ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 85

Question list
Search
Search

List of questions

Search

Related questions











A network engineer is installing APs for a SOHO where every staff member uses a cordless phone. Which of the following standards would work best to reduce interference?

A.
802.11a
A.
802.11a
Answers
B.
802.11b
B.
802.11b
Answers
C.
802.11g
C.
802.11g
Answers
D.
802.1X
D.
802.1X
Answers
Suggested answer: A

Explanation:

The network engineer is installing Access Points (APs) for a Small Office/Home Office (SOHO) where every staff member uses a cordless phone. The goal is to reduce interference. Let's evaluate the options:

802.11a: Operates in the 5 GHz frequency band. It provides higher data rates but has shorter range and poorer penetration through walls due to its higher frequency. It is less likely to interfere with cordless phones.

802.11b: Operates in the 2.4 GHz frequency band. It has slower data rates but better range and wall penetration. However, it shares the same frequency band with many cordless phones, microwave ovens, and other devices, leading to potential interference.

802.11g: Also operates in the 2.4 GHz frequency band. It provides higher data rates than 802.11b but maintains backward compatibility with 802.11b devices. Like 802.11b, it shares the same frequency band with cordless phones and other devices.

802.1X: This is not a wireless standard. It is an authentication protocol used for network access control.

Given the scenario,802.11awould work best to reduce interference because it operates in the 5 GHz band, which is less crowded and less likely to overlap with cordless phones.

Which of the following is most closely associated with the management plane?

A.
Routing table
A.
Routing table
Answers
B.
Current configuration
B.
Current configuration
Answers
C.
File operations
C.
File operations
Answers
D.
Console port
D.
Console port
Answers
Suggested answer: B

Explanation:

The management plane is responsible for managing and controlling network devices. Let's evaluate the options:

Routing table: Part of the control plane, used for making forwarding decisions.

Current configuration: Part of the management plane. It includes settings, access control lists, and other configuration details.

File operations: Typically part of the management plane. It involves tasks like uploading/downloading configurations, firmware updates, and backups.

Console port: Also part of the management plane. It provides direct access to the device for configuration and troubleshooting.

Among the options, the one most closely associated with the management plane is thecurrent configuration.

Which of the following attacks can be effectively protected against by using techniques to check if a connection was made by a human user? (Select two).

A.
Brute-force
A.
Brute-force
Answers
B.
Dictionary
B.
Dictionary
Answers
C.
On-path attack
C.
On-path attack
Answers
D.
Phishing
D.
Phishing
Answers
E.
Shoulder surfing
E.
Shoulder surfing
Answers
F.
Evil twin
F.
Evil twin
Answers
Suggested answer: A, B

Explanation:

Techniques to check if a connection was made by a human user, such as CAPTCHAs, are effective against automated attacks like:

A . Brute-force: This attack method involves trying many passwords or passphrases with the hope of eventually guessing correctly.

B . Dictionary: Similar to brute-force, this attack uses a list of words to attempt to guess passwords or encryption keys.

These techniques are not designed to protect against:

C . On-path attack: Previously known as a man-in-the-middle attack, where the attacker intercepts communication between two parties.

D . Phishing: A social engineering attack aiming to trick users into giving up sensitive information.

E . Shoulder surfing: Direct observation techniques, such as looking over someone's shoulder to get information.

F . Evil twin: A rogue Wi-Fi access point that appears legitimate but is set up to eavesdrop on wireless communications.

An engineer recently installed a new distribution switch and connected two servers provisioned with the following IPs: 192.168.17.20 and 192.168.17.30. The servers cannot connect to the Internet, but they can reach themselves. The engineer observes that the distribution switch has the following setup:

The engineer is able to reach the core router 192.168.17.1 from the distribution switch. Which of the following is the most likely cause of this issue?

A.
A routing loop has occurred.
A.
A routing loop has occurred.
Answers
B.
The subne1 mask is Incorrect.
B.
The subne1 mask is Incorrect.
Answers
C.
The servers are not configured with default gateway.
C.
The servers are not configured with default gateway.
Answers
D.
There is an improper Layer 1 connection between the router and the ISP modem.
D.
There is an improper Layer 1 connection between the router and the ISP modem.
Answers
Suggested answer: C

Explanation:

The servers can communicate with each other but not the internet, indicating local network connectivity is fine. The distribution switch's VLAN and IP configuration are correct, and the engineer can reach the core router, suggesting the issue is not with the switch or the router. The most likely cause is that the servers do not have a default gateway configured, which is necessary for traffic to leave the local network and reach the internet.

Which of the following fields are negotiated during the three-way-handshake process? (Select three).

A.
Sequence number
A.
Sequence number
Answers
B.
MTU
B.
MTU
Answers
C.
Window size
C.
Window size
Answers
D.
MSS
D.
MSS
Answers
E.
TTL
E.
TTL
Answers
F.
Flags
F.
Flags
Answers
G.
Acknowledgment number
G.
Acknowledgment number
Answers
H.
CRC
H.
CRC
Answers
Suggested answer: A, C, G

Explanation:

During the TCP three-way handshake process, the following fields are negotiated:

A . Sequence number: Initial sequence numbers are established during the handshake to keep track of the segments in the communication.

C . Window size: This determines the amount of data that can be sent before receiving an acknowledgment.

G . Acknowledgment number: This confirms receipt of the data and also indicates the next expected byte.

The other options are not negotiated during the three-way handshake:

B . MTU (Maximum Transmission Unit): This is determined at the network layer and is not negotiated during the handshake.

D . MSS (Maximum Segment Size): This is communicated during the handshake but not negotiated; it's declared by the sender to inform the receiver of the maximum segment size it can handle.

E . TTL (Time To Live): This is set in each IP packet to limit its lifespan and is not negotiated during the handshake.

F- Flags: Specific flags are used during the handshake (SYN and ACK), but they are not ''negotiated'' per se.

H) CRC (Cyclic Redundancy Check): This is used for error-checking in frames at the data link layer and is not part of the three-way handshake.

A network technician plugged a workstation in to a network device. When the technician turned on the workstation, it was not connected at full duplex. Which of the following devices was the workstation connected to?

A.
Media converter
A.
Media converter
Answers
B.
Hub
B.
Hub
Answers
C.
Bridge
C.
Bridge
Answers
D.
Layer 3 switch
D.
Layer 3 switch
Answers
Suggested answer: B

Explanation:

Hubs operate athalf-duplex, meaning they can either send or receive data but not both simultaneously.

Full-duplex communication allows simultaneous transmission and reception, which is typically supported byswitchesandrouters.

Professor Messer's Network+ Study Guide

The cybersecurity department needs to monitor historical IP network traffic on the WAN interface of the outside router without installing network sensors. Which of the following would be best to allow the department to complete this task?

A.
Enabling NetFlow on the interface
A.
Enabling NetFlow on the interface
Answers
B.
Enabling SSH on the Interface
B.
Enabling SSH on the Interface
Answers
C.
Enabling SNMP on the interlace
C.
Enabling SNMP on the interlace
Answers
D.
Enabling 802.1Q on the Interface
D.
Enabling 802.1Q on the Interface
Answers
Suggested answer: A

Explanation:

NetFlowis a protocol that collects and analyzes network traffic data. It provides information about the source and destination of traffic, the volume of data, and other relevant details.

By enabling NetFlow on the WAN interface, the cybersecurity department can monitor historical traffic patterns without additional hardware or sensors.

Professor Messer's Network+ Study Guide

A company is implementing a secure remote access solution for multiple employees. Which of the following should the company use?

A.
Remote desktop connection
A.
Remote desktop connection
Answers
B.
Virtual desktop
B.
Virtual desktop
Answers
C.
Site-to-site VPN
C.
Site-to-site VPN
Answers
D.
Client-to-site VPN
D.
Client-to-site VPN
Answers
Suggested answer: D

Explanation:

A client-to-site VPN is a secure remote access solution that allows individual employees to connect to the company's network from remote locations1.This type of VPN creates a secure tunnel from the user's location to the company's network, ensuring that the data transmitted is secure and private

Which of the following is a hybrid routing protocol?

A.
BGP
A.
BGP
Answers
B.
RIPv2
B.
RIPv2
Answers
C.
OSPF
C.
OSPF
Answers
D.
EIGRP
D.
EIGRP
Answers
Suggested answer: D

Explanation:

Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol23.It combines the features of Distance Vector Routing Protocol (DVRP) and Link State Routing Protocol (LSRP), making it an effective solution for larger networks that require scalable and efficient routing

A network administrator wants all outgoing traffic to the internet to flow through a single device for web content inspection. Which of the following devices is the most appropriate?

A.
VPN headend
A.
VPN headend
Answers
B.
Router
B.
Router
Answers
C.
Proxy server
C.
Proxy server
Answers
D.
Load balancer
D.
Load balancer
Answers
Suggested answer: C

Explanation:

A proxy server is the most appropriate device for inspecting all outgoing traffic to the internet5.It acts as an intermediary between users and the internet, allowing the network administrator to inspect and control the content accessed by the users

Total 865 questions
Go to page: of 87