CompTIA Network+ (N10-008) Practice Test Questions And Answers!!
A disgruntled employee used a shared login to access an organization's CRM system and deleted customer information. How will the organization react? - Answer-Incident response plan A systems architect is setting up traffic between an SDN controller and infrastructure devices through automation by scripts that call functions. What direction of traffic is this considered to be? - AnswerSouth A network link offers simultaneous communications in each direction. What defines this functionality? - Answer-Duplex An attacker plants a device in a native subnet and sends traffic to a computer on an external subnet in order to perform a denial of service (DoS) attack against the host in the external subnet. What type of attack does this refer to? - Answer-Virtual Local Area Network (VLAN) hopping A systems administrator is setting up communications for sending content to other hosts that have identified themselves as interested in receiving the originating host's content. What should they use? - Answer-Multicast What allows fine-grained control over traffic parameters? - Answer-Quality of Service (QoS) A system has a network of ASICs (Application-Specific Integrated Circuits) computing nodes organized into a cluster for training Artifical Intelligence (AI) models. There are 64 devices running non-stop. In a period of 48 hours, two of the devices failed. Calculate the Mean Time Between Failures (MTBF) for the Service Level Agreement (SLA). - Answer-MTBF (total time/number of failures) (48*64)/2=1536 It will fail in about 1536 hours or 64 days What access security controls are important to consider when managing remote access for network administrators? - Answer-Authentication and authorizationAn attacker used a malicious host with a spoofed physical address to perform cache poisoning and perpetuate an on-path attack. What can prevent these types of attacks? - Answer-DHCP snooping and ARP inspection An Active Directory administrator is trying to identify the primary authoritative server. What can they check to find this? - Answer-Start of Authority (SOA) record identifies the primary authoritative name server that maintains complete resource records for the zone A working physical server is experiencing network connectivity issues after switching connections to another physical port on a basic layer 2 switch. Identify the most likely problem with the switch. - Answer-Hardware failure A bad physical port or a hardware failure is most likely the cause of the issue, as the connection to the previous physical switch port was working fine. After setting up an evil twin, the attacker could sniff information about the authentication process. Users tried to reconnect to a wireless network and unknowingly connected to the rogue AP. What type of attack did the hacker most likely use to get the user to connect to the rogue AP? - AnswerDeauthentication; an evil twin may be coupled with a deauthentication attack A help desk operator is attempting to release a client's IP as part of their troubleshooting steps. What tools can they use to accomplish this? - Answer-Network Manager dhclient ipconfig A network technician is troubleshooting network issues between a workstation and a virtual server running a beta application. Network performance is lacking and there seems to be issues in between the source and destination. Which command will provide the technician with the best information regarding other nodes between the workstation and the remote host? - Answer-The pathping command A user logged on to a desktop client and was immediately prompted to enter credit card information to proceed. What type of attack is the user witnessing on screen? - Answer-RansomwareA technician recently installed a VoIP phone at a users desk. The workstation is not able to browse the Internet. The VoIP phone connects directly to the LAN and the workstation connects to the phone in a daisy-chain fashion. Other devices can connect successfully to the phone. At which layer of the OSI model would a network technician most likely continue troubleshooting? - Answer-Layer 3 (Network) is responsible for moving data around a network and routing data packets with IP addresses A communications company uses TIA/EIA IS-95 handsets that require each subscriber to use a code to key the modulation of their signal. The receiver uses this 'key' to extract the subscriber's traffic from the radio signal. What type of handset is the company using? - Answer-CDMA
Written for
- Institution
- CompTIA Network+
- Course
- CompTIA Network+
Document information
- Uploaded on
- April 10, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal