Practice Free N10-008 Exam Online Questions
A network consultant is setting up a new wireless infrastructure. The new infrastructure is primarily focused on supporting legacy equipment that does not support the newest standards.
Which of the following frequency ranges will the consultant most likely have to support?
- A . 2.4GHz
- B . 5GHz
- C . 5.9GHz
- D . 6GHz
A
Explanation:
The most likely frequency range that the network consultant will have to support is 2.4GHz. This is because the most common legacy wireless standards, 802.11b and 802.11g, use the 2.4GHz range1. IEEE 802.11a uses 5GHz exclusively, and 5.9GHz and 6GHz are not widely used by legacy equipment. Therefore, A. 2.4GHz is the correct answer.
https://www.networkcomputing.com/networking/wireless-beginners-part-1-rf-and-waves
A network administrator is talking to different vendors about acquiring technology to support a new project for a large company.
Which of the following documents will MOST likely need to be signed before information about the project is shared?
- A . BYOD policy
- B . NDA
- C . SLA
- D . MOU
B
Explanation:
NDA stands for Non-Disclosure Agreement, which is a legal contract between two or more parties that outlines confidential material, knowledge, or information that the parties wish to share with one another for certain purposes, but wish to restrict access to by others. A network administrator may need to sign an NDA before sharing information about a new project with different vendors, as the project may involve sensitive or proprietary data that the company wants to protect from competitors or unauthorized use.
Reference: https://www.adobe.com/sign/esignature-resources/sign-nda.html
A public, wireless ISP mounts its access points on top of traffic signal poles. Fiber-optic cables are installed from a fiber switch through the ground and up the pole to a fiber-copper media converter, and then connected to the AP. In one location, the switchport is showing sporadic link loss to the attached AP. A similar link loss is not seen at the AP interface. The fiber-optic cable is moved to another unused switchport with a similar result.
Which of the following steps should the assigned technician complete NEXT?
- A . Disable and enable the switchport.
- B . Clean the fiber-optic cable ends.
- C . Replace the media converter.
- D . Replace the copper patch cord.
B
Explanation:
Fiber-optic cables are cables that use light signals to transmit data over long distances at high speeds. Fiber-optic cables are sensitive to dirt, dust, moisture, or other contaminants that can interfere with the light signals and cause link loss or signal degradation. To troubleshoot link loss issues with fiber-optic cables, one of the steps that should be completed next is to clean the fiber-optic cable ends with a lint-free cloth or a specialized cleaning tool. Cleaning the fiber-optic cable ends can remove any dirt or debris that may be blocking or reflecting the light signals and restore the link quality.
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections After troubleshooting, the administrator determines that moving from one location to another causes the disconnection.
Which of the following settings should provide better network stability?
- A . Client association timeout
- B . RSSl roaming threshold
- C . RF attenuation ratio
- D . EIRP power setting
B
Explanation:
In this case, the most likely cause of the constant disconnections when moving from one location to another is likely due to a problem with the roaming functionality of the wireless network. The setting that would likely provide better network stability in this situation is the RSSI roaming threshold, which determines the signal strength required for a client device to remain connected to the wireless network. If the roaming threshold is set too low, the client device may disconnect and reconnect to the network too frequently as it moves between different access points. On the other hand, if the threshold is set too high, the client device may not roam to a new access point when necessary, leading to a loss of connectivity. Adjusting the RSSI roaming threshold to an appropriate value may help to improve the stability of the wireless network in this situation.
A network technician is investigating why a core switch is logging excessive amounts of data to the syslog server.
The running configuration of the switch showed the following logging information:
ip ssh logging events
logging level debugging
logging host 192.168.1.100
logging synchronous
Which of the following changes should the technician make to best fix the issue?
- A . Update the logging host IP.
- B . Change to asynchronous logging.
- C . Stop logging SSH events.
- D . Adjust the logging level.
D
Explanation:
The logging level debugging is the highest level of logging, which means that the switch will log every possible event, including low-priority and verbose messages. This can result in excessive amounts of data being sent to the syslog server, which can affect the performance and storage of the server. To fix the issue, the technician should adjust the logging level to a lower value, such as informational, warning, or error, depending on the desired level of detail and severity. This will reduce the amount of log data generated by the switch and only send the relevant and necessary messages to the syslog server.
https://betterstack.com/community/guides/logging/log-levels-explained/
Which of the following should be used to manage outside cables that need to be routed to various multimode uplinks?
- A . Fiber distribution panel
- B . 110 punchdown block
- C . PDU
- D . TIA/EIA-568A patch bay
- E . Cat 6 patch panel
A
Explanation:
A fiber distribution panel is a device that provides a central location for connecting and managing fiber optic cables and optical modules. It can support various types and speeds of fiber optic links, including multimode uplinks. Therefore, a fiber distribution panel should be used to manage outside cables that need to be routed to various multimode uplinks.
Which of the following network management methods is able to perform various automated tasks?
- A . SSH
- B . CLI
- C . GUI
- D . API
D
Explanation:
API stands for Application Programming Interface, which is a set of rules and protocols that allow different software applications to communicate and exchange data. Network automation can use APIs to perform various automated tasks, such as configuring devices, provisioning resources, monitoring performance, and optimizing networks. APIs can enable network automation to interact with different network elements, platforms, and services, regardless of their vendor, technology, or architecture.
The other options are not correct because:
SSH stands for Secure Shell, which is a protocol that allows secure remote access to a network device. SSH can be used to manually configure and manage a network device, but it does not automate network tasks by itself.
CLI stands for Command-Line Interface, which is a text-based interface that allows users to interact with a network device by typing commands. CLI can be used to manually configure and manage a network device, but it does not automate network tasks by itself.
GUI stands for Graphical User Interface, which is a visual interface that allows users to interact with a network device by using icons, menus, and windows. GUI can be used to manually configure and manage a network device, but it does not automate network tasks by itself.
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 pm. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network.
Which of the following solutions would address these concerns?
- A . Changing the VLAN of the web server
- B . Changing the server’s IP address
- C . Implementing an ACL
- D . Instating a rule on the firewall connected to the web server
C
Explanation:
An access control list (ACL) is a set of rules that defines which traffic is allowed or denied on a network device, such as a router or a firewall12.
An ACL can be used to filter traffic based on various criteria, such as source or destination IP address, port number, protocol, or time of day12.
By implementing an ACL on the edge router of the network, the network administrator can block the unauthorized IP address from entering the secure part of the network every night at 8:00 pm12. This solution would address the concerns of the network administrator, as it would prevent the unauthorized IP address from accessing the critical server or any other resource on the secure network12.
Changing the VLAN of the web server (A) or changing the server’s IP address (B) would not stop the unauthorized IP address from entering the network, as it could still scan the network for other open ports or vulnerabilities12.
Instating a rule on the firewall connected to the web server (D) would only protect the web server, but not the rest of the secure network, from the unauthorized IP address12.
Reference: CompTIA Network+ N10-008 Certification Study Guide, Chapter 4: Network Operations, Section 4.3:
Network Security Devices and Technologies, pp. 212-213.
Professor Messer’s CompTIA N10-008 Network+ Course, Section 4.3: Network Security Devices and
Technologies, Video: Access Control Lists.
The following instructions were published about the proper network configuration for a videoconferencing device:
"Configure a valid static RFC1918 address for your network. Check the option to use a connection over NAT."
Which of the following is a valid IP address configuration for the device?
- A . FE80::1
- B . 100.64.0.1
- C . 169.254.1.2
- D . 172.19.0.2
- E . 224.0.0.12
D
Explanation:
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz.
Which of the following should the systems administrator select to meet this requirement?
- A . 802.11ac
- B . 802.11ax
- C . 802.11g
- D . 802.11n
B
Explanation: