100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CompTIA Network+ (N10-008) Practice Test Questions And Answers!!

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
10-04-2024
Written in
2023/2024

A disgruntled employee used a shared login to access an organization's CRM system and deleted customer information. How will the organization react? - Answer-Incident response plan A systems architect is setting up traffic between an SDN controller and infrastructure devices through automation by scripts that call functions. What direction of traffic is this considered to be? - AnswerSouth A network link offers simultaneous communications in each direction. What defines this functionality? - Answer-Duplex An attacker plants a device in a native subnet and sends traffic to a computer on an external subnet in order to perform a denial of service (DoS) attack against the host in the external subnet. What type of attack does this refer to? - Answer-Virtual Local Area Network (VLAN) hopping A systems administrator is setting up communications for sending content to other hosts that have identified themselves as interested in receiving the originating host's content. What should they use? - Answer-Multicast What allows fine-grained control over traffic parameters? - Answer-Quality of Service (QoS) A system has a network of ASICs (Application-Specific Integrated Circuits) computing nodes organized into a cluster for training Artifical Intelligence (AI) models. There are 64 devices running non-stop. In a period of 48 hours, two of the devices failed. Calculate the Mean Time Between Failures (MTBF) for the Service Level Agreement (SLA). - Answer-MTBF (total time/number of failures) (48*64)/2=1536 It will fail in about 1536 hours or 64 days What access security controls are important to consider when managing remote access for network administrators? - Answer-Authentication and authorizationAn attacker used a malicious host with a spoofed physical address to perform cache poisoning and perpetuate an on-path attack. What can prevent these types of attacks? - Answer-DHCP snooping and ARP inspection An Active Directory administrator is trying to identify the primary authoritative server. What can they check to find this? - Answer-Start of Authority (SOA) record identifies the primary authoritative name server that maintains complete resource records for the zone A working physical server is experiencing network connectivity issues after switching connections to another physical port on a basic layer 2 switch. Identify the most likely problem with the switch. - Answer-Hardware failure A bad physical port or a hardware failure is most likely the cause of the issue, as the connection to the previous physical switch port was working fine. After setting up an evil twin, the attacker could sniff information about the authentication process. Users tried to reconnect to a wireless network and unknowingly connected to the rogue AP. What type of attack did the hacker most likely use to get the user to connect to the rogue AP? - AnswerDeauthentication; an evil twin may be coupled with a deauthentication attack A help desk operator is attempting to release a client's IP as part of their troubleshooting steps. What tools can they use to accomplish this? - Answer-Network Manager dhclient ipconfig A network technician is troubleshooting network issues between a workstation and a virtual server running a beta application. Network performance is lacking and there seems to be issues in between the source and destination. Which command will provide the technician with the best information regarding other nodes between the workstation and the remote host? - Answer-The pathping command A user logged on to a desktop client and was immediately prompted to enter credit card information to proceed. What type of attack is the user witnessing on screen? - Answer-RansomwareA technician recently installed a VoIP phone at a users desk. The workstation is not able to browse the Internet. The VoIP phone connects directly to the LAN and the workstation connects to the phone in a daisy-chain fashion. Other devices can connect successfully to the phone. At which layer of the OSI model would a network technician most likely continue troubleshooting? - Answer-Layer 3 (Network) is responsible for moving data around a network and routing data packets with IP addresses A communications company uses TIA/EIA IS-95 handsets that require each subscriber to use a code to key the modulation of their signal. The receiver uses this 'key' to extract the subscriber's traffic from the radio signal. What type of handset is the company using? - Answer-CDMA

Show more Read less
Institution
CompTIA Network+
Course
CompTIA Network+








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CompTIA Network+
Course
CompTIA Network+

Document information

Uploaded on
April 10, 2024
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PatrickKaylian Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1807
Member since
2 year
Number of followers
1043
Documents
22126
Last sold
15 hours ago

3.8

316 reviews

5
147
4
60
3
54
2
15
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions