CompTIA N10-006 Exam Practice Questions (P. 5)
- Full Access (741 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #41
Company policies require that all network infrastructure devices send system level information to a centralized server.
Which of the following should be implemented to ensure the network administrator can review device error information from one central location?
Which of the following should be implemented to ensure the network administrator can review device error information from one central location?
- ATACACS+ server
- BSingle sign-on
- CSYSLOG server
- DWi-Fi analyzer
Correct Answer:
C
Syslog is a protocol designed to send log entries generated by a device or process called a facility across an IP network to a message collector, called a syslog server. A syslog message consists of an error code and the severity of the error. A syslog server would enable the network administrator to view device error information from a central location.
C
Syslog is a protocol designed to send log entries generated by a device or process called a facility across an IP network to a message collector, called a syslog server. A syslog message consists of an error code and the severity of the error. A syslog server would enable the network administrator to view device error information from a central location.
send
light_mode
delete
Question #42
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs.
Which of the following systems should be used?
Which of the following systems should be used?
- AEvent log
- BSyslog
- CSIEM
- DSNMP
Correct Answer:
C
Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated.
SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.
SIEM capabilities include Data aggregation; Log management aggregates data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data to help avoid missing crucial events.
C
Using a Security information and event management (SIEM) product, the security logs can be analyzed and aggregated.
SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM is sold as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.
SIEM capabilities include Data aggregation; Log management aggregates data from many sources, including network, security, servers, databases, applications, providing the ability to consolidate monitored data to help avoid missing crucial events.
send
light_mode
delete
Question #43
A technician would like to track the improvement of the network infrastructure after upgrades.
Which of the following should the technician implement to have an accurate comparison?
Which of the following should the technician implement to have an accurate comparison?
- ARegression test
- BSpeed test
- CBaseline
- DStatement of work
Correct Answer:
C
In networking, baseline can refer to the standard level of performance of a certain device or to the normal operating capacity for your whole network. High-quality documentation should include a baseline for network performance, because you and your client need to know what "normal" looks like in order to detect problems before they develop into disasters.
A network baseline delimits the amount of available bandwidth available and when. For networks and networked devices, baselines include information about four key components:
✑ Processor
✑ Memory
✑ Hard-disk (or other storage) subsystem
✑ Network adapter or subsystem
C
In networking, baseline can refer to the standard level of performance of a certain device or to the normal operating capacity for your whole network. High-quality documentation should include a baseline for network performance, because you and your client need to know what "normal" looks like in order to detect problems before they develop into disasters.
A network baseline delimits the amount of available bandwidth available and when. For networks and networked devices, baselines include information about four key components:
✑ Processor
✑ Memory
✑ Hard-disk (or other storage) subsystem
✑ Network adapter or subsystem
send
light_mode
delete
Question #44
It has been determined by network operations that there is a severe bottleneck on the company's mesh topology network. The field technician has chosen to use log management and found that one router is making routing decisions slower than others on the network.
This is an example of which of the following?
This is an example of which of the following?
- ANetwork device power issues
- BNetwork device CPU issues
- CStorage area network issues
- DDelayed responses from RADIUS
Correct Answer:
B
Network processors (CPUs) are used in the manufacture of many different types of network equipment such as routers. Such a CPU on a router could become bottleneck for the network traffic. The routing through that device would then slow down.
B
Network processors (CPUs) are used in the manufacture of many different types of network equipment such as routers. Such a CPU on a router could become bottleneck for the network traffic. The routing through that device would then slow down.
send
light_mode
delete
Question #45
A network technician receives the following alert from a network device:
"High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54"
Which of the following is being monitored to trigger the alarm?
"High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54"
Which of the following is being monitored to trigger the alarm?
- ASpeed and duplex mismatch
- BWireless channel utilization
- CNetwork device CPU
- DNetwork device memory
- EInterface link status
Correct Answer:
E
This is an error message that indicates that threshold of high utilization of network interface, in this case interfacegi1/0/24, has been exceeded. The message has been triggered on the interface link status.
Note: gi1/0 would be a gigabyte interface.
E
This is an error message that indicates that threshold of high utilization of network interface, in this case interfacegi1/0/24, has been exceeded. The message has been triggered on the interface link status.
Note: gi1/0 would be a gigabyte interface.
send
light_mode
delete
Question #46
The administrator's network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending.
Which of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10 -
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts -
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
Which of the following would resolve this issue?
Output:
Fast Ethernet 0 is up, line protocol is up
Int ip address is 10.20.130.5/25
MTU 1500 bytes, BW10000 kbit, DLY 100 usec
Reliability 255/255, Tx load 1/255, Rx load 1/255
Encapsulation ospf, loopback not set
Keep alive 10 -
Half duplex, 100Mb/s, 100 Base Tx/Fx
Received 1052993 broadcasts -
0 input errors
983881 packets output, 768588 bytes
0 output errors, 0 collisions, 0 resets
- ASet the loopback address
- BChange the IP address
- CChange the slash notation
- DChange duplex to full
Correct Answer:
D
From the output we see that the half-duplex is configured. This would not use the full capacity of ports on the network. By changing to full duplex the throughput would be doubled.
Note: All communications are either half-duplex or full-duplex. During half-duplex communication, a device can either send communication or receive communication, but not both at the same time. In full-duplex communication, both devices can send and receive communication at the same time. This means that the effective throughput is doubled and communication is much more efficient.
D
From the output we see that the half-duplex is configured. This would not use the full capacity of ports on the network. By changing to full duplex the throughput would be doubled.
Note: All communications are either half-duplex or full-duplex. During half-duplex communication, a device can either send communication or receive communication, but not both at the same time. In full-duplex communication, both devices can send and receive communication at the same time. This means that the effective throughput is doubled and communication is much more efficient.
send
light_mode
delete
Question #47
The RAID controller on a server failed and was replaced with a different brand.
Which of the following will be needed after the server has been rebuilt and joined to the domain?
Which of the following will be needed after the server has been rebuilt and joined to the domain?
- AVendor documentation
- BRecent backups
- CPhysical IP address
- DPhysical network diagram
Correct Answer:
B
If the RAID controller fails and is replaced with a RAID controller with a different brand the RAID will break. We would have to rebuild a new RAID disk, access and restore the most recent backup to the new RAID disk.
Note: RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in a computer or storage array so they work as a logical unit. In hardware-based RAID, a physical controller is used to manage the RAID array.
B
If the RAID controller fails and is replaced with a RAID controller with a different brand the RAID will break. We would have to rebuild a new RAID disk, access and restore the most recent backup to the new RAID disk.
Note: RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in a computer or storage array so they work as a logical unit. In hardware-based RAID, a physical controller is used to manage the RAID array.
send
light_mode
delete
Question #48
An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned.
Which of the following BEST describes these actions?
Which of the following BEST describes these actions?
- ANetwork map
- BAsset management
- CChange management
- DBaselines
Correct Answer:
B
Documenting the location, the user of the device and the date of the reassignment would be part of the asset management.
The best way to keep track of your computers and their configurations is to document them yourself. Large enterprise networks typically assign their own identification numbers to their computers and other hardware purchases as part of an asset management process that controls the entire life cycle of each device, from recognition of a need to retirement or disposal.
B
Documenting the location, the user of the device and the date of the reassignment would be part of the asset management.
The best way to keep track of your computers and their configurations is to document them yourself. Large enterprise networks typically assign their own identification numbers to their computers and other hardware purchases as part of an asset management process that controls the entire life cycle of each device, from recognition of a need to retirement or disposal.
send
light_mode
delete
Question #49
A network technician is diligent about maintaining all system servers' at the most current service pack level available. After performing upgrades, users experience issues with server-based applications.
Which of the following should be used to prevent issues in the future?
Which of the following should be used to prevent issues in the future?
- AConfigure an automated patching server
- BVirtualize the servers and take daily snapshots
- CConfigure a honeypot for application testing
- DConfigure a test lab for updates
Correct Answer:
D
To prevent the service pack issues make sure, before going ahead and applying a new Service Pack in your production environment, to validate them in a test/lab environment first.
D
To prevent the service pack issues make sure, before going ahead and applying a new Service Pack in your production environment, to validate them in a test/lab environment first.
send
light_mode
delete
Question #50
A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed.
Which of the following will mitigate production outages before the enhancements are deployed?
Which of the following will mitigate production outages before the enhancements are deployed?
- AImplement an environment to test the enhancements.
- BImplement ACLs that only allow management access to the enhancements.
- CDeploy an IPS on the production network.
- DMove the software team's workstations to the DMZ.
Correct Answer:
A
Environments are controlled areas where systems developers can build, distribute, install, configure, test, and execute systems that move through the Software
Development Life Cycle (SDLC). The enhancements can be deployed and tested in a test environment before they are installed in the production environment.
A
Environments are controlled areas where systems developers can build, distribute, install, configure, test, and execute systems that move through the Software
Development Life Cycle (SDLC). The enhancements can be deployed and tested in a test environment before they are installed in the production environment.
send
light_mode
delete
All Pages