Practice Free N10-008 Exam Online Questions
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
- A . The network device is not configured to log that level to the syslog server
- B . The network device was down and could not send the event
- C . The syslog server is not compatible with the network device
- D . The syslog server did not have the correct MIB loaded to receive the message
A
Explanation:
The reason why the alerts are not being received is that the network device is not configured to log that level to the syslog server. The severity level for the events may need to be adjusted in order for them to be sent to the syslog server.
Reference: Network+ Certification Study Guide, Chapter 8: Network Troubleshooting
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey.
Which of the following documents would MOST likely be created as a result of the site survey?
- A . Physical diagram
- B . Heat map
- C . Asset list
- D . Device map
B
Explanation:
A heat map would most likely be created as a result of the site survey. A heat map is a graphical representation of the wireless signal strength and coverage in a given area. It can show the location of APs, antennas, walls, obstacles, interference sources, and dead zones. It can help with planning, optimizing, and troubleshooting wireless networks.
Reference: https://www.netspotapp.com/what-is-a-wifi-heatmap.html
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency.
Which of the following is MOST likely occurring?
- A . Ethernet collisions
- B . A DDoS attack
- C . A broadcast storm
- D . Routing loops
C
Explanation:
A broadcast storm is most likely occurring when connecting multiple unmanaged Layer 2 switches with multiple connections between each pair. A broadcast storm is a situation where broadcast packets flood a network segment and consume all the available bandwidth. It can be caused by loops in the network topology, where broadcast packets are endlessly forwarded by switches without any loop prevention mechanism. Unmanaged switches do not support features such as Spanning Tree Protocol (STP) or Rapid Spanning Tree Protocol (RSTP) that can detect and block loops.
Reference: https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/10556-16.html
Which of the following routing technologies is used to prevent network failure at the gateway by protecting data traffic from a failed router?
- A . BGP
- B . OSPF
- C . EIGRP
- D . FHRP
D
Explanation:
FHRP stands for First Hop Redundancy Protocol, and it is a group of protocols that allow routers to work together to provide backup or failover for the default gateway in a network. FHRP can prevent network failure at the gateway by protecting data traffic from a failed router and ensuring that there is always an active router to forward packets. Some examples of FHRP protocols are HSRP, VRRP, and GLBP12.
Reference: 1: CompTIA Network+ N10-008 Cert Guide – Chapter 13: Routing Protocols32: First Hop Redundancy Protocols (FHRP) Explained4
An engineer needs to verity the external record tor SMTP traffic. The engineer logged in to the server and entered the nslookup command.
Which of the following commands should the engineer send
before entering the DNS name?
- A . set type=A
- B . is -d company-mail.com
- C . set domain=company.mail.com
- D . set querytype=Mx
D
Explanation:
The question asks about the command that an engineer should send before entering the DNS name to verify the external record for SMTP traffic, which is the mail exchange (MX) record.
The MX record is a type of DNS resource record that specifies the mail server responsible for accepting email messages on behalf of a domain name.
To query the MX record using the nslookup command, the engineer should first set the query type to MX using the command set querytype=Mx or set type=Mx.
The other options are not correct, as they do not set the query type to MX:
set type=A sets the query type to A, which is the address record that maps a domain name to an IP address.
ls -d company-mail.com lists all DNS records for the domain company-mail.com, but does not specify the query type.
set domain=company.mail.com sets the default domain name to company.mail.com, but does not specify the query type.
Reference: CompTIA Network+ N10-008 Study Guide, Chapter 3, Section 3.4, DNS Concepts, page 1441 Professor Messer’s CompTIA N10-008 Network+ Course Notes, Section 3.4, DNS Concepts, page 242 Professor Messer’s CompTIA N10-008 Network+ Training Course, Video 3.4 – DNS Concepts, 9:00 – 10:003
A network administrator is setting up a web-based application for a company. The application needs to be continually accessible to all end users.
Which of the following would best ensure this need is fulfilled?
- A . NIC teaming
- B . Cold site
- C . Snapshots
- D . High availability
D
Explanation:
High availability is a quality of a system or component that assures a high level of operational performance for a given period of time. High availability means that an IT system, component, or application can operate at a high level, continuously, without intervention, for a given time period. High-availability infrastructure is configured to deliver quality performance and handle different loads and failures with minimal or zero downtime. High availability is important for web-based applications, as it ensures that the application is always accessible to the end users, even in the event of a server or component failure. High availability can be achieved by eliminating single points of failure, implementing redundancy, load balancing, and failover mechanisms.
A technician is working on a ticket for a user in the human resources department who received a new PC that does not connect to the internet. All users in human resources can access the internet. The technician can ping the PC from the human resources router but not from the IT network.
Which of the following is the most likely cause of the issue?
- A . Duplicate IP address
- B . Misconfigured RIP
- C . Improper VLAN assignment
- D . Incorrect default gateway
D
Explanation:
An incorrect default gateway can cause a PC to not connect to the internet, because the default gateway is the device that routes traffic from the local network to other networks. If the PC has a wrong default gateway configured, it may not be able to reach the internet router or the IT network router. The technician can ping the PC from the human resources router because they are on the same local network, but not from the IT network router because they are on different networks.
A duplicate IP address can cause a PC to not communicate with other devices on the same network, because the IP address is the unique identifier of a device on a network. If two devices have the same IP address, they may cause IP conflicts and packet loss. However, a duplicate IP address would not prevent the technician from pinging the PC from the human resources router, because they are on the same network.
A misconfigured RIP can cause a router to not learn or advertise routes to other networks, because RIP is a routing protocol that dynamically exchanges routing information between routers. If a router has a wrong RIP configuration, it may not be able to reach or share routes with other routers.
However, a misconfigured RIP would not affect the PC’s connectivity to the internet, because the PC does not use RIP.
An improper VLAN assignment can cause a PC to not communicate with other devices on the same or different networks, because a VLAN is a logical segmentation of a network that isolates traffic based on criteria such as function, security, or performance. If a PC is assigned to a wrong VLAN, it may not be able to access the resources or services that it needs. However, an improper VLAN assignment would not prevent the technician from pinging the PC from the human resources router, because they are on the same physical network.
Reference
What is a Default Gateway?
What’s an IP Conflict and How Do You Resolve It?
What is RIP (Routing Information Protocol)?
What is a VLAN? How to Set Up a VLAN Network
CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008)
A systems administrator wants to use the least amount of equipment to segment two departments that nave cables terminating in the same room.
Which of the following would allow this to occur?
- A . A load balancer
- B . A proxy server
- C . A Layer 3 switch
- D . A hub
- E . A Layer 7 firewall
- F . The RSSI was not strong enough on the link
C
Explanation:
The question asks about the least amount of equipment to segment two departments that have cables terminating in the same room.
Segmentation is the process of dividing a network into smaller logical units for security, performance, or management purposes.
One way to segment a network is by using VLANs (virtual LANs), which are logical groups of devices that share the same broadcast domain, regardless of their physical location or connection.
VLANs can be configured on switches that support Layer 2 or Layer 3 functionality. Layer 2 switches operate at the data link layer and forward frames based on MAC addresses. Layer 3 switches operate at the network layer and forward packets based on IP addresses.
A Layer 3 switch can perform both Layer 2 and Layer 3 functions, and can also route traffic between different VLANs without the need for an external router. This makes it a versatile and efficient device for network segmentation.
Therefore, the answer is C, a Layer 3 switch, as it can segment two departments with the least amount of equipment.
Reference: CompTIA Network+ N10-008 Study Guide, Chapter 2: Network Devices and Technologies, Section 2.1: Network Devices, Pages 74-75
Professor Messer’s CompTIA N10-008 Network+ Course, Video 2.1: Network Devices, Part 1 Network + N10-008 practice exam, Question 977, Answer C, Explanation
An IT administrator needs to connect older smart-plug devices to the network. The administrator wants to prevent future issues from occurring by using an 802.11 standard that only operates on the 2.4GHz frequency.
Which of the following standards should the administrator choose?
- A . 802.11a
- B . 802.11ac
- C . 802.11ax
- D . 802.11b
D
Explanation:
Which of the following synchronizes time on all devices within a network?
- A . DHCP
- B . DNS
- C . NTP
- D . SNMP
C
Explanation:
Network Time Protocol (NTP): NTP is a widely adopted protocol for synchronizing clocks across network devices. It ensures that all devices have accurate and consistent time. NTP uses a hierarchical system of time sources to maintain synchronization.
Reference: Professor Messer – Network+ Certification Course
CompTIA Network+ N10-008 Study Guide
Auvik – Network Time Synchronization: Why and How It Works