Text Material Preview
N10-008 Exam Name: CompTIA Network+Exam Full version: 613 Q&As Full version of N10-008 Dumps Share some N10-008 exam dumps below. 1. A company is utilizing multifactor authentication for data center access. Which of the following is the MOST effective security mechanism against physical intrusions due to stolen credentials? A. Biometrics security hardware B. Access card readers 1 / 49 https://www.certqueen.com/N10-008.html C. Access control vestibule D. Motion detection cameras Answer: C 2. A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case? A. DB9 B. RJ11 C. RJ45 D. DB25 Answer: B Explanation: RJ11 is a type of connector that is commonly used for analog phone lines. RJ11 has four wires and six positions, but only two or four of them are used. A technician can crimp an RJ11 connector to a new phone line to install an analog desk phone for a new receptionist. Reference: https://www.comptia.org/blog/what-is-rj11 3. Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO). A. Deauthentication attack B. Malware infection C. IP spoofing D. Firmware corruption E. Use of default credentials F. Dictionary attack Answer: BE 4. Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links? A. OSPF B. RIPv2 C. QoS D. STP Answer: A 2 / 49 5. A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations? A. Capture a network baseline B. Perform an environmental review. C. Read the network logs D. Run a bandwidth test Answer: A Explanation: Before making any recommendations, a network technician should first capture a network baseline, which is a snapshot of the current performance of the network. This will give the technician a baseline to compare against after any changes are made. According to the CompTIA Network+ Study Manual, the technician should "capture the state of the network before making any changes and then compare the performance after the changes have been made. This will provide an accurate baseline to compare the performance of the network before and after the changes have been made." 6. A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST? A. Validate the roaming settings on the APs and WLAN clients B. Verify that the AP antenna type is correct for the new layout C. Check to see if MU-MIMO was properly activated on the APs D. Deactivate the 2.4GHz band on the APS Answer: A Explanation: The network administrator should check the roaming settings on the APs and WLAN clients first. Roaming is the process of switching from one AP to another without losing connectivity. If the roaming settings are not configured properly, some users may experience poor connectivity when their devices stay connected to a distant AP instead of switching to a closer one. Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan- wlan/82068-roam-faq.html 7. A technician is consolidating a topology with multiple SSlDs into one unique SSID 3 / 49 deployment. Which of the following features will be possible after this new configuration? A. Seamless roaming B. Basic service set C. WPA D. MU-MIMO Answer: A 8. A small, family-run business uses a single SOHO router to provide Internet and WiFi to its employees. At the start of a new week, employees come in and find their usual WiFi network is no longer available, and there is a new wireless network to which they cannot connect. Given that information, which of the following should have been done to avoid this situation? A. The device firmware should have been kept current. B. Unsecure protocols should have been disabled. C. Parental controls should have been enabled D. The default credentials should have been changed Answer: D Explanation: The default credentials are the username and password that come with a device or service when it is first installed or configured. They are often easy to guess or find online, which makes them vulnerable to unauthorized access or attacks. The default credentials should be changed to something unique and strong as soon as possible to avoid this situation. If the default credentials were not changed, someone could have accessed the SOHO router and changed the WiFi settings without the employees’ knowledge. Reference: https://www.comptia.org/blog/network-security-basics-6-easy-ways-to-protect-your- network 9. Which of the following is a security flaw in an application or network? A. A threat B. A vulnerability C. An exploit D. A risk Answer: B Explanation: A vulnerability is a security flaw in an application or network that can be exploited by an attacker, allowing them to gain access to sensitive data or take control of the system. 4 / 49 Vulnerabilities can range from weak authentication methods to unpatched software, allowing attackers to gain access to the system or data they would not otherwise be able to access. Exploits are programs or techniques used to take advantage of vulnerabilities, while threats are potential dangers, and risks are the likelihood of a threat becoming a reality. 10. A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST? A. Network performance baselines B. VLAN assignments C. Routing table D. Device configuration review Answer: D 11. Which of the following BEST describes a spirt-tunnel client-to-server VPN connection? A. The client sends an network traffic down the VPN tunnel B. The client has two different IP addresses that can be connected to a remote site from two different ISPs to ensure availability C. The client sends some network traffic down the VPN tunnel and other traffic to the local gateway. D. The client connects to multiple remote sites at the same time Answer: C Explanation: In a split-tunnel VPN, the client can access both the local network and the remote network simultaneously, with some network traffic sent through the VPN tunnel and other traffic sent to the local gateway. This approach allows for more efficient use of bandwidth and reduces the load on the VPN server. It also allows the client to continue accessing local resources while connected to the remote network. 12. A network administrator responds to a support ticket that was submitted by a customer who is having issues connecting to a website inside of the company network. The administrator verities that the customer could not connect to a website using a URL. Which of the following troubleshooting steps would be BEST for the administrator to take? A. Check for certificate issues B. Contact the ISP C. Attempt to connect to the site via IP address 5 / 49 D. Check the NTP configuration. Answer: C Explanation: The best option for the administrator to take would be to attempt to connect to the site via IP address. This will help to determine if the issue is related to the website's DNS address or if the site itself is not accessible. Checking for certificate issues may be necessary, but this should be done afterthe administrator has attempted to connect to the site via IP address. Contacting the ISP is unnecessary since the issue is related to the website inside of the company network, and checking the NTP configuration is not relevant to this issue. When a customer is having issues connecting to a website using a URL, one of the first troubleshooting steps a network administrator should take is attempting to connect to the site using the IP address of the website. This will help to determine if the issue is related to a DNS resolution problem or a connectivity problem. If the administrator is able to connect to the website using the IP address, then the issue may be related to a DNS problem. However, if the administrator is still unable to connect, then the issue may be related to a connectivity problem. In either case, further troubleshooting steps will be necessary. Checking for certificate issues or NTP configuration, and contacting the ISP would not be the BEST initial steps in this scenario. 13. A company is reviewing ways to cut the overall cost of Its IT budget. A network technician suggests removing various computer programs from the IT budget and only providing these programs on an as-needed basis. Which of the following models would meet this requirement? A. Multitinency B. laaS C. SaaS D. VPN Answer: C Explanation: SaaS stands for Software as a Service and is a cloud computing model where software applications are hosted and delivered over the internet by a service provider. SaaS can help the company cut the overall cost of its IT budget by eliminating the need to purchase, install, update, and maintain various computer programs on its own devices. The company can access the programs on an as-needed basis and pay only for what it uses. Multitenancy is a feature of cloud computing where multiple customers share the same physical or virtual resources. IaaS stands for Infrastructure as a Service and is a cloud computing model where computing resources such as servers, storage, and networking are provided over the internet by a service 6 / 49 provider. VPN stands for Virtual Private Network and is a technology that creates a secure and encrypted connection over a public network. Reference: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.9: Compare and contrast common network service types. 14. A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect. Which of the following describes the issue? A. Rogue DHCP server B. Misconfigured HSRP C. DNS poisoning D. Exhausted IP scope Answer: C Explanation: DNS poisoning is a type of attack that modifies the DNS records of a domain name to point to a malicious IP address instead of the legitimate one. This can result in users being directed to cloned websites that are stealing credentials, even if they enter the correct URL for the website. The incorrect DNS server address on the user’s PC could be a sign of DNS poisoning, as the attacker could have compromised the DNS server or spoofed its response to redirect the user’s queries. Reference: https://www.comptia.org/blog/what-is-dns-poisoning 15. While working in a coffee shop, an attacker watches a user log in to a corporate system and writes down the user's log-in credentials. Which of the following social engineering attacks is this an example of? A. Shoulder surfing B. Dumpster diving C. Phishing D. Tailgating Answer: A Explanation: Shoulder surfing is the social engineering attack where an attacker watches a user log in to a corporate system and writes down the user’s log-in credentials. Social engineering is a type of 7 / 49 attack that exploits human psychology and behavior to manipulate or trick people into revealing sensitive information or performing malicious actions. Shoulder surfing is a form of social engineering that involves observing or eavesdropping on someone’s screen, keyboard, or paper documents to obtain confidential information such as passwords, PINs, or credit card numbers. Shoulder surfing can be done in person or remotely using cameras or other devices. Shoulder surfing can be prevented by using privacy filters, locking screens, shielding keyboards, or being aware of one’s surroundings. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Shoulder Surfing? | Definition & Examples | Forcepoint 16. A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully? A. Ensure an implicit permit rule is enabled B. Configure the log settings on the firewalls to the central syslog server C. Update the firewalls with current firmware and software D. Use the same complex passwords on all firewalls Answer: C Explanation: Updating the firewalls with current firmware and software is an important step to ensure all the firewalls are hardened successfully, as it can fix any known vulnerabilities or bugs and provide new features or enhancements. Enabling an implicit permit rule is not a good practice for firewall hardening, as it can allow unwanted traffic to pass through the firewall. Configuring the log settings on the firewalls to the central syslog server is a good practice for monitoring and auditing purposes, but it does not harden the firewalls themselves. Using the same complex passwords on all firewalls is not a good practice for password security, as it can increase the risk of compromise if one firewall is breached. Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 3.0 Network Security, Objective 3.3 Given a scenario, implement network hardening techniques. 17. A new office space is being designed. The network switches are up. but no services are running yet A network engineer plugs in a laptop configured as a DHCP client to a switch. 8 / 49 Which of the following IP addresses should be assigned to the laptop? A. 10.1.1.1 B. 169.254.1.128 C. 172 16 128 128 D. 192 168.0.1 Answer: B Explanation: When a DHCP client is connected to a network and no DHCP server is available, the client can automatically configure a link-local address in the 169.254.0.0/16 range using the Automatic Private IP Addressing (APIPA) feature. So, the correct answer is option B, 169.254.1.128. This is also known as an APIPA address. Reference: CompTIA Network+ Study Guide, Exam N10-007, Fourth Edition, by Todd Lammle (Chapter 4: IP Addressing) 18. A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer? A. Port duplex settings B. Port aggregation C. ARP settings D. VLAN tags E. MDIX settings Answer: A 19. A Chief Executive Officer and a network administrator came to an agreement With a vendor to purchase new equipment for the data center A document was drafted so all parties would be Informed about the scope of the project before It started. Which of the following terms BEST describes the document used? A. Contract B. Project charter C. Memorandum of understanding D. Non-disclosure agreement Answer: B Explanation: The document used to inform all parties about the scope of the project before it starts is likely a 9 / 49 project charter.A project charter is a document that outlines the key aspects of a project, including the project's objectives, scope, stakeholders, and resources. It serves as a formal agreement between the project team and the stakeholders, and helps to define the project's goals and constraints. A project charter typically includes information about the project's scope, including the specific deliverables that are expected and any constraints or limitations that may impact the project. It may also include details about the project team and stakeholders, the project schedule and budget, and the roles and responsibilities of each party. By creating a project charter, the Chief Executive Officer and the network administrator can ensure that all parties involved in the project have a clear understanding of the project's goals and objectives, and can help to prevent misunderstandings or miscommunications during the project. What is in a project charter? A project charter is a formal short document that states a project exists and provides project managers with written authority to begin work. A project charter document describes a project to create a shared understanding of its goals, objectives and resource requirements before the project is scoped out in detail. What are the 5 elements of the project charter? What Are the Contents of a Project Charter? A project charter should always include an overview, an outline of scope, an approximate schedule, a budget estimate, anticipated risks, and key stakeholders 20. To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device. Which of the Mowing can be configured to fulfill this requirement? A. QoS traffic classification B. Port mirroring C. Flow control D. Link Aggregation Control Protocol Answer: B 21. Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure? A. Business continuity plan B. Onboarding and offboarding policies C. Acceptable use policy 10 / 49 D. System life cycle E. Change management Answer: A 22. A network administrator requires redundant routers on the network, but only one default gateway is configurable on a workstation. Which of the following will allow for redundant routers with a single IP address? A. EIGRP B. VRRP C. MPLS D. STP Answer: B Explanation: Virtual Router Redundancy Protocol (VRRP) is a protocol that allows for redundant routers on the network with a single IP address. VRRP works by creating a virtual router that consists of one master router and one or more backup routers. The virtual router has its own IP address and MAC address that are shared among the routers in the group. The master router responds to traffic sent to the virtual router’s IP address, while the backup routers monitor the master router’s status. If the master router fails, one of the backup routers takes over as the new master router and continues to respond to traffic. This way, VRRP provides high availability and fault tolerance for the network. Reference: https://www.comptia.org/training/books/network-n10-008-study-guide (page 230) 23. Which of the following would a network administrator configure to set NTP settings for a specific subnet within DHCP? A. Reservation B. Lease time C. Scope options D. Exclusion range Answer: C Explanation: The network administrator would configure scope options to set NTP settings for a specific subnet within DHCP. Scope options are settings that apply to a range of IP addresses that are assigned by a DHCP server. Scope options can include parameters such as default gateway, DNS server, and NTP server. By configuring the NTP server option for a specific scope, the network administrator can ensure that the devices in that subnet synchronize their clocks with 11 / 49 the same time source. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 121; The Official CompTIA Network+ Student Guide (Exam N10-008), page 5-11. 24. An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report. The tool was configured to scan using the following information: Network address: 172.28.16.0 CIDR: /22 The engineer collected the following information from the client workstation: IP address: 172.28.17.206 Subnet mask: 255.255.252.0 Which of the following MOST likely explains why the tool is failing to detect some workstations? A. The scanned network range is incorrect. B. The subnet mask on the client is misconfigured. C. The workstation has a firewall enabled. D. The tool is unable to scan remote networks. Answer: C Explanation: A firewall is a device or software that filters and controls the incoming and outgoing network traffic based on predefined rules. A firewall can block ICMP packets, which are used for ping and other diagnostic tools. If the workstation has a firewall enabled, it may not respond to the ICMP sweep and appear as offline. The engineer should check the firewall settings on the workstation and allow ICMP traffic if needed. Reference: Network+ Study Guide Objective 4.1: Given a scenario, use the appropriate tool. 25. A network technician receives a support ticket concerning multiple users who are unable access the company's shared drive. The switch interface that the shared drive Is connected to is displaying die following: 12 / 49 Which of the following is MOST likely the Issue? A. The switchport Is shut down B. The cable Is not plugged In. C. The loopoack Is not set D. The bandwidth configuration is incorrect. Answer: A Explanation: The switchport is shut down, which means it is administratively disabled and cannot forward traffic. The image shows that the switchport status is “down” and the protocol status is “down”, indicating that there is no physical or logical connection. The cable is plugged in, as shown by the “connected” message under the interface name. The loopback is not set, as shown by the “loopback not set” message under the encapsulation type. The bandwidth configuration is correct, as shown by the “BW 10000 Kbit/sec” message under the MTU size. Reference: [CompTIA Network+ Certification Exam Objectives], Domain 3.0 Infrastructure, Objective 3.1: Given a scenario, use appropriate networking tools, Subobjective: Command line tools (ping, netstat, tracert, etc.) 26. An engineer is designing a network topology for a company that maintains a large on- premises private cloud. A design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal server IP ranges. Which of the following defense strategies helps meet this requirement? A. Implementing a screened subnet B. Deploying a honeypot C. Utilizing network access control D. Enforcing a Zero Trust model Answer: A Explanation: A screened subnet is a network topology that uses two firewalls to isolate a segment of the network from both the internal LAN and the internet. The screened subnet, also known as a demilitarized zone (DMZ), hosts the internet-facing servers that need to be accessible from outside the network, such as web servers, mail servers, or DNS servers. The first firewall, also known as the external firewall, filters the traffic between the internet and the DMZ, allowing only the necessary ports and protocols to pass through. The second firewall, also known as the internal firewall, filters the traffic between the DMZ and the internal LAN, allowing only authorized and secure connections to access the internal resources. This way, the screened subnet provides a layer of protection for both the internet-facing hosts and the internal LAN from13 / 49 potential attacks12. The other options are not defense strategies that help meet the design requirement of partitioning off the internet-facing hosts from the internal LAN and internal server IP ranges. Deploying a honeypot is a deception technique that lures attackers to a fake system or network that mimics the real one, in order to monitor their activities and collect information about their methods and motives. However, a honeypot does not isolate or protect the internet-facing hosts from the rest of the network3. Utilizing network access control is a security method that enforces policies on who or what can access the network resources, based on factors such as identity, role, device type, location, or time. However, network access control does not create a separate segment for the internet-facing hosts from the internal LAN. Enforcing a Zero Trust model is a security paradigm that assumes no trust for any entity inside or outside the network, and requires continuous verification and validation of every request and transaction. However, a Zero Trust model does not necessarily imply a specific network topology or architecture for separating the internet-facing hosts from the internal LAN. 27. Which of the following is used to track and document various types of known vulnerabilities? A. CVE B. Penetration testing C. Zero-day D. SIEM E. Least privilege Answer: A Explanation: CVE stands for Common Vulnerabilities and Exposures, which is a list of publicly disclosed cybersecurity vulnerabilities that is free to search, use, and incorporate into products and services. CVE provides a standardized identifier and description for each vulnerability, as well as references to related sources of information. CVE helps to track and document various types of known vulnerabilities and facilitates communication and coordination among security professionals. Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network- n10-008-exam-objectives-(2-0), https://cve.mitre.org/cve/ 28. You are tasked with verifying the following requirements are met in order to ensure network security. Requirements: 14 / 49 Datacenter Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic Building A Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide devices to support 5 additional different office users Add an additional mobile user Replace the Telnet server with a more secure solution Screened subnet Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage Provide a server to handle external 80/443 traffic Provide a server to handle port 20/21 traffic INSTRUCTIONS Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled. Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. 15 / 49 Answer: Screened Subnet devices C Web server, FTP server Building A devices C SSH server top left, workstations on all 5 on the right, laptop on bottom left DataCenter devices C DNS server. 16 / 49 29. A network administrator is setting up a new phone system and needs to define the location where VoIP phones can download configuration files. Which of the following DHCP services can be used to accomplish this task? A. Scope options B. Exclusion ranges C. Lease time D. Relay Answer: A Explanation: To define the location where VoIP phones can download configuration files, the network administrator can use scope options within the Dynamic Host Configuration Protocol (DHCP) service. Scope options are a set of values that can be configured within a DHCP scope, which defines a range of IP addresses that can be leased to clients on a network. One of the scope options that can be configured is the option for the location of the configuration file server, which specifies the URL or IP address of the server where the configuration files can be downloaded. https://pbxbook.com/voip/dhcpcfg.html 30. Which of the following attacks, if successful, would provide a malicious user who is 17 / 49 connected to an isolated guest network access to the corporate network? A. VLAN hopping B. On-path attack C. IP spoofing D. Evil twin Answer: A Explanation: The attack which, if successful, would provide a malicious user who is connected to an isolated guest network access to the corporate network is VLAN hopping. VLAN hopping is an attack technique which involves tricking a switch into sending traffic from one VLAN to another. This is done by sending specially crafted packets, which force the switch to send traffic from one VLAN to another, thus allowing the malicious user to gain access to the corporate network. VLAN hopping is an attack technique which involves tricking a switch into sending traffic from one VLAN to another. This is done by sending specially crafted packets, which force the switch to send traffic from one VLAN to another, thus allowing the malicious user to gain access to the corporate network. According to the CompTIA Network+ N10-008 Exam Guide VLAN hopping is a type of attack that is used to gain access to network resources that are not meant to be accessible by a user on a guest network. 31. A network technician is troubleshooting a connection to a web server. The Technician Is unable to ping the server but is able to verify connectivity to the web service using Tenet. Which of the following protocols is being blocked by me firewall? A. UDP B. ARP C. ICMP D. TCP Answer: C Explanation: ICMP (Internet Control Message Protocol) is a protocol that is used to send error and control messages between network devices, such as ping requests and replies. ICMP is being blocked by the firewall, which prevents the network technician from pinging the web server. TCP (Transmission Control Protocol) is a protocol that provides reliable and ordered delivery of data between network devices, such as web service requests and responses using HTTP (Hypertext Transfer Protocol). TCP is not being blocked by the firewall, which allows the network technician to verify connectivity to the web service using Telnet. UDP (User Datagram Protocol) is a protocol that provides fast and efficient delivery of data between network devices, but does not 18 / 49 guarantee reliability or order. UDP is used for applications such as streaming media or online gaming. ARP (Address Resolution Protocol) is a protocol that resolves IP addresses to MAC addresses on a local network. Reference: [CompTIA Network+ Certification Exam Objectives], Domain 2.0 Networking Concepts, Objective 2.1: Compare and contrast OSI and TCP/IP models, Subobjective: TCP/IP model layers (Application/Transport/Internet/Network Interface) 32. A security engineer is trying to determine whether an internal server was accessed by hosts on the internet. The internal server was shut down during the investigation. Which of the following will the engineer review to determine whether the internal server had an unauthorized access attempt? A. The server's syslog B. The NetFlow statistics C. The firewall logs D. The audit logs on the core switch Answer: A 33. A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?A. FTP B. TFTP C. SMTP D. SFTP Answer: D 34. A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice? A. 802.11a B. 802.11b C. 802.11g D. 802.11n Answer: D Explanation: 19 / 49 35. Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections? A. Layer 3 switch B. VPN headend C. Next-generation firewall D. Proxy server E. Intrusion prevention Answer: C Explanation: Next-generation firewalls can provide content filtering and threat protection, and can manage multiple IPSec site-to-site connections. Reference: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security. 36. A systems administrator wants to use the least amount of equipment to segment two departments that nave cables terminating in the same room. Which of the following would allow this to occur? A. A load balancer B. A proxy server C. A Layer 3 switch D. A hub E. A Layer 7 firewall F. The RSSI was not strong enough on the link Answer: C 37. A technician is configuring a static IP address on a new device in a newly created subnet. The work order specifies the following requirements: • The IP address should use the highest address available in the subnet. • The default gateway needs to be set to 172.28.85.94. • The subnet mask needs to be 255.255.255.224. Which of the following addresses should the engineer apply to the device? A. 172.28.85.93 B. 172.28.85.95 C. 172.28.85.254 D. 172.28.85.255 Answer: A Explanation: 20 / 49 https://www.tunnelsup.com/subnet-calculator/ IP Address: 172.28.85.95/27 Netmask: 255.255.255.224 Network Address: 172.28.85.64 Usable Host Range: 172.28.85.65 - 172.28.85.94 Broadcast Address: 172.28.85.95 38. A large metropolitan city is looking to standardize the ability tor police department laptops to connect to the city government's VPN The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city's needs? A. 5G B. LTE C. Wi-Fi 4 D. Wi-Fi 5 E. Wi-Fi 6 Answer: B 39. A client moving into a new office wants the IP network set up to accommodate 412 network- connected devices that are all on the same subnet. The subnet needs to be as small as possible. Which of the following subnet masks should be used to achieve the required result? A. 255.255.0.0 B. 255.255.252.0 C. 255.255.254.0 D. 255.255.255.0 Answer: B Explanation: 40. A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks needs to be completed to allow the phone to operate correctly? A. Assign the phone's switchport to the correct VLAN B. Statically assign the phone's gateway address. C. Configure a route on the VoIP network router. D. Implement a VoIP gateway 21 / 49 Answer: A 41. A bank installed a new smart TV to stream online video services, but the smart TV was not able to connect to the branch Wi-Fi. The next day. a technician was able to connect the TV to the Wi-Fi, but a bank laptop lost network access at the same time. Which of the following is the MOST likely cause? A. DHCP scope exhaustion B. AP configuration reset C. Hidden SSID D. Channel overlap Answer: A Explanation: DHCP scope exhaustion is the situation when a DHCP server runs out of available IP addresses to assign to clients. DHCP stands for Dynamic Host Configuration Protocol, which is a network protocol that automatically assigns IP addresses and other configuration parameters to clients on a network. A DHCP scope is a range of IP addresses that a DHCP server can distribute to clients. If the DHCP scope is exhausted, new clients will not be able to obtain an IP address and connect to the network. This can explain why the smart TV was not able to connect to the branch Wi-Fi on the first day, and why the bank laptop lost network access on the next day when the TV was connected. The technician should either increase the size of the DHCP scope or reduce the lease time of the IP addresses to avoid DHCP scope exhaustion. Reference: [CompTIA Network+ Certification Exam Objectives], DHCP Scope Exhaustion - What Is It? How Do You Fix It? 42. A network administrator is connecting two Layer 2 switches in a network These switches must transfer data in multiple networks. Which of the following would fulfill this requirement? A. Jumbo frames B. 802. IQ tagging C. Native VLAN D. Link aggregation Answer: B Explanation: The technique that would fulfill the requirement of transferring data in multiple networks is 802.1Q tagging. 802.1Q tagging is a method of adding a tag or identifier to Ethernet frames that indicate which VLAN (Virtual Local Area Network) they belong to. VLANs are logical 22 / 49 subdivisions of a network that allow devices in different physical locations or segments to communicate as if they were in the same network. VLANs improve network performance, security, and management by reducing broadcast traffic, isolating sensitive data, and grouping devices by function or department. By using 802.1Q tagging, two Layer 2 switches can exchange data from multiple VLANs over a single trunk link, without mixing or losing the VLAN information. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 64; The Official CompTIA Network+ Student Guide (Exam N10-008), page 2-12. 43. Which of the following uses the destination IP address to forward packets? A. A bridge B. A Layer 2 switch C. A router D. A repeater Answer: C Explanation: A router is a device that uses the destination IP address to forward packets between different networks. A bridge and a Layer 2 switch operate at the data link layer and use MAC addresses to forward frames within the same network. A repeater is a device that amplifies or regenerates signals at the physical layer. 44. 11n is a wireless standard that supports up to 600 Mbps data rate and operates in both the 2.4 GHz and 5 GHz frequency bands. 802.11n uses multiple-input multiple-output (MIMO) technology to increase the number of spatial streams and improve the wireless performance and range. 802.11n meets the requirements of the wireless network design. Reference: Network+ Study Guide Objective 1.6: Explain the functions of network services. 45. Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question: 23 / 49 Which of the following should a wireless technician do NEXT to troubleshoot this issue? A. Reconfigure the channels to reduce overlap B. Replace the omni antennas with directional antennas C. Update the SSIDs on all the APs D. Decrease power in AP 3 and AP 4 Answer: A Explanation: Based on the site survey table, we can see that AP 2, AP 3, and AP 4 are all broadcasting on the same channel, which can cause interference and affect performance. Therefore, the next step a wireless technician should take to troubleshoot this issue is to reconfigure the channels to reduce overlap. This will help to improve network performance and eliminate any interference. Reference: Network+ N10-007 Certification Exam Objectives, Objective 2.8: Given a scenario, troubleshoot common wireless problems and perform site surveys. 46. A technician wants to monitor and provide traffic segmentation across the network. The technician would like to assign each department a specific identifier. Which of the following will the technicianMOST likely use? A. Flow control B. Traffic shaping C. VLAN tagging D. Network performance baselines Answer: C Explanation: To monitor and provide traffic segmentation across the network, a technician may use the concept of VLANs (Virtual Local Area Networks). VLANs are a way of dividing a single physical network into multiple logical networks, each with its own unique identifier or "tag." By assigning each department a specific VLAN identifier, the technician can segment the network traffic and ensure that the different departments' traffic is kept separate from one another. This can help to improve network security, performance, and scalability, as well as allowing for better monitoring and control of the network traffic. To implement VLANs, the technician will need to configure VLAN tagging on the network devices, such as switches and routers, and assign each department's devices to the appropriate VLAN. The technician may also need to configure VLAN trunking to allow the different VLANs to communicate with each other. 24 / 49 By using VLANs, the technician can effectively monitor and segment the network traffic, providing better control and visibility into the network. 47. A technician received a report that some users in a large, 30-floor building are having intermittent connectivity issues. Users on each floor have stable connectivity, but do not have connectivity to other floors. Which of the following devices is MOST likely causing the issue? A. User devices B. Edge devices C. Access switch D. Core switch Answer: D Explanation: A core switch is the most likely device causing the issue where users on each floor have stable connectivity, but do not have connectivity to other floors. A core switch is a high-performance switch that connects multiple access switches in a network. An access switch is a switch that connects end devices, such as computers and printers, to the network. A core switch acts as the backbone of the network, providing interconnection and routing between different subnets or VLANs. If the core switch is malfunctioning or misconfigured, it can prevent communication between different segments of the network, resulting in intermittent connectivity issues. Reference: [CompTIA Network+ Certification Exam Objectives], Core Switch vs Access Switch: What Are the Differences? 48. An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, me administrator sees me following entries: Which of the following firewall rules is MOST likely causing the issue? A. Rule 1 B. Rule 2 25 / 49 C. Rule 3 D. Rule 4 Answer: A 49. A network device is configured to send critical events to a syslog server; however, the following alerts are not being received: Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down Which of the following describes the reason why the events are not being received? A. The network device is not configured to log that level to the syslog server B. The network device was down and could not send the event C. The syslog server is not compatible with the network device D. The syslog server did not have the correct MIB loaded to receive the message Answer: A Explanation: The reason why the alerts are not being received is that the network device is not configured to log that level to the syslog server. The severity level for the events may need to be adjusted in order for them to be sent to the syslog server. Reference: Network+ Certification Study Guide, Chapter 8: Network Troubleshooting 50. Which of the following connector types would have the MOST flexibility? A. SFP B. BNC C. LC D. RJ45 Answer: A Explanation: SFP (Small Form-factor Pluggable) is a connector type that has the most flexibility. It is a hot- swappable transceiver that can support different speeds, distances, and media types depending on the module inserted. It can be used for both copper and fiber connections and supports various protocols such as Ethernet, Fibre Channel, and SONET. Reference: https://www.fs.com/what-is-sfp-transceiver-aid-11.html 51. A SQL server connects over port: A. 445. B. 995 26 / 49 C. 1433. D. 1521. Answer: C Explanation: A SQL server connects over port 1433. Port numbers are used to identify specific applications or services on a network device. Port 1433 is the default port for Microsoft SQL Server, which is a relational database management system that uses SQL (Structured Query Language) to store and manipulate data. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 147; The Official CompTIA Network+ Student Guide (Exam N10-008), page 6-4. 52. A network engineer is designing a wireless network that has the following requirements: • Network speed must be higher than 100Mbps • Must use the 2.4GHz and 5GHz bands Which of the following 802.11 standards should the engineer select? A. 802. lla B. 802.11b C. 802. 11g D. 802.11 n Answer: D Explanation: 53. Which of the following fouling protocols is generally used by major ISPs for handing large- scale internet traffic? A. RIP B. EIGRP C. OSPF D. BGP Answer: D 54. A customer has an attached USB printer that needs to be shared with other users. The desktop team set up printer sharing. Now, the network technician needs to obtain the necessary information about the PC and share it with other users so they can connect to the printer. Which of the following commands should the technician use to get the required information? (Select TWO). A. arp B. route 27 / 49 C. netstat D. tcpdump E. hostname F. ipconfig Answer: E, F Explanation: The hostname and ipconfig commands should be used to get the required information about the PC and share it with other users so they can connect to the printer. The hostname command displays the name of the computer on a network. The ipconfig command displays the IP configuration of the computer, including its IP address, subnet mask, default gateway, and DNS servers. These information are necessary for other users to locate and connect to the shared printer on the network. For example, other users can use the UNC path \\hostname\printername or \\ipaddress\printername to access the shared printer. Reference: [CompTIA Network+ Certification Exam Objectives], How to Share a Printer in Windows 10 55. A network technician needs to select an AP that will support at least 1.3Gbps and 5GHz only. Which of the following wireless standards must the AP support to meet the requirements? A. B B. AC C. AX D. N E. G Answer: B Explanation: Wireless AC is a wireless standard that supports up to 1.3Gbps data rate and operates in the 5GHz frequency band only. Wireless AC is also backward compatible with wireless A and N devices that use the 5GHz band. Wireless AC is suitable for high-performance applications such as HD video streaming and online gaming. Reference: Network+ Study Guide Objective 2.2: Explain the purposes and properties of routing and switching. Subobjective: Wireless standards and their characteristics. 56. A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors? 28 / 49 A. A bad wire on the Cat 5e cable B. The wrong VLAN assignment to the switchport C. A misconfigured QoS setting on the router D. Both sides of the switch trunk set to full duplex Answer: A 57. A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceout from the client to the server, and also from the server to the client. Whilecomparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings? A. Asymmetric routing B. A routing loop C. A switch loop D. An incorrect gateway Answer: C 58. A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low. Which Of the following is the MOST appropriate mechanism to handle this issue? A. Traffic shaping B. Flow control C. NetFIow D. Link aggregation Answer: A Explanation: Traffic shaping is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets1. Traffic shaping can help to improve the performance of a videoconferencing application by prioritizing its packets over other types of traffic and smoothing out traffic bursts. Traffic shaping can also help to avoid packet loss and ensure fair allocation of bandwidth among different applications or users. Flow control is a mechanism that prevents a sender from overwhelming a receiver with more data than it can handle. Flow control can help to avoid buffer overflow and data loss, but it does not prioritize different types of traffic or smooth out traffic bursts. Flow control operates at the data link layer or the transport layer, while traffic shaping operates at the network layer or 29 / 49 above. NetFlow is a protocol that collects and analyzes network traffic data for monitoring and troubleshooting purposes2. NetFlow can help to identify the sources, destinations, volumes, and types of traffic on a network, but it does not regulate or shape the traffic flow. NetFlow operates at the network layer or above. Link aggregation is a technique that combines multiple physical links into one logical link for increased bandwidth, redundancy, and load balancing. Link aggregation can help to improve the performance of a videoconferencing application by providing more available bandwidth at the WAN connection, but it does not prioritize different types of traffic or smooth out traffic bursts. Link aggregation operates at the data link layer. 59. Which of the following record types would be used to define where SIP is found? A. SRV B. CNAME C. A D. MX Answer: C Explanation: The record type that would be used to define where SIP (Session Initiation Protocol) is found is A (Address). A record is a type of DNS (Domain Name System) record that maps a domain name to an IPv4 address. SIP is a protocol that enables voice over IP (VoIP) communication, such as voice calls or video conferencing. SIP uses domain names to identify endpoints or servers involved in a communication session. Therefore, an A record is needed to resolve the domain name of a SIP endpoint or server to its IPv4 address. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 154; The Official CompTIA Network+ Student Guide (Exam N10-008), page 6-8. 60. Which or the following devices and encapsulations are found at me data link layer? (Select TWO) A. Session B. Frame C. Firewall D. Switch E. Packet F. Router Answer: B, D 30 / 49 Explanation: The data link layer is responsible for defining the format of data on the network and providing physical transmission of data. Devices that operate at this layer include switches and network interface cards (NICs). Encapsulations that are used at this layer include frames, which are units of data that contain a header, payload, and trailer. Frames are used to identify the source and destination of data on the network and to perform error detection. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 9; The Official CompTIA Network+ Student Guide (Exam N10-008), page 1-6. 61. According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue? A. Establish a plan of action to resolve the issue and identify potential effects B. Verify full system functionality and, if applicable, implement preventive measures C. Implement the solution or escalate as necessary D. Test the theory to determine the cause Answer: A Explanation: According to troubleshooting methodology, after determining the most likely probable cause of an issue, the next step is to establish a plan of action to resolve the issue and identify potential effects. This step involves defining the steps needed to implement a solution, considering the possible consequences of each step, and obtaining approval from relevant stakeholders if necessary. Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network- n10-008-exam-objectives-(2-0), https://www.comptia.org/blog/the-comptia-guide-to-it- troubleshooting 62. A technician knows the MAC address of a device and is attempting to find the device's IP address. Which of the following should the technician look at to find the IP address? (Select TWO). A. ARP table B. DHCP leases C. IP route table D. DNS cache E. MAC address table F. STP topology 31 / 49 Answer: B, E 63. A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall. Which of the following would be the MOST appropriate way to enable secure remote printing? A. SSH B. VPN C. Telnet D. SSL Answer: B Explanation: VPN (Virtual Private Network) is the most appropriate way to enable secure remote printing. VPN is a technology that creates a secure and encrypted tunnel over a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. VPN can be used for various purposes such as accessing corporate resources, bypassing geo-restrictions, or enhancing privacy and security. VPN can also be used for remote printing by allowing users to connect to a printer on the private network and send print jobs securely over the VPN tunnel. Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike- protocols/14106-how-vpn-works.html 64. The Chief Executive Officer of a company wants to ensure business operations are not disrupted in the event of a disaster. The solution must have fully redundant equipment, real-time synchronization, and zero data loss. Which Of the following should be prepared? A. Cloud site B. Warm site C. Hot site D. Cold site Answer: C Explanation: A hot site is a backup site that is fully equipped and ready to take over the operations of the primary site in the event of a disaster. A hot site has real-time synchronization with the primary site and can provide zero data loss. A hot site is the most expensive and reliable option for disaster recovery. 32 / 49 Reference: Network+ Study Guide Objective 5.3: Explain common scanning, monitoring and patching processes and summarize their expected outputs. 65. A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use? A. 255.255.128.0 B. 255.255.192.0 C. 255.255.240.0 D. 255.255.248.0 Answer: C Explanation: A subnet mask is a binary number that indicates which bits of an IP address belong to the network portion and which bits belong to the host portion. A slash notation (/n) indicates how many bits are used for the network portion. A /20 notation means that 20 bits are used for the network portion and 12 bits are used for the host portion. To convert /20 to a dotted decimal notation, we need to write 20 ones followed by 12 zeros in binary and then divide them into fouroctets separated by dots. This gives us 11111111.11111111.11110000.00000000 or 255.255.240.0 in decimal. Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network- n10-008-exam-objectives-(2-0), https://www.techopedia.com/definition/950/subnet-mask 66. A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise Each team member has been assigned an area to trouble shoot. Which of the following approaches is being used? A. Divide-and-conquer B. Top-to-bottom C. Bottom-to-top D. Determine if anything changed Answer: A 67. Which of the following attacks encrypts user data and requires a proper backup implementation to recover? A. DDoS 33 / 49 B. Phishing C. Ransomware D. MAC spoofing Answer: C Explanation: Ransomware is a type of malware that encrypts user data and demands a ransom for its decryption. Ransomware can prevent users from accessing their files and applications, and cause data loss or corruption. A proper backup implementation is essential to recover from a ransomware attack, as it can help restore the encrypted data without paying the ransom or relying on the attackers’ decryption key. Reference: https://www.comptia.org/blog/what-is-ransomware 68. A company is designing a SAN and would like to use STP as its medium for communication. Which of the following protocols would BEST suit me company's needs? A. SFTP B. Fibre Channel C. iSCSI D. FTP Answer: B Explanation: A SAN also employs a series of protocols enabling software to communicate or prepare data for storage. The most common protocol is the Fibre Channel Protocol (FCP), which maps SCSI commands over FC technology. The iSCSI SANs will employ an iSCSI protocol that maps SCSI commands over TCP/IP. STP (Spanning Tree Protocol) is a protocol used to prevent loops in Ethernet networks, and it is not a medium for communication in a storage area network (SAN). However, Fibre Channel is a protocol that is specifically designed for high-speed data transfer in SAN environments. It is a dedicated channel technology that provides high throughput and low latency, making it ideal for SANs. Therefore, Fibre Channel would be the best protocol for the company to use for its SAN. SFTP (Secure File Transfer Protocol), iSCSI (Internet Small Computer System Interface), and FTP (File Transfer Protocol) are protocols used for transferring files over a network and are not suitable for use in a SAN environment. 69. An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can 34 / 49 be down before impacting operations? A. MTTR B. RTO C. MTBF D. RPO Answer: B Explanation: The maximum duration that a given service can be down before it impacts operations is often referred to as the Recovery Time Objective (RTO). RTO is a key consideration in any backup and disaster recovery plan, as it determines how quickly the organization needs to be able to recover from a disruption or failure. It is typically expressed in terms of time, and it helps to inform the design and implementation of the backup solution. For example, if an organization has a critical service that must be available 24/7, it may have a very low RTO, requiring that the service be restored within a matter of minutes or even seconds. On the other hand, if the service can be down for a longer period of time without significantly impacting operations, the organization may have a higher RTO. When selecting a backup solution, it is important to consider the organization's RTO requirements and ensure that the solution is capable of meeting those needs. A solution that does not meet the organization's RTO requirements may not be sufficient to ensure the availability of critical services in the event of a disruption or failure. 70. A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ? A. Active-active B. Warm C. Cold D. Cloud Answer: B Explanation: Active-active refers to more than one NIC being active at the same time. In my opinion, this question is referring to a recovery site (hot, warm, cold, cloud) 71. Which of the following is a valid alternative to maintain a deployed proxy technology while saving physical space in the data center by moving the network service to the virtualization infrastructure? 35 / 49 A. NFV B. SDWAN C. Networking as code D. VIP Answer: A Explanation: The valid alternative to maintain a deployed proxy technology while saving physical space in the data center by moving the network service to the virtualization infrastructure is NFV (Network Function Virtualization). NFV is a technique that allows network functions, such as proxies, firewalls, routers, or load balancers, to be implemented as software applications running on virtual machines or containers. NFV reduces the need for dedicated hardware devices and improves scalability and flexibility of network services. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 440; The Official CompTIA Network+ Student Guide (Exam N10-008), page 16-11. NFV can be used to virtualize a wide variety of network functions, including proxy servers. By virtualizing proxy servers, organizations can save physical space in the data center and improve the scalability and efficiency of their networks. To virtualize a proxy server using NFV, an organization would need to deploy a virtualization platform, such as VMware ESXi or Microsoft Hyper-V. The organization would then need to install a virtual proxy server appliance on the virtualization platform. Once the virtual proxy server appliance is installed, it can be configured and used just like a physical proxy server. NFV is a relatively new technology, but it is quickly gaining popularity as organizations look for ways to improve the efficiency and scalability of their networks. 72. A customer called the help desk to report a network issue. The customer recently added a hub between the switch and the router in order to duplicate the traffic flow to a logging device. After adding the hub, all the Other network components that were connected to the switch slowed more than expected. Which Of the following is the MOST likely cause Of the issue? A. Duplex mismatch B. Flow control failure C. STP malfunction D. 802.1Q disabled Answer: A Explanation: 36 / 49 A duplex mismatch is a situation where two devices on a network have different duplex settings, such as full-duplex or half-duplex. Full-duplex means that a device can send and receive data simultaneously, while half-duplex means that a device can only send or receive data at a time. A duplex mismatch can cause performance issues, such as collisions, errors, or slow throughput. In this scenario, the customer added a hub between the switch and the router. A hub is a device that operates at half-duplex and broadcasts all traffic to all ports. A switch and a router are devices that operate at full-duplex and forward traffic to specific ports. Therefore, adding a hub between the switch and the router can cause a duplex mismatch and slow down all the other network components that were connected to the switch. Reference: https://www.comparitech.com/net-admin/hub-vs-switch-vs-router/ https://www.cisco.com/c/en/us/support/docs/lan-switching/ethernet/10561-3.html 73. A Fortune 500 firm is deciding On the kind or data center equipment to install given its five- year budget Outlook. The Chief Information comparing equipment based on the life expectancy Of different models. Which Of the followingconcepts BEST represents this metric? A. MTBF B. MTRR C. RPO D. RTO Answer: A 74. Which of the following issues are present with RIPv2? (Select TWO). A. Route poisoning B. Time to converge C. Scalability D. Unicast E. Adjacent neighbors F. Maximum transmission unit Answer: BC Explanation: The disadvantages of RIP (Routing Information Protocol) include the following. ---Outdated, insecure, and slow. This is your parents' protocol. It was a thing before the Web was born. ---The more well-known problem of the 15 hop limitation in which data must travel 37 / 49 ---Convergence time is terrible for information propagation in a network ---Metrics. It determines the number of hops from source to destination, and gives no regard to other factors when determining the best path for data to travel ---Overhead. A good example would be routing tables. These are broadcast at half-minute intervals to other routers regardless of whether the data has changed or not. It's essentially like those old cartoons where the town guard in the walled city cries out, '10 o' the clock and all is well!'. RIPv2 introduced more security and reduced broadcast traffic, which is relevant for some available answers here. 75. A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order: Device LC/LC patch cable Patch panel Cross-connect fiber cable Patch panel LC/LC patch cable Switch The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue? A. TX/RX is reversed B. An incorrect cable was used C. The device failed during installation D. Attenuation is occurring Answer: A Explanation: The most likely cause of the issue where the fiber connection from a device to a switch is not working is that the TX/RX (transmit/receive) is reversed. When connecting fiber optic cables, it is important to ensure that the TX of one device is connected to the RX of the other device and vice versa. If the TX/RX is reversed, data cannot be transmitted successfully. Reference: CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 5: 38 / 49 Network Operations, Objective 5.1: Given a scenario, use appropriate documentation and diagrams to manage the network. 76. A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access? A. CDMA B. CSMA/CD C. CSMA/CA D. GSM Answer: C Explanation: CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) is an IEEE 802.11 standard that would be best to use for multiple simultaneous client access on a wireless network. CSMA/CA is a media access control method that allows multiple devices to share the same wireless channel without causing collisions or interference. It works by having each device sense the channel before transmitting data and waiting for an acknowledgment from the receiver after each transmission. If the channel is busy or no acknowledgment is received, the device will back off and retry later with a random delay. Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan- wlan/82068-csma-ca.html 77. Which of the following refers to a weakness in a mechanism or technical process? A. Vulnerability B. Risk C. Exploit D. Threat Answer: A Explanation: The term that refers to a weakness in a mechanism or technical process is vulnerability. A vulnerability is a flaw or gap in a system’s security that can be exploited by an attacker to gain unauthorized access, compromise data, or cause damage. A vulnerability can be caused by design errors, configuration errors, software bugs, human errors, or environmental factors. For example, an outdated software version that has known security holes is a vulnerability that can be exploited by malware or hackers. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 342; The Official 39 / 49 CompTIA Network+ Student Guide (Exam N10-008), page 13-7. 78. A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing? A. NAT B. PAT C. STP D. SNAT E. ARP Answer: B Explanation: The firewall administrator is implementing a PAT (Port Address Translation) rule that directs HTTP traffic to an internal server listening on a non-standard socket. PAT is a type of NAT (Network Address Translation) that allows multiple devices to share a single public IP address by using different port numbers. PAT can also be used to redirect traffic from one port to another port on the same or different IP address. This can be useful for security or load balancing purposes. For example, a firewall administrator can configure a PAT rule that redirects HTTP traffic (port 80) from the public IP address of the firewall to an internal server that listens on a non-standard port (such as 8080) on its private IP address. Reference: https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation- nat/13772-12.html 79. Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an internet update server without exposing the devices to the public internet? A. Allow connections only to an internal proxy server. B. Deploy an IDS system and place it in line with the traffic. C. Create a screened network and move the devices to it. D. Use a host-based network firewall on each device. Answer: A Explanation: An internal proxy server is a server that acts as an intermediary between internal devices and external servers on the internet. An internal proxy server can be used to limit the ability of devices to perform only HTTPS connections to an internet update server by filtering and forwarding the requests and responses based on predefined rules or policies. An internal proxy server can also prevent the devices from being exposed to the public internet by hiding their IP 40 / 49 addresses and providing a layer of security and privacy. 80. Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices? A. WLAN controller B. Load balancer C. SIEM solution D. Syslog server Answer: A Explanation: A WLAN controller is a device that manages and controls multiple wireless access points (WAPs) in a wireless LAN (WLAN). A WLAN controller has the capability to centrally manage configuration, logging, and firmware versioning for distributed WAPs. A WLAN controller can also provide load balancing, security, and quality of service (QoS) for the WLAN. Reference: Network+ Study Guide Objective 3.1: Explain the purposes and use cases for advanced networking devices. 81. After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two). A. Ensure a bottleneck is not coming from other devices on the network. B. Install the latest firmware for the device. C. Create a new VLAN for the access point. D. Make sure the SSID is not longer than 16 characters. E. Configure the AP in autonomous mode. F. Install a wireless LAN controller. Answer: AB Explanation: One possible cause of poor wireless performance is a bottleneck in the network, which means that other devices or applications are consuming too much bandwidth or resources andlimiting the speed of the wireless access point. To troubleshoot this issue, the engineer should ensure that there is no congestion or interference from other devices on the network, such as wired clients, servers, routers, switches, or other wireless access points. The engineer can use tools such as network analyzers, bandwidth monitors, or ping tests to check the network traffic and latency12. Another possible cause of poor wireless performance is outdated firmware on the device, which 41 / 49 may contain bugs or vulnerabilities that affect the functionality or security of the wireless access point. To troubleshoot this issue, the engineer should install the latest firmware for the device from the manufacturer’s website or support portal. The engineer should follow the instructions carefully and backup the configuration before updating the firmware. The engineer can also check the release notes or changelog of the firmware to see if there are any improvements or fixes related to the wireless performance3. The other options are not relevant to troubleshooting poor wireless performance. Creating a new VLAN for the access point may help with network segmentation or security, but it will not improve the speed of the wireless connection. Making sure the SSID is not longer than 16 characters may help with compatibility or readability, but it will not affect the wireless performance. Configuring the AP in autonomous mode may give more control or flexibility to the engineer, but it will not enhance the wireless speed. Installing a wireless LAN controller may help with managing multiple access points or deploying advanced features, but it will not increase the wireless performance. 82. A consultant is working with two international companies. The companies will be sharing cloud resources for a project. Which of the following documents would provide an agreement on how to utilize the resources? A. MOU B. NDA C. AUP D. SLA Answer: A Explanation: A memorandum of understanding (MOU) is a document that describes an agreement between two or more parties on how to utilize shared resources for a project. An MOU is not legally binding, but it outlines the expectations and responsibilities of each party involved in the collaboration. An MOU can be used when two international companies want to share cloud resources for a project without creating a formal contract. Reference: https://www.comptia.org/training/books/network-n10-008-study-guide (page 405) 83. A technician is deploying a new SSID for an industrial control system. The control devices require the network to use encryption that employs TKIP and a symmetrical password to connect. Which of the following should the technician configure to ensure compatibility with the control devices? 42 / 49 A. WPA2-Enterprise B. WPA-Enterprise C. WPA-PSK D. WPA2-PSK Answer: C Explanation: "WPA uses Temporal Key Integrity Protocol (TKIP) for enhanced encryption. TKIP uses RC4 for the encryption algorithm, and the CompTIA Network+ exam may reference TKIP-RC4 in a discussion of wireless." " WPA2 uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) for integrity checking and Advanced Encryption Standard (AES) for encryption. On the Network+ exam, you might find this referenced as simply CCMP-AES" 84. A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data? A. Packet capture B. IPerf C. SIEM log review D. Internet speed test Answer: B Explanation: An engineer will most likely use IPerf to get detailed measurement data about the user's slow file transfers. IPerf is a tool used for measuring network performance and bandwidth, and it can be used to measure the speed and throughput of file transfers from the remote office. It can also provide detailed information about the latency and jitter of the connection, which can be used to troubleshoot the slow file transfers. Reference: CompTIA Network+ Study Manual (Chapter 10, Page 214). 85. A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic? A. A VoIP sales call with a customer B. An in-office video call with a coworker C. Routing table from the ISP 43 / 49 D. Firewall CPU processing time Answer: A Explanation: A VoIP sales call with a customer would be most affected by jitter greater than 10ms on the WAN connection. Jitter is the variation in delay of packets arriving at the destination. It can cause choppy or distorted audio quality for VoIP applications, especially over WAN links that have limited bandwidth and high latency. The recommended jitter for VoIP is less than 10ms. Reference: https://www.voip-info.org/voip-jitter/ 86. Which of the following systems would MOST likely be found in a screened subnet? A. RADIUS B. FTP C. SQL D. LDAP Answer: B Explanation: FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet1. A screened subnet typically hosts systems that need to be accessed by both internal and external users, such as web servers, email servers, or FTP servers. Reference: https://www.techtarget.com/searchsecurity/definition/screened-subnet#:~:text=A screened subnet%2C or triple-homed firewall%2C refers to,a perimeter network to isolate or sepa rate the 1 87. A network technician is having issues connecting an loT sensor to the internet The WLAN settings were enabled via a custom command line, and a proper IP address assignment was received on the wireless interlace. However, when trying to connect to the internet, only HTTP redirections are being received when data Is requested. Which of the following will point to the root cause of the Issue? A. Verifying if an encryption protocol mismatch exists. B. Verifying If a captive portal is active for the WLAN. C. Verifying the minimum RSSI for operation in the device's documentation D. Verifying EIRP power settings on the access point. Answer: C 44 / 49 Explanation: A captive portal is a web page that is displayed to a user before they can access the internet or other network resources. This is often used in public or guest networks to present users with a login or terms and conditions page before they can access the internet. If a captive portal is active on the WLAN, it would explain why the IoT sensor is only receiving HTTP redirections when trying to connect to the internet. 88. Which of the following focuses on application delivery? A. DaaS B. laaS C. SaaS D. PaaS Answer: C Explanation: SaaS is the cloud computing model that focuses on application delivery. SaaS stands for Software as a Service, which is a cloud computing model that provides software applications over the internet. SaaS allows customers to access and use software applications without installing or maintaining them on their own devices or servers. SaaS offers advantages such as scalability, accessibility, compatibility, and cost-effectiveness. Customers can use SaaS applications on demand and pay only for what they use. Reference: [CompTIA Network+ Certification Exam Objectives], What Is Software as a Service (SaaS)? | IBM 89. A network technician is selecting new network hardware, and availability is the main concern. Which of the following availability concepts should the technicianconsider? A. RTO B. MTTR C. MTBF D. RPO Answer: A Explanation: The availability concept that the network technician should consider when selecting new network hardware is RTO (Recovery Time Objective). RTO is a metric that defines the maximum acceptable time for restoring a system or service after a disruption or failure. RTO is based on the impact and cost of downtime for the business and its customers. RTO helps 45 / 49 determine the level of redundancy and backup needed for network hardware to ensure high availability and minimize downtime. Reference: CompTIA Network+ N10-008 Certification Study Guide, page 346; The Official CompTIA Network+ Student Guide (Exam N10-008), page 13-9. 90. A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey? A. Physical diagram B. Heat map C. Asset list D. Device map Answer: B Explanation: A heat map would most likely be created as a result of the site survey. A heat map is a graphical representation of the wireless signal strength and coverage in a given area. It can show the location of APs, antennas, walls, obstacles, interference sources, and dead zones. It can help with planning, optimizing, and troubleshooting wireless networks. Reference: https://www.netspotapp.com/what-is-a-wifi-heatmap.html 91. Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Select TWO). A. SNMPv3 B. SSh C. Telnet D. IPSec E. ESP F. Syslog Answer: BD 92. Which of the following ports is a secure protocol? A. 20 B. 23 C. 443 D. 445 Answer: C 46 / 49 Explanation: This is the port number for HTTPS, which stands for Hypertext Transfer Protocol Secure. HTTPS is a secure version of HTTP, which is the protocol used to communicate between web browsers and web servers. HTTPS encrypts the data sent and received using SSL/TLS, which are cryptographic protocols that provide authentication, confidentiality, and integrity. HTTPS is commonly used for online transactions, such as banking and shopping, where security and privacy are important 93. Which of the following layers is where TCP/IP port numbers identify which network application is receiving the packet and where it is applied? A. 3 B. 4 C. 5 D. 6 E. 7 Answer: B Explanation: Layer 4 is where TCP/IP port numbers identify which network application is receiving the packet and where it is applied. Layer 4 is also known as the transport layer in the TCP/IP model or the OSI model. The transport layer is responsible for providing reliable or unreliable end-to-end data transmission between hosts on a network. The transport layer uses port numbers to identify and multiplex different applications or processes that communicate over the network. Port numbers are 16-bit numbers that range from 0 to 65535 and are divided into three categories: well-known ports (0-1023), registered ports (1024-49151), and dynamic ports (49152-65535). Some examples of well-known port numbers are 80 for HTTP, 443 for HTTPS, and 25 for SMTP. Reference: [CompTIA Network+ Certification Exam Objectives], Transport Layer - an overview | ScienceDirect Topics 94. A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office? A. Multimode B. Cat 5e C. RG-6 D. Cat 6 E. 100BASE-T 47 / 49 Answer: C Explanation: RG-6 is a type of coaxial cable that is commonly used by cable companies to provide Internet access from the demarcation point back to the central office. It has a thicker conductor and better shielding than RG-59, which is another type of coaxial cable. Multimode and Cat 5e are types of fiber optic and twisted pair cables respectively, which are not typically used by cable companies. Cat 6 and 100BASE-T are standards for twisted pair cables, not types of cabling. 95. Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation coordination, and termination of the call? A. Session B. Physical C. Transport D. Data link Answer: A Explanation: The OSI model layer that ensures the initiation, coordination, and termination of a video call is the session layer. The session layer is responsible for establishing, maintaining, and terminating communication sessions between two devices on a network. More Hot Exams are available. 48 / 49 https://www.certqueen.com/promotion.asp 350-401 ENCOR Exam Dumps 350-801 CLCOR Exam Dumps 200-301 CCNA Exam Dumps Powered by TCPDF (www.tcpdf.org) 49 / 49 https://www.certqueen.com/350-401.html https://www.certqueen.com/350-801.html https://www.certqueen.com/200-301.html http://www.tcpdf.org