ExamGecko
Home Home / CompTIA / N10-009

CompTIA N10-009 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

Related questions











A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

A.
802.1X
A.
802.1X
Answers
B.
Access control list
B.
Access control list
Answers
C.
Port security
C.
Port security
Answers
D.
MAC filtering
D.
MAC filtering
Answers
Suggested answer: A

Explanation:

802.1X is a port-based network access control (PNAC) protocol that provides an authentication mechanism to devices wishing to connect to a LAN or WLAN. It is widely used for secure network access, ensuring that only authenticated devices can access the network, whether they are connecting via wired or wireless means. 802.1X works in conjunction with an authentication server, such as RADIUS, to validate the credentials of devices trying to connect.

Reference: CompTIA Network+ study materials.

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

A.
DNS poisoning
A.
DNS poisoning
Answers
B.
Denial-of-service
B.
Denial-of-service
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
ARP spoofing
D.
ARP spoofing
Answers
Suggested answer: A

Explanation:

Network segmentation involves dividing a network into smaller segments or subnets. This is particularly important when integrating OT (Operational Technology) devices to ensure that these devices are isolated from other parts of the network. Segmentation helps protect the OT devices from potential threats and minimizes the impact of any security incidents. It also helps manage traffic and improves overall network performance.

Reference: CompTIA Network+ study materials.

Which of the following should a network administrator configure when adding OT devices to an organization's architecture?

A.
Honeynet
A.
Honeynet
Answers
B.
Data-at-rest encryption
B.
Data-at-rest encryption
Answers
C.
Time-based authentication
C.
Time-based authentication
Answers
D.
Network segmentation
D.
Network segmentation
Answers
Suggested answer: D

Explanation:

Network segmentation involves dividing a network into smaller segments or subnets. This is particularly important when integrating OT (Operational Technology) devices to ensure that these devices are isolated from other parts of the network. Segmentation helps protect the OT devices from potential threats and minimizes the impact of any security incidents. It also helps manage traffic and improves overall network performance.

Reference: CompTIA Network+ study materials.

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

A.
Fire suppression system
A.
Fire suppression system
Answers
B.
UPS location
B.
UPS location
Answers
C.
Humidity control
C.
Humidity control
Answers
D.
Power load
D.
Power load
Answers
E.
Floor construction type
E.
Floor construction type
Answers
F.
Proximity to nearest MDF
F.
Proximity to nearest MDF
Answers
Suggested answer: A

Explanation:

When installing equipment in a building, environmental factors are critical to ensure the safety and longevity of the equipment. A fire suppression system is essential to protect the equipment from fire hazards. Humidity control is crucial to prevent moisture-related damage, such as corrosion and short circuits, which can adversely affect electronic components. Both factors are vital for maintaining an optimal environment for networking equipment.

Reference: CompTIA Network+ study materials.

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

A.
Stronger wireless connection
A.
Stronger wireless connection
Answers
B.
Roaming between access points
B.
Roaming between access points
Answers
C.
Advanced security
C.
Advanced security
Answers
D.
Increased throughput
D.
Increased throughput
Answers
Suggested answer: B

Explanation:

An Extended Service Set Identifier (ESSID) allows multiple access points to share the same SSID, enabling seamless roaming for users. This means that users can move between different access points within the same ESSID without losing connection or having to reauthenticate. This provides a better user experience, especially in large environments such as office buildings or campuses.

Reference: CompTIA Network+ study materials.

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

A.
255.255.0.0
A.
255.255.0.0
Answers
B.
255.255.254.0
B.
255.255.254.0
Answers
C.
255.255.255.0
C.
255.255.255.0
Answers
D.
255.255.255.128
D.
255.255.255.128
Answers
Suggested answer: D

Explanation:

Understanding Subnetting:

Original Network: 192.168.1.0/24 has a subnet mask of 255.255.255.0, which allows for 256 IP addresses (including network and broadcast addresses).

Objective: Divide this network into two equal subnets.

Calculating Subnet Mask:

New Subnet Mask: To divide 192.168.1.0/24 into two equal halves, we need to borrow one bit from the host portion of the address, changing the subnet mask to 255.255.255.128 (/25).

Subnet Breakdown:

First Subnet: 192.168.1.0/25 (192.168.1.0 - 192.168.1.127)

Second Subnet: 192.168.1.128/25 (192.168.1.128 - 192.168.1.255)

Verification:

Each subnet now has 128 IP addresses (126 usable IP addresses, excluding the network and broadcast addresses).

Comparison with Other Options:

255.255.0.0 (/16): Provides a much larger network, not dividing the original /24 network.

255.255.254.0 (/23): Also creates a larger subnet, encompassing more than the original /24 network.

255.255.255.0 (/24): Maintains the original subnet size, not dividing it.

CompTIA Network+ study materials on subnetting and IP addressing.

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

A.
172.16.0.0/24
A.
172.16.0.0/24
Answers
B.
192.168.0.0/24
B.
192.168.0.0/24
Answers
C.
224.0.0.0/24
C.
224.0.0.0/24
Answers
D.
240.0.0.0/24
D.
240.0.0.0/24
Answers
Suggested answer: C

Explanation:

Understanding Multicast:

Multicast IP Address Range: The multicast address range is from 224.0.0.0 to 239.255.255.255, designated for multicast traffic.

Multicast Applications:

Use Case: Multicast is used for one-to-many or many-to-many communication, suitable for applications like audio and video broadcasting where the same data is sent to multiple recipients simultaneously.

Appropriate Network Selection:

224.0.0.0/24 Network: This range is reserved for multicast addresses, making it the appropriate choice for setting up a multicast network.

Comparison with Other Options:

172.16.0.0/24: Part of the private IP address space, used for private networks, not designated for multicast.

192.168.0.0/24: Another private IP address range, also not for multicast.

240.0.0.0/24: Reserved for future use, not suitable for multicast.

CompTIA Network+ study materials on IP address ranges and multicast.

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

A.
802.1Q tagging
A.
802.1Q tagging
Answers
B.
Network address translation
B.
Network address translation
Answers
C.
Port duplex
C.
Port duplex
Answers
D.
Link aggregation
D.
Link aggregation
Answers
Suggested answer: D

Explanation:

Understanding Link Aggregation:

Definition: Link aggregation combines multiple network connections into a single logical link to increase bandwidth and provide redundancy.

Usage in High-Bandwidth Scenarios:

Combining Links: By aggregating multiple 1Gbps connections, the facility can utilize the full 2.5Gbps bandwidth provided by the ISP.

Benefits: Enhanced throughput, load balancing, and redundancy, ensuring better utilization of available bandwidth.

Comparison with Other Options:

802.1Q Tagging: Used for VLAN tagging, which does not affect the physical bandwidth utilization.

Network Address Translation (NAT): Used for IP address translation, not related to link speed or bandwidth aggregation.

Port Duplex: Refers to the mode of communication (full or half duplex) on a port, not the aggregation of bandwidth.

Implementation:

Configure link aggregation (often referred to as LACP - Link Aggregation Control Protocol) on network devices to combine multiple physical links into one logical link.

CompTIA Network+ study materials on network configuration and link aggregation.

Which of the following is used to estimate the average life span of a device?

A.
RTO
A.
RTO
Answers
B.
RPO
B.
RPO
Answers
C.
MTBF
C.
MTBF
Answers
D.
MTTR
D.
MTTR
Answers
Suggested answer: C

Explanation:

Understanding MTBF:

Mean Time Between Failures (MTBF): A reliability metric that estimates the average time between successive failures of a device or system.

Calculation and Importance:

Calculation: MTBF is calculated as the total operational time divided by the number of failures during that period.

Usage: Used by manufacturers and engineers to predict the lifespan and reliability of a device, helping in maintenance planning and lifecycle management.

Comparison with Other Metrics:

RTO (Recovery Time Objective): The maximum acceptable time to restore a system after a failure.

RPO (Recovery Point Objective): The maximum acceptable amount of data loss measured in time.

MTTR (Mean Time to Repair): The average time required to repair a device or system and return it to operational status.

Application:

MTBF is crucial for planning maintenance schedules, spare parts inventory, and improving the overall reliability of systems.

CompTIA Network+ study materials on reliability and maintenance metrics.

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

A.
ACLs
A.
ACLs
Answers
B.
Port security
B.
Port security
Answers
C.
Content filtering
C.
Content filtering
Answers
D.
NAC
D.
NAC
Answers
Suggested answer: A

Explanation:

Understanding ACLs:

Access Control Lists (ACLs): A set of rules used to control network traffic and restrict access to network resources by filtering packets based on IP addresses, protocols, or ports.

Implementing Security Zones:

Defining Zones: ACLs can be used to create security zones by applying specific rules to different departments, ensuring that only authorized traffic is allowed between these zones.

Control Traffic: ACLs control inbound and outbound traffic at network boundaries, enforcing security policies and preventing unauthorized access.

Comparison with Other Options:

Port Security: Limits the number of devices that can connect to a switch port, preventing MAC address flooding attacks, but not used for defining security zones.

Content Filtering: Blocks or allows access to specific content based on predefined policies, typically used for web filtering rather than network segmentation.

NAC (Network Access Control): Controls access to the network based on the security posture of devices but does not define security zones.

Implementation Steps:

Define ACL rules based on the requirements of each department.

Apply these rules to the appropriate network interfaces or firewall policies to segment the network into security zones.

CompTIA Network+ study materials on network security and access control methods.

Total 153 questions
Go to page: of 16