Lompat ke konten Lompat ke sidebar Lompat ke footer

Question Answer CompTIA Network+ (N10-008) Network+ Final Review

 


A technician want to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antena types should the AP utilize?

  • Directional
  • Parabolic
  • Omni
  • Yagi

A security company is working with a new customer and is describing different kinds of attacks they have discovered through research. What form of threat research does this represent?
  • Behavioral threat research
  • Threat data
  • Threat assessment
  • Reputational threat intelligence
A network administrator is reviewing interface error on a switch. Which of the following indicates that a switch port is receiving packet in excess of the configuration MTU?
  • Flooding
  • Runts
  • Giants
  • CRC errors
A network technician wants to upgrade the company's hub to avoid collisions. Which solution would help the technician accomplish this to the fullest extent?
  • Bridge
  • Switch
  • Router
  • Hub
An administrator is monitoring the performance metrics for a server and notices that the system memory utilization is very high. What does this indicate?
There is a problem with network traffic
There is low storage space
The system needs an upgrade
The storage I/O is too slow

The amount of data traffic both sent and received or calculated as a percentage of the available bandwidth is known as which interface monitoring metric?
Speed
Duplex
Duplex
Utilization
Resets

A helpdesk operator is troubleshooting communication issues for devices in different broadcast domains. What do the devices need to pass through to talk to each other?
Modem
Switch
Router
Hub

A network administrator is diagnosing a suspected problem with local addressing and packet delivery. Which of the following commands would the administrator use to add an entry to the ARP cache?
  • arp -d
  • arp -s
  • arp -g
  • arp -a
An organization purchased a new router with built-in firewall features. The administrator configured the new appliance and it worked as expected. However, after 90 days the firewall stopped working. What is the most likely cause?
There weren’t enough routes allowed in the routing table
There weren’t enough ports on the device
The license trial period ended
The routing protocols stopped working

An administrator is using DHCP and wants to retain centralized management of IP addressing but needs to ensure that specific devices that supply always-on functionality have static IP address assignments. What is the best solution?
Configure static assignments on those devices
Create reservations
Configure scopes
Assign addresses from a specially configured exclusion range

An organization needs to use shared mailboxes for managing customer inquiries. What mailbox access protocol should the clients utilize to retrieve the mail over secured connections?
IMAP
IMAPS
MAPI
POP3S

A client is trying to connect to a network. The client can get an IP address but does not have internet access and decides to see if they are issued an APIPA address. Which of the following would fall under the APIPA range?
169.254.0.0 through 169.254.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
10.0.0.0 to 10.255.255.255

A network technician is trying to troubleshoot attenuation and measure accordingly. What unit of measurement expresses attenuation?
Mbps
dB
ms
SNR

A network administrator discovers that users in an adjacent building are connecting to the company’s guest wireless network to download inappropriate material. Which of the following can the administrator do to MOST easily mitigate this issue?
Enable wireless client isolation
Enable wireless port security
Adjust the wireless channels
Reduce the wireless power levels

A security architect is dividing a network into logically distinct zones for security and administrative control. Which of the following should the security architect use?
VLANs
Flow control
CAMs
Port security
Flow control

A network cabling operator is looking at different fiber optic connector form factors. Which of the following only works for multimode?
LC
MTRJ
SC
ST

A cyber security technician speaks with a department that has voiced concern regarding tech issues. The technician discovered that the employee had received an email containing an attachment from an outside party. Curious about what the document contained, the employee clicked on the link. The next day, the employee noticed that some of the software was not working correctly, and some important documents were no longer accessible. What was likely the cause of this issue?
Malware
DDoS
On-path attack
DNS Poisoning

A helpdesk operator is troubleshooting issues on a Windows client and wants to try to flush their dynamic IP address so that they can pull another one. Which command will help the helpdesk operator do this?
ipconfig /release
ipconfig /flushdns
ipconfig /all
ipconfig /renew

A project manager is preparing a team to set up cabling infrastructure in a new building. Which of the following tools should they order to be able to create patch cords?
Cable strippers
Crimper
Punchdown tool
Block tool

An application developer is attempting to troubleshoot issues with ASCII conversion for their application. At which layer of the OSI model are they troubleshooting?
Presentation
Application
Session
Data link

A server administrator is analyzing a normal Transmission Control Protocol (TCP) Teardown connection to their servers. How many FIN-WAIT states does the client go through during this process?
Three
One
Two
Four

A cable operator needs to transition from one cable type to another. Which of the following would best help?
MDI
Repeater
Hub
Media converter

A help desk technician is trying to troubleshoot the end of a cable but is uncertain where the other end is. What could the technician use to help find the other end of the cable?
Loopback tool
Multimeter
Fox and Hound
Wire map tester

A network administrator is setting up an Exterior Gateway Protocol (EGP). Which of the following protocols are part of the EGP class?
OSPF
EIGRP
BGP
RIP

A server administrator needs to allow a server to instruct the switch to pause traffic temporarily to avoid overwhelming its buffer and causing it to drop frames. What should the server administrator set up?
Port mirroring
Jumbo frames
Port aggregation
Flow control

A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following?
IXP
PSTN
CPE
IANA

A Windows user is trying to remote desktop into an application server, Although the user can ping the FQDN, they are unable to establish a connection. What is most likely the cause?
DNS misconfiguration
Firewall blocking TCP port 3389
The application server is on a different VLAN
The application server is down

A project manager is ordering equipment to set up fiber cabling in a new building. Which of the following tools will allow a more permanent join with lower insertion loss?
Crimper
Fusion splicer
Block tool
Punchdown tool

A help desk technician is helping to troubleshoot connectivity issues. Users report that they are receiving a blinking amber light. This is indicative of what type of issue?
Disconnect at other end
Port disabled
Connected but no traffic
Fault detected

Which of the following processes of an identity and access management (IAM) system proves that the user is who they say they are?
Identification
Authorization
Accounting
Authentication

An organization has secured its website with SSL/TLS (Secure Sockets Layer/Transport Layer Security). By default, what port will this encrypted traffic use?
TCP port 443
TCP port 53
TCP port 80
UDP port 53

A junior IT technician configures a purchased private computer network for a small bakery. The placement of a SOHO router within the building is which of the following?
CPE
IANA
PSTN
IXP

A network architect is planning a new setup for a new company that has yet to build buildings. Which of the following would the architect set up for a /16 network?
Multicast
Class B
Class C
Class A

A network technician needs to strengthen the security of the company network by minimizing the amount of traffic required for the operation of the valid network services, and no additional access to be permitted. What is the technician placing into the network?
Endpoint security
Control plane policing
Hardening
Firewall access control lists (ACLs)

While looking for a cloud deployment model for business operations, the network specialist looks for a model where several organizations share the costs of either a hosted private or fully private cloud. Which cloud deployment model meets the network specialist's and businesses' needs?
Community
Public (or multitenant)
Private
Hosted Private

An organization hired a security firm to hack into its systems in order to determine what type of exploitable weaknesses the organization was vulnerable to. What kind of testing is this?
Vulnerability scanning
Threat hunting
Penetration testing
Zero-day

A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?
The power level is too high for the APs on the far side
An incorrect channel assignment is on the nearest APs
Interference exists around the AP on the far side
The nearest APs are configured for 802.11g

A network engineer needs to decommission a server and wipe all custom configurations. What routine will the engineer use to wipe the server?
Motion Detection
Sanitization
Asset Tags
Factory Reset

A security architect is looking over network topologies where each endpoint node connects to a central forwarding node. What is this called?
Star
Point-to-point
Client server
Mesh

A company tasks its network specialist with configuring a steel shelving system for patch panels, switches and routers, and server devices. What is the name of this system?
Wiring Diagram
Change Management
Floor Plan
Rack

A network consultant needs to develop a plan that sets out the procedures, tools, methods of communication, and guidelines when mitigating a problem. What is the name of this plan?
Incident Response Plan
Service Legal Agreement
Disaster Recovery Plan
Security Response

A systems administrator is looking at technology in the organization's environment and finds Fast Link Pulse. What does this technology do?
Sends link integrity test signals
Does not support autonegotiation
Supports up to 10 Mbps
Typically deployed on new networks

A network engineer wants to establish data communications over a greater distance than a Local Area Network (LAN). What technology will the network engineer use to gain the desired distance?
Enterprise WAN
Digital Subscriber Line
WAN
T-Carrier

A network technician is troubleshooting a connection from a client and decides to use the bottom to top troubleshooting methodology. Which step would the technician perform first?
Determine subsystem
Test theory
Determine if hardware or software related
Isolate subsystem variables

A store owner would like to have secure wireless access available for both business equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
SSID
MIMO
TKIP
LTE

An administrator has blocked access to port 23 to prevent users from using an unsecure terminal emulation software and protocol. What is the administrator blocking the use of?
Telnet
SSH
TFTP
FTP

A network engineer installs a new Virtual Private Network (VPN) set up dynamically according to traffic requirements and demand. What is the type of VPN installed?
Dynamic Multipoint VPN
Hub and Spoke VPN
VPN headend
Remote Access VPN

A technician is consolitaing a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
Basic service set
WPA
Seamless roaming
MU-MIMO

A network administrator is require to ensure that auditors have read-only access to the system logs, while system administrators have read and wire access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
Least privileges
User-based permissions
Role-based access
Mandatory acces control

A network technician is laying out coax cables and needs to order more termination connectors. What should the technician order?
RJ-11
F-type
QSFP+ DAC
SFP+ DAC

Demikian Pertanyaan dan Jawaban untuk latihan CompTIA Network+ (N10-008) FINAL NETWORK
These are the Questions and Answers for the CompTIA Network+ (N10-008) FINAL NETWORK+ practice
Rio Widyatmoko
Rio Widyatmoko Desainer Grafis, Trainer, Developer & Pecandu Teknologi Lulus dengan Jurusan Sistem Informasi, Jangan ragu untuk terhubung dengan saya di Media Sosial Instagram: @widyatmokorio :)

Posting Komentar untuk "Question Answer CompTIA Network+ (N10-008) Network+ Final Review"