Network+

Here you have the best CompTIA N10-008 practice exam questions

  • You have 833 total questions to study from
  • Each page has 5 questions, making a total of 167 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 2, 2024
Question 1 of 833

A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use

2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?

    Correct Answer: B

    The best option is 802.11ax, also known as Wi-Fi 6. This standard supports both 2.4 GHz and 5 GHz frequencies and is designed to offer improved performance, efficiency, and capacity, especially in dense environments like an office tower. The latest standard ensures compatibility with a mix of devices and provides significant advancements over previous standards such as higher throughput and better handling of multiple connections.

Question 2 of 833

Which of the following would be BEST to use to detect a MAC spoofing attack?

    Correct Answer: C

    The best option to detect a MAC spoofing attack is Dynamic Host Configuration Protocol (DHCP). DHCP includes features such as DHCP snooping which helps in preventing and detecting MAC address spoofing by recording which MAC addresses are assigned to which IP addresses. This allows the network to detect if an IP address is being used by a different MAC address than the one it was assigned to, thus identifying a possible MAC spoofing attack. Other protocols like ICMP, IMAP, and RARP are not directly used for detecting MAC spoofing attacks.

Question 3 of 833

A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?

    Correct Answer: D

    To troubleshoot high amounts of jitter and verify interference from other networks and non-802.11 devices, the technician should use a spectrum analyzer. A spectrum analyzer is designed to detect and measure radio frequency signals, which allows the technician to identify and analyze sources of interference within the wireless network's frequency range. This makes it the appropriate tool for diagnosing issues related to wireless network interference and variations in latency.

Question 4 of 833

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

    Correct Answer: A

    If wireless users are reporting intermittent internet connectivity that is restored upon disconnecting and reconnecting through the web authentication process, the most likely cause of the issue is related to session management. Verifying the session time-out configuration on the captive portal settings is the most relevant and logical step. A misconfigured session time-out could cause users to get disconnected once the session expires, requiring them to re-authenticate and reconnect. Since the devices are always visible to the APs, an encryption mismatch or invalid passphrase is less likely to be the cause, and the presence of an evil twin AP would not typically restore connectivity upon re-authentication.

Question 5 of 833

A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?

    Correct Answer: B

    When an authorized person enters a restricted area, and an unauthorized person follows closely behind them without their knowledge or consent to gain access, it is known as tailgating. In this scenario, the network administrator noticed an unknown person following closely and directed them to the security desk, thereby preventing the unauthorized entry. Tailgating is a common physical security threat where the perpetrator exploits the opportunity to enter a secured area behind someone who has legitimate access.