CompTIA N10-008 CompTIA Network+Exam Online Training
CompTIA N10-008 Online Training
The questions for N10-008 were last updated at Jan 29,2025.
- Exam Code: N10-008
- Exam Name: CompTIA Network+Exam
- Certification Provider: CompTIA
- Latest update: Jan 29,2025
A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems.
Which of the following should a network security administrator recommend to assist with detecting these activities?
- A . Implement file integrity monitoring.
- B . Change the default credentials.
- C . Use SSL encryption.
- D . Update the web-server software.
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio.
Which of the following antenna types should the AP utilize?
- A . Omni
- B . Directional
- C . Yagi
- D . Parabolic
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey.
Which of the following documents would MOST likely be created as a result of the site survey?
- A . Physical diagram
- B . Heat map
- C . Asset list
- D . Device map
A wireless network was installed in a warehouse for employees to scan crates with a wireless handheld scanner. The wireless network was placed in the corner of the building near the ceiling for maximum coverage However users in the offices adjacent lo the warehouse have noticed a large amount of signal overlap from the new network Additionally warehouse employees report difficulty connecting to the wireless network from the other side of the building; however they have no issues when they are near the antenna.
Which of the following is MOST likely the cause?
- A . The wireless signal is being refracted by the warehouse’s windows
- B . The antenna’s power level was set too high and is overlapping
- C . An omnidirectional antenna was used instead of a unidirectional antenna
- D . The wireless access points are using channels from the 5GHz spectrum
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology.
Which of the following is the number of additional network connections needed?
- A . 5
- B . 7
- C . 10
- D . 15
A network technician is investigating an issue with a desktop that is not connecting to the network.
The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully.
Which of the following is MOST likely the cause of the desktop not connecting?
- A . Transceiver mismatch
- B . VLAN mismatch
- C . Port security
- D . Damaged cable
- E . Duplex mismatch
A network technician has multimode fiber optic cable available in an existing IDF.
Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?
- A . 10GBaseT
- B . 1000BaseT
- C . 1000BaseSX
- D . 1000BaseLX
An ARP request is broadcasted and sends the following request.
”Who is 192.168.1.200? Tell 192.168.1.55”
At which of the following layers of the OSI model does this request operate?
- A . Application
- B . Data link
- C . Transport
- D . Network
- E . Session
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
- A . Fault tolerance
- B . Quality of service
- C . Load balancing
- D . Port aggregation
A network technician is observing the behavior of an unmanaged switch when a new device is added to the network and transmits data.
Which of the following BEST describes how the switch processes this information?
- A . The data is flooded out of every port. including the one on which it came in.
- B . The data is flooded out of every port but only in the VLAN where it is located.
- C . The data is flooded out of every port, except the one on which it came in
- D . The data is flooded out of every port, excluding the VLAN where it is located