Practice Free N10-009 Exam Online Questions
Question #71
A group of users cannot connect to network resources. The technician runs ipconfig from one user’s device and is able to ping the gateway shown from the command.
Which of the following is most likely preventing the users from accessing network resources?
- A . VLAN hopping
- B . Rogue DHCP
- C . Distributed DoS
- D . Evil twin
Correct Answer: B
B
Explanation:
A rogue DHCP server occurs when an unauthorized or misconfigured DHCP server assigns incorrect IP addresses, default gateways, or DNS settings to clients.
• In this scenario:
• The user can ping the gateway, meaning local network communication is working.
• However, they cannot access network resources, which suggests incorrect IP configuration (likely due to a rogue DHCP server assigning the wrong gateway or DNS).
• Why not the other options?
• VLAN hopping (A): This is an attack that exploits VLAN configurations to gain access to unauthorized VLANs. It would not typically cause multiple users to lose network access.
• Distributed DoS (C): A DDoS attack floods a network or service with traffic, but this issue is more likely misconfigured IP settings than an actual attack.
• Evil twin (D): This refers to a fraudulent Wi-Fi network mimicking a legitimate one. Since the users are on a wired network (ipconfig output checked), this is not applicable.
Reference: CompTIA Network+ (N10-009) Official Guide C Chapter 11: Network Security Threats
B
Explanation:
A rogue DHCP server occurs when an unauthorized or misconfigured DHCP server assigns incorrect IP addresses, default gateways, or DNS settings to clients.
• In this scenario:
• The user can ping the gateway, meaning local network communication is working.
• However, they cannot access network resources, which suggests incorrect IP configuration (likely due to a rogue DHCP server assigning the wrong gateway or DNS).
• Why not the other options?
• VLAN hopping (A): This is an attack that exploits VLAN configurations to gain access to unauthorized VLANs. It would not typically cause multiple users to lose network access.
• Distributed DoS (C): A DDoS attack floods a network or service with traffic, but this issue is more likely misconfigured IP settings than an actual attack.
• Evil twin (D): This refers to a fraudulent Wi-Fi network mimicking a legitimate one. Since the users are on a wired network (ipconfig output checked), this is not applicable.
Reference: CompTIA Network+ (N10-009) Official Guide C Chapter 11: Network Security Threats
Question #72
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic.
Which of the following should the administrator use?
- A . SNMP trap
- B . Port mirroring
- C . Syslog collection
- D . API integration
Correct Answer: B
B
Explanation:
Port mirroring, also known as SPAN (Switched Port Analyzer), is used to send a copy of network packets seen on one switch port (or an entire VLAN) to another port where the IDS is connected. This allows the IDS to passively inspect network traffic without interfering with the actual traffic flow. Port mirroring is an essential feature for implementing IDS in a network for traffic analysis and security monitoring.
Reference: CompTIA Network+ study materials.
B
Explanation:
Port mirroring, also known as SPAN (Switched Port Analyzer), is used to send a copy of network packets seen on one switch port (or an entire VLAN) to another port where the IDS is connected. This allows the IDS to passively inspect network traffic without interfering with the actual traffic flow. Port mirroring is an essential feature for implementing IDS in a network for traffic analysis and security monitoring.
Reference: CompTIA Network+ study materials.