Practice Free N10-008 Exam Online Questions
An ISP is providing Internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out.
Which of me following terminations should the technician use when running a cable from the ISP’s port lo the front desk?
- A . F-type connector
- B . TIA/E1A-56S-B
- C . LC
- D . SC
B
Explanation:
The termination that the technician should use when running a cable from the ISP’s port to the front desk is B. TIA/EIA-568-B. This is a standard pin-out for Cat 6 cables that is used for Ethernet and other network physical layers1. It specifies how to arrange the eight wires in an RJ45 connector, which is a common type of connector for network cables.
A customer wants to log in t o a vendor’s server using a web browser on a laptop.
Which of the following would require the LEAST configuration to allow encrypted access to the server?
- A . Secure Sockets Layer
- B . Site-to-site VPN
- C . Remote desktop gateway
- D . Client-to-site VPN
A
Explanation:
SSL is a widely used protocol for establishing secure, encrypted connections between devices over the Internet. It is typically used to secure communication between web browsers and servers, and can be easily enabled on a server by installing an SSL certificate.
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity.
Which of the following strategies should the company employ?
- A . Active-active
- B . Warm
- C . Cold
- D . Cloud
B
Explanation:
A warm site is a backup data center that has some network equipment and connectivity, but not enough to handle the full load of the primary site. It requires some time and effort to activate and configure in the event of a disaster12.
An active-active site is a backup data center that is fully operational and synchronized with the primary site, and can take over the load immediately if the primary site fails. It is the most expensive and complex option12.
A cold site is a backup data center that has no network equipment or connectivity, and only provides physical space and power. It requires a lot of time and resources to set up and activate in the event of a disaster. It is the cheapest and simplest option12.
A cloud site is a backup data center that is hosted by a third-party provider, and can offer various
levels of availability and scalability depending on the service level agreement. It can be a cost-
effective and flexible option, but also introduces some challenges such as security, compliance, and
vendor lock-in13.
Reference:
1: CompTIA Network+ N10-008 Study Guide, Chapter 6: Network Resiliency and Availability, Section: Disaster Recovery
2: Professor Messer’s CompTIA N10-008 Network+ Course Notes, Page 54: Disaster Recovery Sites
3: Backup Strategy: Ultimate Guide for Data Backup
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity.
Which of the following strategies should the company employ?
- A . Active-active
- B . Warm
- C . Cold
- D . Cloud
B
Explanation:
A warm site is a backup data center that has some network equipment and connectivity, but not enough to handle the full load of the primary site. It requires some time and effort to activate and configure in the event of a disaster12.
An active-active site is a backup data center that is fully operational and synchronized with the primary site, and can take over the load immediately if the primary site fails. It is the most expensive and complex option12.
A cold site is a backup data center that has no network equipment or connectivity, and only provides physical space and power. It requires a lot of time and resources to set up and activate in the event of a disaster. It is the cheapest and simplest option12.
A cloud site is a backup data center that is hosted by a third-party provider, and can offer various
levels of availability and scalability depending on the service level agreement. It can be a cost-
effective and flexible option, but also introduces some challenges such as security, compliance, and
vendor lock-in13.
Reference:
1: CompTIA Network+ N10-008 Study Guide, Chapter 6: Network Resiliency and Availability, Section: Disaster Recovery
2: Professor Messer’s CompTIA N10-008 Network+ Course Notes, Page 54: Disaster Recovery Sites
3: Backup Strategy: Ultimate Guide for Data Backup
A security team updated a web server to require https:// in the URL. Although the IP address did not change, users report being unable to reach the site.
Which of the following should the security team do to allow users to reach the server again?
- A . Configure the switch port with the correct VLAN.
- B . Configure inbound firewall rules to allow traffic to port 443.
- C . Configure the router to include the subnet of the server.
- D . Configure the server with a default route.
B
Explanation:
One possible reason why users are unable to reach the site after the security team updated the web server to require https:// in the URL is that the firewall rules are blocking the traffic to port 443. Port 443 is the default port for HTTPS, which is the protocol that encrypts and secures the web communication. If the firewall rules do not allow inbound traffic to port 443, then users will not be able to access the web server using HTTPS12.
To troubleshoot this issue, the security team should configure inbound firewall rules to allow traffic to port 443. This can be done by using the firewall-cmd command on RHEL 8.2, which is a tool that manages firewalld, the default firewall service on RHEL. The command to add a rule to allow traffic to port 443 is:
firewall-cmd –permanent –add-port=443/tcp
The –permanent option makes the rule persistent across reboots, and the –add-port option specifies the port number and protocol (TCP) to allow.
After adding the rule, the security team should reload the firewalld service to apply the changes:
firewall-cmd –reload
The security team can verify that the rule is active by using this command:
firewall-cmd –list-ports
The output should show 443/tcp among the ports that are allowed34.
The other options are not relevant to troubleshooting this issue. Configuring the switch port with the correct VLAN may help with network segmentation or isolation, but it will not affect the HTTPS protocol or port. Configuring the router to include the subnet of the server may help with network routing or connectivity, but it will not enable HTTPS communication. Configuring the server with a default route may help with network access or reachability, but it will not allow HTTPS traffic.
Which of the following topologies requires me MOST connections when designing a network?
- A . Mesh
- B . Star
- C . Bus
- D . Ring
A
Explanation:
The question asks about the topology that requires the most connections when designing a network. A topology is the physical or logical arrangement of devices and links on a network. Different topologies have different advantages and disadvantages in terms of cost, performance, reliability, scalability, and security.
The four topologies mentioned in the question are:
Mesh: A topology where every device is connected to every other device by a dedicated link. This provides high redundancy, fault tolerance, and performance, but also high cost and complexity. A mesh topology requires n(n-1)/2 connections for n devices.
Star: A topology where every device is connected to a central device, such as a switch or a hub, by a single link. This provides easy installation, management, and troubleshooting, but also a single point
of failure and dependency on the central device. A star topology requires n connections for n devices. Bus: A topology where every device is connected to a single cable, called a bus or a backbone, by a tap or a drop line. This provides low cost and easy expansion, but also low performance, security, and scalability. A bus topology requires one connection for each device, plus two terminators at the ends of the bus.
Ring: A topology where every device is connected to two adjacent devices by a single link, forming a closed loop. This provides simple and equal access, but also low fault tolerance and difficult troubleshooting. A ring topology requires n connections for n devices.
Therefore, the answer is A, a mesh topology, as it requires the most connections when designing a network.
Reference: CompTIA Network+ N10-008 Study Guide, Chapter 1: Networking Concepts, Section 1.1: Network Topologies and Technologies, Pages 8-11
Professor Messer’s CompTIA N10-008 Network+ Course, Video 1.1: Network Topologies and Technologies, Part 1
Network + N10-008 practice exam, Question 989, Answer A, Explanation
A network is experiencing a number of CRC errors during normal network communication.
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
- A . Layer 1
- B . Layer 2
- C . Layer 3
- D . Layer 4
- E . Layer 5
- F . Layer 6
- G . Layer 7
A
Explanation:
CRC errors are cyclic redundancy check errors that occur when data is corrupted during transmission. CRC errors are usually caused by physical layer issues such as faulty cables, connectors, ports, or interference. The network administrator will most likely start to troubleshoot at layer 1 of the OSI model, which is the physical layer that deals with the transmission of bits over a medium.
Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 4.0 Network Troubleshooting and Tools, Objective 4.1 Given a scenario, implement network troubleshooting methodology.
A network is experiencing a number of CRC errors during normal network communication.
At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?
- A . Layer 1
- B . Layer 2
- C . Layer 3
- D . Layer 4
- E . Layer 5
- F . Layer 6
- G . Layer 7
A
Explanation:
CRC errors are cyclic redundancy check errors that occur when data is corrupted during transmission. CRC errors are usually caused by physical layer issues such as faulty cables, connectors, ports, or interference. The network administrator will most likely start to troubleshoot at layer 1 of the OSI model, which is the physical layer that deals with the transmission of bits over a medium.
Reference: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number: N10-006), Domain 4.0 Network Troubleshooting and Tools, Objective 4.1 Given a scenario, implement network troubleshooting methodology.
Which of the following is a requirement when certifying a network cabling as Cat 7?
- A . Ensure the patch panel is certified for the same category.
- B . Limit 10Gb transmissions to 180ft (55m).
- C . Use F-type connectors on the network terminations.
- D . Ensure the termination standard is TIA/EIA-568-A.
D
Explanation:
Category 7 (Cat 7) is a cabling standard that supports 10GBASE-T Ethernet connections up to 100 meters (328 feet). In order for a cabling system to be certified as Cat 7, all components, including the patch panel, must meet the TIA/EIA-568-A standard. This standard requires the use of shielded cables with F-type connectors for the network terminations.
Reference: CompTIA Network+ Study Manual, 8th Edition, page 158.
Which of the following services can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices?
- A . SaaS
- B . IaaS
- C . PaaS
- D . DaaS
B
Explanation:
IaaS stands for Infrastructure as a Service, which is a cloud computing model that provides virtualized computing resources such as servers, storage, and networking over the Internet. IaaS can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices by allowing them to rent or lease the infrastructure they need from a cloud provider. The company can pay only for what they use and scale up or down as needed.
Reference: https://www.comptia.org/blog/what-is-iaas