ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 9

Add to Whishlist

List of questions

Question 81

Report Export Collapse

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

Scope options
Scope options
Reservation
Reservation
Dynamic assignment
Dynamic assignment
Exclusion
Exclusion
Static assignment
Static assignment
Suggested answer: B
Explanation:

A reservation should be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP. A reservation is a feature of DHCP that allows an administrator to assign a fixed IP address to a device based on its MAC address. This way, the device will always receive the same IP address from the DHCP server, even if it is powered off or disconnected from the network for a long time. Reference: https://docs.microsoft.com/en-us/windows- server/troubleshoot/configure-dhcp-reservations

asked 02/10/2024
Renaldo Williams
47 questions

Question 82

Report Export Collapse

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?

Motion detection
Motion detection
Access control vestibules
Access control vestibules
Smart lockers
Smart lockers
Cameras
Cameras
Suggested answer: B
Explanation:

The most effective security mechanism against physical intrusions due to stolen credentials would likely be a combination of several of these options. However, of the options provided, the most effective security mechanism would probably be an access control vestibule. An access control vestibule is a secure area that is located between the outer perimeter of a facility and the inner secure area. It is designed to provide an additional layer of security by requiring that individuals pass through a series of security checks before being allowed access to the secure area. This could include biometric authentication, access card readers, and motion detection cameras. Access control vestibules allow the enforcement of the policy that access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. An access control vestibule is a physical security device that consists of two doors with an interlocking mechanism. Only one door can be opened at a time, and only one person can pass through each door. This prevents tailgating or piggybacking, where unauthorized persons follow authorized persons into a secure area. An access control vestibule can also be integrated with a card reader or other authentication system to record each individual’s access. Reference:

https://www.boonedam.us/blog/what-are-access-control-vestibules

asked 02/10/2024
ESSIS MAXIME-ALPHONSE SELLY
35 questions

Question 83

Report Export Collapse

A workstation is configured with the following network details:

CompTIA N10-008 image Question 83 95967 10022024175234000000

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

10.1.2.0
10.1.2.0
10.1.2.1
10.1.2.1
10.1.2.23
10.1.2.23
10.1.2.255
10.1.2.255
10.1.2.31
10.1.2.31
Suggested answer: D
Explanation:

The software on the workstation should be configured to send the query to 10.1.2.255, which is the local subnet broadcast address. A broadcast address is a special address that allows a device to send a message to all devices on the same subnet. It is usually derived by setting all the host bits to 1 in the network address. In this case, the network address is 10.1.2.0/27, which has 27 network bits and 5 host bits. By setting all the host bits to 1, we get 10.1.2.31 as the broadcast address in decimal notation, or 10.1.2.255 in dotted decimal notation. Reference:

https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html

asked 02/10/2024
Mary Andreou
50 questions

Question 84

Report Export Collapse

After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?

TTL
TTL
MX
MX
TXT
TXT
SOA
SOA
Suggested answer: A
Explanation:

TTL (Time To Live) should be adjusted to address the issue of some visitors being unable to access the website after the A record was updated. TTL is a value that specifies how long a DNS record should be cached by DNS servers and clients before it expires and needs to be refreshed. If the TTL is too high, some DNS servers and clients may still use the old A record that points to the previous IP address of the website, resulting in connection failures. By lowering the TTL, the DNS servers and clients will update their cache more frequently and use the new A record that points to the current IP address of the website. Reference: https://www.cloudflare.com/learning/dns/dns-records/dns-ttl/

asked 02/10/2024
shridhar deshpande
42 questions

Question 85

Report Export Collapse

A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?

CDMA
CDMA
CSMA/CD
CSMA/CD
CSMA/CA
CSMA/CA
GSM
GSM
Suggested answer: C
Explanation:

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is an IEEE 802.11 standard that would be best to use for multiple simultaneous client access on a wireless network. CSMA/CA is a media access control method that allows multiple devices to share the same wireless channel without causing collisions or interference. It works by having each device sense the channel before transmitting data and waiting for an acknowledgment from the receiver after each transmission. If the channel is busy or no acknowledgment is received, the device will back off and retry later with a random delay. Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless- lan-wlan/82068-csma-ca.html

asked 02/10/2024
Pritish Verma
34 questions

Question 86

Report Export Collapse

A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?

Asset tags
Asset tags
A smart locker
A smart locker
An access control vestibule
An access control vestibule
A camera
A camera
Suggested answer: A
Explanation:

Asset tags will allow the technician to record changes to new and old equipment when installing multiple UPS units in a major retail store. Asset tags are labels or stickers that are attached to physical assets such as computers, printers, servers, or UPS units. They usually contain information such as asset name, serial number, barcode, QR code, or RFID chip that can be scanned or read by an asset management system or software. Asset tags help track inventory, location, status, maintenance, and ownership of assets. Reference: https://www.camcode.com/asset-tags/asset- tagging-guide/

asked 02/10/2024
Mokoki Ramoadi
27 questions

Question 87

Report Export Collapse

A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?

Implement file integrity monitoring.
Implement file integrity monitoring.
Change the default credentials.
Change the default credentials.
Use SSL encryption.
Use SSL encryption.
Update the web-server software.
Update the web-server software.
Suggested answer: A
Explanation:

Implementing file integrity monitoring (FIM) would assist with detecting activities such as website defacement or internal system attacks. FIM is a process that monitors and alerts on changes to files or directories that are critical for security or functionality. FIM can help detect unauthorized modifications, malware infections, data breaches, or configuration errors. FIM can also help with compliance and auditing requirements. Reference: https://www.tripwire.com/state-of- security/security-data-protection/cyber-security/what-is-file-integrity-monitoring/

Topic 2, Exam Pool B

asked 02/10/2024
Anand R
43 questions

Question 88

Report Export Collapse

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

Omni
Omni
Directional
Directional
Yagi
Yagi
Parabolic
Parabolic
Suggested answer: A
Explanation:

An omni antenna should be used by the AP to provide service in a radius surrounding a radio. An omni antenna is a type of antenna that has a 360-degree horizontal radiation pattern. It can provide wireless coverage in all directions from the antenna with varying degrees of vertical coverage. It is suitable for indoor environments where users are located around the AP1. Reference:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/82068-omni-vs- direct.html 1

asked 02/10/2024
Paul Walker
43 questions

Question 89

Report Export Collapse

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

Physical diagram
Physical diagram
Heat map
Heat map
Asset list
Asset list
Device map
Device map
Suggested answer: B
Explanation:

A heat map would most likely be created as a result of the site survey. A heat map is a graphical representation of the wireless signal strength and coverage in a given area. It can show the location of APs, antennas, walls, obstacles, interference sources, and dead zones. It can help with planning, optimizing, and troubleshooting wireless networks. Reference: https://www.netspotapp.com/what- is-a-wifi-heatmap.html

asked 02/10/2024
Prinesh Chain
47 questions

Question 90

Report Export Collapse

A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when Ihey are near the antenna Which of the following is MOST likely the cause?

The wireless signal is being refracted by the warehouse's windows
The wireless signal is being refracted by the warehouse's windows
The antenna's power level was set too high and is overlapping
The antenna's power level was set too high and is overlapping
An omnidirectional antenna was used instead of a unidirectional antenna
An omnidirectional antenna was used instead of a unidirectional antenna
The wireless access points are using channels from the 5GHz spectrum
The wireless access points are using channels from the 5GHz spectrum
Suggested answer: C
Explanation:

An omnidirectional antenna was used instead of a unidirectional antenna, which is most likely the cause of the wireless network issues. An omnidirectional antenna provides wireless coverage in all directions from the antenna, which can cause signal overlap with adjacent offices and interference with other wireless networks. A unidirectional antenna, on the other hand, provides wireless coverage in a specific direction from the antenna, which can reduce signal overlap and interference and increase signal range and quality. A unidirectional antenna would be more suitable for a warehouse environment where users are located on one side of the building1. Reference:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/82068-omni-vs- direct.html 1

asked 02/10/2024
Louis Reeves
53 questions
Total 865 questions
Go to page: of 87
Search

Related questions