ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 73

Question list
Search
Search

List of questions

Search

Related questions











A network administrator is setting up a web-based application for a company. The application needs to be continually accessible to all end users.

Which of the following would best ensure this need is fulfilled?

A.
NIC teaming
A.
NIC teaming
Answers
B.
Cold site
B.
Cold site
Answers
C.
Snapshots
C.
Snapshots
Answers
D.
High availability
D.
High availability
Answers
Suggested answer: D

Explanation:

High availability is a quality of a system or component that assures a high level of operational performance for a given period of time. High availability means that an IT system, component, or application can operate at a high level, continuously, without intervention, for a given time period. High-availability infrastructure is configured to deliver quality performance and handle different loads and failures with minimal or zero downtime. High availability is important for web-based applications, as it ensures that the application is always accessible to the end users, even in the event of a server or component failure. High availability can be achieved by eliminating single points of failure, implementing redundancy, load balancing, and failover mechanisms.

Which of the following documents dictates the uptimes that were agreed upon by the involved parties?

A.
MOU
A.
MOU
Answers
B.
BYOD
B.
BYOD
Answers
C.
SLA
C.
SLA
Answers
D.
NDA
D.
NDA
Answers
Suggested answer: C

Explanation:

An SLA (Service Level Agreement) is a document that defines the expected level of service and performance guaranteed by a service provider to a customer. It usually specifies metrics such as uptime, availability, reliability, response time, and compensation or penalties for not meeting the agreed standards. An SLA is a way of ensuring that both parties are clear about their roles and responsibilities, and that the customer receives the quality of service they paid for.

An IT administrator needs to connect older smart-plug devices to the network. The administrator wants to prevent future issues from occurring by using an 802.11 standard that only operates on the 2.4GHz frequency. Which of the following standards should the administrator choose?

A.
802.11a
A.
802.11a
Answers
B.
802.11ac
B.
802.11ac
Answers
C.
802.11ax
C.
802.11ax
Answers
D.
802.11b
D.
802.11b
Answers
Suggested answer: D

Explanation:

802.11b is a wireless networking standard that operates on the 2.4 GHz frequency band. It supports a maximum data rate of 11 Mbps and has a range of about 35 meters indoors and 140 meters outdoors. 802.11b is compatible with older smart-plug devices that use the same frequency band, but it may suffer from interference from other devices that also use the 2.4 GHz band, such as microwave ovens, Bluetooth devices, and cordless phones.

Which of the following is a major difference between a router and a Layer 3 switch?

A.
A router can perform PAT, but a Layer 3 switch cannot.
A.
A router can perform PAT, but a Layer 3 switch cannot.
Answers
B.
A Layer 3 switch is more efficient than a router.
B.
A Layer 3 switch is more efficient than a router.
Answers
C.
A router uses higher speed interfaces than a Layer 3 switch.
C.
A router uses higher speed interfaces than a Layer 3 switch.
Answers
D.
A Layer 3 switch can run more routing protocols than a router.
D.
A Layer 3 switch can run more routing protocols than a router.
Answers
Suggested answer: A

Explanation:

PAT (Port Address Translation) is a type of Network Address Translation (NAT) that allows multiple devices to share a single public IP address by using different port numbers. PAT enables devices to access the internet without exposing their private IP addresses. A router is a device that can perform PAT by translating the source IP address and port number of outgoing packets and the destination IP address and port number of incoming packets. A Layer 3 switch is a device that can perform basic routing functions by using IP addresses, but it cannot perform PAT or other advanced routing features that a router can.

Which of the following should be implemented to allow remote users to access network resources while only redirecting necessary traffic?

A.
Split-tunnel VPN
A.
Split-tunnel VPN
Answers
B.
Geofencing
B.
Geofencing
Answers
C.
Client-to-site VPN
C.
Client-to-site VPN
Answers
D.
Remote desktop gateway
D.
Remote desktop gateway
Answers
Suggested answer: A

Explanation:

A split-tunnel VPN is a VPN feature that allows remote users to access network resources while only redirecting necessary traffic through the VPN tunnel. A split-tunnel VPN enables users to choose which applications or websites to secure with the VPN and which to connect normally through the internet. This can improve performance, conserve bandwidth, and avoid compatibility issues with some services that depend on the user's location. A split-tunnel VPN can also allow users to access local devices or resources that are not accessible through the VPN.

Which of the following authentication methods requires a user to enter a password and scan a fingerprint?

A.
Single sign-on
A.
Single sign-on
Answers
B.
Kerberos
B.
Kerberos
Answers
C.
Multifactor
C.
Multifactor
Answers
D.
Network access control
D.
Network access control
Answers
Suggested answer: C

Explanation:

Multifactor authentication is a method of verifying a user's identity by requiring more than one factor, such as something the user knows, something the user has, or something the user is. A password is something the user knows, and a fingerprint is something the user is. Therefore, a user who needs to enter a password and scan a fingerprint is using multifactor authentication.

A network engineer is configuring new switches. Some of the trunk ports are in a blocking state. Which of the following should the network engineer reconfigure?

A.
STP
A.
STP
Answers
B.
Port mirroring
B.
Port mirroring
Answers
C.
Flow control
C.
Flow control
Answers
D.
LACP
D.
LACP
Answers
Suggested answer: A

Explanation:

STP (Spanning Tree Protocol) is a protocol that prevents loops in a network by placing some of the switch ports in different states, such as blocking, listening, learning, forwarding, or disabled. A port in the blocking state does not forward frames or participate in frame forwarding. A network engineer can reconfigure STP to change the port states and avoid blocking ports that are needed for trunking.

While using a secure conference call connection over a corporate VPN, a user moves from a cellular connection to a hotel wireless network. Although the wireless connection and the VPN show a connected status, no network connectivity is present. Which of the following is the most likely cause of this issue?

A.
MAC filtering is configured on the wireless connection.
A.
MAC filtering is configured on the wireless connection.
Answers
B.
The VPN and the WLAN connection have an encryption protocol mismatch.
B.
The VPN and the WLAN connection have an encryption protocol mismatch.
Answers
C.
The WLAN is using a captive portal that requires further authentication.
C.
The WLAN is using a captive portal that requires further authentication.
Answers
D.
Wireless client isolation is enforced on the WLAN settings.
D.
Wireless client isolation is enforced on the WLAN settings.
Answers
Suggested answer: C

Explanation:

A captive portal is a web page that is displayed to newly connected users of a Wi-Fi network before they are granted broader access to network resources.Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by123

A possible cause of the issue is that the user has not completed the captive portal authentication process, which prevents the VPN from establishing a secure connection over the Wi-Fi network. The user may need to open a web browser and follow the instructions on the captive portal page to gain full access to the internet.

A user is unable to reach any resources on the internet. A technician goes to the site and obtains the following output from the workstation:

Which of the following commands should the technician use to correct the issue?

A.
route ADD 0.0.0.0 MASK 0.0.0.0 10.10.51.10 metric 35
A.
route ADD 0.0.0.0 MASK 0.0.0.0 10.10.51.10 metric 35
Answers
B.
route CHANGE 10.10.51.0 MASK 255.255.255.255 10.10.52.1 metric 5
B.
route CHANGE 10.10.51.0 MASK 255.255.255.255 10.10.52.1 metric 5
Answers
C.
route CHANGE 10.10.51.255 MASK 255.0.0.0 On-Link metric 1
C.
route CHANGE 10.10.51.255 MASK 255.0.0.0 On-Link metric 1
Answers
D.
route DELETE 127.255.255.255
D.
route DELETE 127.255.255.255
Answers
Suggested answer: A

Explanation:

The route command is used to view and manipulate the IP routing table in Windows operating systems456The routing table contains information about how to reach different network destinations. The output from the workstation shows that the routing table does not have a default gateway, which is a router that forwards packets to other networks that are not directly connected to the local network. A default gateway is usually specified by a route with a destination of 0.0.0.0 and a netmask of 0.0.0.0, which matches any IP address.

To correct the issue, the technician can use the route ADD command to add a default gateway to the routing table. The syntax of the command is:

route ADD <destination> MASK <netmask> <gateway> metric <metric>

The destination and netmask parameters should be 0.0.0.0 to indicate a default route. The gateway parameter should be the IP address of the router that can reach the internet, which is 10.10.51.10 in this case. The metric parameter is an optional value that indicates the cost or preference of the route, which can be used to choose between multiple routes to the same destination. A lower metric means a higher preference. The metric parameter can be any integer between 1 and 9999. In this case, the metric parameter can be 35 or any other value.

Therefore, the correct command is:

route ADD 0.0.0.0 MASK 0.0.0.0 10.10.51.10 metric 35

Which of the following network types is composed of computers that can all communicate with one another with equal permissions and allows users to directly share what is on or attached to their computers?

A.
Local area network
A.
Local area network
Answers
B.
Peer-to-peer network
B.
Peer-to-peer network
Answers
C.
Client-server network
C.
Client-server network
Answers
D.
Personal area network
D.
Personal area network
Answers
Suggested answer: B

Explanation:

A peer-to-peer network is a type of network in which each computer (or node) can communicate directly with any other node, without requiring a central server or authority. Each node can act as both a client and a server, and can share its own resources, such as files, printers, or internet connection, with other nodes.A peer-to-peer network allows users to directly access and exchange what is on or attached to their computers, with equal permissions and responsibilities

Total 865 questions
Go to page: of 87