ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 76

Question list
Search
Search

List of questions

Search

Related questions











A user returns to the office after working remotely for an extended period. The user is reporting limited access to the office wireless network and the inability to reach company resources on the network. The user connected to the guest network, ensured all patches were applied, and checked to make sure software was up to date. Which of the following is most likely the cause of the issue?

A.
The laptop drivers need to be updated to support a new wireless infrastructure.
A.
The laptop drivers need to be updated to support a new wireless infrastructure.
Answers
B.
The wireless passphrase has been cycled and needs to be updated.
B.
The wireless passphrase has been cycled and needs to be updated.
Answers
C.
The NAC appliance has labeled the laptop as non-complaint.
C.
The NAC appliance has labeled the laptop as non-complaint.
Answers
D.
The WAP transmit power is too low and cannot complete user authentication.
D.
The WAP transmit power is too low and cannot complete user authentication.
Answers
Suggested answer: C

Explanation:

A network access control (NAC) appliance is a device that checks the enrollment and compliance state of devices that try to access the network resources.It can deny, quarantine, or restrict the access of non-compliant devices based on predefined policies1. A device can be considered non-compliant if it does not meet the security requirements, such as having the latest patches, antivirus signatures, firewall settings, or encryption standards. In this scenario, the user's laptop may have been labeled as non-compliant by the NAC appliance because it was out of sync with the network policies after working remotely for a long time. The user connected to the guest network, which is usually less secure and isolated from the corporate network, and updated the patches and software, but that may not be enough to satisfy the NAC appliance. The user may need to enroll the device again, or contact the IT support to resolve the issue.

Reference 1- Network access control integration with Microsoft Intune | Microsoft Learn

A customer hired a network consultant to install a new wireless network with the following specifications:

2.4GHz

11Mbps

20MHz

Which of the following standards best fits these requirements?

A.
802.11ac
A.
802.11ac
Answers
B.
802.11b
B.
802.11b
Answers
C.
802.11g
C.
802.11g
Answers
D.
802.11n
D.
802.11n
Answers
Suggested answer: B

Explanation:

The 802.11b standard is a wireless networking protocol that operates in the 2.4GHz frequency band and supports a maximum data rate of 11Mbps.It uses a 20MHz channel width and a direct-sequence spread spectrum (DSSS) modulation technique2.The 802.11b standard was released in 1999 and is backward compatible with the original 802.11 standard3. The other standards do not match the specifications given by the customer. 802.11ac operates in the 5GHz band and supports higher data rates up to 6.9Gbps. 802.11g also operates in the 2.4GHz band but supports data rates up to 54Mbps. 802.11n can operate in both 2.4GHz and 5GHz bands and supports data rates up to 600Mbps.It also uses a wider channel width of 40MHz and a multiple-input multiple-output (MIMO) technology3.

Reference 2- 802.11 Standards Explained: 802.11ax, 802.11ac, 802.11b/g/n, 802.11a - Lifewire 3- Introduction to WLAN Frequency Bands | Engineering Education (EngEd ...

An IT intern moved the location of a WAP from one conference room to another. The WAP was unable to boot following the move. Which of the following should be used to fix the issue?

A.
Antenna
A.
Antenna
Answers
B.
WLAN controller
B.
WLAN controller
Answers
C.
Media converter
C.
Media converter
Answers
D.
PoE injector
D.
PoE injector
Answers
Suggested answer: D

Explanation:

A PoE injector is a device that provides power over Ethernet (PoE) to a WAP or other network device that does not have a built-in power supply. A PoE injector connects to a power outlet and an Ethernet cable, and sends both power and data to the WAP. If the WAP was moved to a location where there is no power outlet or PoE switch, it would need a PoE injector to boot up.Reference:

Part 3 of the current page talks about PoE and PoE injectors as a way to power WAPs.

[This article] explains how PoE injectors work and how to use them.

Which of the following DNS records maps an alias to a true name?

A.
AAAA
A.
AAAA
Answers
B.
NS
B.
NS
Answers
C.
TXT
C.
TXT
Answers
D.
CNAME
D.
CNAME
Answers
Suggested answer: D

Explanation:

A CNAME (Canonical Name) record is a type of DNS (Domain Name System) record that maps an alias name to a canonical or true domain name. For example, a CNAME record can map blog.example.com to example.com, which means that blog.example.com is an alias of example.com.A CNAME record is useful when you want to point multiple subdomains to the same IP address, or when you want to change the IP address of a domain without affecting the subdomains1.

A network technician is troubleshooting an issue that involves connecting to a server via SSH. The server has one network interface that does not support subinterfaces. The technician runs a command on the server and receives the following output:

On the host, the technician runs another command and receives the following:

Which of the following best explains the issue?

A.
A firewall is blocking access to the server.
A.
A firewall is blocking access to the server.
Answers
B.
The server is plugged into a trunk port.
B.
The server is plugged into a trunk port.
Answers
C.
The host does not have a route to the server.
C.
The host does not have a route to the server.
Answers
D.
The server is not running the SSH daemon.
D.
The server is not running the SSH daemon.
Answers
Suggested answer: C

A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer use to upgrade the gateway?

A.
NGFW
A.
NGFW
Answers
B.
Proxy
B.
Proxy
Answers
C.
Layer 3 switch
C.
Layer 3 switch
Answers
D.
Load balancer
D.
Load balancer
Answers
Suggested answer: A

Explanation:

A Next-Generation Firewall (NGFW) is a type of firewall that can filter traffic on all OSI layers, as well as provide advanced security features such as application awareness, intrusion prevention, and threat intelligence. A NGFW can replace a traditional router at the edge of a network and provide better protection against network attacks.

A proxy is a server that acts as an intermediary between clients and servers, forwarding requests and responses. A proxy can filter traffic on the application layer (layer 7), but not on the lower layers of the OSI model.

A layer 3 switch is a device that can perform both switching and routing functions. A layer 3 switch can filter traffic on the network layer (layer 3), but not on the higher or lower layers of the OSI model.

A load balancer is a device that distributes incoming traffic among a group of servers, improving performance and reliability. A load balancer can filter traffic on the transport layer (layer 4), but not on the higher or lower layers of the OSI model.

Reference

What is a Next-Generation Firewall?

What is a Reverse Proxy vs. Load Balancer?

Load Balancers Vs Api Gateway Vs Reverse Proxy

Reverse Proxy and Load Balancer: Understanding the Difference

CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)

Which of the following would be used to indicate when unauthorized access to physical internal hardware has occurred?

A.
Motion detectors
A.
Motion detectors
Answers
B.
Radio frequency identification tags
B.
Radio frequency identification tags
Answers
C.
Tamper evident seal
C.
Tamper evident seal
Answers
D.
Locking racks
D.
Locking racks
Answers
Suggested answer: C

Explanation:

A tamper evident seal is a device or material that provides a visible indication of unauthorized access to physical internal hardware. Tamper evident seals can be stickers, labels, tapes, locks, or seals that are designed to break, tear, or change color when someone tries to open, remove, or tamper with them. Tamper evident seals can help deter and detect physical security breaches, such as theft, vandalism, or sabotage of hardware devices12. Tamper evident seals can also provide evidence for forensic analysis and legal action3.

Reference

1 - What Is Hardware Security? Definition, Threats, and Best Practices

2 - Device Physical Security Guideline | Information Security Office

3 - What is unauthorized physical access? -- Heimduo

A network engineer installed a new fiber uplink for an office and wants to make sure that the link meets throughput requirements. Which of the following tools should the engineer use to verify that the new link is sufficient?

A.
tcpdump
A.
tcpdump
Answers
B.
ping
B.
ping
Answers
C.
iperf
C.
iperf
Answers
D.
netstat
D.
netstat
Answers
Suggested answer: C

Explanation:

iperf is a tool that can measure the bandwidth and quality of a network link by generating and transferring TCP or UDP data streams. iperf can report the maximum achievable throughput, packet loss, jitter, and other statistics for a given link. iperf can be used to test both the uplink and downlink performance of a network link by running it on two endpoints and specifying the direction and duration of the test. iperf can help the engineer verify that the new fiber uplink meets the throughput requirements for the office network.

tcpdump is a tool that can capture and analyze network traffic by filtering and displaying packets based on various criteria. tcpdump can help the engineer troubleshoot network problems, monitor network activity, and inspect packet contents, but it cannot measure the throughput or quality of a network link.

ping is a tool that can test the reachability and latency of a network host by sending and receiving ICMP echo packets. ping can help the engineer check if the new fiber uplink is connected and responsive, and how long it takes for packets to travel between the endpoints, but it cannot measure the throughput or quality of a network link.

netstat is a tool that can display information about the network connections, routing tables, interfaces, and protocols on a network host. netstat can help the engineer view the status and details of the network connections using the new fiber uplink, but it cannot measure the throughput or quality of a network link.

Reference

iperf - The ultimate speed test tool for TCP, UDP and SCTP

How to use iperf to test local network LAN speed in Windows 10

How to Test Network Performance Between Two Linux Servers

What is tcpdump?

8 Common Network Utilities Explained

Monitoring Your Network: ping, netstat, tcpdump, and Ethereal

Netstat vs. Nmap vs. Netcat: Understanding the Differences

A network administrator wants to know which systems on the network are at risk of a known vulnerability. Which of the following should the administrator reference?

A.
SLA
A.
SLA
Answers
B.
Patch management policy
B.
Patch management policy
Answers
C.
NDA
C.
NDA
Answers
D.
Site survey report
D.
Site survey report
Answers
E.
CVE
E.
CVE
Answers
Suggested answer: E

Explanation:

A Common Vulnerabilities and Exposures (CVE) is a publicly available database of known security vulnerabilities and exposures that affect various software and hardware products. A CVE entry provides a standardized identifier, a brief description, and references to related sources of information for each vulnerability or exposure. A network administrator can reference the CVE database to check if any of the systems on the network are affected by a known vulnerability, and if so, what are the potential impacts and mitigations.

A Service Level Agreement (SLA) is a contract between a service provider and a customer that defines the expected level and quality of service, such as availability, performance, and security. An SLA does not provide information on specific vulnerabilities or exposures affecting the systems or services.

A Patch Management Policy is a set of rules and procedures that govern how patches are applied to systems and software to fix bugs, improve functionality, or address security issues. A patch management policy can help prevent or reduce the risk of vulnerabilities or exposures, but it does not provide information on specific vulnerabilities or exposures affecting the systems or software.

A Non-Disclosure Agreement (NDA) is a legal contract between two or more parties that prohibits the disclosure of confidential or proprietary information to unauthorized parties. An NDA does not provide information on specific vulnerabilities or exposures affecting the systems or information.

A Site Survey Report is a document that summarizes the results of a physical inspection and assessment of a network site, such as the layout, infrastructure, equipment, and environmental conditions. A site survey report can help identify and resolve potential network issues, such as interference, signal strength, or coverage, but it does not provide information on specific vulnerabilities or exposures affecting the network devices or software.

Reference

What is CVE?

What is a Service Level Agreement (SLA)?

Guide to Enterprise Patch Management Planning

NDA, MSA, SOW and SLA. Confidentiality agreements when you outsource QA

Site Survey Report

Which of the following best describes the purpose of an access control vestibule?

A.
To mitigate an on-path attack
A.
To mitigate an on-path attack
Answers
B.
To mitigate tailgating
B.
To mitigate tailgating
Answers
C.
To mitigate phishing
C.
To mitigate phishing
Answers
D.
To mitigate snooping
D.
To mitigate snooping
Answers
Suggested answer: B

Explanation:

An access control vestibule, also known as a mantrap, is a physical security access control system that consists of a small space with two sets of interlocking doors. The first set of doors must close before the second set opens, preventing unauthorized individuals from following authorized individuals into facilities with controlled access. This activity, also known as tailgating, results in unauthorized access to the facility. An access control vestibule can help deter and detect tailgating attempts, as well as provide a containment area while authorization for physical access is verified.

Reference

Access Control Vestibules: Types and Peculiarities

Mantrap (access control)

PE-3 (8): Access Control Vestibules

Total 865 questions
Go to page: of 87