CompTIA Network+ N10-008 Exam Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

  • 802.11n
  • 802.11ax (correct)
  • 802.11ac
  • 802.11g

Which of the following would be BEST to use to detect a MAC spoofing attack?

  • Dynamic Host Configuration Protocol
  • Reverse Address Resolution Protocol (correct)
  • Internet Control Message Protocol
  • Internet Message Access Protocol

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

  • Spectrum analyzer (correct)
  • NetFlow analyzer
  • Bandwidth analyzer
  • Protocol analyzer

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

<p>Verify the session time-out configuration on the captive portal settings (A)</p> Signup and view all the answers

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

<p>Tailgating (A)</p> Signup and view all the answers

Which of the following DNS records works as an alias to another record?

<p>CNAME (B)</p> Signup and view all the answers

A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?

<p>Correct the DNS server entries in the DHCP scope (A)</p> Signup and view all the answers

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC patch cable Switch The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?

<p>TX/RX is reversed (A)</p> Signup and view all the answers

A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port?

<p>MAC table (D)</p> Signup and view all the answers

Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?

<p>NIC teaming (B)</p> Signup and view all the answers

An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization's requirements?

<p>Content delivery network (A)</p> Signup and view all the answers

A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?

<p>Ask what changes were made (B)</p> Signup and view all the answers

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?

<p>MDIX (D)</p> Signup and view all the answers

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?

<p>IP scanner (B)</p> Signup and view all the answers

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

<p>5GHz (C)</p> Signup and view all the answers

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?

<p>Port security (C)</p> Signup and view all the answers

Which of the following is used to track and document various types of known vulnerabilities?

<p>CVE (C)</p> Signup and view all the answers

The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

<p>Complex passwords (A), Two-factor authentication (F)</p> Signup and view all the answers

A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?

<p>NIC teaming (D)</p> Signup and view all the answers

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?

<p>255.255.240.0 (A)</p> Signup and view all the answers

Which of the following is the LARGEST MTU for a standard Ethernet frame?

<p>1500 (D)</p> Signup and view all the answers

Given the following information: Protocol | Local address | Foreign address | State TCP | 127.0.0.1:57779 | Desktop-Open:57780 | Establish TCP | 127.0.0.1:57780 | Desktop-Open:57779 | Establish Which of the following command-line tools would generate this output?

<p>netstat (C)</p> Signup and view all the answers

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

<p>Test the theory to determine the cause (C)</p> Signup and view all the answers

Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?

<p>IDS (B)</p> Signup and view all the answers

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

<p>Coaxial (A)</p> Signup and view all the answers

A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?

Signup and view all the answers

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)

<p>Memory (B), CPU usage (A)</p> Signup and view all the answers

Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?

Signup and view all the answers

10Topic 1 An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?

Signup and view all the answers

Which of the following DNS records works as an alias to another record?

Signup and view all the answers

A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?

Signup and view all the answers

Flashcards

802.11ac

A wireless networking standard designed to support high-density environments with minimal interference by utilizing 5 GHz frequency.

Zero Trust

A network security measure that requires strong authentication and authorization for each individual access request.

Least Privilege

A security policy that requires users and applications to have only the necessary permissions to perform their tasks.

DHCP exhaustion attack

A type of network attack that aims to exhaust the available IP addresses in a DHCP pool, preventing legitimate devices from obtaining IP addresses.

Signup and view all the flashcards

Intrusion Detection System (IDS)

A network appliance that analyzes network traffic for suspicious patterns and alerts administrators about potential attacks.

Signup and view all the flashcards

Physical security

A network security practice that aims to prevent unauthorized access to physical locations, such as data centers, by controlling entry and exit points.

Signup and view all the flashcards

Authentication

A network security practice that involves verifying the identity of users and devices before granting access to network resources.

Signup and view all the flashcards

Authorization

A network security practice that involves limiting the actions that users can take based on their role or assigned permissions.

Signup and view all the flashcards

Two-factor authentication

A security measure that uses two or more factors of authentication to verify user identity.

Signup and view all the flashcards

Patching

A security practice that involves regularly updating network devices and software with the latest security patches to mitigate vulnerabilities.

Signup and view all the flashcards

Brute-force attack

A type of network attack that uses automated tools to try a large number of possible password combinations until the correct one is discovered.

Signup and view all the flashcards

Dictionary attack

A type of network attack that uses a pre-compiled list of commonly used passwords to try and gain unauthorized access to an account.

Signup and view all the flashcards

Link Aggregation Control Protocol (LACP)

A technology that allows devices to aggregate multiple network interfaces to create a single logical channel, increasing bandwidth and providing redundancy.

Signup and view all the flashcards

Routing Protocol

A protocol that allows devices to exchange routing information, enabling them to learn about reachable networks and paths.

Signup and view all the flashcards

Denial-of-service (DoS) attack

A type of attack that floods a target network or device with malicious traffic, consuming bandwidth and resources.

Signup and view all the flashcards

Switch

A specialized network device used to connect multiple computers or devices, providing data forwarding and network management functions.

Signup and view all the flashcards

Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

A network technology that allows multiple devices to share a common channel, but only one device can transmit at a time.

Signup and view all the flashcards

Repeater

A network device used to amplify and forward signals, extending the reach of a network.

Signup and view all the flashcards

Router

A network device that forwards traffic between different network segments, based on destination IP addresses.

Signup and view all the flashcards

Physical layer

A layer of the OSI model that defines how data is transmitted over the physical medium, including cable types, connectors, and signaling.

Signup and view all the flashcards

Session layer

A layer of the OSI model that establishes, coordinates, and terminates conversations between applications.

Signup and view all the flashcards

Presentation layer

A layer of the OSI model that prepares data for transmission, ensuring that data is formatted and encoded in a way that can be understood by the receiving application.

Signup and view all the flashcards

Data link layer

A layer of the OSI model that deals with the physical addressing of devices on a network.

Signup and view all the flashcards

Dedicated connection

A type of connection that uses a dedicated physical link between devices, enabling faster data transfer and reduced latency.

Signup and view all the flashcards

Shared connection

A type of connection that uses a shared physical link, where multiple devices can access the link simultaneously.

Signup and view all the flashcards

Multiplexing

A technique that allows multiple data streams to be transmitted over the same physical channel, increasing the overall bandwidth.

Signup and view all the flashcards

Border Gateway Protocol (BGP)

A network protocol used for routing traffic between different autonomous systems (ASs) on the internet.

Signup and view all the flashcards

Interior Gateway Routing Protocol (IGRP)

A protocol that allows devices to exchange routing information within an autonomous system (AS).

Signup and view all the flashcards

Network Interface

A network interface used for connecting devices to a network, such as a network card (NIC) for computers or a network port for switches.

Signup and view all the flashcards

Distributed Denial of Service (DDoS) attack

A type of network attack that aims to overwhelm a target network or device with a flood of traffic from multiple sources, rendering it unavailable.

Signup and view all the flashcards

Maximum Transmission Unit (MTU)

The maximum transmission unit (MTU) defines the largest allowable packet size that can be sent over a specific network interface or connection.

Signup and view all the flashcards

Bottom-to-top troubleshooting

Network troubleshooting techniques often involve examining the problem from the simplest potential cause to more complex issues.

Signup and view all the flashcards

Impersonation attack

An attack that involves impersonating another user or device to gain unauthorized access or privileges.

Signup and view all the flashcards

VLAN

A technology that combines multiple LAN segments into a single logical network, allowing devices on different segments to communicate directly with each other as if they were on the same network.

Signup and view all the flashcards

Jitter

A measure of the variability in network delay, indicating the smoothness of data flow.

Signup and view all the flashcards

Study Notes

N10-008 Exam Questions

  • Exam Name: CompTIA Network+

  • Exam Code: N10-008

  • Total Exam Questions: 877

  • Topic 1 - Single Topic

    • Question 1: A systems administrator needs to improve WiFi performance in a densely populated office. The correct answer is 802.11ax.
    • Question 2: Which of the following would be BEST to use to detect a MAC spoofing attack? The correct answer is Reverse Address Resolution Protocol (ARP).
    • Question 3: A technician experiences high jitter on a wireless network. The correct tool to troubleshoot this issue is a spectrum analyzer.
    • Question 4: Wireless users are reporting intermittent internet connectivity, resolved by reconnecting. The correct solution is verifying the session time-out configuration on the captive portal.
    • Question 5: An unknown person is following a network administrator closely. The attack prevented is tailgating.
  • Question 6 (Simulation): Set up a wireless network with 3 Access Points and a single switch. The SSIDs need to be configured as CorpNet with a key of S3cr3t!. Wireless signals should not interfere with each other. The subnet should only support a maximum of 30 devices. Access points should only support TKIP clients at a maximum speed .

  • Questions 7 through 20 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 21 through 30 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 31 through 40 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 41 through 50 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 51 through 60 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 61 through 70 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 71 through 80 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 81 through 90 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 91 through 100 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 101 through 110 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 111 through 120 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 121 through 130 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 131 through 140 (Topic 1 or other topics): details about different networking concepts and solutions

  • Questions 141 through 150 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 151 through 160 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 161 through 170 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 171 through 180 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 181 through 190 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 191 through 200 (Topic 1 and other topics): details about different networking concepts and solutions

  • Questions 201 through 210 (Topic 1 and other topics): details about different networking concepts and solutions

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

CompTIA Network+ N10-008 Exam Prep
37 questions
Use Quizgecko on...
Browser
Browser