Scroll down to see your responses and detailed results
Prepare for the CompTIA Network+ N10-008 exam with this free practice test. Randomly generated and customizable, this test allows you to choose the number of questions.
A network administrator notices that the connection between a workstation and the wall jack is not establishing a link. The LED indicators on the network interface card (NIC) are not lighting up. After replacing the NIC and confirming the switch port is operational, the administrator uses a cable tester on the suspect Ethernet cable. The cable tester indicates that there is a discontinuity in the wire corresponding to pin 1. What is the most likely issue with this Ethernet cable?
The connectors are wired for the wrong Ethernet standard.
There is an open fault on pin 1 of the cable.
The cable tester being used is faulty.
There is a short fault on pin 1 of the cable.
This issue is indicative of an 'open' fault, where there is a break or disconnection within the cable run, specifically affecting the wire associated with pin 1. An open fault prevents signal transmission, which is consistent with the absence of LED indicators on the NIC. A 'short' would suggest that two wires are electrically connected inside the cable, which would not typically be indicated by a discontinuity on a single pin. Incorrectly wired connectors or a faulty cable tester would likely present different symptoms or error messages not consistent with a single wire showing discontinuity.
AI Generated Content may display inaccurate information, always double-check anything important.
A network administrator is configuring a new server to ensure that potential operational issues are promptly identified and addressed. The administrator needs to choose the correct level of logging to balance between detail and storage efficiency. Select the BEST logging level that would capture warnings that might not be immediately harmful to the network's operation but are significant enough to be monitored.
Informational
Emergency
Warning
Alert
The correct logging level to capture warnings of potential issues without seriously affecting the operation is 'Warning'. This level logs events such as potential issues and errors that are not necessarily critical or error level but could become a larger problem if not addressed. The 'Informational' level would contain too much extraneous data, as it logs all successful operations. The 'Alert' level is used for events requiring immediate action, which is a higher severity than warnings of potential issues. The 'Emergency' level is the highest severity, indicating the system is unusable, and is not the correct choice for capturing warnings about potential issues.
AI Generated Content may display inaccurate information, always double-check anything important.
Why is it considered a best practice to disable switch ports that are not in use within a network infrastructure?
To conserve power consumed by the network infrastructure.
To avoid IP address exhaustion due to a limited DHCP scope.
To reduce the number of active ports that could potentially serve as entry points for unauthorized users or devices.
To decrease network complexity and the associated overhead for network administrators.
To increase the speed of the network by preventing unused ports from generating traffic.
Disabling switch ports that are not in use reduces the number of entry points into the network, therefore limiting the potential attack surface for unauthorized access or network breaches. By minimizing unnecessary active connections, the risk of port-based threats such as MAC flooding or unauthorized device connections is also mitigated.
AI Generated Content may display inaccurate information, always double-check anything important.
A company needs to manage incoming network traffic efficiently to multiple servers in order to ensure optimal performance and minimize downtime. Which of the following devices is best suited for this requirement?
VPN headend
Switch
Router
Load balancer
A load balancer is best suited for managing incoming network traffic efficiently across multiple servers, thereby ensuring optimal performance and minimizing downtime. A router and a switch primarily handle traffic direction at different layers of the OSI model but do not distribute workloads among servers. A VPN headend manages secure connections for remote users but does not balance server loads.
AI Generated Content may display inaccurate information, always double-check anything important.
In network operations, what is the primary purpose of maintaining a comprehensive Acceptable Use Policy (AUP)?
To ensure all network devices operate with the latest firmware updates
To document the physical layout of the organization's network infrastructure
To outline the procedure for adding new devices to the network
To define what behavior is considered acceptable when using the organization's network and computing resources
The primary purpose of an Acceptable Use Policy is to define acceptable behaviors and use of company resources, thus mitigating potential legal issues and keeping the network secure by guiding users in what is and is not allowed. This policy helps prevent misuse of the network and can reduce risk to the organization by setting clear guidelines for user conduct.
AI Generated Content may display inaccurate information, always double-check anything important.
What is commonly used in networks to detect errors in data transmissions?
Load balancing
Network interface card teaming
Simple Network Management Protocol
Cyclic redundancy checks
Cyclic redundancy checks (CRCs) are a common method used to verify the integrity of data transmitted over a network. It works by performing a mathematical calculation on the data and sending this CRC value along with the data itself. The receiver then performs the same calculation and compares the result with the transmitted CRC value. If the values match, the data is considered intact; if not, this indicates that an error has occurred in transmission. Other listed terms do not pertain specifically to error detection in data transmissions.
AI Generated Content may display inaccurate information, always double-check anything important.
A company's firewall has been configured with various rules to allow specific types of traffic into the network. After all the access control rules have been set, what is the BEST practice to ensure that any unspecified traffic is blocked by default?
Configure an 'implicit deny' rule at the end of the ACL
Configure the firewall to 'ignore unspecified traffic'
Remove all 'deny' rules to streamline firewall processing
Configure an 'allow by default' rule at the end of the ACL
The correct answer is to configure an 'implicit deny' rule at the end of the access control list (ACL). This rule ensures that if traffic does not match any of the previous allow rules, it will be denied by default, thus providing an additional layer of security. This is the most fitting option since it aligns with the concept of 'deny by default' where everything not explicitly allowed is denied. Other options such as 'allow by default' or 'ignore unspecified traffic' would result in a less secure configuration since they could potentially let unwanted or unverified traffic through the firewall, which is against the security best practices associated with an implicit deny approach.
AI Generated Content may display inaccurate information, always double-check anything important.
A small business is expanding its office space and the existing wireless signal does not adequately cover the new area. To extend the wireless network range with minimal cost, which device should be used at the location where the signal begins to weaken?
Access point
Repeater
Media converter
Layer 2 switch
A repeater is used to extend the range of a wireless network by capturing the signal from the access point and retransmitting it. This is the most cost-effective solution to amplify the existing signal and extend its range without running additional cabling or setting up extra infrastructure.
AI Generated Content may display inaccurate information, always double-check anything important.
An organization is implementing a network access control mechanism and requires a method that accommodates both certificate-based and password-based user authentications within a secure channel. Which protocol should they implement to satisfy this need while integrating with their network's existing access control?
EAP Message Digest 5 (EAP-MD5)
Lightweight EAP (LEAP)
EAP-Tunneled Transport Layer Security (EAP-TTLS)
EAP-Flexible Authentication via Secure Tunneling (EAP-FAST)
EAP-Transport Layer Security (EAP-TLS)
Protected EAP (PEAP)
Protected EAP (PEAP) is the correct answer because it fits the requirement for a method that accommodates both certificate-based and password-based user authentications within a secure channel. PEAP creates an encrypted TLS tunnel to transport authentication data, which satisfies the secure channel requirement. Other options such as EAP-TLS only support certificate-based authentication, EAP-MD5 does not provide a secure tunnel and is considered insecure, EAP-FAST is more complex to deploy and is not as widely supported, EAP-TTLS is less common compared to PEAP and might face compatibility issues, and LEAP, being proprietary and less secure, doesn't fulfill the requirements as effectively as PEAP.
AI Generated Content may display inaccurate information, always double-check anything important.
In the OSI model layer 4 is known as:
Transport
Application
Physical
Session
The OSI model from 1-7: Physical, Data Link, Network, Transport, Session, Presentation, Application
AI Generated Content may display inaccurate information, always double-check anything important.
Why is it recommended to separate audio communication traffic from other data on a network switch?
To reduce the overall data speed for audio communication, preventing overutilization of network bandwidth
To increase the security of audio communication by isolating it from other network traffic
To prioritize audio communication, minimizing latency and packet loss for clearer and more reliable VoIP calls
To allow for the exclusive use of higher bandwidth channels by audio communication devices
Separating voice and data traffic is critical for ensuring Quality of Service (QoS). When voice traffic is given a dedicated path within the network, it can be prioritized, which is necessary to maintain the clarity and reliability of VoIP communications. Voice data is sensitive to delays and packet loss, and segregating this traffic helps minimize these issues, improving call quality significantly.
AI Generated Content may display inaccurate information, always double-check anything important.
A network technician is tasked with installing a new switch in an enterprise data center that requires a connection to a legacy multimode fiber running at 1 Gbps. Which of the following transceivers should the technician install in the switch to ensure compatibility with the existing infrastructure?
1000BASE-TX SFP
10GBASE-LR SFP+
1000BASE-SX SFP
1000BASE-LX SFP
The correct transceiver for connecting a switch to a legacy multimode fiber running at 1 Gbps is the 1000BASE-SX SFP. This transceiver is designed for use with multimode fiber and operates at gigabit speeds. The 1000BASE-SX standard is specifically tailored for short-wavelength transmissions on multimode fiber optics.
AI Generated Content may display inaccurate information, always double-check anything important.
What type of filtering allows for controlling specific types of network traffic (such as web traffic, mail, file transfer)?
MAC
IP
Port
URL
Blocking certain ports can restrict specific types of network traffic, for example blocking port 80 would restrict the HTTP protocol. It is important to know however that this only blocks the default HTTP port and another could be used to bypass this measure.
AI Generated Content may display inaccurate information, always double-check anything important.
A network administrator needs to implement a wireless security protocol that logs all access attempts and guarantees that user credentials are not compromised even if intercepted. Which authentication mechanism should the administrator deploy?
LEAP
EAP-FAST
EAP-TLS
EAP-MD5
EAP-TLS is the correct authentication mechanism to deploy because it provides a secure channel by using mutual authentication via client and server certificates. This ensures that user credentials are not compromised if intercepted, and it allows all access attempts to be logged, which is essential for auditing purposes. EAP-MD5 is an older, less secure mechanism that does not encrypt credentials; therefore, it does not meet the security requirements. EAP-FAST establishes a secure communication channel after a successful negotiation but does not inherently meet the specified criteria as well as EAP-TLS. LEAP is vulnerable to dictionary attacks and does not encrypt the credentials securely, making it insufficient for these criteria.
AI Generated Content may display inaccurate information, always double-check anything important.
When a network engineer is examining interface statistics, they notice an incrementally increasing count of CRC errors. What is indicated by the increment of CRC errors on a network interface?
The interface is experiencing a higher than usual traffic load.
There is an IP address conflict on the network interface.
There is a potential problem with the network cable or interference causing data corruption.
The device is running out of buffer space due to memory issues.
Cyclic Redundancy Checks (CRC) are used to detect accidental changes to data in digital networks and storage devices. A CRC error indicates that there is a mismatch between the transmitted and received frame's calculated checksum, usually caused by collision or a physical issue with the network media (such as cable faults or electrical interference). It points to possible data corruption during transmission.
AI Generated Content may display inaccurate information, always double-check anything important.
Looks like that's it! You can go back and review your answers or click the button below to grade your test.
Join premium for unlimited access and more features