A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?
A. NFV
B. SDWAN
C. VIP
D. MPLS
Correct Answer: A
Network Function Virtualization (NFV) is a technology that allows for the virtualization of a replica of a network's physical topology and the way it behaves without changing the logical topology and the way that devices are managed. NFV allows for the virtualization of network functions such as routers, firewalls, and switches, resulting in increased flexibility and scalability. This makes NFV an ideal technology for companies looking to virtualize a replica of their internal physical network.
Question 412:
A technician notices that equipment is being moved around and misplaced in the server room, even though the room has locked doors and cabinets. Which of the following would be the BEST solution to identify who is responsible?
A. Install motion detection
B. Install cameras.
C. Install tamper detection.
D. Hire a security guard.
Correct Answer: B
Installing cameras in the server room is the best solution to identify who is responsible for the equipment being moved and misplaced. Cameras provide a way to monitor the server room in real time and can be used to identify suspicious activity. Additionally, they provide a way to review past activity and allow you to review footage to determine who may be responsible for the misplacement of equipment.
Question 413:
Which of the following can be used to validate domain ownership by verifying the presence of pre-agreed content contained in a DNS record?
A. SOA
B. SRV
C. AAA
D. TXT
Correct Answer: D
"One final usage of the TXT resource record is how some cloud service providers, such as Azure, validate ownership of custom domains. You are provided with data to include in your TXT record, and once that is created, the domain is verified and able to be used. The thought is that if you control the DNS, then you own the domain name."
Question 414:
Which of the following commands can be used to display the IP address, subnet address, gateway address, and DNS address on a Windows computer?
A. netstat -a
B. ifconfig
C. ip addr
D. ipconfig /all
Correct Answer: D
The ipconfig command is a utility that allows you to view and modify the network configuration of a Windows computer. By running the command "ipconfig /all", you can view detailed information about the network configuration of your computer, including the IP address, subnet mask, default gateway, and DNS server addresses.
Option A (netstat -a) is a command that displays active network connections and their status, but it does not display IP address or other network configuration information. Option B (ifconfig) is a command used on Linux and Unix systems to view and modify network configuration, but it is not available on Windows. Option C (ip addr) is a command used on Linux and Unix systems to view and modify network configuration, but it is not available on Windows.
Question 415:
A technician is configuring a static IP address on a new device in a newly created subnet. The work order specifies the following requirements:
1.
The IP address should use the highest address available in the subnet.
2.
The default gateway needs to be set to 172.28.85.94.
3.
The subnet mask needs to be 255.255.255.224.
Which of the following addresses should the engineer apply to the device?
A network administrator has received calls every day for the past few weeks from three users who cannot access the network. The administrator asks all the users to reboot their PCs, but the same users still cannot access the system. The following day, three different users report the same issue, and the administrator asks them all to reboot their PCs; however, this does not fix the issue. Which of the following is MOST likely occurring?
A. Incorrect firewall settings
B. Inappropriate VLAN assignment
C. Hardware failure
D. Overloaded CAM table in switch
E. DHCP scope exhaustion
Correct Answer: E
Based on the information provided, it is unlikely that the CAM table is the problem. The CAM table is used in switches to map MAC addresses to switch ports and is typically updated dynamically as devices communicate on the network. If there were a problem with the CAM table, it would typically result in connectivity issues for all users connected to the affected switch, not just a few.
Question 417:
A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?
A. Multifactor authentication
B. Single sign-on
C. RADIUS
D. VPN
Correct Answer: A
Multifactor authentication is a security measure that requires users to provide multiple pieces of evidence before they can access a network resource. This could include requiring users to enter a username, password, and a code sent to the user's mobile phone before they are allowed access. This ensures that the user is who they say they are, reducing the risk of malicious actors gaining access to network resources as a result of a successful phishing campaign.
Question 418:
An IT administrator received an assignment with the following objectives
1.
Conduct a total scan within the company's network tor all connected hosts
2.
Detect all the types of operating systems running on all devices
3.
Discover all services offered by hosts on the network
4.
Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
A. nmap
B. arp
C. netatat
D. tcpdump
Correct Answer: A
Nmap (Network Mapper) is a free and open source command line tool that can be used to scan a network for all connected hosts, detect the types of operating systems running on all devices, discover all services offered by hosts on the network, find open ports, and detect security risks. Nmap is commonly used by system administrators and security professionals to audit a network's security and identify possible vulnerabilities. Nmap can be used to discover active hosts, scan ports, fingerprint operating systems, detect running services, and more. Reference: CompTIA Network+ Study Manual, 8th Edition, page 592.
Question 419:
On a network with redundant switches, a network administrator replaced one of the switches but was unable to get a connection with another switch. Which of the following should the administrator chock after successfully testing the cable that was wired for TIA/EIA-568A on both ends?
A. If MDIX is enabled on the new switch
B. If PoE is enabled
C. If a plenum cable is being used
D. If STP is disabled on the switches
Correct Answer: A
Auto-MDIX (or medium dependent interface crossover) is a feature that automatically detects the type of cable connection and configures the interface accordingly (i.e. straight-through or crossover). This ensures that the connection between the two switches is successful. This is referenced in the CompTIA Network+ Study Manual, page 519.
Question 420:
A network technician 13 troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration?
A. show route
B. show Interface
C. show arp
D. show port
Correct Answer: B
To see the configuration of a specific port on a switch, the network technician should use the "show interface" command. This command provides detailed information about the interface, including the current configuration, status, and statistics for the interface.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.