Practice Free N10-008 Exam Online Questions
Which of the following attacks, if successful, would provide a malicious user who is connected to an isolated guest network access to the corporate network?
- A . VLAN hopping
- B . On-path attack
- C . IP spoofing
- D . Evil twin
A
Explanation:
The attack which, if successful, would provide a malicious user who is connected to an isolated guest network access to the corporate network is VLAN hopping. VLAN hopping is an attack technique which involves tricking a switch into sending traffic from one VLAN to another. This is done by sending specially crafted packets, which force the switch to send traffic from one VLAN to another, thus allowing the malicious user to gain access to the corporate network.
VLAN hopping is an attack technique which involves tricking a switch into sending traffic from one VLAN to another. This is done by sending specially crafted packets, which force the switch to send traffic from one VLAN to another, thus allowing the malicious user to gain access to the corporate network. According to the CompTIA Network+ N10-008 Exam Guide VLAN hopping is a type of attack that is used to gain access to network resources that are not meant to be accessible by a user on a guest network.
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology.
Which of the following is the number of additional network connections needed?
- A . 5
- B . 7
- C . 10
- D . 15
C
Explanation:
10 additional network connections are needed to transition from a star to a full-mesh topology. A star topology is a network topology where each device is connected to a central device, such as a switch or a hub. A full-mesh topology is a network topology where each device is directly connected to every other device. The number of connections needed for a full-mesh topology can be calculated by the formula n(n-1)/2, where n is the number of devices. In this case, there are six devices (one core and five distribution switches), so the number of connections needed for a full-mesh topology is 6(6-1)/2 = 15. Since there are already five connections in the star topology (one from each distribution switch to the core switch), the number of additional connections needed is 15 – 5 = 10.
Reference: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html
A network consultant is working with a software-defined network and is troubleshooting an issue with an application’s instructions being properly translated for the network components.
Which of the following is most likely at fault?
- A . Infrastructure layer
- B . Session layer
- C . Control layer
- D . Application layer
A
Explanation:
The issue with an application’s instructions being properly translated for network components is most likely at the Application layer. Here’s why:
Infrastructure layer: This layer deals with physical components (e.g., switches, routers) and is unlikely to cause translation issues.
Session layer: Responsible for establishing, maintaining, and terminating communication sessions but not directly related to application instructions.
Control layer: Not a standard OSI layer; it’s likely a misnomer.
Application layer: This layer handles application-specific protocols and data. Translation issues often occur here.
Therefore, the correct answer is D. Application laye
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO).
- A . Deauthentication attack
- B . Malware infection
- C . IP spoofing
- D . Firmware corruption
- E . Use of default credentials
- F . Dictionary attack
BE
Explanation:
A botnet is a collection of internet-connected devices that are compromised and controlled by hackers, often without the knowledge of the device owners. Hackers use botnets to launch various types of malicious attacks, such as distributed denial-of-service (DDoS), spam, phishing, crypto-mining, and more123.
To create a botnet, hackers need to infect the devices with malware that allows them to remotely control them and communicate with other infected devices. Malware can be delivered through various methods, such as phishing emails, malicious websites, drive-by downloads, exploit kits, and more12.
Therefore, one of the ways that compromises internet-connected devices and makes them vulnerable to becoming part of a botnet is
B. Malware infection. Malware infection can affect any type of device that connects to the internet, such as computers, smartphones, tablets, routers, cameras, smart TVs, and more12.
Another way that compromises internet-connected devices and makes them vulnerable to becoming part of a botnet is
E. Use of default credentials. Many internet-connected devices come with default usernames and passwords that are easy to guess or find online. Hackers can use these credentials to access the devices and install malware or change their settings12.
Therefore, another answer is
E. Use of default credentials. Use of default credentials can affect any type of device that has a web interface or a remote login service, such as routers, cameras, printers, smart devices, and more12.
The other options are incorrect for the following reasons:
A technician is investigating a SAN switch that has a high number of CRC errors.
Which of the following is the MOST likely cause of the errors?
- A . Break in the fiber
- B . Bad switch port
- C . Mismatched duplex
- D . Memory errors
B
Explanation:
A bad switch port is the most likely cause of CRC errors on a SAN switch. CRC stands for cyclic redundancy check, which is a method of detecting errors in data transmission. A SAN switch is a device that connects storage devices and servers in a storage area network (SAN), which is a high-performance network that provides block-level access to data. A bad switch port can cause CRC errors due to physical damage, faulty wiring, or misconfiguration. CRC errors can result in data corruption or loss, which can affect the performance and availability of the SAN.
Reference: [CompTIA Network+ Certification Exam Objectives],.
What are CRC Errors and How Do I Fix Them? | ITIGIC
A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy.
Which of the following configurations would meet this requirement?
- A . Full duplex
- B . 802.1Q tagging
- C . Native VLAN
- D . Link aggregation
D
Explanation:
Link aggregation is a technique that allows multiple physical ports to be combined into a single logical channel, which provides increased bandwidth, load balancing, and redundancy. Link aggregation can be configured using protocols such as Link Aggregation Control Protocol (LACP) or static methods.
Reference
Link aggregation is one of the common Ethernet switching features covered in Objective 2.3 of the CompTIA Network+ N10-008 certification exam1.
Link aggregation can be used to connect two ports to the core switch to ensure redundancy23.
Link aggregation can be configured using LACP or static methods23.
1: CompTIA Network+ Certification Exam Objectives, page 5 2: Interface Configurations C N10-008 CompTIA Network+: 2.3 3: CompTIA Network+ N10-008 Cert Guide, Chapter 11, page 323
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm’s firewall.
Which of the following would be the MOST appropriate way to enable secure remote printing?
- A . SSH
- B . VPN
- C . Telnet
- D . SSL
B
Explanation:
VPN (Virtual Private Network) is the most appropriate way to enable secure remote printing. VPN is a technology that creates a secure and encrypted tunnel over a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. VPN can be used for various purposes such as accessing corporate resources, bypassing geo-restrictions, or enhancing privacy and security. VPN can also be used for remote printing by allowing users to connect to a printer on the private network and send print jobs securely over the VPN tunnel.
Reference: https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106-how-vpn-works.html
A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends.
Which of the following would be the MOST likely result of this finding?
- A . Increased CRC errors
- B . Increased giants and runts
- C . Increased switching loops
- D . Increased device temperature
A
Explanation:
Mismatched duplex settings can cause an increase in CRC errors, which are errors in data transmission that can result in corrupted data.
Reference: CompTIA Network+ Certification Study Guide, Chapter 4: Infrastructure.