ExamGecko
Home Home / CompTIA / N10-008

CompTIA N10-008 Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

A.
Scope options
A.
Scope options
Answers
B.
Reservation
B.
Reservation
Answers
C.
Dynamic assignment
C.
Dynamic assignment
Answers
D.
Exclusion
D.
Exclusion
Answers
E.
Static assignment
E.
Static assignment
Answers
Suggested answer: B

Explanation:

A reservation should be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP. A reservation is a feature of DHCP that allows an administrator to assign a fixed IP address to a device based on its MAC address. This way, the device will always receive the same IP address from the DHCP server, even if it is powered off or disconnected from the network for a long time. Reference: https://docs.microsoft.com/en-us/windows- server/troubleshoot/configure-dhcp-reservations

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?

A.
Motion detection
A.
Motion detection
Answers
B.
Access control vestibules
B.
Access control vestibules
Answers
C.
Smart lockers
C.
Smart lockers
Answers
D.
Cameras
D.
Cameras
Answers
Suggested answer: B

Explanation:

The most effective security mechanism against physical intrusions due to stolen credentials would likely be a combination of several of these options. However, of the options provided, the most effective security mechanism would probably be an access control vestibule. An access control vestibule is a secure area that is located between the outer perimeter of a facility and the inner secure area. It is designed to provide an additional layer of security by requiring that individuals pass through a series of security checks before being allowed access to the secure area. This could include biometric authentication, access card readers, and motion detection cameras. Access control vestibules allow the enforcement of the policy that access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. An access control vestibule is a physical security device that consists of two doors with an interlocking mechanism. Only one door can be opened at a time, and only one person can pass through each door. This prevents tailgating or piggybacking, where unauthorized persons follow authorized persons into a secure area. An access control vestibule can also be integrated with a card reader or other authentication system to record each individual’s access. Reference:

https://www.boonedam.us/blog/what-are-access-control-vestibules

A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

A.
10.1.2.0
A.
10.1.2.0
Answers
B.
10.1.2.1
B.
10.1.2.1
Answers
C.
10.1.2.23
C.
10.1.2.23
Answers
D.
10.1.2.255
D.
10.1.2.255
Answers
E.
10.1.2.31
E.
10.1.2.31
Answers
Suggested answer: D

Explanation:

The software on the workstation should be configured to send the query to 10.1.2.255, which is the local subnet broadcast address. A broadcast address is a special address that allows a device to send a message to all devices on the same subnet. It is usually derived by setting all the host bits to 1 in the network address. In this case, the network address is 10.1.2.0/27, which has 27 network bits and 5 host bits. By setting all the host bits to 1, we get 10.1.2.31 as the broadcast address in decimal notation, or 10.1.2.255 in dotted decimal notation. Reference:

https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html

After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?

A.
TTL
A.
TTL
Answers
B.
MX
B.
MX
Answers
C.
TXT
C.
TXT
Answers
D.
SOA
D.
SOA
Answers
Suggested answer: A

Explanation:

TTL (Time To Live) should be adjusted to address the issue of some visitors being unable to access the website after the A record was updated. TTL is a value that specifies how long a DNS record should be cached by DNS servers and clients before it expires and needs to be refreshed. If the TTL is too high, some DNS servers and clients may still use the old A record that points to the previous IP address of the website, resulting in connection failures. By lowering the TTL, the DNS servers and clients will update their cache more frequently and use the new A record that points to the current IP address of the website. Reference: https://www.cloudflare.com/learning/dns/dns-records/dns-ttl/

A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?

A.
CDMA
A.
CDMA
Answers
B.
CSMA/CD
B.
CSMA/CD
Answers
C.
CSMA/CA
C.
CSMA/CA
Answers
D.
GSM
D.
GSM
Answers
Suggested answer: C

Explanation:

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is an IEEE 802.11 standard that would be best to use for multiple simultaneous client access on a wireless network. CSMA/CA is a media access control method that allows multiple devices to share the same wireless channel without causing collisions or interference. It works by having each device sense the channel before transmitting data and waiting for an acknowledgment from the receiver after each transmission. If the channel is busy or no acknowledgment is received, the device will back off and retry later with a random delay. Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless- lan-wlan/82068-csma-ca.html

A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?

A.
Asset tags
A.
Asset tags
Answers
B.
A smart locker
B.
A smart locker
Answers
C.
An access control vestibule
C.
An access control vestibule
Answers
D.
A camera
D.
A camera
Answers
Suggested answer: A

Explanation:

Asset tags will allow the technician to record changes to new and old equipment when installing multiple UPS units in a major retail store. Asset tags are labels or stickers that are attached to physical assets such as computers, printers, servers, or UPS units. They usually contain information such as asset name, serial number, barcode, QR code, or RFID chip that can be scanned or read by an asset management system or software. Asset tags help track inventory, location, status, maintenance, and ownership of assets. Reference: https://www.camcode.com/asset-tags/asset- tagging-guide/

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?

A.
Implement file integrity monitoring.
A.
Implement file integrity monitoring.
Answers
B.
Change the default credentials.
B.
Change the default credentials.
Answers
C.
Use SSL encryption.
C.
Use SSL encryption.
Answers
D.
Update the web-server software.
D.
Update the web-server software.
Answers
Suggested answer: A

Explanation:

Implementing file integrity monitoring (FIM) would assist with detecting activities such as website defacement or internal system attacks. FIM is a process that monitors and alerts on changes to files or directories that are critical for security or functionality. FIM can help detect unauthorized modifications, malware infections, data breaches, or configuration errors. FIM can also help with compliance and auditing requirements. Reference: https://www.tripwire.com/state-of- security/security-data-protection/cyber-security/what-is-file-integrity-monitoring/

Topic 2, Exam Pool B

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

A.
Omni
A.
Omni
Answers
B.
Directional
B.
Directional
Answers
C.
Yagi
C.
Yagi
Answers
D.
Parabolic
D.
Parabolic
Answers
Suggested answer: A

Explanation:

An omni antenna should be used by the AP to provide service in a radius surrounding a radio. An omni antenna is a type of antenna that has a 360-degree horizontal radiation pattern. It can provide wireless coverage in all directions from the antenna with varying degrees of vertical coverage. It is suitable for indoor environments where users are located around the AP1. Reference:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/82068-omni-vs- direct.html 1

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

A.
Physical diagram
A.
Physical diagram
Answers
B.
Heat map
B.
Heat map
Answers
C.
Asset list
C.
Asset list
Answers
D.
Device map
D.
Device map
Answers
Suggested answer: B

Explanation:

A heat map would most likely be created as a result of the site survey. A heat map is a graphical representation of the wireless signal strength and coverage in a given area. It can show the location of APs, antennas, walls, obstacles, interference sources, and dead zones. It can help with planning, optimizing, and troubleshooting wireless networks. Reference: https://www.netspotapp.com/what- is-a-wifi-heatmap.html

A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when Ihey are near the antenna Which of the following is MOST likely the cause?

A.
The wireless signal is being refracted by the warehouse's windows
A.
The wireless signal is being refracted by the warehouse's windows
Answers
B.
The antenna's power level was set too high and is overlapping
B.
The antenna's power level was set too high and is overlapping
Answers
C.
An omnidirectional antenna was used instead of a unidirectional antenna
C.
An omnidirectional antenna was used instead of a unidirectional antenna
Answers
D.
The wireless access points are using channels from the 5GHz spectrum
D.
The wireless access points are using channels from the 5GHz spectrum
Answers
Suggested answer: C

Explanation:

An omnidirectional antenna was used instead of a unidirectional antenna, which is most likely the cause of the wireless network issues. An omnidirectional antenna provides wireless coverage in all directions from the antenna, which can cause signal overlap with adjacent offices and interference with other wireless networks. A unidirectional antenna, on the other hand, provides wireless coverage in a specific direction from the antenna, which can reduce signal overlap and interference and increase signal range and quality. A unidirectional antenna would be more suitable for a warehouse environment where users are located on one side of the building1. Reference:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/82068-omni-vs- direct.html 1

Total 865 questions
Go to page: of 87