n10-008_4
n10-008_4
CompTIA
Exam Questions N10-008
CompTIA Network+Exam
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the
issue?
A. TTL
B. MX
C. TXT
D. SOA
Answer: A
NEW QUESTION 2
A network technician needs to correlate security events to analyze a suspected intrusion Which of the following should the technician use?
A. SNMP
B. Log review
C. Vulnerability scanning
D. SIEM
Answer: D
NEW QUESTION 3
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication
process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likelydetermine the
cause of the issue?
Answer: A
NEW QUESTION 4
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all
firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
Answer: C
NEW QUESTION 5
A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect
the network switch to the existing fiber?
A. 10GBaseT
B. 1000BaseT
C. 1000BaseSX
D. 1000BaseLX
Answer: A
NEW QUESTION 6
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following
attack types BEST describes this action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack
Answer: D
NEW QUESTION 7
A network technician is observing the behavior of an unmanaged switch when a new device is added to the network and transmits data. Which of the following
BEST describes how the switch processes this information?
Answer: C
NEW QUESTION 8
Which of the following would MOST likely be used to review previous upgrades to a system?
Answer: B
NEW QUESTION 9
SIMULATION
You have been tasked with setting up a wireless network in anoffice. The network will consist of 3 Access Points and a single switch. The network must meet the
following parameters:
The SSIDs need to be configured as CorpNet with a key of S3cr3t! The wireless signals should not interfere with each other
The subnet the Access Points and switch are on should only support 30 devices maximum The Access Points should be configured to only support TKIP clients at
a maximum speed INSTRUCTONS
Click on the wireless devices and review their information and adjust the settingsof the access points to meet the given requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
On the first exhibit, the layout should be as follows Access Point Name AP1
IP Address 192.168.1.3
Gateway 192.168.1.2 SSID corpnet
SSID Broadcast yes Mode G
Channel 1 Speed Auto Duplex Auto WPA
Passphrase S3cr3t! Exhibit 2 as follows Access Point Name AP2 IP Address 192.168.1.4
Gateway 192.168.1.2 SSID corpnet
SSID Broadcast yes Mode G
Channel 6 Speed Auto
Duplex Auto WPA
Passphrase S3cr3t! Exhibit 3 as follows Access Point Name AP3 IP Address 192.168.1.5
Gateway 192.168.1.2 SSID corpnet
SSID Broadcast yes Mode G
Channel 11 Speed Auto Duplex Auto WPA
Passphrase S3cr3t!
NEW QUESTION 10
A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions
should the corporation implement?
A. Full backups
B. Load balancing
C. Hot site
D. Snapshots
Answer: C
NEW QUESTION 10
A customer wants to segregate the traffic between guests on a hypervisor. Which of the following does a technician need to configure to meet the requirement?
A. Virtual switches
B. OSPF routing
C. Load balancers
D. NIC teaming
E. Fibre Channel
Answer: A
NEW QUESTION 13
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex.
Which of the following is the MOST likely cause of this issue?
Answer: C
NEW QUESTION 16
A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and
no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the
switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the
following is MOST likely the cause of the desktop not connecting?
A. Transceiver mismatch
B. VLAN mismatch
C. Port security
D. Damaged cable
E. Duplex mismatch
Answer: C
NEW QUESTION 19
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
A. The network device is not configured to log that level to the syslog server
B. The network device was down and could not send the event
C. The syslog server is not compatible with the network device
D. The syslog server did not have the correct MIB loaded to receive the message
Answer: A
NEW QUESTION 24
A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on
one of the web servers to allow communication to the company's file server, but it is unable to connect to it Other machines in the building are able to retrieve files
from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?
A. The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS
B. The lab environment is located in the DM2, and traffic to the LAN zone is denied by defaul
C. The technician can move the computer to another zone or request an exception from theadministrator.
D. The lab environment has lost connectivity to the company router, and the switch needs to be rebooted.The technician can get the key to the wiring closet and
manually restart the switch
E. The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for
upgraded equipment tomanagement.
Answer: B
NEW QUESTION 28
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which ofthe following switch features
will MOST likely be used to assist with this task?
Answer: B
NEW QUESTION 32
A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their
connections Which of the following pieces of equipment would be able to handle this requirement?
A. A VPN concentrator
B. A load balancer
C. A wireless controller
D. A RADIUS server
Answer: A
NEW QUESTION 35
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
Answer: B
NEW QUESTION 36
Which of the following would be BEST to use to detect a MAC spoofing attack?
Answer: B
NEW QUESTION 41
A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users
report that the network connections frequently disconnect and reconnect throughout the day. Whichof the following is the MOST likely cause of this issue?
Answer: B
NEW QUESTION 46
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are
password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?
Answer: A
NEW QUESTION 51
A small, family-run business uses a single SOHO router to provide Internet and WiFi to its employees At the start of a new week, employees come in and find their
usual WiFi network is no longer available, and there is a new wireless network to which they cannot connect. Given that information, which of the following should
have been done to avoid this situation'
Answer: A
NEW QUESTION 56
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the
technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be
interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
A. NetFlow analyzer
B. Bandwidth analyzer
C. Protocol analyzer
D. Spectrum analyzer
Answer: D
NEW QUESTION 57
A technician is troubleshooting a workstation's network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using Which of
the following concepts would BEST help the technician?
A. Consistent labeling
B. Change management
Answer: A
NEW QUESTION 60
A network administrator is installing a wireless network at aclient’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple
simultaneous client access?
A. CDMA
B. CSMA/CD
C. CSMA/CA
D. GSM
Answer: A
NEW QUESTION 62
A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the
following will allow the technician to record these changes?
A. Asset tags
B. A smart locker
C. An access control vestibule
D. A camera
Answer: A
NEW QUESTION 66
Within the realm of network security, Zero Trust:
Answer: C
NEW QUESTION 71
Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45
Answer: A
NEW QUESTION 73
According to troubleshooting methodology, which of the following should the technician doNEXT after determining the most likely probable cause of an issue?
A. Establish a plan of action to resolve the issue and identify potential effects
B. Verify full system functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine the cause
Answer: D
NEW QUESTION 75
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely
associated?
A. Insider threat
B. War driving
C. Evil twin
D. Honeypot
Answer: D
NEW QUESTION 76
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the
AP utilize?
A. Omni
B. Directional
C. Yagi
D. Parabolic
Answer: A
NEW QUESTION 81
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator
MOST likely start to troubleshoot?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
G. Layer 7
Answer: B
NEW QUESTION 82
Which of the following is used to prioritize Internet usage per application and per user on the network?
A. Bandwidth management
B. Load balance routing
C. Border Gateway Protocol
D. Administrative distance
Answer: A
NEW QUESTION 84
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any
performance issues. The following table summarizes the findings after a site survey of the area in question:
Which of the following should a wireless technician do NEXT to troubleshoot this issue?
Answer: A
NEW QUESTION 85
A technician is deploying a low-density wireless network and is contending with multiple types of building materials. Which of the following wireless frequencies
would allow for the LEAST signal attenuation?
A. 2.4GHz
B. 5GHz
C. 850MHz
D. 900MHZ
Answer: B
NEW QUESTION 90
You are tasked with verifying the following requirements are met in order to ensure network security. Requirements:
Datacenter
Ensure network is subnetted to allow all devices to communicate properly whileminimizing address space usage
Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic Building A
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage
Provide devices to support 5 additional different office users Add an additional mobile user
Replace the Telnet server with a more secure solution Screened subnet
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage
Provide a server to handle external 80/443 traffic Provide a server to handle port 20/21 traffic INSTRUCTIONS
Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.
Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
Top left subnet – 206.208.134.0/28
Top right subnet – 10.72.63.0/28 Bottom subnet – 192.168.11.0/28
Screened Subnet devices – Web server, FTP server
Building A devices – SSH server top left, workstations on all 5 on the right, laptop on bottom left DataCenter devices – DNS server.
NEW QUESTION 92
A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the
following should a network security administrator recommend to assist with detecting these activities?
Answer: C
NEW QUESTION 95
A networkengineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are
mismatched on both ends. Which of the following would be the MOST likely result of this finding?
A. IncreasedCRC errors
B. Increased giants and runts
C. Increased switching loops
D. Increased device temperature
Answer: A
NEW QUESTION 98
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new
building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how
the network administrator can resolve this issue?
Answer: A
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS)
Answer: B
Answer: A
A. 1452
B. 1492
C. 1500
D. 2304
Answer: C
A. Antenna type
B. Power levels
C. Frequency
D. Encryption type
Answer: A
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP
Answer: C
Answer: C
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
Answer: B
A. Evil twin
B. Tailgating
C. Piggybacking
D. Shoulder surfing
Answer: B
Answer: C
A. OTDR
B. Tone generator
C. Fusion splicer
D. Cable tester
E. PoE injector
Answer:
Answer: D
A. A Layer 3 switch
B. A proxy server
C. A NGFW
D. A WLAN controller
Answer: A
A. SSO
B. TACACS+
C. Zero Trust
D. Separation of duties
E. Multifactor authentication
Answer: B
Answer: A
A. VLAN mismatch
B. Transceiver mismatch
C. Latency
D. DHCP exhaustion
Answer: A
A. DB9
B. RJ11
C. RJ45
D. DB25
Answer: A
Software on the workstation needs to send a query tothe local subnet broadcast address. To which of the following addresses should the software be configured to
send the query?
A. 10.1.2.0
B. 10.1.2.1
C. 10.1.2.23
D. 10.1.2.255
E. 10.1.2.31
Answer: E
Answer: D
A. NIC teaming
B. Load balancer
C. RAID array
D. PDUs
Answer: A
A. TWP-RC4
B. CCMP-AES
C. EAP-TLS
D. WPA2
Answer: C
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber
Answer: A
Answer: A
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny
Answer: BC
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
Answer: B
A. A smart card
B. A key fob
C. An employee badge
D. A door lock
Answer: B
Answer: B
A. AUP
B. DLP
C. BYOD
D. NDA
Answer: A
Relate Links
https://www.exambible.com/N10-008-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/