Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Network+ N10-008 Practice Questions and Answers, Exams of Network Theory

Practice questions and answers for the network+ n10-008 certification exam, covering topics such as network security, cabling, ip addressing, and wireless networks.

Typology: Exams

2023/2024

Available from 04/09/2024

Jayju
Jayju 🇺🇸

416 documents

1 / 51

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Network + N10-008 practice Questions
and answers
Which of the following tools would generate this output?
Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established CORRECT ANSWERS
Netstat - displays active/ listening connections
People living near your business are using your guest Wi-Fi in order to gain free
Internet access and to download questionable files. Which of the following can be
done to most easily address this issue? CORRECT ANSWERS Reduce the wireless
power levels - adjusting the power level of nap can be an easy way to decrease
the radius in which people can connect to your Wi-Fi. Leaving your power levels at
their default can lead to many unintended individuals seeing your network
Which protocol would be used to exchange information between different
Autonomous systems? CORRECT ANSWERS BSP - is an EGP (external gateway
protocol) and is used to exchange information between autonomous systems.
autonomous systems. - A network or a group of networks owned/controlled by a
single entity
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33

Partial preview of the text

Download Network+ N10-008 Practice Questions and Answers and more Exams Network Theory in PDF only on Docsity!

and answers

Which of the following tools would generate this output? Protocol. Local address. Foreign address. State TCP 127.0.0.1:48512 Desktop-Open:64251. Established TCP 127.0.0.1:64251. Desktop-Open:48512. Established CORRECT ANSWERS✅ Netstat - displays active/ listening connections People living near your business are using your guest Wi-Fi in order to gain free Internet access and to download questionable files. Which of the following can be done to most easily address this issue? CORRECT ANSWERS✅ Reduce the wireless power levels - adjusting the power level of nap can be an easy way to decrease the radius in which people can connect to your Wi-Fi. Leaving your power levels at their default can lead to many unintended individuals seeing your network Which protocol would be used to exchange information between different Autonomous systems? CORRECT ANSWERS✅ BSP - is an EGP (external gateway protocol) and is used to exchange information between autonomous systems. autonomous systems. - A network or a group of networks owned/controlled by a single entity

and answers

Which of the following controls could be used to allow employees entry into building to be recorded by a card reader? CORRECT ANSWERS✅ Access control vestibules - physical or logical list of who entered a room/building. This could be a sign in sheet or even a complex system that reads RFID cards and records who enters/leaves in area electronically Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices? CORRECT ANSWERS✅ TACACS+ While troubleshooting a network you notice a connection reporting Late collisions over a half duplex link. You verify that both ends of the device are indeed running half duplex interfaces. Given that information which of the following answers is the most likely cause of this scenario? CORRECT ANSWERS✅ The cable length is excessive - whenever you see lake collisions that is a telltale sign that your cable is running past its maximum recommended length for example twisted-pair cables shouldn't be run further than 100 m ( 328ft) While configuring a load balancer between multiple systems which of the following must be configured in order to ensure proper connectivity during a fail over? CORRECT ANSWERS✅ VIP - virtual IP an essential part of configuring load balance systems as a single system

and answers

Keeping a device up today is an essential step in hardening any system Which of the following solutions would allow for high speed, low latency, and globally disperse content distribution? CORRECT ANSWERS✅ Public cloud — CDNs or content delivery networks are load balance networks that are geographically separated in order to provide the best connection for local users while also providing normal load balancing services. This is just the idea of having many servers all around the world to serve many people A new network was set up in order to facilitate more users in a building near your companies HQ. The new network is connected to the HQ's LAN via a fiber optic cable. However many users on the new network are unable to access the companies Intranet despise being able to access the Internet. Which of the following corrections would most likely resolve this issue? CORRECT ANSWERS✅ Correct the external firewall gateway address — Could be a misconfigured firewall

and answers

Which of the following attacks consists of following closely behind a real employee into a secure building by grabbing the door without their knowledge? CORRECT ANSWERS✅ Tailgating — Is the act of following somebody into a secure area without their knowledge Piggybacking is following somebody into a secure area with their knowledge IP headers would be found under which of the following OSI layers? CORRECT ANSWERS✅ Layer 3- routers, IPv4 , IPv6, and ICMP Which of the following solutions would provide redundancy for a server if our main concern is physical port failure CORRECT ANSWERS✅ NIC teaming — Utilizing multiple physical network cards/ethernet ports in order to connect to the network. This would allow one to physically fail while keeping network connectivity Which of the following is the largest MTU for a standard ethernet frame CORRECT ANSWERS✅ 1500

and answers

In order to save money, you're trying to make a purchasing decision in order to get a device that provides access ports for edge systems are also allowing routing between networks. Which of the following pieces of hardware would be best for fill this requirement CORRECT ANSWERS✅ A layer three switch — We want to connect our clients via access ports (The job of a switch) and also connects to other networks ( The job of a router) this is the perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3 switch has the capabilities of both a switch and a router While installing Wi-Fi for a large amount of users, we want to utilize and 802. Standard with the maximum amount of channels in order to prioritize reducing interference. While researching which standard we should utilize, we see if you different frequencies that different 802.11 standards utilize. Which of the following frequencies ranges should we utilize given the above requirement? CORRECT ANSWERS✅ 5 GHz. — 23 non overlapping channels Which of the following would most likely be used to review previous upgrades to a system CORRECT ANSWERS✅ Change management Which of the following commands can be used to display the pass that networking traffic takes to reach other networks CORRECT ANSWERS✅ Show route

and answers

While using many unmanaged switches in your home you decided to connect redundant cables between the switches in order to increase redundancy. However, since this change was made you started experiencing extreme amounts of latency. Which of the following problems is most likely occurring? CORRECT ANSWERS✅ A broadcast storm — Having redundant connections between switches runs the risk of allowing broadcast storms to propagate through your network. This is especially true of unmanaged switches which would like many of the basic security controls of manage switches, such as STP Which of the following best describes a network appliance that warns of unapproved devices that are accessing the network CORRECT ANSWERS✅ IDS - intrusion detection system Which of the following technologies will allow many WAP's to broadcast the same SSID across a multi story building while providing continuous connectivity? CORRECT ANSWERS✅ Extended service set — ESSID allows users to seamlessly reconnect to a different access point when they walk far enough away from their original access point. This is great for a company with a large physical footprint that wants one consistent wireless network

and answers

While we would generally increase the scope of the DHCP pool that may cause other problems which is why we see this question states we want to avoid increasing the scope by reducing the least time we will cycle through IP at a quicker rate then we otherwise would allowing us to reuse IP address is much more quickly What type of cable would likely be used to connect to the WAN Port on a cable modem CORRECT ANSWERS✅ Coaxial Which of the following would need to be configured to ensure a device with a specific Mac addresses always assigned the same IP address from DHCP CORRECT ANSWERS✅ Reservation — While a static assignment would ensure a device would have a consistent IP address the question states that it Has to be from DHCP making a Mac reservation our best answer What port enables telnet access to a device CORRECT ANSWERS✅ 23 Telnet

and answers

What should be reviewed on a switch in order to review physical network addresses CORRECT ANSWERS✅ MAC table— Mac addresses are physical network addresses You were troubleshooting a network switch that seem to have stopped responding to request when the login level was set to debugging which of the following should be checked to begin troubleshooting the switch CORRECT ANSWERS✅ CPU utilization — If setting logging to debugging the highest level/lease severe level of logging you end up asking the device for all logs which is information on an incredible amount of traffic What is used to track and document various types of known vulnerabilities CORRECT ANSWERS✅ CVE- Common vulnerability and exposure

and answers

After trying to set up a port mirror with the following configuration: Switch mirror port details: eth0:10.1.2.3 AA:BB:CC:DD:EE:FF Which of the following commands could be entered on the PC to finish this configuration? CORRECT ANSWERS✅ Ifconfig eth0 promisc — Turns on promiscuous mode Which of the following command can confirm the name of a Linux server CORRECT ANSWERS✅ Nslookup— The OS of the server who's name we are confirming doesn't affect the command we run we determine the command we use based on the OS that we are actively using if we were running commands in order to query in the DNS( name) information of a device we would use nslookup on a Windows system or DIG on a Linux system A new cabling certification is being requested every time and network technician rebuilds one end of a CAT 6 (vendor-certified) Cable to create a crossover

and answers

connection that is used to connect switches which of the following will address this issue by allowing the use of the original cable CORRECT ANSWERS✅ MDIX— Auto MDIX allows a cable to take the correct connection requirements. (Crossover vs straight through) and that's the opposite end of the cable becomes less important to the tech Which of the following devices could be used to detect which devices exit on a given network? CORRECT ANSWERS✅ Ip scanner A simply IP scanning tool could tell you which devices exist on your network and what their IP addresses are a port scanner would be a close second but it would provide more information in the question is asking for making an IP scanner a better answer ( it would should open/close ports as well as services running) After investigating reporter for network performance and network admin finds hundreds of CRC Errors on an interface which of the following is the most likely cause of these errors CORRECT ANSWERS✅ A bad wire on the Cat 5e cable CRC Errors can because by a multitude of issues these issues can range from corrupt data to noise (interference) On the cable to just plain bad cabling

and answers

report that the network connections frequently disconnect and reconnect throughout the day which of the following is the most likely cause of this issue CORRECT ANSWERS✅ Channel overlap is occurring A high-rise building is likely to have many AP's set up by various businesses which is likely to cause considerable interference resulting in an unstable connection The network device is configured to send critical events to a syslog server but severity five alerts are not being received from networking devices CORRECT ANSWERS✅ The network device is not configured to log that level to the syslog server. Whenever a particular syslog level is configured A system returns all events from that level and more severe Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices CORRECT ANSWERS✅ TACACS+ SSO Is a tempting answer we are asking what can actually manage these accounts not the terminology used to describe having a centrally manage account

and answers

When assigned 196.168.1.0/26 as a network, an admin gave a router the following up configurations Ip address: 192.168.1. Subnet mask: 255.255.255. Gateway: 192.168.1. Users on the network immediately lost connectivity what is the most likely reason as to why? CORRECT ANSWERS✅ The incorrect IP address was configured A CIDR of /26 is the equivalent of the subnet mask 255.255.255. Which of the following features would allow us to condense multiple SSID into a single SSID CORRECT ANSWERS✅ Seamless roaming Seamless roaming allows you to dynamically connect to different APs as your room through building all of these APs would have the same SSID in order to signify they are the same network

and answers

A workstation is configured with the following information IP :172.20.5. Mask: 172.20.5.0/ Gateway: 172.20.5. Which of the following addresses would represent the broadcast address of this network CORRECT ANSWERS✅ 172.20.5. A /27 network could contain 32 IP address (5.0-5.31) the first address (5.0) is the network ID the last address (5.31) is the broadcast address and all addresses between those are valid assignable hosts (5.1-5.30) And network is experiencing a number of CRC errors during normal operations which of the following layers of the OSI model will likely need troubleshooting? CORRECT ANSWERS✅ Layer 2 CRC errors are contained within an ethernet header ( layer2) A network tech is reviewing the interface counters on a routers interface the tech is attempting to confirm a cabling issue given the information below which of the following metrics confirms that there is a cabling issue?

and answers

CRC's : Giants : Runts : Multicast:12 CORRECT ANSWERS✅ CRC's CRC's Measure the number of frame errors detected over an interface which could be caused by corrupt data noise ( interference) on the cable or just plain bad cabling Which of the following records can be used to track the number of changes on a DNS zone CORRECT ANSWERS✅ SOA Start of authority ( admninstrative DNS info/ for zone transfers) Are use her in a branch office reports that access to all files has been lost after receiving a new PC all other users in the branch can access file shares the IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router but the machine cannot ping the router which of the following