Month End Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! N10-008 CompTIA Network+ Exam is now Stable and With Pass Result

N10-008 Practice Question and Answers

CompTIA Network+ Exam

Last Update 6 days ago
Total Questions : 514

N10-008 is stable now with all latest exam questions are added 6 days ago. Just download our Full package and start your journey with CompTIA Network+ Exam certification. All these CompTIA N10-008 practice questions are real and verified by our Experts in the related industry fields.

N10-008 PDF

N10-008 PDF (Printable)
$48
$119.99

N10-008 Testing Engine

N10-008 PDF (Printable)
$56
$139.99

N10-008 PDF + Testing Engine

N10-008 PDF (Printable)
$70.8
$176.99
Question # 1

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

Options:

A.  

Verify the session time-out configuration on the captive portal settings

B.  

Check for encryption protocol mismatch on the client’s wireless settings

C.  

Confirm that a valid passphrase is being used during the web authentication

D.  

Investigate for a client’s disassociation caused by an evil twin AP

Discussion 0
Question # 2

A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?

Options:

A.  

dig

B.  

arp

C.  

show interface

D.  

hostname

Discussion 0
Question # 3

A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST?

Options:

A.  

Validate the roaming settings on the APs and WLAN clients

B.  

Verify that the AP antenna type is correct for the new layout

C.  

Check to see if MU-MIMO was properly activated on the APs

D.  

Deactivate the 2.4GHz band on the APS

Discussion 0
Question # 4

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?

Options:

A.  

IP scanner

B.  

Terminal emulator

C.  

NetFlow analyzer

D.  

Port scanner

Discussion 0
Question # 5

A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?

Options:

A.  

255.255.128.0

B.  

255.255.192.0

C.  

255.255.240.0

D.  

255.255.248.0

Discussion 0
Question # 6

A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?

Options:

A.  

IP route table

B.  

VLAN tag

C.  

MAC table

D.  

QoS tag

Discussion 0
Question # 7

A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

Options:

A.  

Coaxial

B.  

Single-mode fiber

C.  

Cat 6e

D.  

Multimode fiber

Discussion 0
Question # 8

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?

Options:

A.  

Motion detection

B.  

Access control vestibules

C.  

Smart lockers

D.  

Cameras

Discussion 0
Question # 9

Given the following information:

Question # 9

Which of the following command-line tools would generate this output?

Options:

A.  

netstat

B.  

arp

C.  

dig

D.  

tracert

Discussion 0
Question # 10

An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?

Options:

A.  

The link is improperly terminated

B.  

One of the devices is misconfigured

C.  

The cable length is excessive

D.  

One of the devices has a hardware issue

Discussion 0
Question # 11

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:

Device

LC/LC patch cable

Patch panel

Cross-connect fiber cable

Patch panel

LC/LC patch cable

Switch

The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?

Options:

A.  

TX/RX is reversed

B.  

An incorrect cable was used

C.  

The device failed during installation

D.  

Attenuation is occurring

Discussion 0
Question # 12

A network technician needs to ensure outside users are unable to telnet into any of the servers at the datacenter. Which of the following ports should be blocked when checking firewall configuration?

Options:

A.  

22

B.  

23

C.  

80

D.  

3389

E.  

8080

Discussion 0
Question # 13

A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign. The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP:

Question # 13

The network engineer observes that all users have lost Internet connectivity. Which of the following describes the issue?

Options:

A.  

The incorrect subnet mask was configured

B.  

The incorrect gateway was configured

C.  

The incorrect IP address was configured

D.  

The incorrect interface was configured

Discussion 0
Question # 14

A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?

Options:

A.  

VIP

B.  

NAT

C.  

APIPA

D.  

IPv6 tunneling

E.  

Broadcast IP

Discussion 0
Question # 15

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

Options:

A.  

802.11ac

B.  

802.11ax

C.  

802.11g

D.  

802.11n

Discussion 0
Question # 16

A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?

Options:

A.  

OTDR

B.  

Tone generator

C.  

Fusion splicer

D.  

Cable tester

E.  

PoE injector

Discussion 0
Question # 17

Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question:

Question # 17

Which of the following should a wireless technician do NEXT to troubleshoot this issue?

Options:

A.  

Reconfigure the channels to reduce overlap

B.  

Replace the omni antennas with directional antennas

C.  

Update the SSIDs on all the APs

D.  

Decrease power in AP 3 and AP 4

Discussion 0
Question # 18

A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?

Options:

A.  

A Layer 3 switch

B.  

A proxy server

C.  

A NGFW

D.  

A WLAN controller

Discussion 0
Question # 19

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)

Options:

A.  

CPU usage

B.  

Memory

C.  

Temperature

D.  

Bandwidth

E.  

Latency

F.  

Jitter

Discussion 0
Question # 20

Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?

Options:

A.  

A smart card

B.  

A key fob

C.  

An employee badge

D.  

A door lock

Discussion 0
Question # 21

A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?

Options:

A.  

CRC errors

B.  

Giants

C.  

Runts

D.  

Flooding

Discussion 0
Question # 22

Which of the following technologies provides a failover mechanism for the default gateway?

Options:

A.  

FHRP

B.  

LACP

C.  

OSPF

D.  

STP

Discussion 0
Question # 23

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Options:

A.  

Layer 3 switch

B.  

VPN headend

C.  

Next-generation firewall

D.  

Proxy server

E.  

Intrusion prevention

Discussion 0
Question # 24

Which of the following TCP ports is used by the Windows OS for file sharing?

Options:

A.  

53

B.  

389

C.  

445

D.  

1433

Discussion 0
Question # 25

Which of the following services can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices?

Options:

A.  

SaaS

B.  

IaaS

C.  

PaaS

D.  

DaaS

Discussion 0
Question # 26

A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?

Options:

A.  

Static IP

B.  

Default gateway

C.  

DNS entries

D.  

Local host file

Discussion 0
Question # 27

A technician is connecting DSL for a new customer. After installing and connecting the on-premises equipment, the technician verifies DSL synchronization. When connecting to a workstation, however, the link LEDs on the workstation and modem do not light up. Which of the following should the technician perform during troubleshooting?

Options:

A.  

Identify the switching loops between the modem and the workstation.

B.  

Check for asymmetrical routing on the modem.

C.  

Look for a rogue DHCP server on the network.

D.  

Replace the cable connecting the modem and the workstation.

Discussion 0
Question # 28

An ARP request is broadcasted and sends the following request.

''Who is 192.168.1.200? Tell 192.168.1.55''

At which of the following layers of the OSI model does this request operate?

Options:

A.  

Application

B.  

Data link

C.  

Transport

D.  

Network

E.  

Session

Discussion 0
Question # 29

A network administrator needs to implement an HDMI over IP solution. Which of the following will the network administrator MOST likely use to ensure smooth video delivery?

Options:

A.  

Link aggregation control

B.  

Port tagging

C.  

Jumbo frames

D.  

Media access control

Discussion 0
Question # 30

A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?

Options:

A.  

Network address translation

B.  

Default gateway

C.  

Loopback

D.  

Routing protocol

Discussion 0
Question # 31

A technician is implementing a new wireless network to serve guests at a local office. The network needs to provide Internet access but disallow associated stations from communicating with each other. Which of the following would BEST accomplish this requirement?

Options:

A.  

Wireless client isolation

B.  

Port security

C.  

Device geofencing

D.  

DHCP snooping

Discussion 0
Question # 32

A network administrator has been directed to present the network alerts from the past week to the company's executive staff. Which of the following will provide the BEST collection and presentation of this data?

Options:

A.  

A port scan printout

B.  

A consolidated report of various network devices

C.  

A report from the SIEM tool

D.  

A report from a vulnerability scan done yesterday

Discussion 0
Question # 33

A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when Ihey are near the antenna Which of the following is MOST likely the cause?

Options:

A.  

The wireless signal is being refracted by the warehouse's windows

B.  

The antenna's power level was set too high and is overlapping

C.  

An omnidirectional antenna was used instead of a unidirectional antenna

D.  

The wireless access points are using channels from the 5GHz spectrum

Discussion 0
Question # 34

A technician is deploying a low-density wireless network and is contending with multiple types of building materials. Which of the following wireless frequencies would allow for the LEAST signal attenuation?

Options:

A.  

2.4GHz

B.  

5GHz

C.  

850MHz

D.  

900MHZ

Discussion 0
Question # 35

A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:

1 Must not use plaintext passwords

2 Must be certificate based

3. Must be vendor neutral

Which of the following methods should the engineer select?

Options:

A.  

TWP-RC4

B.  

CCMP-AES

C.  

EAP-TLS

D.  

WPA2

Discussion 0
Question # 36

There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?

Options:

A.  

Enable a management access list

B.  

Disable access to unnecessary services.

C.  

Configure a stronger password for access

D.  

Disable access to remote management

E.  

Use an out-of-band access method.

Discussion 0
Question # 37

A company requires a disaster recovery site to have equipment ready to go in the event of a disaster at its main datacenter. The company does not have the budget to mirror all the live data to the disaster recovery site. Which of the following concepts should the company select?

Options:

A.  

Cold site

B.  

Hot site

C.  

Warm site

D.  

Cloud site

Discussion 0
Question # 38

A network technician is installing an analog desk phone for a new receptionist After running a new phone line, the technician now needs to cnmp on a new connector. Which of the following connectors would MOST likely be used in this case?

Options:

A.  

DB9

B.  

RJ11

C.  

RJ45

D.  

DB25

Discussion 0
Question # 39

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?

Options:

A.  

Fault tolerance

B.  

Quality of service

C.  

Load balancing

D.  

Port aggregation

Discussion 0
Question # 40

A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall?

Options:

A.  

Secure SNMP

B.  

Port security

C.  

Implicit deny

D.  

DHCP snooping

Discussion 0
Question # 41

A network engineer performs the following tasks to increase server bandwidth:

Connects two network cables from the server to a switch stack

Configure LACP on the switchports

Verifies the correct configurations on the switch interfaces

Which of the following needs to be configured on the server?

Options:

A.  

Load balancing

B.  

Multipathing

C.  

NIC teaming

D.  

Clustering

Discussion 0
Question # 42

A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall Which of the following would be the MOST appropriate way to enable secure remote printing?

Options:

A.  

SSH

B.  

VPN

C.  

Telnet

D.  

SSL

Discussion 0
Question # 43

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections Which of the following pieces of equipment would be able to handle this requirement?

Options:

A.  

A VPN concentrator

B.  

A load balancer

C.  

A wireless controller

D.  

A RADIUS server

Discussion 0
Question # 44

An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?

Options:

A.  

5

B.  

7

C.  

10

D.  

15

Discussion 0
Question # 45

Which of the following protocols will a security appliance that is correlating network events from multiple devices MOST likely rely on to receive event messages?

Options:

A.  

Syslog

B.  

Session Initiation Protocol

C.  

Secure File Transfer Protocol

D.  

Server Message Block

Discussion 0
Question # 46

Which of the following OSI model layers is where conversations between applications are established, coordinated, and terminated?

Options:

A.  

Session

B.  

Physical

C.  

Presentation

D.  

Data link

Discussion 0
Question # 47

A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

Options:

A.  

Confirm the patch's MD5 hash prior to the upgrade

B.  

Schedule the switches to reboot after an appropriate amount of time.

C.  

Download each switch's current configuration before the upgrade

D.  

Utilize FTP rather than TFTP to upload the patch

Discussion 0
Question # 48

A network administrator wants to improve the security of the management console on the company's switches and ensure configuration changes made can be correlated to the administrator who conformed them Which of the following should the network administrator implement?

Options:

A.  

Port security

B.  

Local authentication

C.  

TACACS+

D.  

Access control list

Discussion 0
Question # 49

Which of the Mowing architectures reduces network latency by enforcing a limit on the number of switching devices on the frame's path between any internal hosts?

Options:

A.  

Spine and leaf

B.  

Software-defined network

C.  

Three-tiered

D.  

Collapsed core

Discussion 0
Question # 50

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

Options:

A.  

Omni

B.  

Directional

C.  

Yagi

D.  

Parabolic

Discussion 0
Question # 51

A network administrator is reviewing the network device logs on a syslog server. The messages are normal but the stamps on the messages are incorrect. Which of the following actions should the administrator take to ensure the log message time stamps are correct?

Options:

A.  

Change the NTP settings on the network device

B.  

Change the time on the syslog server

C.  

Update the network device firmware

D.  

Adjust the timeout settings on the syslog server

E.  

Adjust the SSH settings on the network device.

Discussion 0
Question # 52

A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks. Which of the following would be BEST for the administrator to purchase?

Options:

A.  

An IPS

B.  

A Layer 3 switch

C.  

A router

D.  

A wireless LAN controller

Discussion 0
Question # 53

Which of the following records can be used to track the number of changes on a DNS zone?

Options:

A.  

SOA

B.  

SRV

C.  

PTR

D.  

NS

Discussion 0
Question # 54

A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue?

Options:

A.  

Run the show interface command on the switch

B.  

Run the tracerouute command on the server

C.  

Run iperf on the technician's desktop

D.  

Ping the client's computer from the router

E.  

Run a port scanner on the client's IP address

Discussion 0
Question # 55

Which of the following devices would be used to extend the range of a wireless network?

Options:

A.  

A repeater

B.  

A media converter

C.  

A router

D.  

A switch

Discussion 0
Question # 56

A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?

Options:

A.  

MAC table

B.  

Neighbor Discovery Protocol

C.  

ARP table

D.  

IPConfig

E.  

ACL table

Discussion 0
Question # 57

An administrator is setting up a multicast server on a network, but the firewall seems to be dropping the traffic. After logging in to the device, me administrator sees me following entries:

Question # 57

Which of the following firewall rules is MOST likely causing the issue?

Options:

A.  

Rule 1

B.  

Rule 2

C.  

Rule 3

D.  

Rule 4

Discussion 0
Question # 58

Which of the following layers of the OSI model has new protocols activated when a user moves from a wireless to a wired connection?

Options:

A.  

Data link

B.  

Network

C.  

Transport

D.  

Session

Discussion 0
Question # 59

A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?

Options:

A.  

Disable unneeded ports

B.  

Disable SSH service

C.  

Disable MAC filtering

D.  

Disable port security

Discussion 0
Question # 60

While setting up a new workstation, a technician discovers that the network connection is only 100 full duplex (FD), although it is connected to a gigabit switch.

While reviewing the interface information in the switch CLI, the technician notes the port is operating at IOOFD but Shows many RX and TX errors. The technician moves the computer to another switchport and experiences the

same issues.

Which of the following is MOST likely the cause of the low data rate and port errors?

Options:

A.  

Bad switch ports

B.  

Duplex issues

C.  

Cable length

D.  

Incorrect pinout

Discussion 0
Question # 61

A network engineer is investigating reports of poor performance on a videoconferencing application. Upon reviewing the report, the engineer finds that available bandwidth at the WAN connection is low.

Which Of the following is the MOST appropriate mechanism to handle this issue?

Options:

A.  

Traffic shaping

B.  

Flow control

C.  

NetFIow

D.  

Link aggregation

Discussion 0
Question # 62

Which of the following allows for an devices within a network to share a highly reliable time source?

Options:

A.  

NTP

B.  

SNMP

C.  

SIP

D.  

DNS

Discussion 0
Question # 63

A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode, but it contains sensitive information about clients and vendors. Which of the following should also be enabled?

Options:

A.  

Factory reset

B.  

Autolock

C.  

Encryption

D.  

Two-factor authentication

Discussion 0
Question # 64

An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?

Options:

A.  

Private VLANs

B.  

Access control lists

C.  

Firewalls

D.  

Control plane policing

Discussion 0
Question # 65

Which of the following can be used to store various types of devices and provide contactless delivery to users?

Options:

A.  

Asset tags

B.  

Biometrics

C.  

Access control vestibules

D.  

Smart lockers

Discussion 0
Question # 66

Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?

Options:

A.  

Traffic shaping

B.  

Traffic policing

C.  

Traffic marking

D.  

Traffic classification

Discussion 0
Question # 67

An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations?

Options:

A.  

MTTR

B.  

RTO

C.  

MTBF

D.  

RPO

Discussion 0
Question # 68

The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?

Options:

A.  

Redundant power supplies

B.  

Uninterruptible power supply

C.  

Generator

D.  

Power distribution unit

Discussion 0
Question # 69

Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?

Options:

A.  

netstat -a

B.  

ifconfig

C.  

ip addr

D.  

ipconfig /all

Discussion 0
Question # 70

A user reports that a crucial fileshare is unreachable following a network upgrade that was completed the night before. A network technician confirms the problem exists. Which of the following

troubleshooting Steps should the network technician perform NEXT?

Options:

A.  

Establish a theory of probable cause.

B.  

Implement a solution to fix the problem.

C.  

Create a plan of action to resolve the problem.

D.  

Document the problem and the solution.

Discussion 0
Question # 71

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

Options:

A.  

Syslog server messages

B.  

MIB of the attacked firewall

C.  

Network baseline reports

D.  

NetFlow aggregate data

Discussion 0
Question # 72

A technician is investigating an issue with connectivity at customer's location. The technician confirms that users can access resources locally but not over the internet The technician theorizes that the local router has failed and investigates further. The technician's testing results show that the route is functional: however, users still are unable to reach resources on the internal. Which of the following describes what the technician should do NEXT?

Options:

A.  

Document the lessons learned

B.  

Escalate the issue

C.  

identify the symptoms.

D.  

Question users for additional information

Discussion 0
Question # 73

A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise Each team member has been assigned an area to trouble shoot. Which of the following approaches is being used?

Options:

A.  

Divide-and-conquer

B.  

Top-to-bottom

C.  

Bottom-to-top

D.  

Determine if anything changed

Discussion 0
Question # 74

A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?

Options:

A.  

Network access control

B.  

Least privilege

C.  

Multifactor authentication

D.  

Separation of duties

Discussion 0
Get N10-008 dumps and pass your exam in 24 hours!

Free Exams Sample Questions