CompTIA N10-008 Exam Practice Questions (P. 1)
- Full Access (877 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use
2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
2.4 GHz and 5 GHz. Which of the following should the systems administrator select to meet this requirement?
- A802.11ac
- B802.11axMost Voted
- C802.11g
- D802.11n
Correct Answer:
B
B

802.11ax, also known as Wi-Fi 6, is ideal for a densely populated office due to its capability to operate across both 2.4 and 5 GHz bands, offering increased capacity, higher throughput, and improved efficiency. These features reduce congestion and enhance performance, supporting a mixture of device capabilities within the office environment efficiently.
send
light_mode
delete
Question #2
Which of the following would be BEST to use to detect a MAC spoofing attack?
- AInternet Control Message Protocol
- BReverse Address Resolution ProtocolMost Voted
- CDynamic Host Configuration Protocol
- DInternet Message Access Protocol
Correct Answer:
B
B

Reverse Address Resolution Protocol (RARP) is effective in detecting MAC spoofing attacks because it maps a known MAC address to its corresponding IP address. In a MAC spoofing scenario, attackers alter the MAC address of their device to mimic another device on the network. By using RARP, you can verify if the IP address associated with a MAC is what it is supposed to be. When the returned IP doesn't match the expected outcome, it hints at a potential MAC spoofing attempt. This makes RARP a suitable choice for detecting such network security threats.
send
light_mode
delete
Question #3
A technician receives feedback that some users are experiencing high amounts of jitter while using the wireless network. While troubleshooting the network, the technician uses the ping command with the IP address of the default gateway and verifies large variations in latency. The technician thinks the issue may be interference from other networks and non-802.11 devices. Which of the following tools should the technician use to troubleshoot the issue?
- ANetFlow analyzer
- BBandwidth analyzer
- CProtocol analyzer
- DSpectrum analyzerMost Voted
Correct Answer:
D
D

The spectrum analyzer is the optimal choice for troubleshooting high jitter caused by interference on a wireless network. This tool inspects and identifies various radio frequencies and their sources within an area, which is especially effective for detecting disruptions from both other networks and non-802.11 equipment. By pinpointing these interference sources, a technician can better understand and mitigate issues affecting network performance, ensuring a smoother and more reliable wireless connection.
send
light_mode
delete
Question #4
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?
- AVerify the session time-out configuration on the captive portal settingsMost Voted
- BCheck for encryption protocol mismatch on the client's wireless settings
- CConfirm that a valid passphrase is being used during the web authentication
- DInvestigate for a client's disassociation caused by an evil twin AP
Correct Answer:
A
A

The intermittent connectivity issues described are linked to the re-authentication requirements on the captive portal. This suggests a configuration issue within the captive portal settings, such as a too-short session timeout. Adjusting the session timeout setting in the captive portal could resolve the intermittent disconnections by allowing longer active sessions before requiring reauthentication. This step should indeed rectify the reported problem as it directly addresses user session stability on the network.
send
light_mode
delete
Question #5
A network administrator walks into a datacenter and notices an unknown person is following closely. The administrator stops and directs the person to the security desk. Which of the following attacks did the network administrator prevent?
- AEvil twin
- BTailgatingMost Voted
- CPiggybacking
- DShoulder surfing
Correct Answer:
B
B

Great intuition from the network administrator in the scenario! The administrator effectively prevented a tailgating incident. Tailgating is when an unauthorized person follows someone into a restricted or secured area without consent. It’s distinguished from piggybacking by the lack of consent and physical context—tailgating doesn't involve hacking into a network, but physically entering a secure space unauthorized. Always be alert and enforce physical security protocols to prevent such security breaches.
send
light_mode
delete
Question #6
SIMULATION -
You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:
✑ The SSIDs need to be configured as CorpNet with a key of S3cr3t!
✑ The wireless signals should not interfere with each other
✑ The subnet the Access Points and switch are on should only support 30 devices maximum
✑ The Access Points should be configured to only support TKIP clients at a maximum speed
INSTRUCTONS -
Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:
✑ The SSIDs need to be configured as CorpNet with a key of S3cr3t!
✑ The wireless signals should not interfere with each other
✑ The subnet the Access Points and switch are on should only support 30 devices maximum
✑ The Access Points should be configured to only support TKIP clients at a maximum speed
INSTRUCTONS -
Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.




Correct Answer:
See explanation below.
On the first exhibit, the layout should be as follows
Access Point Name AP1 -
IP Address 192.168.1.3 -
Gateway 192.168.1.2 -
SSID corpnet -
SSID Broadcast yes -
Mode G -
Channel 1 -
Speed Auto -
Duplex Auto -
WPA -
Passphrase S3cr3t!
Exhibit 2 as follows -
Access Point Name AP2 -
IP Address 192.168.1.4 -
Gateway 192.168.1.2 -
SSID corpnet -
SSID Broadcast yes -
Mode G -
Channel 6 -
Speed Auto -
Duplex Auto -
WPA -
Passphrase S3cr3t!
Exhibit 3 as follows -
Access Point Name AP3 -
IP Address 192.168.1.5 -
Gateway 192.168.1.2 -
SSID corpnet -
SSID Broadcast yes -
Mode G -
Channel 11 -
Speed Auto -
Duplex Auto -
WPA -
Passphrase S3cr3t!
See explanation below.
On the first exhibit, the layout should be as follows
Access Point Name AP1 -
IP Address 192.168.1.3 -
Gateway 192.168.1.2 -
SSID corpnet -
SSID Broadcast yes -
Mode G -
Channel 1 -
Speed Auto -
Duplex Auto -
WPA -
Passphrase S3cr3t!
Exhibit 2 as follows -
Access Point Name AP2 -
IP Address 192.168.1.4 -
Gateway 192.168.1.2 -
SSID corpnet -
SSID Broadcast yes -
Mode G -
Channel 6 -
Speed Auto -
Duplex Auto -
WPA -
Passphrase S3cr3t!
Exhibit 3 as follows -
Access Point Name AP3 -
IP Address 192.168.1.5 -
Gateway 192.168.1.2 -
SSID corpnet -
SSID Broadcast yes -
Mode G -
Channel 11 -
Speed Auto -
Duplex Auto -
WPA -
Passphrase S3cr3t!
send
light_mode
delete
Question #7
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator
MOST likely start to troubleshoot?
MOST likely start to troubleshoot?
- ALayer 1
- BLayer 2Most Voted
- CLayer 3
- DLayer 4
- ELayer 5
- FLayer 6
- GLayer 7
Correct Answer:
B
B

Absolutely, Layer 2 makes the most sense for starting the hunt when dealing with CRC errors—a classic sign of trouble at the data link layer. This is where frames carry error-detecting code like CRC to check the integrity of the data being transmitted. If there are errors, it often points to issues like disruptions in frame transmission, which are detected and handled right there at Layer 2. Starting here allows you to pinpoint if these disruptions are related to hardware issues or link failures, guiding subsequent troubleshooting steps effectively. Remember, Layer 1 would generally relate to pure physical connections, which isn't directly concerned with CRC but rather with the physical state of the transmission mediums.
send
light_mode
delete
Question #8
A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)
- ACPU usageMost Voted
- BMemoryMost Voted
- CTemperature
- DBandwidth
- ELatency
- FJitter
Correct Answer:
AB
AB

Absolutely right, focusing on CPU usage and memory is key here. Given that network conditions like congestion, packet loss, and delay aren't the issue, the slowdowns are clearly not network-related. The problem likely stems from the strain on the VM host's resources due to the increased load from 100 additional users. Monitoring CPU and memory usage will provide the best insight into these performance bottlenecks, helping to pinpoint and address the root causes of the slow or unresponsive desktops reported by users.
send
light_mode
delete
Question #9
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new
DHCP pool. Which of the following can the administrator perform to resolve the issue?
DHCP pool. Which of the following can the administrator perform to resolve the issue?
- AInstall load balancers
- BInstall more switches
- CDecrease the number of VLANs
- DReduce the lease timeMost Voted
Correct Answer:
D
D

Reducing the DHCP lease time is indeed the most suitable solution when the objective is to re-use IP addresses more efficiently without expanding the DHCP scope. Shorter lease periods will return IPs to the pool sooner, facilitating ongoing and efficient resource management, especially in environments where devices connect intermittently. This strategy avoids the additional costs and complexities associated with expanding DHCP pools or managing new hardware. It represents an optimal balance between resource utilization and network stability.
send
light_mode
delete
Question #10
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?
- ASpanning Tree Protocol
- BNeighbor Discovery ProtocolMost Voted
- CLink Aggregation Control Protocol
- DAddress Resolution Protocol
Correct Answer:
B
B

The Neighbor Discovery Protocol (NDP) in IPv6 performs functions similar to ARP for IPv4, making it essential for discovering and logging IPv6 addresses along with their corresponding MAC addresses. Therefore, NDP is indeed the most applicable facility for the task of logging this information on a network segment that utilizes IPv6.
send
light_mode
delete
All Pages