ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 84

Question list
Search
Search

List of questions

Search

Related questions











A network administrator is investigating a network connectivity issue. The administrator runs a command to view the status of the network cards. The administrator receives the following output:

Which of the following should the administrator troubleshoot based on the output?

A.
Physical layer components
A.
Physical layer components
Answers
B.
VLAN tagging configuration
B.
VLAN tagging configuration
Answers
C.
Buffers on the card filling up
C.
Buffers on the card filling up
Answers
D.
TCP/IP address settings
D.
TCP/IP address settings
Answers
Suggested answer: A

Explanation:

Based on the provided output, the administrator should troubleshootphysical layer components. Here's why:

The output shows statistics related to received packets, errors, dropped packets, overruns, and frame.

These statistics are related to the physical layer of network communication.

VLAN tagging, buffers, and TCP/IP address settings are not directly reflected in this output.

Therefore, the correct answer isA. Physical layer components

Users report that the network is slower than usual when accessing on-premises email. Which of the following should a network technician do to confirm the issue?

A.
Review the logging levels of network devices.
A.
Review the logging levels of network devices.
Answers
B.
Check the audit logs to see if users are accessing email.
B.
Check the audit logs to see if users are accessing email.
Answers
C.
Compare the network baselines to the current network status.
C.
Compare the network baselines to the current network status.
Answers
D.
Verify that users who are trying to access email have LDAP accounts.
D.
Verify that users who are trying to access email have LDAP accounts.
Answers
Suggested answer: C

Explanation:

To confirm the issue of slow network performance when accessing on-premises email, a network technician shouldcompare the network baselines to the current network status. Here's why:

Reviewing logging levels of network devices(Option A) may provide information about device behavior but won't directly confirm the email performance issue.

Checking audit logs(Option B) is useful for security purposes but doesn't specifically address network performance.

Verifying LDAP accounts(Option D) is relevant for authentication but doesn't directly relate to network performance.

Therefore, the correct answer isC. Compare the network baselines to the current network status

Which of the following describes a situation in which an employee knowingly allows someone access to a restricted area without verifying authentication?

A.
Piggybacking
A.
Piggybacking
Answers
B.
Tailgating
B.
Tailgating
Answers
C.
Shoulder surfing
C.
Shoulder surfing
Answers
D.
Phishing
D.
Phishing
Answers
Suggested answer: B

Explanation:

The situation in which an employee knowingly allows someone access to a restricted area without verifying authentication is calledTailgating. Here's why:

Piggybacking(Option A) refers to an unauthorized person following an authorized person into a secure area without their knowledge.

Shoulder surfing(Option C) involves someone observing sensitive information (such as passwords) by looking over another person's shoulder.

Phishing(Option D) is a form of social engineering where attackers deceive individuals into revealing confidential information.

Therefore, the correct answer isB. Tailgating

A systems administrator has two network switches that need to be cabled together via copper cabling. Neither of the switches support MDIX. Which of the following types of cables should the administrator use?

A.
Straight
A.
Straight
Answers
B.
Crossover
B.
Crossover
Answers
C.
Patch cable
C.
Patch cable
Answers
D.
Rollover
D.
Rollover
Answers
Suggested answer: B

Explanation:

Since neither of the switches supports MDIX, the systems administrator should use aCrossover cableto connect the two network switches via copper cabling. Here's why:

Straight cable(Option A) is used to connect different types of devices (e.g., switch to computer) and not switches to switches.

Crossover cable(Option B) is specifically designed for connecting similar devices (e.g., switch to switch, switch to hub) without MDIX support.

Patch cable(Option C) is a general term for Ethernet cables and doesn't specify whether it's straight or crossover.

Rollover cable(Option D) is used for console connections to network devices (e.g., connecting to a router or switch console port).

Therefore, the correct answer isB. Crossover

A network administrator is configuring DCHP and wants to explicitly set an IP address based on a MAC address. Which of the following should the administration use?

A.
Dynamic assignment
A.
Dynamic assignment
Answers
B.
Static IP on the server
B.
Static IP on the server
Answers
C.
IP helper
C.
IP helper
Answers
D.
Exclusion range
D.
Exclusion range
Answers
E.
Reservation
E.
Reservation
Answers
Suggested answer: E

Explanation:

The correct option for this scenario isE. Reservation. DHCP reservations allow the administrator to assign a specific IP address to a device based on its MAC address. This ensures that the device always receives the same IP address from the DHCP server.

Dynamic assignment: This is the default behavior of DHCP, where IP addresses are assigned dynamically from a pool of available addresses.

Static IP on the server: This is not related to DHCP reservations. A static IP address is manually configured on the device itself, not assigned by the DHCP server.

IP helper: IP helper is used to forward DHCP requests across different subnets, but it doesn't specifically address MAC-based IP assignment.

Exclusion range: Exclusion ranges are used to prevent certain IP addresses from being assigned dynamically by DHCP. They do not assign specific IP addresses based on MAC addresses.

Reservation: DHCP reservations allow the administrator to assign specific IP addresses to devices based on their MAC addresses. This ensures consistent IP assignments for specific devices.

CompTIA Network+ Certification Exam Objectives

A user is trying to map a network fileshare to a local drive and needs to open a firewall port for this traffic. Which of the following ports needs to be opened to accomplish this task?

A.
389
A.
389
Answers
B.
445
B.
445
Answers
C.
514
C.
514
Answers
D.
636
D.
636
Answers
Suggested answer: B

Explanation:

The correct port to open for mapping a network file share (such as SMB/CIFS) to a local drive isB. 445. Port 445 is used for Microsoft's SMB (Server Message Block) protocol, which facilitates file and printer sharing over a network.

Port 389: This is used for LDAP (Lightweight Directory Access Protocol) communication.

Port 514: This is used for syslog traffic.

Port 636: This is used for secure LDAP (LDAPS) communication.

Port 445: This is the standard port for SMB/CIFS (Common Internet File System) traffic. It allows for file and printer sharing between Windows devices.

CompTIA Network+ Certification Exam Objectives

A network administrator for receives a call about a network printer that is not working for a workstation. The network administrator verifies the printer is turned on. Given the following information:

Routers gateway IP: 10.0.0.1/25

Device: Printer

Which of the following should the administrator change to remediate this issue? (Select two).

A.
The subnet on the router
A.
The subnet on the router
Answers
B.
The IP address on the printer
B.
The IP address on the printer
Answers
C.
The subnet on the printer
C.
The subnet on the printer
Answers
D.
The IP address on the router
D.
The IP address on the router
Answers
E.
The subnet on the workstation
E.
The subnet on the workstation
Answers
Suggested answer: B, C

Explanation:

The printer should be on the same subnet as the workstation to communicate.

If the printer's IP address and subnet mask do not align with the workstation's network, it won't connect.

Adjusting the printer's IP address and subnet mask to match the network configuration will likely resolve the issue.

A company that replicated the production environment in a cloud environment is starting to use a load balancer to evenly distribute requests between both environments. Which of the following does this scenario best describe?

A.
High availability
A.
High availability
Answers
B.
NIC teaming
B.
NIC teaming
Answers
C.
FHRP
C.
FHRP
Answers
D.
Configuration backup
D.
Configuration backup
Answers
Suggested answer: A

Explanation:

High availability refers to systems that are durable and likely to operate continuously without failure for a long time.

Using a load balancer to distribute requests between production and cloud environments ensures that if one environment fails, the other can take over, thus providing high availability.

A technician is documenting an application that is installed on a server and needs to verify all existing web and database connections to the server. Which of the following tools should the technician use to accomplish this task?

A.
Tracert
A.
Tracert
Answers
B.
Ipconfig
B.
Ipconfig
Answers
C.
Netstat
C.
Netstat
Answers
D.
nslookup
D.
nslookup
Answers
Suggested answer: C

Explanation:

The correct tool for verifying existing network connections on a server isC. Netstat. Netstat (network statistics) displays active network connections, routing tables, interface statistics, masquerade connections, and multicast memberships.

Tracert: Tracert (traceroute) is used to trace the route taken by packets from the source to the destination. It helps identify the path and latency between routers.

Ipconfig: Ipconfig is used to view and manage IP configuration settings on a local machine (such as IP address, subnet mask, default gateway, etc.). It does not provide information about existing connections.

Netstat: Netstat displays active network connections, including listening ports, established connections, and associated processes. It's useful for troubleshooting and monitoring network activity.

Nslookup: Nslookup is used for DNS (Domain Name System) queries to resolve domain names to IP addresses. It does not provide information about existing connections.

CompTIA Network+ Certification Exam Objectives

A technician is troubleshooting a SQL database connection. After remotely connecting to the end client, the technician tests basic connectivity. Which of the following ports is available to connect via command-line interface?

A.
143
A.
143
Answers
B.
445
B.
445
Answers
C.
993
C.
993
Answers
D.
1521
D.
1521
Answers
Suggested answer: D

Explanation:

The correct port available for connecting to a SQL database via command-line interface isD. 1521. Port 1521 is the default port for Oracle Database connections using the Oracle Net Services (SQL*Net) protocol.

Port 143: This is used for IMAP (Internet Message Access Protocol) communication.

Port 445: This is used for Microsoft's SMB (Server Message Block) protocol (file and printer sharing).

Port 993: This is used for secure IMAP (IMAPS) communication.

Port 1521: This is the default port for Oracle Database connections using the Oracle Net Services (SQL*Net) protocol.

Total 865 questions
Go to page: of 87