A user calls the IT department to report being unable to log in after locking the computer The user resets the password, but later in the day the user is again unable to log in after locking the computer.
Which of the following attacks against the user IS MOST likely taking place?
A. Brute-force
B. On-path
C. Deauthentication
D. Phishing
Correct Answer: A
Active Directory - IT Department resets the password
Brute-Force Attack - Every time user comes back to their computer, users acount is being locked. With that being said, I would assume someone is trying to guess their password to access the user computer while the user is away.
Question 602:
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections After troubleshooting, the administrator determines that moving from one location to another causes the disconnection.
Which of the following settings should provide better network stability?
A. Client association timeout
B. RSSl roaming threshold
C. RF attenuation ratio
D. EIRP power setting
Correct Answer: B
In this case, the most likely cause of the constant disconnections when moving from one location to another is likely due to a problem with the roaming functionality of the wireless network. The setting that would likely provide better network stability in this situation is the RSSI roaming threshold, which determines the signal strength required for a client device to remain connected to the wireless network. If the roaming threshold is set too low, the client device may disconnect and reconnect to the network too frequently as it moves between different access points. On the other hand, if the threshold is set too high, the client device may not roam to a new access point when necessary, leading to a loss of connectivity. Adjusting the RSSI roaming threshold to an appropriate value may help to improve the stability of the wireless network in this situation.
Question 603:
A Network engineer is investigating issues on a Layer 2 Switch. The department typically snares a Switchport during meetings for presentations, but atter the first user Shares, no Other users can connect. Which Of the following is MOST likely related to this issue?
A. Spanning Tree Protocol is enabled on the switch.
B. VLAN trunking is enabled on the switch.
C. Port security is configured on the switch.
D. Dynamic ARP inspection is configured on the switch.
Correct Answer: C
The most likely issue related to this scenario is that port security is configured on the switch. Port security is a Layer 2 security feature that restricts access to a switch port based on the MAC address of the device that is connected to it. When a port reaches its maximum number of allowed MAC addresses, it will prevent any further connections to that port. If the department is sharing a switchport during meetings for presentations, then it is possible that the maximum number of allowed MAC addresses has already been reached by the first user, and therefore no other users can connect.
Question 604:
A user calls the help desk to report being unable to reach a file server. The technician logs in to the user's computer and verifies that pings fall to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable?
A. netstat
B. ipconfig
C. nslookup
D. traceroute
Correct Answer: D
Traceroute is a network diagnostic tool that allows you to trace the path that network packets take from one device to another. By running traceroute to the file server, the technician can see the sequence of devices and networks that the packets pass through on their way to the file server. This can help the technician to determine if there is a problem with the network connection between the user's computer and the file server, or if the issue is with the file server itself.
Question 605:
A network technician is selecting a replacement for a damaged fiber cable that goes directly to an SFP transceiver on a network switch. Which of the following cable connectors should be used?
A. RJ45
B. LC
C. MT
D. F-type
Correct Answer: B
All SFP and SFP+ optics require LC connectors so the question becomes when you need single mode fiber or multi mode fiber but the connector type is clear. SC square connectors are too big to fit in a SFP or SFP+
Question 606:
A technician is investigating packet loss to a device that has varying data bursts throughout the day. Which of the following will the technician MOST likely configure to resolve the issue?
A. Flow control
B. Jumbo frames
C. Duplex
D. Port mirroring
Correct Answer: A
Ethernet flow control is a mechanism for temporarily stopping the transmission of data on Ethernet family computer networks. The goal of this mechanism is to avoid packet loss in the presence of network congestion. Flow control is a mechanism that allows a device to regulate the amount of data it receives from another device, ensuring that the receiving device is not overwhelmed with data. If the device experiencing packet loss is receiving large bursts of data at times when it is not able to process it quickly enough, configuring flow control could help prevent packets from being lost.
"In theory, flow control can help with situations like a host that can't keep up with the flow of traffic. It enables the host to send an Ethernet PAUSE frame, which asks the switch to hold up for some amount of time so the host can catch its breath. If the switch can, it'll buffer transmissions until the pause expires, and then start sending again. If the host catches up early, it can send another PAUSE frame with a delay of zero to ask the switch to resume. In practice, flow control can cause latency trouble for modern real-time applications such as VoIP, and the same needs are usually met by QoS"
Question 607:
Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Select TWO).
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog
Correct Answer: AB
SNMPv3 (Simple Network Management Protocol version 3) is a protocol that provides secure access to network devices by encrypting and authenticating SNMP messages. It is used to manage and monitor network devices and can be used to change device configurations.
SSH (Secure Shell) is a protocol that provides secure remote access to network devices by encrypting and authenticating sessions between devices. It is commonly used to access and manage network devices, such as routers and switches, and can be used to change device configurations.
Question 608:
A network technician needs to ensure that all files on a company's network can be moved in a safe and protected manner without interception from someone who is not the intended recipient. Which of the following would allow the network technician to meet these requirements?
A. FTP
B. TFTP
C. SMTP
D. SFTP
Correct Answer: D
SFTP (Secure File Transfer Protocol) is a secure and encrypted method for transferring files over a network. It ensures that data is protected from interception and only accessible by the intended recipient. FTP and TFTP do not provide encryption, while SMTP is a protocol used for email transmission, not file transfer.
Question 609:
Which of the following would be the MOST likely attack used to bypass an access control vestibule?
A. Tailgating
B. Phishing
C. Evil twin
D. Brute-force
Correct Answer: A
Tailgating is when someone follows an authorized person into a restricted area without having the proper credentials. This is usually done by pretending to be with the authorized person, or by offering assistance. Tailgating is a social engineering attack and does not require any technical skill.
Question 610:
Which of the following devices Is used to configure and centrally manage access points Installed at different locations?
A. Wireless controller
B. Load balancer
C. Proxy server
D. VPN concentrator
Correct Answer: A
A wireless controller is a device that is used to centrally manage wireless access points (APs) that are installed at different locations. It allows an administrator to configure and manage the APs remotely, rather than having to configure each AP individually. A wireless controller can be used to control multiple APs and can provide features such as load balancing, security, and guest access.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.