Practice Free N10-008 Exam Online Questions
Which of the following copper wire standards utilizes four pairs of wires to achieve Gigabit Ethernet speeds?
- A . 1000BASE-FX
- B . 1000BASE-T
- C . 1000BASE-LR
- D . 1000BASE-SX
B
Explanation:
The correct answer is 1000BASE-T. This standard is part of the Ethernet technologies and uses four pairs of Category 5 or higher copper cables. It’s designed to support networks at Gigabit Ethernet speeds up to 1000 Mbps (1 Gbps) over distances up to 100 meters. Unlike the other options listed, which pertain to fiber optic cable standards (1000BASE-FX, 1000BASE-LR, and 1000BASE-SX), 1000BASE-T is the only one utilizing copper wiring, making it the suitable choice for this question.
A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site.
Which of the following concepts should the company select?
- A . Cold site
- B . Hot site
- C . Warm site
- D . Cloud site
C
Explanation:
A warm site is a type of disaster recovery site that has equipment ready to go in the event of a disaster at the main datacenter, but does not have live data or applications. A warm site requires some time and effort to restore the data and services from backups, but it is less expensive than a hot site that has live data and applications. A cold site is a disaster recovery site that has no equipment or data, and requires a lot of time and money to set up after a disaster. A cloud site is a disaster recovery site that uses cloud computing resources to provide data and services, but it may have issues with bandwidth, latency, security, and cost.
Reference: https://www.comptia.org/blog/what-is-a-warm-site
A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the flrewal.
Which of Vie following should the technician perform to fix the Issue?
- A . Adjust the proper logging level on the new firewall.
- B . Tune the filter for logging the severity level on the syslog server.
- C . Activate NetFlow traffic between the syslog server and the firewall
- D . Restart the SNMP service running on the syslog server.
A
Explanation:
Logging level is a setting that determines what types of events are recorded by a device and sent to a syslog server. Different logging levels have different severity levels, ranging from emergency to debug. If the technician performed a manual reconfiguration of the firewall, it is possible that the logging level was changed or reset to a lower level that does not include the connection events that were previously sent to the syslog server. To fix the issue, the technician should adjust the proper logging level on the new firewall to match the desired level of detail and severity for the connection events.
Reference: Network+ Study Guide Objective 3.4: Explain common scanning, monitoring and patching processes and summarize their expected outputs. Subobjective: Syslog.
A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the flrewal.
Which of Vie following should the technician perform to fix the Issue?
- A . Adjust the proper logging level on the new firewall.
- B . Tune the filter for logging the severity level on the syslog server.
- C . Activate NetFlow traffic between the syslog server and the firewall
- D . Restart the SNMP service running on the syslog server.
A
Explanation:
Logging level is a setting that determines what types of events are recorded by a device and sent to a syslog server. Different logging levels have different severity levels, ranging from emergency to debug. If the technician performed a manual reconfiguration of the firewall, it is possible that the logging level was changed or reset to a lower level that does not include the connection events that were previously sent to the syslog server. To fix the issue, the technician should adjust the proper logging level on the new firewall to match the desired level of detail and severity for the connection events.
Reference: Network+ Study Guide Objective 3.4: Explain common scanning, monitoring and patching processes and summarize their expected outputs. Subobjective: Syslog.
A network administrator is troubleshooting a connection to a remote site.
The administrator runs a command and sees the following output:
Which of the following is the cause of the connection issue?
- A . Routing loop
- B . Asymmetrical routing
- C . Broadcast storm
- D . Switching loop
A
Explanation:
The cause of the connection issue is a routing loop. A routing loop is a situation where a packet is forwarded in circles between routers, never reaching its destination. A routing loop can be caused by misconfigured or inconsistent routing tables, or by routing protocols that do not update their information properly. A routing loop can be detected by using the traceroute command, which shows the path taken by a packet from the source to the destination. The traceroute output in the image shows that the packet is bouncing back and forth between two routers, 10.12.2.1 and 10.12.2.2, indicating a routing loop.
Reference: CompTIA Network+ N10-008 Certification Study Guide, page 181; The Official CompTIA Network+ Student Guide (Exam N10-008), page 7-9.
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20.
Which of the following subnets should the technician use?
- A . 255.255.128.0
- B . 255.255.192.0
- C . 255.255.240.0
- D . 255.255.248.0
C
Explanation:
A subnet mask is a binary number that indicates which bits of an IP address belong to the network portion and which bits belong to the host portion. A slash notation (/n) indicates how many bits are used for the network portion. A /20 notation means that 20 bits are used for the network portion and 12 bits are used for the host portion. To convert /20 to a dotted decimal notation, we need to write 20 ones followed by 12 zeros in binary and then divide them into four octets separated by dots. This gives us 11111111.11111111.11110000.00000000 or 255.255.240.0 in decimal.
Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-
objectives-(2-0), https://www.techopedia.com/definition/950/subnet-mask
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20.
Which of the following subnets should the technician use?
- A . 255.255.128.0
- B . 255.255.192.0
- C . 255.255.240.0
- D . 255.255.248.0
C
Explanation:
A subnet mask is a binary number that indicates which bits of an IP address belong to the network portion and which bits belong to the host portion. A slash notation (/n) indicates how many bits are used for the network portion. A /20 notation means that 20 bits are used for the network portion and 12 bits are used for the host portion. To convert /20 to a dotted decimal notation, we need to write 20 ones followed by 12 zeros in binary and then divide them into four octets separated by dots. This gives us 11111111.11111111.11110000.00000000 or 255.255.240.0 in decimal.
Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-
objectives-(2-0), https://www.techopedia.com/definition/950/subnet-mask
A business is using the local cable company to provide Internet access.
Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office?
- A . Multimode
- B . Cat 5e
- C . RG-6
- D . Cat 6
- E . 100BASE-T
C
Explanation:
RG-6 is a type of coaxial cable that is commonly used by cable companies to provide Internet access from the demarcation point back to the central office. It has a thicker conductor and better shielding than RG-59, which is another type of coaxial cable. Multimode and Cat 5e are types of fiber optic and twisted pair cables respectively, which are not typically used by cable companies. Cat 6 and 100BASE-T are standards for twisted pair cables, not types of cabling.
A technician is configuring a bandwidth-monitoring tool that supports payloads of 1,600 bytes.
Which of the following should the technician configure for this tool?
- A . LACP
- B . Flow control
- C . Port mirroring
- D . Jumbo frames
D
Explanation:
Jumbo frames are Ethernet frames that can carry more than the standard 1,500 bytes of payload data. Jumbo frames can support payloads of up to 9,000 bytes, depending on the network device and configuration. Jumbo frames can improve network performance by reducing the overhead of packet headers and increasing the efficiency of data transmission. Jumbo frames can also reduce the CPU utilization of the sender and receiver devices, as they require fewer interrupts and processing cycles. However, jumbo frames also have some drawbacks, such as increased latency, fragmentation, and compatibility issues. Therefore, jumbo frames should be used with caution and only in networks that support them end-to-end.
A technician who is configuring a bandwidth-monitoring tool that supports payloads of 1,600 bytes should enable jumbo frames for this tool, as this would allow the tool to capture and analyze more data per frame and provide more accurate and detailed results. However, the technician should also ensure that the network devices and interfaces that the tool is connected to also support jumbo frames, and that the MTU (maximum transmission unit) is set to the same value across the network path.
Reference
What are Jumbo Frames?
How to Enable Jumbo Frames
CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)
A network contains 25 access points.
Which of the following devices would be best to change configurations on all the devices remotely?
- A . WLAN controller
- B . Load balancer
- C . Bridge
- D . Layer 3 switch
A
Explanation:
A WLAN controller is a device that can centrally manage and configure multiple access points in a wireless network. A WLAN controller can change settings on all the devices remotely, such as SSIDs, security policies, firmware updates, and channel assignments. A WLAN controller can also monitor the performance and status of the access points and provide load balancing and fault tolerance