ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 83

Question list
Search
Search

List of questions

Search

Related questions











An attacker is using an unknown vulnerability that allows malicious actors to utilize the print spooler to gain system privileges on a computer. Which of the following is this scenario an example of?

A.
Honeypot
A.
Honeypot
Answers
B.
Zero-day attack
B.
Zero-day attack
Answers
C.
Internal threat
C.
Internal threat
Answers
D.
External threat
D.
External threat
Answers
Suggested answer: B

Explanation:

A zero-day attack refers to an attack that exploits a previously unknown vulnerability in a software or system, which developers have had zero days to fix. In this scenario, the attacker is using an unknown vulnerability in the print spooler to gain elevated system privileges, which is a classic example of a zero-day attack. This term specifically denotes the unexpected nature of the attack and the absence of a patch or workaround at the time of discovery. Honeypots, internal threats, and external threats refer to different aspects of cybersecurity and do not specifically describe the exploitation of unknown vulnerabilities.

Which of the following is the best way to remotely monitor who is accessing a secure data center?

A.
Access control vestibule
A.
Access control vestibule
Answers
B.
Cameras
B.
Cameras
Answers
C.
Employee training
C.
Employee training
Answers
D.
Biometrics
D.
Biometrics
Answers
Suggested answer: B

Explanation:

Cameras are the best tool for remotely monitoring who is accessing a secure data center. They provide real-time visual verification of individuals entering and exiting the facility and can be monitored remotely to ensure security protocols are followed. Access control vestibules, employee training, and biometrics are also important for security but do not offer the same continuous, visual monitoring capability that cameras do. Cameras also serve as a deterrent to unauthorized access and can provide forensic evidence in the event of a security breach.

Staff members notify a network technician that the wireless network is not working as expected and connectivity to wireless devices is intermittent. Some devices connect but then disconnect. The technician reviews the logs on the WAP controller and identifies thousands of connection attempts from unrecognized devices within a short amount of time. Which of the following is the most likely reason for the wireless network connectivity issue?

A.
Wrong SSID
A.
Wrong SSID
Answers
B.
Denial of service
B.
Denial of service
Answers
C.
Interference
C.
Interference
Answers
D.
Poor coverage
D.
Poor coverage
Answers
Suggested answer: B

Explanation:

The symptoms described---intermittent connectivity and thousands of connection attempts from unrecognized devices---strongly suggest a denial of service (DoS) attack. This type of attack typically involves overwhelming a network service with excessive requests, in this case to the wireless access point (WAP), which prevents legitimate network traffic from being processed effectively. Options like wrong SSID, interference, and poor coverage do not explain the high volume of connection attempts and are less likely to cause such a specific connectivity disruption pattern.

A user is experimenting with audio transmissions and would like the transmissions to reach several specific devices simultaneously over the IP network. The user requests assistance from a network technician to configure the appropriate features within the SOHO. Which of the following should the technician configure to meet the requirements?

A.
Unicast
A.
Unicast
Answers
B.
Multicast
B.
Multicast
Answers
C.
Anycast
C.
Anycast
Answers
D.
Broadcast
D.
Broadcast
Answers
Suggested answer: B

Explanation:

Multicast is the network communication method to use when audio transmissions need to reach several specific devices simultaneously over an IP network. It allows for efficient network use by directing a single stream of data to multiple recipients without needing to send separate streams to each recipient. Unicast sends data to a single destination, anycast sends data to the nearest or best destination in a group, and broadcast sends data to all devices in the network segment. Thus, multicast is most appropriate for the requirement described.

A network technician added a new workstation to the network and needs to make a custom, shielded cable that is 492ft (150m) with both ends wired to TIA/EIA-568A standards. The workstation is not establishing a link to the switchport. Which of the following is the cause of the issue?

A.
Cable shielding
A.
Cable shielding
Answers
B.
Attenuation
B.
Attenuation
Answers
C.
Incorrect pinout
C.
Incorrect pinout
Answers
D.
Near-end crosstalk
D.
Near-end crosstalk
Answers
Suggested answer: B

Explanation:

Attenuation, or the loss of signal strength over distance, is likely the cause of the issue with the 492ft (150m) cable not establishing a link to the switchport. Ethernet standards typically limit the length of copper Ethernet cables to approximately 328ft (100m) for standard performance. Exceeding this distance, as in the case of the 492ft cable, often results in insufficient signal strength to maintain a reliable connection. Options such as cable shielding, incorrect pinout, or near-end crosstalk do not directly relate to the problem described by the excessive cable length.

A network technician is working to deploy a new subnet to support 500 hosts. The technician needs to limit the number of unused IP addresses. Which of the following subnets should the technician choose?

A.
255.255.224.0
A.
255.255.224.0
Answers
B.
255.255.248.0
B.
255.255.248.0
Answers
C.
255.255.252.0
C.
255.255.252.0
Answers
D.
255.255.254.0
D.
255.255.254.0
Answers
Suggested answer: D

Explanation:

A/23subnet mask has23bits set to1(255.255.254.0).

The formula to calculate the number of usable host addresses in a subnet is2^(32 - subnet bits) - 2.

For a/23subnet:

32 - 23 = 9bits are available for host addresses.

2^9 - 2 = 510usable host addresses.

Professor Messer's Network+ Study Guide

CompTIA Network+ N10-008 Study Guide

Users al a company will require more bandwidth on their wireless laptops because of a migration to the cloud. The company's current infrastructure contains four 802.11n access points, which are creating a bottleneck. Hardware upgrades are not an option. Which of the following configurations will provide a solution?

A.
Increasing RSSi
A.
Increasing RSSi
Answers
B.
MIMO
B.
MIMO
Answers
C.
Channel bonding
C.
Channel bonding
Answers
D.
Reconfiguring SSID
D.
Reconfiguring SSID
Answers
Suggested answer: C

Explanation:

Given that hardware upgrades are not an option, the best configuration to provide a solution for increased bandwidth on wireless laptops isChannel bonding. Here's why:

Increasing RSSi: RSSi (Received Signal Strength Indicator) is related to signal strength but does not directly address bandwidth limitations.

MIMO (Multiple Input, Multiple Output): While MIMO improves throughput, it requires compatible hardware on both ends (access points and client devices). Since hardware upgrades are not allowed, MIMO is not a viable solution.

Channel bonding: This technique combines multiple adjacent channels to increase overall bandwidth. By using multiple channels simultaneously, the available bandwidth can be expanded without changing the hardware.

Reconfiguring SSID: Changing the SSID (Service Set Identifier) won't directly impact bandwidth; it only affects network identification.

Therefore, the correct answer isC. Channel bonding2.

A network technician needs to determine which RJ45 jack in a patch panel corresponds to the RJ45 drop in the Chief Executive Officer's office. Which of the following tools would be best for the technician to use?

A.
Fusion splicer
A.
Fusion splicer
Answers
B.
Cable tester
B.
Cable tester
Answers
C.
Tone generator
C.
Tone generator
Answers
D.
Spectrum analyzer
D.
Spectrum analyzer
Answers
Suggested answer: B

Explanation:

To determine which RJ45 jack in a patch panel corresponds to the RJ45 drop in the Chief Executive Officer's office, the best tool for the network technician to use is aCable tester. Here's why:

Fusion splicer: Used for joining optical fibers, not for identifying specific jacks.

Cable tester: This tool helps verify cable continuity, identify wiring faults, and match connections between patch panels and drops.

Tone generator: Used to trace cables by sending an audible tone through them, but it doesn't directly identify specific jacks.

Spectrum analyzer: Used for analyzing frequency components in signals, not for cable identification.

Therefore, the correct answer isB. Cable tester3.

A technician wants to assign addresses to PCs on a subnet that uses IPv4 and IPv6. The DHCP server only supports IPv4. Which of the following can the technician use to assign IPv6 addresses without DHCP?

A.
SLAAC
A.
SLAAC
Answers
B.
APIPA
B.
APIPA
Answers
C.
MAC reservation
C.
MAC reservation
Answers
D.
IPv4 to IPv6 tunnel
D.
IPv4 to IPv6 tunnel
Answers
Suggested answer: A

Explanation:

To assign IPv6 addresses without DHCP, the technician can useSLAAC (Stateless Address Autoconfiguration). Here's why:

SLAAC: Stateless Address Autoconfiguration allows devices to automatically configure their IPv6 addresses based on the network prefix advertised by routers. It doesn't rely on a central DHCP server for address assignment.

APIPA (Automatic Private IP Addressing): This is an IPv4 feature and not applicable for IPv6.

MAC reservation: This is related to DHCP and doesn't directly assign IPv6 addresses.

IPv4 to IPv6 tunnel: This is used for tunneling IPv6 traffic over an IPv4 network and doesn't address address assignment.

Therefore, the correct answer isA. SLAAC

A network consultant is working with a software-defined network and is troubleshooting an issue with an application's instructions being properly translated for the network components. Which of the following is most likely at fault?

A.
Infrastructure layer
A.
Infrastructure layer
Answers
B.
Session layer
B.
Session layer
Answers
C.
Control layer
C.
Control layer
Answers
D.
Application layer
D.
Application layer
Answers
Suggested answer: A

Explanation:

The issue with an application's instructions being properly translated for network components is most likely at theApplication layer. Here's why:

Infrastructure layer: This layer deals with physical components (e.g., switches, routers) and is unlikely to cause translation issues.

Session layer: Responsible for establishing, maintaining, and terminating communication sessions but not directly related to application instructions.

Control layer: Not a standard OSI layer; it's likely a misnomer.

Application layer: This layer handles application-specific protocols and data. Translation issues often occur here.

Therefore, the correct answer isD. Application laye

Total 865 questions
Go to page: of 87