NETWORK+ N10-008 NETWORK+ N10-008 20 EXAM QUESTIONS FREE CLICK HERE TO BUY 500 EXAM QUESTIONS + SIMULATIONS FOR N10-008 1. A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement? 802.11ac 802.11ax 802.11g 802.11n None 2. Which of the following would be BEST to use to detect a MAC spoofing attack? Internet Control Message Protocol Reverse Address Resolution Protocol Dynamic Host Configuration Protocol Internet Message Access Protocol None 3. A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue? NetFlow analyzer Bandwidth analyzer Protocol analyzer Spectrum analyzer None 4. Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue? Verify the session time-out configuration on the captive portal settings Check for encryption protocol mismatch on the client's wireless settings Confirm that a valid passphrase is being used during the web authentication Investigate for a client's disassociation caused by an evil twin AP None 5. A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent? Evil twin Tailgating Piggybacking Shoulder surfing None 6. A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot? Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7 None 7. A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.) CPU usage Memory Temperature Bandwidth Latency Jitter 8. Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue? Install load balancers Install more switches Decrease the number of VLANs Reduce the lease time None 9. An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task? Spanning Tree Protocol Neighbor Discovery Protocol Link Aggregation Control Protocol Address Resolution Protocol None 10. Which of the following DNS records works as an alias to another record? AAAA CNAME MX SOA None 11. A company built a new building at its headquarters location. The new building is connected to the company's LAN via fiber-optic cable. Multiple users in the new building are unable to access the company's intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue? Correct the DNS server entries in the DHCP scope Correct the external firewall gateway address Correct the NTP server settings on the clients Correct a TFTP Issue on the company's server None 12. A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port? IP route table VLAN tag MAC table QoS tag None 13. Which of the following provides redundancy on a file server to ensure the server is still connected to a LAN even in the event of a port failure on a switch? NIC teaming Load balancer RAID array PDUs None 14. An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization's requirements? Load balancing Geofencing Public cloud Content delivery network Infrastructure as a service None 15. A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST? Check the system's IP address Do a ping test against the servers Reseat the cables into the back of the PC Ask what changes were made None 16. A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable? CSMA/CD LACP PoE+ MDIX None 17. A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task? IP scanner Terminal emulator NetFlow analyzer Port scanner None 18. A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications? 2.4GHz 5GHz 6GHz 900MHz None 19. A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections? DHCP snooping Geofencing Port security Secure SNMP None 20. Which of the following is used to track and document various types of known vulnerabilities? CVE Penetration testing Zero-day SIEM Least privilege None 1 out of 4 Time's up 117