CompTIA Network+ N10-008 Exam #2
Quiz Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?
CorrectIncorrect -
Question 2 of 50
2. Question
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
CorrectIncorrect -
Question 3 of 50
3. Question
A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day’s upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?
CorrectIncorrect -
Question 4 of 50
4. Question
A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on one of the web servers to allow communication to the company’s file server, but it is unable to connect to it Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?
CorrectIncorrect -
Question 5 of 50
5. Question
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?
CorrectIncorrect -
Question 6 of 50
6. Question
A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?
CorrectIncorrect -
Question 7 of 50
7. Question
A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
CorrectIncorrect -
Question 8 of 50
8. Question
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
CorrectIncorrect -
Question 9 of 50
9. Question
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?
CorrectIncorrect -
Question 10 of 50
10. Question
A technician is troubleshooting a workstation’s network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using. Which of the following concepts would BEST help the technician?
CorrectIncorrect -
Question 11 of 50
11. Question
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
CorrectIncorrect -
Question 12 of 50
12. Question
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
CorrectIncorrect -
Question 13 of 50
13. Question
Within the realm of network security, Zero Trust:
CorrectIncorrect -
Question 14 of 50
14. Question
A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?
CorrectIncorrect -
Question 15 of 50
15. Question
Refer to the exhibit. A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information: Which of the following metrics confirms there is a cabling issue?CorrectIncorrect -
Question 16 of 50
16. Question
Which of the following routing protocols is used to exchange route information between public autonomous systems?
CorrectIncorrect -
Question 17 of 50
17. Question
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?
CorrectIncorrect -
Question 18 of 50
18. Question
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
CorrectIncorrect -
Question 19 of 50
19. Question
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:
Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch pane
lLC/LC patch cable
Switch
The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?CorrectIncorrect -
Question 20 of 50
20. Question
A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?
CorrectIncorrect -
Question 21 of 50
21. Question
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications?
CorrectIncorrect -
Question 22 of 50
22. Question
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?
CorrectIncorrect -
Question 23 of 50
23. Question
Which of the following is the physical topology for an Ethernet LAN?
CorrectIncorrect -
Question 24 of 50
24. Question
Which of the following is used to prioritize Internet usage per application and per user on the network?
CorrectIncorrect -
Question 25 of 50
25. Question
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?
CorrectIncorrect -
Question 26 of 50
26. Question
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
CorrectIncorrect -
Question 27 of 50
27. Question
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm’s firewall. Which of the following would be the MOST appropriate way to enable secure remote printing?
CorrectIncorrect -
Question 28 of 50
28. Question
A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?
CorrectIncorrect -
Question 29 of 50
29. Question
Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch?
CorrectIncorrect -
Question 30 of 50
30. Question
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?
CorrectIncorrect -
Question 31 of 50
31. Question
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two).
CorrectIncorrect -
Question 32 of 50
32. Question
Refer to the exhibit. Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: Which of the following should a wireless technician do NEXT to troubleshoot this issue?CorrectIncorrect -
Question 33 of 50
33. Question
A network administrator wants to improve the security of the management console on the company’s switches and ensure configuration changes made can be correlated to the administrator who conformed them. Which of the following should the network administrator implement?
CorrectIncorrect -
Question 34 of 50
34. Question
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
CorrectIncorrect -
Question 35 of 50
35. Question
A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user’s PC. After checking the ip setting, the technician found the DNS server address was incorrect. Which of the following describes the issue?
CorrectIncorrect -
Question 36 of 50
36. Question
After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?
CorrectIncorrect -
Question 37 of 50
37. Question
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
CorrectIncorrect -
Question 38 of 50
38. Question
Refer to the exhibit. The following configuration is applied to a DHCP server connected to a VPN concentrator: There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?
CorrectIncorrect -
Question 39 of 50
39. Question
A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST?
CorrectIncorrect -
Question 40 of 50
40. Question
Refer to the exhibit. A workstation is configured with the following network details:
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
CorrectIncorrect -
Question 41 of 50
41. Question
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
CorrectIncorrect -
Question 42 of 50
42. Question
Refer to the exhibit. A technician needs to configure a Linux computer for network monitoring. The technician has the following information: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?CorrectIncorrect -
Question 43 of 50
43. Question
A network engineer performs the following tasks to increase server bandwidth:
Connects two network cables from the server to a switch stack
Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?CorrectIncorrect -
Question 44 of 50
44. Question
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
CorrectIncorrect -
Question 45 of 50
45. Question
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?
CorrectIncorrect -
Question 46 of 50
46. Question
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?
CorrectIncorrect -
Question 47 of 50
47. Question
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two).
CorrectIncorrect -
Question 48 of 50
48. Question
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?
CorrectIncorrect -
Question 49 of 50
49. Question
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP. IP Address: 196.26.4.30; Subnet Mask: 255.255.255.224; Default Gateway: 196.26.4.1 The network engineer observes that all users have lost Internet connectivity. Which of the following describes the issue?
CorrectIncorrect -
Question 50 of 50
50. Question
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
CorrectIncorrect