Download CompTIA Network Plus.N10-008.PassLeader.2024-09-27.245q.tqb

Vendor: CompTIA
Exam Code: N10-008
Exam Name: CompTIA Network Plus
Date: Sep 27, 2024
File Size: 4 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which of the following is the physical topology for an Ethernet LAN?
  1. Bus
  2. Ring
  3. Mesh
  4. Star
Correct answer: D
Explanation:
A star (hub-and-spoke) topology’s computers are connected to a central point with their own individual cables or wireless connections. You will often find that central spot inhabited by a device like a hub, a switch, or an access point.
A star (hub-and-spoke) topology’s computers are connected to a central point with their own individual cables or wireless connections. You will often find that central spot inhabited by a device like a hub, a switch, or an access point.
Question 2
A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?
  1. The AP association time is set too low
  2. EIRP needs to be boosted
  3. Channel overlap is occurring
  4. The RSSI is misreported
Correct answer: B
Question 3
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. 
Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
  1. Ensure an implicit permit rule is enabled
  2. Configure the log settings on the firewalls to the central syslog server
  3. Update the firewalls with current firmware and software
  4. Use the same complex passwords on all firewalls
Correct answer: C
Explanation:
Newer firmware and patches can often improve your existing firewall performance, resulting in faster speeds and better overall performance. In addition, newer firmware can provide additional features and security updates that can further improve the performance of your firewall.
Newer firmware and patches can often improve your existing firewall performance, resulting in faster speeds and better overall performance. In addition, newer firmware can provide additional features and security updates that can further improve the performance of your firewall.
Question 4
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
  1. 802.1Q
  2. STP
  3. Flow control 
  4. CSMA/CD
Correct answer: B
Explanation:
STP (Spanning Tree Protocol) - A switching protocol that prevents network loops by dynamically disabling links as needed.
STP (Spanning Tree Protocol) - A switching protocol that prevents network loops by dynamically disabling links as needed.
Question 5
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
  1. SSO
  2. TACACS+
  3. Zero Trust
  4. Separation of duties
  5. Multifactor authentication
Correct answer: B
Explanation:
Terminal Access Controller Access Control System (TACACS+) is often used in authenticating administrative access to routers and switches.
Terminal Access Controller Access Control System (TACACS+) is often used in authenticating administrative access to routers and switches.
Question 6
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
  1. Motion detection
  2. Access control vestibules
  3. Smart lockers
  4. Cameras
Correct answer: B
Explanation:
The devil is in the details, the question is essentially asking, why would it be possible for an individual to use a card reader, that would be a access control vestibule or mantrap. An individual would typically utilize a card reader if you want to access a particular room via a mantrap.
The devil is in the details, the question is essentially asking, why would it be possible for an individual to use a card reader, that would be a access control vestibule or mantrap. An individual would typically utilize a card reader if you want to access a particular room via a mantrap.
Question 7
A workstation is configured with the following network details: 
  
     
    
Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
  1. 10.1.2.0
  2. 10.1.2.1
  3. 10.1.2.23
  4. 10.1.2.255
  5. 10.1.2.31
Correct answer: E
Explanation:
CIDR 27 is 1111 1111.1111 1111.1111 1111.1110 0000  2^5 = 32 hosts per subnet  1st address is network address, last address is broadcast address  The user address is 10.1.2.23 which means he reside in the network of 10.1.2.0 to 10.1.2.31  10.1.2.31 is the last address in that network thus the broadcast address
CIDR 27 is 1111 1111.1111 1111.1111 1111.1110 0000  
2^5 = 32 hosts per subnet  
1st address is network address, last address is broadcast address  
The user address is 10.1.2.23 which means he reside in the network of 10.1.2.0 to 10.1.2.31  
10.1.2.31 is the last address in that network thus the broadcast address
Question 8
A website administrator is concerned the company's static website could be defaced by hacktivists or used as a pivot point to attack internal systems.  
Which of the following should a network security administrator recommend to assist with detecting these activities?
  1. Implement file integrity monitoring.
  2. Change the default credentials.
  3. Use SSL encryption.
  4. Update the web-server software.
Correct answer: C
Explanation:
SSL will determine if the website is trusted or not.
SSL will determine if the website is trusted or not.
Question 9
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey.  
Which of the following documents would MOST likely be created as a result of the site survey?
  1. Physical diagram
  2. Heat map
  3. Asset list
  4. Device map
Correct answer: B
Question 10
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology.  
Which of the following is the number of additional network connections needed?
  1. 5
  2. 7
  3. 10
  4. 15
Correct answer: C
Explanation:
With the star we have 5 connections.  The formula for the Mesh is n(n-1)/2 with n = total number of devices.   This leads to (6x5)/2=30/2=15  15-5=10   From star to mesh we need 10.  
With the star we have 5 connections.  
The formula for the Mesh is n(n-1)/2 with n = total number of devices.   
This leads to (6x5)/2=30/2=15  
15-5=10   
From star to mesh we need 10.  
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!