Practice Free N10-008 Exam Online Questions
Classification using labels according to information sensitivity and impact in case of unauthorized access or leakage is a mandatory component of:
- A . an acceptable use policy.
- B . a memorandum of understanding.
- C . data loss prevention,
- D . a non-disclosure agreement.
C
Explanation:
Data loss prevention (DLP) is a set of tools and processes that aim to prevent unauthorized access or leakage of sensitive information. One of the components of DLP is data classification, which involves labeling data according to its information sensitivity and impact in case of unauthorized disclosure.
Data classification helps to identify and protect the most critical and confidential data and apply appropriate security controls and policies.
Reference: Network+ Study Guide Objective 5.1: Explain the importance of policies, processes and procedures for IT governance. Subobjective: Data loss prevention.
Which of the following would most likely affect design considerations when building out an IDF?
- A . The source panel amperage
- B . The fire suppression system
- C . The humidity levels
- D . The cable transmission speeds
B
Explanation:
The fire suppression system is a design consideration when building out an IDF because it can affect the safety and reliability of the network equipment and cabling. A fire suppression system is a system that detects and extinguishes fires in a building, using water, gas, or chemicals. Depending on the type of fire suppression system, it can have different impacts on the IDF design, such as: Water-based systems, such as sprinklers, can damage the network equipment and cabling if they are activated by a fire or a false alarm. Therefore, the IDF should be designed to protect the equipment and cabling from water exposure, such as using waterproof cabinets, drip pans, and conduits. Gas-based systems, such as clean agent systems, can displace the oxygen in the IDF and cause suffocation for anyone inside. Therefore, the IDF should be designed to allow for ventilation and air circulation, as well as warning signs and alarms to alert anyone in the IDF before the gas is released. Chemical-based systems, such as dry chemical systems, can leave a residue on the network equipment and cabling that can affect their performance and lifespan. Therefore, the IDF should be designed to minimize the contact between the chemical and the equipment and cabling, as well as provide a means for cleaning and restoring them after a fire. The other options are not correct because:
The source panel amperage is not a design consideration when building out an IDF, as it is determined by the electrical circuit and the power needs of the network equipment and cabling. The source panel amperage does not affect the layout, location, or protection of the IDF.
The humidity levels are not a design consideration when building out an IDF, as they are controlled by the HVAC system and the ventilation of the IDF. The humidity levels do not affect the layout, location, or protection of the IDF.
The cable transmission speeds are not a design consideration when building out an IDF, as they are determined by the type and quality of the network cabling and the network equipment. The cable transmission speeds do not affect the layout, location, or protection of the IDF.
A network engineer performs the following tasks to increase server bandwidth:
Connects two network cables from the server to a switch stack
Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces.
Which of the following needs to be configured on the server?
- A . Load balancing
- B . Multipathing
- C . NIC teaming
- D . Clustering
C
Explanation:
NIC teaming is a technique that combines two or more network interface cards (NICs) on a server into a single logical interface that can increase bandwidth, provide redundancy, and balance traffic. NIC teaming can be configured with different modes and algorithms depending on the desired outcome. Link Aggregation Control Protocol (LACP) is a protocol that enables NIC teaming by dynamically bundling multiple links between two devices into one logical link.
Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://docs.microsoft.com/en-us/windows-server/networking/technologies/nic-teaming/nic-teaming
A homeowner frequently has guests visit and would like to install a wireless router for their personal devices. The homeowner wants to ensure that the wireless router is compatible with the widest range of devices possible.
Which of the following standards should a technician suggest?
- A . 802 11ac
- B . 802.11b
- C . 802 11g
- D . 802.11n
A
Explanation:
A technician is configuring a network switch to be used in a publicly accessible location.
Which of the following should the technician configure on the switch to prevent unintended connections?
- A . DHCP snooping
- B . Geofencing
- C . Port security
- D . Secure SNMP
C
Explanation:
Port security is a feature that restricts input to a switch port by limiting and identifying MAC addresses of the devices allowed to access the port. This prevents unintended connections from unauthorized devices or spoofed MAC addresses. Port security can also be configured to take actions such as shutting down the port or sending an alert when a violation occurs.
Reference:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0),
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9500/software/release/16-10/configuration_guide/sec/b_1610_sec_9500_cg/b_1610_sec_9500_cg_chapter_0101010.html
Which of the following objectives does an evil twin achieve?
- A . DNS poisoning
- B . Log-in credentials
- C . ARP spoofing
- D . Denial of service
B
Explanation:
The objective that an evil twin achieves is log-in credentials. An evil twin is a type of rogue access point that mimics a legitimate wireless network by using the same SSID, encryption, and authentication methods. An evil twin can trick unsuspecting users into connecting to it instead of the real network, and then capture their log-in credentials or other sensitive data. An evil twin can also perform man-in-the-middle attacks, redirecting or modifying the user’s traffic.
Reference: CompTIA Network+ N10-008 Certification Study Guide, page 358; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-1.
A user returns to the office after working remotely for an extended period. The user is reporting limited access to the office wireless network and the inability to reach company resources on the network. The user connected to the guest network, ensured all patches were applied, and checked to make sure software was up to date.
Which of the following is most likely the cause of the issue?
- A . The laptop drivers need to be updated to support a new wireless infrastructure.
- B . The wireless passphrase has been cycled and needs to be updated.
- C . The NAC appliance has labeled the laptop as non-complaint.
- D . The WAP transmit power is too low and cannot complete user authentication.
C
Explanation:
A network access control (NAC) appliance is a device that checks the enrollment and compliance state of devices that try to access the network resources. It can deny, quarantine, or restrict the access of non-compliant devices based on predefined policies1. A device can be considered non-compliant if it does not meet the security requirements, such as having the latest patches, antivirus signatures, firewall settings, or encryption standards. In this scenario, the user’s laptop may have been labeled as non-compliant by the NAC appliance because it was out of sync with the network policies after working remotely for a long time. The user connected to the guest network, which is usually less secure and isolated from the corporate network, and updated the patches and software, but that may not be enough to satisfy the NAC appliance. The user may need to enroll the device again, or contact the IT support to resolve the issue.
Reference 1 – Network access control integration with Microsoft Intune | Microsoft Learn
A network administrator needs to change where the outside DNS records are hosted.
Which of the following records should the administrator change at the registrar to accomplish this task?
- A . NS
- B . SOA
- C . PTR
- D . CNAME
A
Explanation:
NS stands for Name Server, and it is a DNS record that specifies which servers are authoritative for a domain. The registrar is the entity that manages the domain registration and delegation, and it maintains the NS records for each domain. To change where the outside DNS records are hosted, the network administrator needs to change the NS records at the registrar to point to the new DNS servers that will host the outside DNS records.
Reference: DNS Record Types C N10-008 CompTIA Network+: 1.61
CompTIA Network+ N10-008 Cert Guide, page 1472
A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards.
Which of the following blocks does the technician need to install?
- A . 110
- B . 66
- C . Bix
- D . Krone
A
Explanation:
A 110 block is a type of punch-down block that is used to distribute Ethernet to multiple computers in an office. A punch-down block is a device that connects one group of wires to another group of wires by using a special tool that pushes the wires into slots on the block. A 110 block is a non-proprietary standard that supports up to Category 6 cabling and can be used for voice or data applications.
Reference: https://www.comptia.org/training/books/network-n10-008-study-guide (page 64)
A technician completed troubleshooting and was able to fix an issue.
Which of the following is the BEST method the technician can use to pass along the exact steps other technicians should follow in case the issue arises again?
- A . Use change management to build a database
- B . Send an email stating that the issue is resolved.
- C . Document the lessons learned
- D . Close the ticket and inform the users.
C
Explanation:
Documenting the lessons learned is the best method for passing along the exact steps other technicians should follow in case the issue arises again. Lessons learned are the knowledge and experience gained from completing a project or solving a problem. Documenting the lessons learned helps to capture the best practices, challenges, solutions, and recommendations for future reference and improvement. Documenting the lessons learned can also help to update the knowledge base, standard operating procedures, or policies related to the issue.
Reference: [CompTIA Network+ Certification Exam Objectives], Lessons Learned: Definition & Examples for Project Managers