ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 80

Question list
Search
Search

List of questions

Search

Related questions











A company realizes that only half of its employees work in the office, and the employees who work from home no longer need a computer at the office. Which of the following security measures should the network administrator implement when removing a computer from a cubicle?

A.
Disable DHCP on the computer being removed.
A.
Disable DHCP on the computer being removed.
Answers
B.
Place the switch port in a private VLAN.
B.
Place the switch port in a private VLAN.
Answers
C.
Apply a firewall rule to block the computer's IP address.
C.
Apply a firewall rule to block the computer's IP address.
Answers
D.
Remove the employee's network access.
D.
Remove the employee's network access.
Answers
Suggested answer: D

Explanation:

The best security measure to implement when removing a computer from a cubicle is to remove the employee's network access. This will prevent the employee from accessing any network resources or data from the computer, as well as prevent any unauthorized users from using the computer to access the network. Removing the employee's network access can be done by deleting or disabling the user account, revoking the credentials, or changing the permissions.

The other options are not as effective or necessary as removing the employee's network access. They are:

* Disabling DHCP on the computer being removed will prevent the computer from obtaining an IP address from the network, but it will not prevent the computer from using a static IP address or accessing the network through another device.

* Placing the switch port in a private VLAN will isolate the computer from other devices on the network, but it will not prevent the computer from accessing the network through another port or device.

* Applying a firewall rule to block the computer's IP address will prevent the computer from communicating with the network, but it will not prevent the computer from changing its IP address or accessing the network through another device.

Reference

1: CompTIA Network+ N10-008 Cert Guide - O'Reilly Media

2: Network+ (Plus) Certification | CompTIA IT Certifications

3: 10 Ways to Secure Office Workstations - Computer Security

Which of the following ports should a network administrator enable for encrypted log-in to a network switch?

A.
22
A.
22
Answers
B.
23
B.
23
Answers
C.
80
C.
80
Answers
D.
123
D.
123
Answers
Suggested answer: A

Explanation:

Port 22 is used by Secure Shell (SSH), which is a protocol that provides a secure and encrypted method for remote access to hosts by using public-key cryptography and challenge-response authentication. SSH can be used to log in to a network switch and configure it without exposing the credentials or commands to eavesdropping or tampering. Port 23 is used by Telnet, which is an insecure and plaintext protocol for remote access. Port 80 is used by HTTP, which is a protocol for web communication.Port 123 is used by NTP, which is a protocol for time synchronization

A network engineer is designing a secure communication link between two sites The entire data stream needs to remain confidential. Which of the following will achieve this goal?

A.
GRE
A.
GRE
Answers
B.
IKE
B.
IKE
Answers
C.
ESP
C.
ESP
Answers
D.
AH
D.
AH
Answers
Suggested answer: C

Explanation:

ESP stands for Encapsulating Security Payload, and it is a protocol that provides confidentiality, integrity, and authentication for IP packets. ESP encrypts the payload of the IP packet, which contains the data stream, and adds a header and a trailer that contain security information. ESP can be used to create a secure communication link between two sites by using a VPN tunnel that protects the data stream from unauthorized access or modification. GRE stands for Generic Routing Encapsulation, and it is a protocol that encapsulates one network protocol inside another. GRE does not provide encryption or security by itself, but it can be combined with ESP or other protocols to create a secure VPN tunnel. IKE stands for Internet Key Exchange, and it is a protocol that negotiates and establishes security associations for IPsec, which is a suite of protocols that includes ESP and AH. IKE does not encrypt or protect the data stream, but it enables the secure exchange of keys and parameters for IPsec. AH stands for Authentication Header, and it is a protocol that provides integrity and authentication for IP packets. AH does not encrypt the payload of the IP packet, which means the data stream is not confidential.AH adds a header that contains security information and a checksum that verifies the integrity of the packet

Which of the following is the most secure connection used to inspect and provide controlled internet access when remote employees are connected to the corporate network?

A.
Site-to-site VPN
A.
Site-to-site VPN
Answers
B.
Full-tunnel VPN
B.
Full-tunnel VPN
Answers
C.
Split-tunnel VPN
C.
Split-tunnel VPN
Answers
D.
SSH
D.
SSH
Answers
Suggested answer: B

Explanation:

A full-tunnel VPN is a type of virtual private network (VPN) that encrypts and routes all the traffic from the remote device to the corporate network, regardless of the destination or protocol. This provides a secure connection for the remote employees to access the corporate resources, as well as inspect and control the internet access through the corporate firewall and proxy servers. A full-tunnel VPN also prevents any leakage of sensitive data or exposure to malicious attacks from the public internet. A full-tunnel VPN is more secure than a split-tunnel VPN, which only encrypts and routes the traffic destined for the corporate network, while allowing the traffic for other destinations to bypass the VPN and use the local internet connection. A site-to-site VPN is a type of VPN that connects two or more networks, such as branch offices or data centers, over the internet. It is not suitable for connecting individual remote employees to the corporate network. SSH stands for Secure Shell, and it is a protocol that allows secure remote login and command execution over an encrypted channel. It is not a type of VPN, and it does not provide controlled internet access.Reference:CompTIA Network+ N10-008 Cert Guide, Chapter 5, Section 5.3

Which of the following devices and encapsulations are found at the data link layer? (Select two).

A.
Session
A.
Session
Answers
B.
Frame
B.
Frame
Answers
C.
Firewall
C.
Firewall
Answers
D.
Switch
D.
Switch
Answers
E.
Packet
E.
Packet
Answers
F.
Router
F.
Router
Answers
Suggested answer: B, D

Explanation:

A frame is a unit of data that is transmitted at the data link layer of the OSI model. A frame consists of a header, a payload, and a trailer. The header contains information such as the source and destination MAC addresses, the frame type, and the error detection code. The payload contains the data from the upper layer protocols, such as IP packets. The trailer contains the frame check sequence, which is used to verify the integrity of the frame. A switch is a device that operates at the data link layer of the OSI model. A switch forwards frames based on the MAC addresses of the devices connected to its ports. A switch can create separate collision domains and reduce network congestion. A switch can also implement VLANs, which are logical groups of devices that share the same broadcast domain, regardless of their physical location. A session is a logical connection between two or more devices that allows the exchange of data at the transport layer of the OSI model. A session is not a device or an encapsulation at the data link layer. A firewall is a device that operates at the network layer or the application layer of the OSI model. A firewall filters packets based on the IP addresses, ports, protocols, or application rules. A firewall is not a device or an encapsulation at the data link layer. A packet is a unit of data that is transmitted at the network layer of the OSI model. A packet consists of a header and a payload. The header contains information such as the source and destination IP addresses, the protocol type, and the hop count. The payload contains the data from the upper layer protocols, such as TCP segments. A packet is not an encapsulation at the data link layer. A router is a device that operates at the network layer of the OSI model. A router forwards packets based on the IP addresses and the routing table. A router can create separate broadcast domains and connect different networks. A router is not a device or an encapsulation at the data link layer.Reference:CompTIA Network+ N10-008 Cert Guide, Chapter 2, Section 2.2andCompTIA Network+ N10-008 Cert Guide, Chapter 3, Section 3.1

A network technician must connect a newly installed access switch in a warehouse to the distribution switch in the telecommunications closet. The distance between the two switches is 1,640ft (500m). Which of the following is the best cable choice?

A.
Fiber
A.
Fiber
Answers
B.
Cat 5e
B.
Cat 5e
Answers
C.
Cat 6a
C.
Cat 6a
Answers
D.
Coaxial
D.
Coaxial
Answers
Suggested answer: A

Explanation:

Fiber is the best cable choice for long distances, as it can transmit data over 1,640ft (500m) without significant signal loss or interference. Fiber is also immune to electromagnetic interference and can support higher bandwidths than copper cables. Cat 5e and Cat 6a are copper cables that have a maximum distance of 328ft (100m) for Ethernet networks. Coaxial cable is also a copper cable that can reach longer distances, but it is mainly used for cable TV and not for Ethernet networks.

A network administrator is preparing new switches that will be deployed to support a network extension project. The lead network engineer has already provided documentation to ensure the switches are set up properly Which of the following did the engineer most likely provide?

A.
Physical network diagram
A.
Physical network diagram
Answers
B.
Site survey reports
B.
Site survey reports
Answers
C.
Baseline configurations
C.
Baseline configurations
Answers
D.
Logical network diagram
D.
Logical network diagram
Answers
Suggested answer: C

Explanation:

Baseline configurations are the standard settings and parameters that are applied to network devices, such as switches, routers, firewalls, etc., to ensure consistent performance, security, and functionality across the network. Baseline configurations can include aspects such as IP addresses, VLANs, passwords, protocols, access lists, firmware versions, etc. Baseline configurations are usually documented and updated regularly to reflect any changes or modifications made to the network devices.

The lead network engineer most likely provided baseline configurations to the network administrator to ensure that the new switches are set up properly and in accordance with the network design and policies. Baseline configurations can help to simplify the deployment process, reduce errors and inconsistencies, and facilitate troubleshooting and maintenance.

The other options are not correct because they are not the most likely documentation that the lead network engineer provided to the network administrator. They are:

Physical network diagram. A physical network diagram is a graphical representation of the physical layout and connections of the network devices and components, such as cables, ports, switches, routers, servers, etc. A physical network diagram can help to visualize the network topology, identify the locations and distances of the devices, and plan for cabling and power requirements. However, a physical network diagram does not provide the specific settings and parameters that need to be configured on the network devices, such as the switches.

Site survey reports. A site survey report is a document that summarizes the findings and recommendations of a site survey, which is a process of assessing the suitability and readiness of a location for installing and operating network devices and components. A site survey report can include aspects such as environmental conditions, power and cooling availability, security and safety measures, interference and noise sources, signal coverage and quality, etc. A site survey report can help to identify and resolve any potential issues or challenges that may affect the network performance and reliability. However, a site survey report does not provide the specific settings and parameters that need to be configured on the network devices, such as the switches.

Logical network diagram. A logical network diagram is a graphical representation of the logical structure and functionality of the network devices and components, such as subnets, IP addresses, VLANs, protocols, routing, firewall rules, etc. A logical network diagram can help to understand the network design, architecture, and policies, as well as the data flow and communication paths between the devices. However, a logical network diagram does not provide the specific settings and parameters that need to be configured on the network devices, such as the switches.

Reference 1:Network+ (Plus) Certification | CompTIA IT Certifications 2:What is a Baseline Configuration? - Definition from Techopedia 3:What is a Physical Network Diagram? - Definition from Techopedia 4:What is a Site Survey? - Definition from Techopedia 5: [What is a Logical Network Diagram? - Definition from Techopedia]

A support agent receives a report that a remote user's wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user's coaxial modem has a signal power of -97dB Which of the following should the support agent recommend to troubleshoot the issue?

A.
Removing any splitters connected to the line
A.
Removing any splitters connected to the line
Answers
B.
Switching the devices to wireless
B.
Switching the devices to wireless
Answers
C.
Moving the devices closer to the modern
C.
Moving the devices closer to the modern
Answers
D.
Lowering the network speed
D.
Lowering the network speed
Answers
Suggested answer: A

Explanation:

A splitter is a device that divides a coaxial cable into two or more branches, allowing multiple devices to share the same cable connection. However, a splitter also reduces the signal strength and quality of the cable, which can affect the performance and reliability of the devices connected to it. A signal power of -97dB is very low and indicates a weak or poor cable signal, which can cause constant disconnections and slow speeds.

The support agent should recommend removing any splitters connected to the line and connecting the coaxial modem directly to the cable outlet. This can help to improve the signal power and quality of the cable, and thus enhance the performance and reliability of the wired devices. Alternatively, the support agent can also suggest using a signal amplifier or booster, which is a device that increases the signal strength and quality of the cable, to compensate for the signal loss caused by the splitter.

The other options are not correct because they are not the best recommendations to troubleshoot the issue. They are:

Switching the devices to wireless. Switching the devices to wireless may not solve the issue, as the wireless connection may also depend on the cable signal and quality. Moreover, switching the devices to wireless may introduce other problems, such as interference, security, or compatibility issues, that can affect the performance and reliability of the devices.

Moving the devices closer to the modem. Moving the devices closer to the modem may not solve the issue, as the problem is not related to the distance between the devices and the modem, but to the signal power and quality of the cable. Moreover, moving the devices closer to the modem may not be feasible or convenient for the user, depending on the layout and setup of the location.

Lowering the network speed. Lowering the network speed may not solve the issue, as the problem is not related to the bandwidth or capacity of the network, but to the signal power and quality of the cable. Moreover, lowering the network speed may degrade the user experience and satisfaction, as the user may not be able to access or use the network services or applications as expected.

Reference 1:Network+ (Plus) Certification | CompTIA IT Certifications 2:What is a Coaxial Splitter? - Definition from Techopedia 3:What is a Signal Amplifier? - Definition from Techopedia

Which of the following routing technologies is used to prevent network failure at the gateway by protecting data traffic from a failed router?

A.
BGP
A.
BGP
Answers
B.
OSPF
B.
OSPF
Answers
C.
EIGRP
C.
EIGRP
Answers
D.
FHRP
D.
FHRP
Answers
Suggested answer: D

Explanation:

FHRP stands for First Hop Redundancy Protocol, and it is a group of protocols that allow routers to work together to provide backup or failover for the default gateway in a network. FHRP can prevent network failure at the gateway by protecting data traffic from a failed router and ensuring that there is always an active router to forward packets.Some examples of FHRP protocols are HSRP, VRRP, and GLBP12.

A technician is expanding a wireless network and adding new access points. The company requires that each access point broadcast the same SSID. Which of the following should the technician implement for this requirement?

A.
MIMO
A.
MIMO
Answers
B.
Roaming
B.
Roaming
Answers
C.
Channel bonding
C.
Channel bonding
Answers
D.
Extended service set
D.
Extended service set
Answers
Suggested answer: D

Explanation:

An extended service set (ESS) is a wireless network that consists of two or more access points (APs) that share the same SSID and are connected by a distribution system, such as a switch or a router. An ESS allows wireless clients to roam seamlessly between different APs without losing connectivity or changing network settings.An ESS can also increase the coverage area and capacity of a wireless network

Total 865 questions
Go to page: of 87