ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 81

Question list
Search
Search

List of questions

Search

Related questions











A hacker used a packet sniffer on the network to capture the hardware address of the server. Which of the following types of attacks can the hacker perform now?

A.
Piggybacking
A.
Piggybacking
Answers
B.
MAC spoofing
B.
MAC spoofing
Answers
C.
Evil twin
C.
Evil twin
Answers
D.
VLAN hopping
D.
VLAN hopping
Answers
Suggested answer: B

Explanation:

MAC spoofing is a technique that allows a hacker to change the media access control (MAC) address of their network interface card (NIC) to impersonate another device on the network. By capturing the hardware address of the server, the hacker can spoof their MAC address to match the server's and bypass any MAC-based security measures, such as MAC filtering or MAC authentication. MAC spoofing can also be used to perform man-in-the-middle attacks, where the hacker intercepts and alters the traffic between two devices on the network.Reference:CompTIA Network+ N10-008 Cert Guide, Chapter 7, Section 7.3

A local company is planning to upgrade is current wireless network solution to achieve better performance and improve employees' experience. The solution will require a 5GHz radio band to support all current company devices. Which of the following should be considered as an option for the upgrade?

A.
802.11
A.
802.11
Answers
B.
802.11b
B.
802.11b
Answers
C.
802.11n
C.
802.11n
Answers
D.
802.11g
D.
802.11g
Answers
Suggested answer: C

Explanation:

The802.11nstandard is the most suitable option for this scenario. It operates in both the 2.4GHz and 5GHz frequency bands, providing better performance and higher data rates compared to older standards like 802.11b and 802.11g.

802.11n(also known asWi-Fi 4): This standard supports multiple-input and multiple-output (MIMO) technology, which allows for better coverage, increased throughput, and improved reliability. It operates in both the 2.4GHz and 5GHz frequency bands, making it compatible with a wide range of devices. The 5GHz band provides less interference and higher data rates, making it suitable for modern networks.

802.11b: This older standard operates only in the 2.4GHz band and has a maximum data rate of 11 Mbps. It is not recommended for high-performance networks.

802.11g: This standard also operates in the 2.4GHz band and offers a maximum data rate of 54 Mbps. While it is faster than 802.11b, it is still not as efficient as 802.11n.

Professor Messer's Network+ Study Guide

CompTIA Network+ N10-008 Study Guide

An administrator is adjusting the routing policy to ensure the headquarters location can connect to a new out-of-state branch office via BGP. Which of the following types of networks is being described?

A.
PAN
A.
PAN
Answers
B.
MAN
B.
MAN
Answers
C.
LAN
C.
LAN
Answers
D.
WAN
D.
WAN
Answers
Suggested answer: D

Explanation:

The type of network being described here is aWAN (Wide Area Network). BGP (Border Gateway Protocol) is commonly used for routing between different autonomous systems (ASes) over large geographical distances, such as connecting branch offices across states or countries.

WAN (Wide Area Network): A WAN spans a large geographic area and connects multiple LANs (Local Area Networks) or other networks. It allows communication between distant locations, such as connecting branch offices, data centers, or remote sites. BGP is often used in WANs to exchange routing information between different ASes.

BGP (Border Gateway Protocol): BGP is an exterior gateway protocol used for routing between autonomous systems (ASes). It enables routers in different ASes to exchange information about network reachability and select optimal paths for data transmission.

A Chief Information Officer is concerned about environmental issues in the data center at corporate headquarters. Which of the following are the most common sensors installed in a data center? (Select two).

A.
Carbon monoxide
A.
Carbon monoxide
Answers
B.
Air flow
B.
Air flow
Answers
C.
Flooding
C.
Flooding
Answers
D.
Humidity
D.
Humidity
Answers
E.
Electrical
E.
Electrical
Answers
F.
Temperature
F.
Temperature
Answers
Suggested answer: D, F

Explanation:

The most common sensors installed in a data center to monitor environmental issues include:

Temperature Sensors: These sensors monitor the ambient temperature within the data center. Maintaining an optimal temperature is crucial for the proper functioning of servers and other equipment.

Humidity Sensors: These sensors measure the humidity levels. High humidity can cause condensation, leading to equipment damage, while low humidity can cause static electricity buildup.

1:CompTIA Network+ Certification Exam Objectives (N10-008)

Which of the following VPN types provides the highest security (or a user who travels often but also has the highest bandwidth requirements to provide a satisfactory user experience?

A.
Full-tunnel
A.
Full-tunnel
Answers
B.
Site-to-site
B.
Site-to-site
Answers
C.
Clientless
C.
Clientless
Answers
D.
Split-tunnel
D.
Split-tunnel
Answers
Suggested answer: A

Explanation:

The VPN type that provides the highest security for a user who travels often and has high bandwidth requirements is theFull-tunnel VPN. Here's why:

Full-Tunnel VPN:

Alltraffic from the user's device is encrypted and sent through the VPN tunnel to the corporate network.

Providesmaximum securitybecause even internet-bound traffic is routed through the corporate network.

However, it may result inhigher latencydue to the additional routing.

Bandwidth requirements are met, but performance may be impacted.

2:CompTIA Network+ Certification Exam Objectives (N10-008)

Which of the following copper wire standards utilizes four pairs of wires to achieve Gigabit Ethernet speeds?

A.
1000BASE-FX
A.
1000BASE-FX
Answers
B.
1000BASE-T
B.
1000BASE-T
Answers
C.
1000BASE-LR
C.
1000BASE-LR
Answers
D.
1000BASE-SX
D.
1000BASE-SX
Answers
Suggested answer: B

Explanation:

The correct answer is 1000BASE-T. This standard is part of the Ethernet technologies and uses four pairs of Category 5 or higher copper cables. It's designed to support networks at Gigabit Ethernet speeds up to 1000 Mbps (1 Gbps) over distances up to 100 meters. Unlike the other options listed, which pertain to fiber optic cable standards (1000BASE-FX, 1000BASE-LR, and 1000BASE-SX), 1000BASE-T is the only one utilizing copper wiring, making it the suitable choice for this question.

Which of the following routing protocols uses bandwidth and delay as the primary metrics to calculate the best path?

A.
EIGRP
A.
EIGRP
Answers
B.
RIP
B.
RIP
Answers
C.
OSPF
C.
OSPF
Answers
D.
BGP
D.
BGP
Answers
Suggested answer: A

Explanation:

Enhanced Interior Gateway Routing Protocol (EIGRP) uses bandwidth and delay as its primary metrics to determine the best path for routing traffic. EIGRP is an advanced distance-vector routing protocol, which is proprietary to Cisco systems, making it highly efficient in a variety of network designs. It can also utilize load, reliability, and maximum transmission unit (MTU) as additional metrics, but bandwidth and delay are the primary considerations in its composite metric calculation. Other protocols listed, such as RIP, OSPF, and BGP, use different metrics like hop count (RIP) and cost based on link state (OSPF), or make decisions based on path attributes and policy (BGP).

A user is having trouble uploading files to a server. However, other users in the department are not experiencing this issue. The network administrator checks the access switch and sees multiple CRC errors on that user's switchport. Which of the following should the network administrator do first?

A.
Replace the uplink cable for the access switch.
A.
Replace the uplink cable for the access switch.
Answers
B.
Replace the user's network cable.
B.
Replace the user's network cable.
Answers
C.
Replace the NIC for the user's PC.
C.
Replace the NIC for the user's PC.
Answers
D.
Replace the access switch.
D.
Replace the access switch.
Answers
Suggested answer: B

Explanation:

When a network administrator observes CRC errors on a specific switchport associated with one user, the first troubleshooting step recommended is to replace the user's network cable. CRC errors are often indicative of physical layer issues such as noise, interference, or damaged cables. By replacing the network cable, the administrator can potentially resolve these errors without more drastic measures like replacing hardware components (NIC, switch, or uplink cables), which could be more costly and less effective as initial steps. This approach minimizes downtime and is a cost-effective first step in the troubleshooting process.

A trusted vendor emailed a security advisory to an engineer. The advisory listed publicly disclosed security issues and resolutions for the vendor's installed network devices. Which of the following describes this security concept?

A.
CVE
A.
CVE
Answers
B.
Exploits
B.
Exploits
Answers
C.
Zero day
C.
Zero day
Answers
D.
SSO
D.
SSO
Answers
Suggested answer: A

Explanation:

The term 'CVE' stands for Common Vulnerabilities and Exposures. It is a reference method used for publicly known security vulnerabilities. When a vendor issues a security advisory about vulnerabilities in their products, they often include CVE identifiers. These advisories help users understand the specific issues and apply necessary resolutions or patches. Unlike the other options, CVE specifically relates to the identification and cataloging of known vulnerabilities, making it the correct choice in the context of a vendor sending out a security advisory listing issues and their resolutions.

A customer is having issues accessing local resources on the network. A technician questions the user and discovers that a small switch had been taken out of storage and installed so that additional devices could be connected in the room. The technician runs the ping command from the PC to the network server and does not find any issues. However, data transfers to the server are slow, and the transfer appears to be locked up at times. Which of the following is the most likely cause of the issue?

A.
Duplexing mismatch
A.
Duplexing mismatch
Answers
B.
Reversed TX/RX pinouts
B.
Reversed TX/RX pinouts
Answers
C.
Cable crosstalk
C.
Cable crosstalk
Answers
D.
Failed transceiver
D.
Failed transceiver
Answers
Suggested answer: A

Explanation:

A duplex mismatch is the most probable cause of the issues described, where the network connection experiences slow data transfers and intermittent lockups. This occurs when one device in a network connection operates in full-duplex mode and the other in half-duplex, leading to collisions and performance issues. In the scenario provided, the small switch taken from storage may not have been configured to match the duplex settings of the existing network, resulting in these data transfer issues. Other options like reversed TX/RX pinouts, cable crosstalk, or a failed transceiver would typically result in complete connection failures or consistent degradation, not intermittent issues as described.

Total 865 questions
Go to page: of 87