploy a new wireless access point to reduce user latency. Currently, the organization has the following deployed:

Which of the following channels should the new device broadcast on?

A.
Channel 3
A.
Channel 3
Answers
B.
Channel 9
B.
Channel 9
Answers
C.
Channel 10
C.
Channel 10
Answers
D.
Channel 11
D.
Channel 11
Answers
Suggested answer: D

Explanation:

The best channel for a new wireless access point is one that does not overlap with the existing channels used by other devices. Overlapping channels can cause interference and degrade the performance of the wireless network. According to the web search results, the 2.4 GHz band has 11 channels in the U.S., but only channels 1, 6, and 11 are non-overlapping.Since the existing devices are using channels 1 and 6, the new device should use channel 11 to avoid adjacent-channel interference12

Reference 1: Why Channels 1, 6 and 11?| MetaGeek2: How to Choose the Best Wi-Fi Channels for Your Network - Lifewire

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

Which of the following is the most likely issue?

A.
Packet loss
A.
Packet loss
Answers
B.
Bottlenecking
B.
Bottlenecking
Answers
C.
Channel overlap
C.
Channel overlap
Answers
D.
Network congestion
D.
Network congestion
Answers
Suggested answer: B

Explanation:

The most likely issue is bottlenecking. Bottlenecking occurs when a component or device limits the performance or capacity of the network.In this case, the IPS (intrusion prevention system) may be causing a bottleneck by inspecting and filtering the incoming and outgoing traffic, which reduces the speed and bandwidth available for the network devices12

To confirm this issue, the network administrator can compare the speed test results before and after installing the IPS, and check the IPS configuration and logs for any errors or warnings.The network administrator can also try to bypass the IPS temporarily and run the speed test again to see if there is any improvement3

If the IPS is indeed the cause of the bottleneck, the network administrator can try to optimize the IPS settings, such as adjusting the inspection rules, thresholds, and priorities, to reduce the processing overhead and latency.Alternatively, the network administrator can upgrade the IPS hardware or software, or add more IPS devices to balance the load and increase the throughput45

1: What is Network Congestion? Common Causes and How to Fix Them?- GeeksforGeeks2: Network congestion - Wikipedia3: How to Fix Packet Loss - Lifewire4: How to Optimize Your IPS Performance - Cisco5: How to Avoid Network Bottlenecks - TechRepublic

A global company has acquired a local company. The companies are geographically separate. The IP address ranges for the two companies are as follows:

* Global company: 10.0.0.0/16

* Local company: 10.0.0.0/24

Which of the following can the network engineer do to quickly connect the two companies?

A.
Assign static routing to advertise the local company's network.
A.
Assign static routing to advertise the local company's network.
Answers
B.
Assign an overlapping IP address range to both companies.
B.
Assign an overlapping IP address range to both companies.
Answers
C.
Assign a new IP address range to the local company.
C.
Assign a new IP address range to the local company.
Answers
D.
Assign a NAT range to the local company.
D.
Assign a NAT range to the local company.
Answers
Suggested answer: C

Explanation:

Assigning a new IP address range to the local company is the best option to quickly connect the two companies without causing any IP address conflicts or overlaps.This option requires reconfiguring the local company's network devices and updating the routing tables on both sides, but it avoids the need for any NAT or static routing solutions that may introduce additional complexity, cost, or performance issues12

Reference 1: Connecting Networks with Overlapping IP Ranges2: What Is Network Address Translation (NAT)?

Total 865 questions
Go to page: of 87