Question Answer CompTIA Network+ (N10-008) Network+ Final Review
A technician want to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antena types should the AP utilize?
- Directional
- Parabolic
- Omni
- Yagi
A security company is working with a new customer and is describing different kinds of attacks they have discovered through research. What form of threat research does this represent?
- Behavioral threat research
- Threat data
- Threat assessment
- Reputational threat intelligence
A network administrator is reviewing interface error on a switch. Which of the following indicates that a switch port is receiving packet in excess of the configuration MTU?
- Flooding
- Runts
- Giants
- CRC errors
A network technician wants to upgrade the company's hub to avoid collisions. Which solution would help the technician accomplish this to the fullest extent?
- Bridge
- Switch
- Router
- Hub
An administrator is monitoring the performance metrics for a server and notices that the system memory utilization is very high. What does this indicate?
• There is a problem with network traffic
• There is low storage space
• The system needs an upgrade
• The storage I/O is too slow
The amount of data traffic both sent and received or calculated as a percentage of the available bandwidth is known as which interface monitoring metric?
• Speed
• Duplex
• Duplex
• Utilization
• Resets
A helpdesk operator is troubleshooting communication issues for devices in different broadcast domains. What do the devices need to pass through to talk to each other?
• Modem
• Switch
• Router
• Hub
A network administrator is diagnosing a suspected problem with local addressing and packet delivery. Which of the following commands would the administrator use to add an entry to the ARP cache?
- arp -d
- arp -s
- arp -g
- arp -a
An organization purchased a new router with built-in firewall features. The administrator configured the new appliance and it worked as expected. However, after 90 days the firewall stopped working. What is the most likely cause?
• There weren’t enough routes allowed in the routing table
• There weren’t enough ports on the device
• The license trial period ended
• The routing protocols stopped working
An administrator is using DHCP and wants to retain centralized management of IP addressing but needs to ensure that specific devices that supply always-on functionality have static IP address assignments. What is the best solution?
• Configure static assignments on those devices
• Create reservations
• Configure scopes
• Assign addresses from a specially configured exclusion range
An organization needs to use shared mailboxes for managing customer inquiries. What mailbox access protocol should the clients utilize to retrieve the mail over secured connections?
• IMAP
• IMAPS
• MAPI
• POP3S
A client is trying to connect to a network. The client can get an IP address but does not have internet access and decides to see if they are issued an APIPA address. Which of the following would fall under the APIPA range?
• 169.254.0.0 through 169.254.255.255
• 172.16.0.0 to 172.31.255.255
• 192.168.0.0 to 192.168.255.255
• 10.0.0.0 to 10.255.255.255
A network technician is trying to troubleshoot attenuation and measure accordingly. What unit of measurement expresses attenuation?
• Mbps
• dB
• ms
• SNR
A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?
• Enable wireless client isolation
• Enable wireless port security
• Adjust the wireless channels
• Reduce the wireless power levels
A security architect is dividing a network into logically distinct zones for security and administrative control. Which of the following should the security architect use?
• VLANs
• Flow control
• CAMs
• Port security
• Flow control
A network cabling operator is looking at different fiber optic connector form factors. Which of the following only works for multimode?
• LC
• MTRJ
• SC
• ST
A cyber security technician speaks with a department that has voiced concern regarding tech issues. The technician discovered that the employee had received an email containing an attachment from an outside party. Curious about what the document contained, the employee clicked on the link. The next day, the employee noticed that some of the software was not working correctly, and some important documents were no longer accessible. What was likely the cause of this issue?
• Malware
• DDoS
• On-path attack
• DNS Poisoning
A helpdesk operator is troubleshooting issues on a Windows client and wants to try to flush their dynamic IP address so that they can pull another one. Which command will help the helpdesk operator do this?
• ipconfig /release
• ipconfig /flushdns
• ipconfig /all
• ipconfig /renew
A project manager is preparing a team to set up cabling infrastructure in a new building. Which of the following tools should they order to be able to create patch cords?
• Cable strippers
• Crimper
• Punchdown tool
• Block tool
An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting?
• Presentation
• Application
• Session
• Data link
A server administrator is analyzing a normal Transmission Control Protocol (TCP) Teardown connection to their servers. How many FIN-WAIT states does the client go through during this process?
• Three
• One
• Two
• Four
A cable operator needs to transition from one cable type to another. Which of the following would best help?
• MDI
• Repeater
• Hub
• Media converter
A help desk technician is trying to troubleshoot the end of a cable but is uncertain where the other end is. What could the technician use to help find the other end of the cable?
• Loopback tool
• Multimeter
• Fox and Hound
• Wire map tester
A network administrator is setting up an Exterior Gateway Protocol (EGP). Which of the following protocols are part of the EGP class?
• OSPF
• EIGRP
• BGP
• RIP
A server administrator needs to allow a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. What should the server administrator set up?
• Port mirroring
• Jumbo frames
• Port aggregation
• Flow control
A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following?
• IXP
• PSTN
• CPE
• IANA
A Windows user is trying to remote desktop into an application server, Although the user can ping the FQDN, they are unable to establish a connection. What is most likely the cause?
• DNS misconfiguration
• Firewall blocking TCP port 3389
• The application server is on a different VLAN
• The application server is down
A project manager is ordering equipment to set up fiber cabling in a new building. Which of the following tools will allow a more permanent join with lower insertion loss?
• Crimper
• Fusion splicer
• Block tool
• Punchdown tool
A help desk technician is helping to troubleshoot connectivity issues. Users report that they are receiving a blinking amber light. This is indicative of what type of issue?
• Disconnect at other end
• Port disabled
• Connected but no traffic
• Fault detected
Which of the following processes of an identity and access management (IAM) system proves that the user is who they say they are?
• Identification
• Authorization
• Accounting
• Authentication
An organization has secured its website with SSL/TLS (Secure Sockets Layer/Transport Layer Security). By default, what port will this encrypted traffic use?
• TCP port 443
• TCP port 53
• TCP port 80
• UDP port 53
A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following?
• CPE
• IANA
• PSTN
• IXP
A network architect is planning a new setup for a new company that has yet to build buildings. Which of the following would the architect set up for a /16 network?
• Multicast
• Class B
• Class C
• Class A
A network technician needs to strengthen the security of the company network by minimizing the amount of traffic required for the operation of the valid network services, and no additional access to be permitted. What is the technician placing into the network?
• Endpoint security
• Control plane policing
• Hardening
• Firewall access control lists (ACLs)
While looking for a cloud deployment model for business operations, the network specialist looks for a model where several organizations share the costs of either a hosted private or fully private cloud. Which cloud deployment model meets the network specialist's and businesses' needs?
• Community
• Public (or multitenant)
• Private
• Hosted Private
An organization hired a security firm to hack into its systems in order to determine what type of exploitable weaknesses the organization was vulnerable to. What kind of testing is this?
• Vulnerability scanning
• Threat hunting
• Penetration testing
• Zero-day
A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?
• The power level is too high for the APs on the far side
• An incorrect channel assignment is on the nearest APs
• Interference exists around the AP on the far side
• The nearest APs are configured for 802.11g
A network engineer needs to decommission a server and wipe all custom configurations. What routine will the engineer use to wipe the server?
• Motion Detection
• Sanitization
• Asset Tags
• Factory Reset
A security architect is looking over network topologies where each endpoint node connects to a central forwarding node. What is this called?
• Star
• Point-to-point
• Client server
• Mesh
A company tasks its network specialist with configuring a steel shelving system for patch panels, switches and routers, and server devices. What is the name of this system?
• Wiring Diagram
• Change Management
• Floor Plan
• Rack
A network consultant needs to develop a plan that sets out the procedures, tools, methods of communication, and guidelines when mitigating a problem. What is the name of this plan?
• Incident Response Plan
• Service Legal Agreement
• Disaster Recovery Plan
• Security Response
A systems administrator is looking at technology in the organization's environment and finds Fast Link Pulse. What does this technology do?
• Sends link integrity test signals
• Does not support autonegotiation
• Supports up to 10 Mbps
• Typically deployed on new networks
A network engineer wants to establish data communications over a greater distance than a Local Area Network (LAN). What technology will the network engineer use to gain the desired distance?
• Enterprise WAN
• Digital Subscriber Line
• WAN
• T-Carrier
A network technician is troubleshooting a connection from a client and decides to use the bottom to top troubleshooting methodology. Which step would the technician perform first?
• Determine subsystem
• Test theory
• Determine if hardware or software related
• Isolate subsystem variables
A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
• SSID
• MIMO
• TKIP
• LTE
An administrator has blocked access to port 23 to prevent users from using an unsecure terminal emulation software and protocol. What is the administrator blocking the use of?
• Telnet
• SSH
• TFTP
• FTP
A network engineer installs a new Virtual Private Network (VPN) set up dynamically according to traffic requirements and demand. What is the type of VPN installed?
• Dynamic Multipoint VPN
• Hub and Spoke VPN
• VPN headend
• Remote Access VPN
A technician is consolitaing a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
• Basic service set
• WPA
• Seamless roaming
• MU-MIMO
A network administrator is require to ensure that auditors have read-only access to the system logs, while system administrators have read and wire access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
• Least privileges
• User-based permissions
• Role-based access
• Mandatory acces control
A network technician is laying out coax cables and needs to order more termination connectors. What should the technician order?
• RJ-11
• F-type
• QSFP+ DAC
• SFP+ DAC
Demikian Pertanyaan dan Jawaban untuk latihan CompTIA Network+ (N10-008) FINAL NETWORK
These are the Questions and Answers for the CompTIA Network+ (N10-008) FINAL NETWORK+ practice
Posting Komentar untuk "Question Answer CompTIA Network+ (N10-008) Network+ Final Review"