DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Updated CompTIA Network+ N10-008 Exam Dumps – Your Path to Success

Elevate your networking skills with our comprehensive CompTIA Network+ N10-008 exam preparation materials. Developed by industry veterans, our study resources provide an in-depth exploration of the exam objectives, ensuring you're fully equipped to tackle the challenging N10-008 exam. Our meticulously crafted exam questions and answers simulate the real test environment, allowing you to identify your strengths and weaknesses, and focus your efforts accordingly. Our mock exams are designed to mirror the actual exam format, helping you develop effective time-management strategies and boosting your confidence. Don't settle for less when it comes to your Network+ certification journey. Invest in our proven N10-008 study materials and gain the competitive edge you need to excel. Our resources are regularly updated to reflect the latest exam objectives, keeping you ahead of the curve in the ever-evolving networking landscape. Embark on your journey today and experience the difference our comprehensive exam preparation resources can make. With our help, you'll be well-equipped to conquer the N10-008 exam and validate your expertise in configuring, managing, and troubleshooting networks.
Take other online exams

Question #1
The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. oad balancing
B. ultipathing
C. IC teaming
D. lustering
View answer
Correct Answer: BC

View The Updated N10-008 Exam Questions

SPOTO Provides 100% Real N10-008 Exam Questions for You to Pass Your N10-008 Exam!

Question #2
An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?
A. NS poisoning
B. n-path
C. P spoofing
D. ogue DHCP
View answer
Correct Answer: A
Question #3
Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?
A. LAN hopping
B. vil twin
C. NS poisoning
D. ocial engineering
View answer
Correct Answer: B
Question #4
Which of the following is used to track and document various types of known vulnerabilities?
A. VE
B. enetration testing
C. ero-day
D. IEM
E. east privilege
View answer
Correct Answer: A
Question #5
While walking from the parking lot to an access-controlled door, an employee sees an authorized user open the door. Then the employee notices that another person catches the door before it closes and goes inside. Which of the following attacks is taking place?
A. ailgating
B. iggybacking
C. houlder surfing
D. hishing
View answer
Correct Answer: A
Question #6
Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations?
A.
B.
C. 9
D. 00
View answer
Correct Answer: C
Question #7
Which of the following is the NEXT step to perform network troubleshooting after identifying an issue?
A. mplement a solution
B. stablish a theory
C. scalate the issue
D. ocument the findings
View answer
Correct Answer: B
Question #8
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
A. erify the session time-out configuration on the captive portal settings
B. heck for encryption protocol mismatch on the client's wireless settings
C. onfirm that a valid passphrase is being used during the web authentication
D. nvestigate for a client's disassociation caused by an evil twin AP
View answer
Correct Answer: A
Question #9
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?
A. lastic computing
B. calable networking
C. ybrid deployment
D. ultitenant hosting
View answer
Correct Answer: A
Question #10
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
A. 802
B. STP
C. Flow control
D. CSMA/CD
View answer
Correct Answer: B
Question #11
The following instructions were published about the proper network configuration for a videoconferencing device:"Configure a valid static RFC1918 address for your network. Check the option to use a connection over NAT." Which of the following is a valid IP address configuration for the device?
A. E80::1
B. 00
C. 69
D. 72
E. 24
View answer
Correct Answer: D
Question #12
During an annual review of policy documents, a company decided to adjust its recovery time frames. The company agreed that critical applications can be down for no more than six hours, and the acceptable amount of data loss is no more than two hours. Which of the following should be documented as the RPO?
A. wo hours
B. our hours
C. ix hours
D. ight hours
View answer
Correct Answer: A
Question #13
An engineer is gathering data to determine the effectiveness of UPSs in use at remote retail locations. Which of the following statistics can the engineer use to determine the availability of the remote network equipment?
A. ptime
B. etFlow baseline
C. NMP traps
D. nterface statistics
View answer
Correct Answer: A
Question #14
Which of the following would be used when connecting devices that have different physical characteristics?
A. proxy server
B. n industrial control system:
C. load balancer
D. media converter
View answer
Correct Answer: D
Question #15
A network engineer is investigating issues on a Layer 2 switch. The department typically shares a switchport during meetings for presentations, but after the first user shares, no other users can connect. Which of the following is MOST likely related to this issue?
A. panning Tree Protocol is enabled on the switch
B. LAN trunking is enabled on the switch
C. ort security is configured on the switch
D. ynamic ARP inspection is configured on the switch
View answer
Correct Answer: C
Question #16
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
A. nsure an implicit permit rule is enabled
B. onfigure the log settings on the firewalls to the central syslog server
C. pdate the firewalls with current firmware and software
D. se the same complex passwords on all firewalls
View answer
Correct Answer: C
Question #17
A network technician needs to install security updates on several switches on the company's network. The management team wants this completed as quickly and efficiently as possible. Which of the following should the technician do to perform the updates?
A. pload the security update onto each switch using a terminal emulator and a console cable
B. onfigure a TFTP server, SSH into each device, and perform the update
C. eplace each old switch with new switches that have the updates already performed
D. onnect a USB memory stick to each switch and perform the update
View answer
Correct Answer: B
Question #18
A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer?
A. ort duplex settings
B. ort aggregation
C. RP settings
D. LAN tags
E. DIX settings
View answer
Correct Answer: D
Question #19
A security administrator is trying to prevent incorrect IP addresses from being assigned to clients on the network. Which of the following would MOST likely prevent this and allow the network to continue to operate?
A. onfiguring DHCP snooping on the switch
B. reventing broadcast messages leaving the client network
C. locking ports 67/68 on the client network
D. nabling port security on access ports
View answer
Correct Answer: A
Question #20
A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run?
A. pconfig
B. slookup
C. rp
D. oute
View answer
Correct Answer: B
Question #21
A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure?
A. ncorrect VLAN
B. NS failure
C. HCP scope exhaustion
D. ncorrect gateway
View answer
Correct Answer: A
Question #22
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
A. NMP
B. ink state
C. yslog
D. oS
E. raffic shaping
View answer
Correct Answer: A
Question #23
A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?
A. SMA/CD
B. ACP
C. oE+
D. DIX
View answer
Correct Answer: D
Question #24
Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring?
A. itter
B. andwidth
C. atency
D. iants
View answer
Correct Answer: B
Question #25
Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications?
A. Link Aggregation Control Protocol
B. Dynamic routing
C. Quality of service
D. Network load balancer
E. Static IP addresses
View answer
Correct Answer: C
Question #26
Several employees have expressed concerns about the company monitoring their internet activity when they are working from home. The company wants to mitigate this issue and reassure employees that their private internet activity is not being monitored. Which of the following would satisfy company and employee needs?
A. plit tunnel
B. ull tunnel
C. ite-to-site tunnel
D. irtual desktop
View answer
Correct Answer: A
Question #27
A technician is connecting a Cat 6 Ethernet cable to a device that only has LC ports. Which of the following will the technician MOST likely use to accomplish this task?
A. bridge
B. media converter
C. repeater
D. router
View answer
Correct Answer: B
Question #28
Which of the following BEST describes a North-South traffic flow?
A. public Internet user accessing a published web server
B. database server communicating with another clustered database server
C. Layer 3 switch advertising routes to a router
D. management application connecting to managed devices
View answer
Correct Answer: A
Question #29
A network administrator is getting reports of some internal users who cannot connect to network resources. The users state they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks. Which of the following is the MOST likely cause of the issue?
A. he client DHCP scope is fully utilized
B. he wired network is experiencing electrical interference
C. he captive portal is down and needs to be restarted
D. NMP traps are being received
E. he packet counter on the router interface is high
View answer
Correct Answer: A
Question #30
A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?
A. udit logs
B. PU utilization
C. RC errors
D. itter
View answer
Correct Answer: B
Question #31
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?
A. ass-the-hash attack
B. ainbow table attack
C. rute-force attack
D. ictionary attack
View answer
Correct Answer: D
Question #32
A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue?
A. djust the proper logging level on the new firewall
B. une the filter for logging the severity level on the syslog server
C. ctivate NetFlow traffic between the syslog server and the firewall
D. estart the SNMP service running on the syslog server
View answer
Correct Answer: A
Question #33
A network administrator is designing a wireless network. The administrator must ensure a rented office space has a sufficient signal. Reducing exposure to the wireless network is important, but it is secondary to the primary objective. Which of the following would MOST likely facilitate the correct accessibility to the Wi-Fi network?
A. olarization
B. hannel utilization
C. hannel bonding
D. ntenna type
E. U-MIMO
View answer
Correct Answer: D
Question #34
A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?
A. pconfig
B. etstat
C. racert
D. ing
View answer
Correct Answer: C
Question #35
Which of the following routing protocols is generally used by major ISPs for handling large-scale internet traffic?
A. IP
B. IGRP
C. SPF
D. GP
View answer
Correct Answer: D
Question #36
Which of the following is a valid and cost-effective solution to connect a fiber cable into a network switch without available SFP ports?
A. se a media converter and a UTP cable
B. nstall an additional transceiver module and use GBICs
C. hange the type of connector from SC to F-type
D. se a loopback adapter to make the connection
View answer
Correct Answer: A
Question #37
Several users with older devices are reporting intermittent connectivity while in an outdoor patio area. After some research, the network administrator determines that an outdoor WAP might help with the issue. However, the company does not want the signal to bleed into the building and cause interference. Which of the following should the network administrator perform to BEST resolve the issue?
A. isable the SSID broadcast on the WAP in the patio area
B. nstall a WAP and enable 5GHz only within the patio area
C. nstall a directional WAP in the direction of the patio
D. nstall a repeater on the back wall of the patio area
View answer
Correct Answer: C
Question #38
A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?
A. honeypot
B. etwork segmentation
C. ntivirus
D. screened subnet
View answer
Correct Answer: A
Question #39
An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations?
A. TTR
B. TO
C. TBF
D. PO
View answer
Correct Answer: B
Question #40
Which of the following TCP ports is used by the Windows OS for file sharing?
A. 3
B. 89
C. 45
D. 433
View answer
Correct Answer: C
Question #41
A technician is connecting DSL for a new customer. After installing and connecting the on-premises equipment, the technician verifies DSL synchronization. When connecting to a workstation, however, the link LEDs on the workstation and modem do not light up. Which of the following should the technician perform during troubleshooting?
A. dentify the switching loops between the modem and the workstation
B. heck for asymmetrical routing on the modem
C. ook for a rogue DHCP server on the network
D. eplace the cable connecting the modem and the workstation
View answer
Correct Answer: D
Question #42
A technician is deploying a new SSID for an industrial control system. The control devices require the network to use encryption that employs TKIP and a symmetrical password to connect. Which of the following should the technician configure to ensure compatibility with the control devices?
A. PA2-Enterprise
B. PA-Enterprise
C. PA-PSK
D. PA2-PSK
View answer
Correct Answer: C
Question #43
A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs?
A. Layer 3 switch
B. proxy server
C. NGFW
D. WLAN controller
View answer
Correct Answer: A
Question #44
Which of the following would be BEST suited for a long cable run with a 40Gbps bandwidth?
A. at 5e
B. at 6a
C. at 7
D. at 8
View answer
Correct Answer: D
Question #45
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?
A. irtual network computing
B. ecure Socket Shell
C. n-band connection
D. ite-to-site VPN
View answer
Correct Answer: D
Question #46
A network requirement calls for segmenting departments into different networks. The campus network is set up with users of each department in multiple buildings. Which of the following should be configured to keep the design simple and efficient?
A. DIX
B. umbo frames
C. ort tagging
D. low control
View answer
Correct Answer: C
Question #47
Which of the following is considered a physical security detection device?
A. ameras
B. iometric readers
C. ccess control vestibules
D. ocking racks
View answer
Correct Answer: A
Question #48
A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?
A. sset tags
B. smart locker
C. n access control vestibule
D. camera
View answer
Correct Answer: A
Question #49
A technician needs to configure a Linux computer for network monitoring. The technician has the following information: Linux computer details:Switch mirror port details:After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
A. fconfig ecth0 promisc
B. fconfig eth1 up
C. fconfig eth0 10
D. fconfig eth1 hw ether A1:B2:C3:D4:E5:F6
View answer
Correct Answer: A
Question #50
Which of the following is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices?
A. wisted cable with a minimum Cat 5e certification
B. ultimode fiber with an SC connector
C. winaxial cabling using an F-type connector
D. able termination using TIA/EIA-568-B
View answer
Correct Answer: A
Question #51
Which of the following ports are associated with IMAP? (Choose two.)
A. syslog server
B. hange management records
C. rack diagram
D. he security log
View answer
Correct Answer: CE
Question #52
A network technician is reviewing a document that specifies how to handle access to company resources, such as the Internet and printers, when devices are not part of the company's assets. Which of the following agreements would a user be required to accept before using the company's resources?
A. YOD
B. LP
C. UP
D. OU
View answer
Correct Answer: C
Question #53
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
A. vil twin
B. ailgating
C. iggybacking
D. houlder surfing
View answer
Correct Answer: B
Question #54
Which of the following would be BEST to install to find and block any malicious users within a network?
A. DS
B. PS
C. CADA
D. CS
View answer
Correct Answer: B
Question #55
Network users reported that a recent firmware upgrade to a firewall did not resolve the issue that prompted the upgrade. Which of the following should be performed NEXT?
A. eopen the service ticket, request a new maintenance window, and roll back to the anterior firmware version
B. ather additional information to ensure users' concerns are not been caused by a different issue with similar symptoms
C. mploy a divide-and-conquer troubleshooting methodology by engaging the firewall vendor's support
D. scalate the issue to the IT management team in order to negotiate a new SLA with the user's manager
View answer
Correct Answer: B
Question #56
Which of the following uses the destination IP address to forward packets?
A. bridge
B. Layer 2 switch
C. router
D. repeater
View answer
Correct Answer: C
Question #57
Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cabling?
A. J11
B. C ports
C. atch panel
D. -type connector
View answer
Correct Answer: C
Question #58
A Wi-Fi network was originally configured to be able to handle interference from a microwave oven. The microwave oven was recently removed from the office. Now the network administrator wants to optimize the system to maximize the range of the signal. The main sources of signal degradation are the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the following actions should the administrator take?
A. mplement CDM
B. hange from omni to directional
C. hange the SSID
D. hange the frequency
View answer
Correct Answer: D
Question #59
Which of the following topologies requires the MOST connections when designing a network?
A. esh
B. tar
C. us
D. ing
View answer
Correct Answer: A
Question #60
A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?
A. erform a site survey
B. eview the AP placement
C. onitor channel utilization
D. est cable attenuation
View answer
Correct Answer: C
Question #61
Which of the following is most likely to have the HIGHEST latency while being the most accessible?
A. atellite
B. SL
C. able
D. G
View answer
Correct Answer: A
Question #62
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following would normally be applied as the LAST rule in the firewall?
A. ecure SNMP
B. ort security
C. mplicit deny
D. HCP snooping
View answer
Correct Answer: C
Question #63
A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?
A. IP
B. AT
C. PIPA
D. Pv6 tunneling
E. roadcast IP
View answer
Correct Answer: A
Question #64
A company's primary ISP is experiencing an outage. However, the network administrator notices traffic continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this configuration?
A. iverse paths
B. oad balancing
C. ultipathing
D. irtual Router Redundancy Protocol
View answer
Correct Answer: A
Question #65
ARP spoofing would normally be a part of:
A. n on-path attack
B. NS poisoning
C. DoS attack
D. rogue access point
View answer
Correct Answer: A
Question #66
Which of the following systems would MOST likely be found in a screened subnet?
A. ADIUS
B. TP
C. QL
D. DAP
View answer
Correct Answer: B
Question #67
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
A. TTR
B. OU
C. DA
D. LA
View answer
Correct Answer: D
Question #68
A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers?
A. oaxial over Ethernet
B. nternet Small Computer Systems Interface
C. ibre Channel
D. igabit interface converter
View answer
Correct Answer: C
Question #69
Users attending security training at work are advised not to use single words as passwords for corporate applications. Which of the following does this BEST protect against?
A. n on-path attack
B. brute-force attack
C. dictionary attack
D. AC spoofing
E. enial of service
View answer
Correct Answer: C
Question #70
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
A. n increase in network security using encryption and packet encapsulation
B. network expansion caused by an increase in the number of branch locations to the headquarters
C. mandatory requirement to increase the deployment of an SDWAN network
D. n improvement in network efficiency by increasing the useful packet payload
View answer
Correct Answer: B
Question #71
Which of the following is used to elect an STP root?
A. bridge ID
B. bridge protocol data unit
C. nterface port priority
D. switch's root port
View answer
Correct Answer: A
Question #72
Which of the following OSI model layers is where conversations between applications are established, coordinated, and terminated?
A. ession
B. hysical
C. resentation
D. ata link
View answer
Correct Answer: A
Question #73
A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?
A. andatory access control
B. ser-based permissions
C. ole-based access
D. east privilege
View answer
Correct Answer: C
Question #74
A network technician recently installed 35 additional workstations. After installation, some users are unable to access network resources. Many of the original workstations that are experiencing the network access issue were offline when the new workstations were turned on. Which of the following is the MOST likely cause of this issue?
A. ncorrect VLAN setting
B. nsufficient DHCP scope
C. mproper NIC setting
D. uplicate IP address
View answer
Correct Answer: D
Question #75
An international company is transferring its IT assets, including a number of WAPs, from the United States to an office in Europe for deployment. Which of the following considerations should the company research before implementing the wireless hardware?
A. PA2 cipher
B. egulatory impacts
C. DMA configuration
D. 02
View answer
Correct Answer: B
Question #76
A technician is trying to install a VoIP phone, but the phone is not turning on. The technician checks the cable going from the phone to the switch, and the cable is good. Which of the following actions is needed for this phone to work?
A. dd a PoE injector
B. nable MDIX
C. se a crossover cable
D. econfigure the port
View answer
Correct Answer: A
Question #77
Which of the following is used to prioritize Internet usage per application and per user on the network?
A. andwidth management
B. oad balance routing
C. order Gateway Protocol
D. dministrative distance
View answer
Correct Answer: A
Question #78
Which of the following routing protocols is used to exchange route information between public autonomous systems?
A. SPF
B. GP
C. GRIP
D. IP
View answer
Correct Answer: B
Question #79
Which of the following security controls indicates unauthorized hardware modifications?
A. iometric authentication
B. edia device sanitization
C. hange management policy
D. amper-evident seals
View answer
Correct Answer: D
Question #80
Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?
A. he switch was configured with port security
B. ewly added machines are running into DHCP conflicts
C. he IPS was not configured to recognize the new users
D. ecently added users were assigned to the wrong VLAN
View answer
Correct Answer: D
Question #81
A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?
A. low control
B. umbo frames
C. uplex
D. ort mirroring
View answer
Correct Answer: A
Question #82
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician review on the switch to locate the device’s network port?
A. P route table
B. LAN tag
C. AC table
D. oS tag
View answer
Correct Answer: C
Question #83
Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?
A. TP
B. oaxial
C. iber
D. at 5
E. winaxial
View answer
Correct Answer: C
Question #84
A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?
A. assword complexity
B. ort security
C. ireless client isolation
D. ecure SNMP
View answer
Correct Answer: B
Question #85
Which of the following would be the MOST cost-effective recovery solution for a company's lower-priority applications?
A. arm site
B. loud site
C. ot site
D. old site
View answer
Correct Answer: B
Question #86
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information:Which of the following is MOST likely the cause of the issue?
A. loop was discovered, and the impact was mitigated
B. n incorrectly pinned cable was disconnected
C. he link-local address on the port is incorrect
D. he port was shut down, and it needs to be reactivated
View answer
Correct Answer: A
Question #87
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
A. erify the session time-out configuration on the captive portal settings
B. heck for encryption protocol mismatch on the client’s wireless settings
C. onfirm that a valid passphrase is being used during the web authentication
D. nvestigate for a client’s disassociation caused by an evil twin AP
View answer
Correct Answer: A
Question #88
After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?
A. odify the device's MIB on the monitoring system
B. onfigure syslog to send events to the monitoring system
C. se port mirroring to redirect traffic to the monitoring system
D. eploy SMB to transfer data to the monitoring system
View answer
Correct Answer: A
Question #89
A network administrator received a report stating a critical vulnerability was detected on an application that is exposed to the internet. Which of the following is the appropriate NEXT step?
A. heck for the existence of a known exploit in order to assess the risk
B. mmediately shut down the vulnerable application server
C. nstall a network access control agent on the server
D. eploy a new server to host the application
View answer
Correct Answer: A
Question #90
An IT director is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications. In the event of an outage, the company can immediately switch from one datacenter to another. Which of the following does this BEST describe?
A. warm site
B. ata mirroring
C. ultipathing
D. oad balancing
E. hot site
View answer
Correct Answer: E
Question #91
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any performance issues. The following table summarizes the findings after a site survey of the area in question:Which of the following should a wireless technician do NEXT to troubleshoot this issue?
A. econfigure the channels to reduce overlap
B. eplace the omni antennas with directional antennas
C. pdate the SSIDs on all the APs
D. ecrease power in AP 3 and AP 4
View answer
Correct Answer: A
Question #92
A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?
A. orrect the DNS server entries in the DHCP scope
B. orrect the external firewall gateway address
C. orrect the NTP server settings on the clients
D. orrect a TFTP Issue on the company’s server
View answer
Correct Answer: A
Question #93
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?
A. ctive-active
B. arm
C. old
D. loud
View answer
Correct Answer: B
Question #94
At which of the following OSI model layers does routing occur?
A. ata link
B. ransport
C. hysical
D. etwork
View answer
Correct Answer: D
Question #95
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?
A. panning Tree Protocol
B. eighbor Discovery Protocol
C. ink Aggregation Control Protocol
D. ddress Resolution Protocol
View answer
Correct Answer: B
Question #96
Which of the following can be used to store various types of devices and provide contactless delivery to users?
A. sset tags
B. iometrics
C. ccess control vestibules
D. mart lockers
View answer
Correct Answer: D
Question #97
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?
A. nstall load balancers
B. nstall more switches
C. ecrease the number of VLANs
D. educe the lease time
View answer
Correct Answer: D
Question #98
When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does thisBEST represent?
A. hanging the VLAN of the web server
B. hanging the server's IP address
C. mplementing an ACL
D. nstalling a rule on the firewall connected to the web server
View answer
Correct Answer: B
Question #99
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:
A. using a bottom-to-top approach
B. establishing a plan of action
C. documenting a finding
D. questioning the obvious
View answer
Correct Answer: D
Question #100
Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)
A. aptive portal
B. eofencing
C. ireless client isolation
D. ole-based access
View answer
Correct Answer: BD
Question #101
An IT administrator received an assignment with the following objectives:-Conduct a total scan within the company's network for all connected hosts.-Detect all the types of operating systems running on all devices.-Discover all services offered by hosts on the network.-Find open ports and detect security risks.Which of the following command-line tools can be used to achieve these objectives?
A. map
B. rp
C. etstat
D. cpdump
View answer
Correct Answer: A
Question #102
A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the demarcation point back to the central office?
A. ultimode
B. at 5e
C. G-6
D. at 6
E. 00BASE-T
View answer
Correct Answer: C
Question #103
A technician is consolidating a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
A. eamless roaming
B. asic service set
C. PA
D. U-MIMO
View answer
Correct Answer: A
Question #104
A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue?
A. un the show interface command on the switch
B. un the traceroute command on the server
C. un iperf on the technician's desktop
D. ing the client's computer from the router
E. un a port scanner on the client's IP address
View answer
Correct Answer: A
Question #105
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A. OTDR
B. Tone generator
C. Fusion splicer
D. Cable tester
E. PoE injector
View answer
Correct Answer: A
Question #106
Which of the following uses the link-state routing algorithm and operates within a single autonomous system?
A. IGRP
B. SPF
C. IP
D. GP
View answer
Correct Answer: B
Question #107
A network administrator wants to reduce overhead and increase efficiency on a SAN. Which of the following can be configured to achieve these goals?
A. ort aggregation
B. raffic shaping
C. umbo frames
D. low control
View answer
Correct Answer: C
Question #108
Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site. Which of the following will BEST provide this functionality?
A. lient-to-site VPN
B. hird-party VPN service
C. ite-to-site VPN
D. plit-tunnel VPN
View answer
Correct Answer: C
Question #109
A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks need to be completed to allow the phone to operate correctly?
A. ssign the phone’s switchport to the correct VLAN
B. tatistically assign the phone’s gateway address
C. onfigure a route on the VoIP network router
D. mplement a VoIP gateway
View answer
Correct Answer: A
Question #110
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?
A. IB
B. rap
C. yslog
D. udit log
View answer
Correct Answer: A
Question #111
Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links?
A. SPF
B. IPv2
C. oS
D. TP
View answer
Correct Answer: A
Question #112
Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation, coordination, and termination of the call?
A. ession
B. hysical
C. ransport
D. ata link
View answer
Correct Answer: A
Question #113
A technician is assisting a user who cannot access network resources when the workstation is connected to a VoIP phone. The technician identifies the phone as faulty and replaces it. According to troubleshooting methodology, which of the following should the technician do NEXT?
A. mplement the solution
B. est the theory
C. uplicate the issue
D. ocument the findings
E. erify functionality
View answer
Correct Answer: E
Question #114
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?
A. P scanner
B. erminal emulator
C. etFlow analyzer
D. ort scanner
View answer
Correct Answer: A
Question #115
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 452
B. 492
C. 500
D. 304
View answer
Correct Answer: C
Question #116
A network administrator is preparing answers for an annual risk assessment that is required for compliance purposes. Which of the following would be an example of an internal threat?
A. n approved vendor with on-site offices
B. n infected client that pulls reports from the firm
C. malicious attacker from within the same country
D. malicious attacker attempting to socially engineer access into corporate offices
View answer
Correct Answer: B
Question #117
Which of the following issues are present with RIPv2? (Choose two.)
A. ultipathing
B. panning Tree Protocol
C. irst Hop Redundancy Protocol
D. lasticity
View answer
Correct Answer: BC
Question #118
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?
A. VoIP sales call with a customer
B. n in-office video call with a coworker
C. outing table from the ISP
D. irewall CPU processing time
View answer
Correct Answer: A
Question #119
A technician removes an old PC from the network and replaces it with a new PC that is unable to connect to the LAN. Which of the following is MOST likely the cause of the issue?
A. ort security
B. ort tagging
C. ort aggregation
D. ort mirroring
View answer
Correct Answer: A
Question #120
A network engineer needs to create a subnet that has the capacity for five VLANs, with the following number of clients to be allowed on each:Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?
A. 0
B. 0
C. 0
D. 0
View answer
Correct Answer: B
Question #121
Which of the following physical security methods is the MOST effective to prevent tailgating?
A. iometrics in an access control vestibule
B. P cameras with motion detection
C. mart lockers with tamper protection
D. adge readers plus a PIN pad
View answer
Correct Answer: A
Question #122
A client utilizes mobile tablets to view high-resolution images and videos via Wi-Fi within a corporate office building. The previous administrator installed multiple high-density APs with Wi-Fi 5, providing maximum coverage, but the measured performance is still below expected levels. Which of the following would provide the BEST solution?
A. hannel bonding
B. IRP power settings
C. ntenna polarization
D. directional antenna
View answer
Correct Answer: A
Question #123
A technician installed an 8-port switch in a user's office. The user needs to add a second computer in the office, so the technician connects both PCs to the switch and connects the switch to the wall jack. However, the new PC cannot connect to network resources. The technician then observes the following:-The new computer does not get an IP address on the client's VLAN.-Both computers have a link light on their NICs.-The new PC appears to be operating normally except for the network issue.-The existing com
A. ontact the network team to resolve the port security issue
B. ontact the server team to have a record created in DNS for the new PC
C. ontact the security team to review the logs on the company's SIEM
D. ontact the application team to check NetFlow data from the connected switch
View answer
Correct Answer: A
Question #124
A technician knows the MAC address of a device and is attempting to find the device's IP address. Which of the following should the technician look at to find theIP address? (Choose two.)
A. ncorrect subnet mask
B. ncorrect DNS server
C. ncorrect IP class
D. ncorrect TCP port
View answer
Correct Answer: AB
Question #125
After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes.Which of the following would be BEST to use for these notifications?
A. raps
B. IB
C. etFlow
D. yslog
View answer
Correct Answer: A
Question #126
Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated significant network issues occur. Which of the following is the MOST likely cause for the WAN instability?
A. CDP neighbor has changed
B. symmetrical routing
C. switching loop
D. n incorrect IP address
View answer
Correct Answer: B
Question #127
To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device. Which of the following can be configured to fulfill this requirement?
A. oS traffic classification
B. ort mirroring
C. low control
D. ink Aggregation Control Protocol
View answer
Correct Answer: B
Question #128
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?
A. media converter
B. bridge
C. n MDIX
D. load balancer
View answer
Correct Answer: A
Question #129
A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST?
A. Validate the roaming settings on the APs and WLAN clients
B. Verify that the AP antenna type is correct for the new layout
C. Check to see if MU-MIMO was properly activated on the APs
D. Deactivate the 2
View answer
Correct Answer: A
Question #130
A workstation is configured with the following network details:Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
A. 0
B. 0
C. 0
D. 0
E. 0
View answer
Correct Answer: E

View The Updated CompTIA Exam Questions

SPOTO Provides 100% Real CompTIA Exam Questions for You to Pass Your CompTIA Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: