CompTIA Network + N10-008 Exam 1
Quiz Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?
CorrectIncorrect -
Question 2 of 50
2. Question
Which of the following policies is MOST commonly used for guest captive portals?
CorrectIncorrect -
Question 3 of 50
3. Question
At which of the following OSI model layers would a technician find an IP header?
CorrectIncorrect -
Question 4 of 50
4. Question
A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:
1. Must not use plaintext passwords
2. Must be certificate based
3. Must be vendor neutral
Which of the following methods should the engineer select?CorrectIncorrect -
Question 5 of 50
5. Question
A network administrator has been directed to present the network alerts from the past week to the company’s executive staff. Which of the following will provide the BEST collection and presentation of this data?
CorrectIncorrect -
Question 6 of 50
6. Question
A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections. Which of the following pieces of equipment would be able to handle this requirement?
CorrectIncorrect -
Question 7 of 50
7. Question
A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?
CorrectIncorrect -
Question 8 of 50
8. Question
A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options. The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?
CorrectIncorrect -
Question 9 of 50
9. Question
A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, but a strong signal when walking 20ft in the opposite direction. The technician has reviewed the configuration and confirmed the channel type is correct There is no jitter or latency on the connection. Which of the following would be the MOST likely cause of the issue?
CorrectIncorrect -
Question 10 of 50
10. Question
A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?
CorrectIncorrect -
Question 11 of 50
11. Question
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
CorrectIncorrect -
Question 12 of 50
12. Question
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
CorrectIncorrect -
Question 13 of 50
13. Question
Refer to the exhibit. A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations. The manufacturer says the system will work if ping times are less than 50ms. The company has recorded the following ping times: Which of the following is MOST likely causing the issue?CorrectIncorrect -
Question 14 of 50
14. Question
A network technician is reviewing an upcoming project’s requirements to implement laaS. Which of the following should the technician consider?
CorrectIncorrect -
Question 15 of 50
15. Question
A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case?
CorrectIncorrect -
Question 16 of 50
16. Question
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?
CorrectIncorrect -
Question 17 of 50
17. Question
A network device is configured to send critical events to a syslog server; however, the following alerts
are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?CorrectIncorrect -
Question 18 of 50
18. Question
A city has hired a new employee who needs to be able to work when traveling at home and at the municipal sourcing of a neighboring city that snares services. The employee is issued a laptop, and a technician needs to train the employee on the appropriate solutions for secure access to the network from all the possible locations. On which of the following solutions would the technician MOST likely train the employee?
CorrectIncorrect -
Question 19 of 50
19. Question
Which of the following DNS records works as an alias to another record?
CorrectIncorrect -
Question 20 of 50
20. Question
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
CorrectIncorrect -
Question 21 of 50
21. Question
A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?
CorrectIncorrect -
Question 22 of 50
22. Question
Which of the following is the LARGEST MTU for a standard Ethernet frame?
CorrectIncorrect -
Question 23 of 50
23. Question
Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?
CorrectIncorrect -
Question 24 of 50
24. Question
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?
CorrectIncorrect -
Question 25 of 50
25. Question
An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?
CorrectIncorrect -
Question 26 of 50
26. Question
Which of the following TCP ports is used by the Windows OS for file sharing?
CorrectIncorrect -
Question 27 of 50
27. Question
A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?
CorrectIncorrect -
Question 28 of 50
28. Question
Which of the following systems would MOST likely be found in a screened subnet?
CorrectIncorrect -
Question 29 of 50
29. Question
Which of the following is used to track and document various types of known vulnerabilities?
CorrectIncorrect -
Question 30 of 50
30. Question
Which of the following would MOST likely be used to review previous upgrades to a system?
CorrectIncorrect -
Question 31 of 50
31. Question
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?
CorrectIncorrect -
Question 32 of 50
32. Question
A customer wants to segregate the traffic between guests on a hypervisor. Which of the following does a technician need to configure to meet the requirement?
CorrectIncorrect -
Question 33 of 50
33. Question
An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company can immediately switch from one datacenter to another. Which of the following does this BEST describe?
CorrectIncorrect -
Question 34 of 50
34. Question
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
CorrectIncorrect -
Question 35 of 50
35. Question
Which of the following would be BEST to use to detect a MAC spoofing attack?
CorrectIncorrect -
Question 36 of 50
36. Question
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
CorrectIncorrect -
Question 37 of 50
37. Question
Which of the following technologies provides a failover mechanism for the default gateway?
CorrectIncorrect -
Question 38 of 50
38. Question
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?
CorrectIncorrect -
Question 39 of 50
39. Question
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?
CorrectIncorrect -
Question 40 of 50
40. Question
A Chief Information Officer (CIO) wants to improve the availability of a company’s SQL database. Which of the following technologies should be utilized to achieve maximum availability?
CorrectIncorrect -
Question 41 of 50
41. Question
Which of the following is a system that is installed directly on a server’s hardware and abstracts the hardware from any guest machines?
CorrectIncorrect -
Question 42 of 50
42. Question
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?
CorrectIncorrect -
Question 43 of 50
43. Question
During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users to groups and a third who is the only administrator to perform file rights assignment. Which of the following mitigation techniques is being applied?
CorrectIncorrect -
Question 44 of 50
44. Question
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?
CorrectIncorrect -
Question 45 of 50
45. Question
The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained. Which of the following documents would BEST support this?
CorrectIncorrect -
Question 46 of 50
46. Question
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?
CorrectIncorrect -
Question 47 of 50
47. Question
A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?
CorrectIncorrect -
Question 48 of 50
48. Question
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
CorrectIncorrect -
Question 49 of 50
49. Question
Which of the following devices would be used to manage a corporate WLAN?
CorrectIncorrect -
Question 50 of 50
50. Question
Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?
CorrectIncorrect