Practice Free N10-008 Exam Online Questions
To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud.
Which of the following deployment models is the best choice for the organization?
- A . Public
- B . Hybrid
- C . SaaS
- D . Private
B
Explanation:
A hybrid cloud deployment model is a combination of on-premise and cloud solutions, where some resources are hosted in-house and some are hosted by a cloud provider. A hybrid cloud model can
offer the benefits of both public and private clouds, such as scalability, cost-efficiency, security, and control12. A hybrid cloud model can also reduce the impact for users, as they can access the key services from the on-site data center and the enterprise services from the cloud
A user is tricked into providing log-in credentials to an attacker over the telephone.
Which of the following attacks is this an example of?
- A . Shoulder surfing
- B . Tailgating
- C . Phishing
- D . Dumpster diving
C
Explanation:
Phishing is a type of social engineering attack that uses email, phone, SMS, or other forms of personal communication to trick users into revealing sensitive information, such as log-in credentials, to an attacker. In this case, the user was deceived by a phone call that pretended to be from a legitimate source and asked for their log-in details.
Users in a remote office report that corporate web server pages are taking a long time to load, whereas users in the main corporate office do not have any issues.
Which of the following is the best metric for a network administrator to check?
- A . Jitter across the network
- B . Hop-by-hop network latency
- C . Server interface CRC errors
- D . Server NetFlow data
B
Explanation:
The best metric for a network administrator to check is hop-by-hop network latency. This is because network latency is the time it takes for a packet to travel from the source to the destination, and it affects the loading speed of web pages. Hop-by-hop network latency measures the latency between each pair of routers or switches along the network path, and it can help identify where the delay is occurring. By checking the hop-by-hop network latency, the network administrator can determine if the problem is caused by a slow or congested link, a misconfigured or faulty device, or a routing issue.
Jitter is the variation in latency over time, and it affects the quality of voice and video applications. Jitter does not directly affect the loading speed of web pages, and it is not a useful metric for troubleshooting this issue.
Server interface CRC errors are errors that occur when the cyclic redundancy check (CRC) of a packet does not match the expected value, indicating data corruption. Server interface CRC errors can affect the reliability and integrity of data transmission, and they can be caused by faulty cables, connectors, or interfaces. Server interface CRC errors do not necessarily affect the loading speed of web pages, unless they are severe enough to cause retransmissions or packet loss.
Server NetFlow data is data that is collected and analyzed by the NetFlow protocol, which monitors and reports on network traffic flows. Server NetFlow data can provide information on the volume, type, and direction of traffic that is sent or received by the server, as well as the source and destination IP addresses, ports, and protocols. Server NetFlow data can help identify network usage patterns, trends, and anomalies, but it does not measure the latency or performance of the network. Reference
What is Network Latency and How to Measure It
How to Troubleshoot Network Latency Issues
What is Jitter and How to Measure It
What is CRC Error and How to Fix It
What is NetFlow and How Does It Work
CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access.
Which of the following BEST describes this deployment?
- A . Extended service set
- B . Basic service set
- C . Unified service set
- D . Independent basic service set
A
Explanation:
An extended service set (ESS) is a wireless network that consists of multiple access points (APs) that share the same SSID and are connected by a wired network. An ESS allows wireless clients to roam seamlessly between different APs without losing connectivity. A basic service set (BSS) is a wireless network that consists of a single AP and its associated clients. An independent basic service set (IBSS) is a wireless network that consists of a group of clients that communicate directly without an AP. A unified service set is not a standard term for a wireless network.
Reference: https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://en.wikipedia.org/wiki/Service_set_(802.11_network)
The following configuration is applied to a DHCP server connected to a VPN concentrator:
There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day.
Which of the following can be done to resolve the issue without utilizing additional resources?
- A . Decrease the lease duration
- B . Reboot the DHCP server
- C . Install a new VPN concentrator
- D . Configure a new router
A
Explanation:
Decreasing the lease duration on the DHCP server will cause clients to renew their IP address leases more frequently, freeing up IP addresses for other clients to use.
Reference: CompTIA Network+ Certification Study Guide, Chapter 3: IP Addressing.
An administrator would like to have two servers at different geographical locations provide fault tolerance and high performance while appearing as one URL to users.
Which of the following should the administrator implement?
- A . Load balancing
- B . Multipathing
- C . NIC teaming
- D . Warm site
B
Explanation:
Load balancing is a technique that can be used to provide fault tolerance and high performance while appearing as one URL to users. It is achieved by distributing the workload across multiple servers, which are usually located in different geographical locations. This allows for high performance and fault tolerance, as if one server fails, the other will take its place. Additionally, the multiple servers appear as one URL to the users, eliminating the need for the users to switch between servers.
A network administrator is investigating a performance issue on a dual-link connection―VPN and MPLS―to a partner network. The MPLS is the primary path, and the VPN is used as a backup. While communicating, the delay is measured at 18ms, which is higher than the 6ms expected when the MPLS link is operational but lower than the 30ms expected tor the VPN connection.
Which of the following will MOST likely point to the root cause of the Issue?
- A . Checking the routing tables on both sides to ensure there is no asymmetric routing
- B . Checking on the partner network for a missing route pointing to the VPN connection
- C . Running iPerf on both sides to confirm the delay that Is measured is accurate
- D . Checking for an incorrect VLAN assignment affecting the MPLS traffic
A
Explanation:
Asymmetric routing can occur when two routers have different paths for the same two hosts, resulting in increased latency and possible packet loss. According to the CompTIA Network+ Study Manual, “If the path from the source to the destination is not the same in both directions, the packets will take different routes and the latency can increase significantly.” To confirm this, the network administrator should check the routing tables on both sides of the connection and ensure that the same path is used in both directions.
A network administrator responds to a support ticket that was submitted by a customer who is having issues connecting to a website inside of the company network. The administrator verities that the customer could not connect to a website using a URL.
Which of the following troubleshooting steps would be BEST for the administrator to take?
- A . Check for certificate issues
- B . Contact the ISP
- C . Attempt to connect to the site via IP address
- D . Check the NTP configuration.
C
Explanation:
The best option for the administrator to take would be to attempt to connect to the site via IP address. This will help to determine if the issue is related to the website’s DNS address or if the site itself is not accessible. Checking for certificate issues may be necessary, but this should be done after the administrator has attempted to connect to the site via IP address. Contacting the ISP is unnecessary since the issue is related to the website inside of the company network, and checking the NTP configuration is not relevant to this issue.
When a customer is having issues connecting to a website using a URL, one of the first troubleshooting steps a network administrator should take is attempting to connect to the site using the IP address of the website. This will help to determine if the issue is related to a DNS resolution problem or a connectivity problem. If the administrator is able to connect to the website using the IP address, then the issue may be related to a DNS problem. However, if the administrator is still unable to connect, then the issue may be related to a connectivity problem. In either case, further troubleshooting steps will be necessary. Checking for certificate issues or NTP configuration, and contacting the ISP would not be the BEST initial steps in this scenario.
A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree.
Which of the following values would the network administrator expect to see?
- A . 4096
- B . 8192
- C . 32768
- D . 36684
C
Explanation:
The default priority value for spanning tree is 32768, regardless of the STP version (legacy STP, RSTP, MSTP, Per-VLAN STP, Per-VLAN RSTP). This value can be modified by the network administrator to influence the root bridge election. The priority value must be set in increments of 4096, which is the minimum unit of change for the priority value. https://community.cisco.com/t5/switching/spanning-tree-default-priorities/td-p/3304365
The network engineer receives a new router to use for WAN connectivity.
Which of the following best describes the layer the network engineer should connect the new router to?
- A . Core
- B . Leaf
- C . Distribution
- D . Access
C
Explanation:
The distribution layer is the layer that connects the access layer to the core layer in a hierarchical network design. The distribution layer is responsible for routing, filtering, and policy enforcement between the LAN and the WAN. A router is a layer 3 device that can perform these functions and connect to different WAN technologies.
Reference: CompTIA Network+ N10-008 Certification Study Guide, page 151
CompTIA Network+ N10-008 Cert Guide, Deluxe Edition, page 322 CompTIA Network+ N10-008 Exam Cram, page 233