An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?
A. DNS poisoning
B. On-path
C. IP spoofing
D. Rogue DHCP
Correct Answer: A
Question 652:
Which of the following would be BEST suited for a long cable run with a 40Gbps bandwidth?
A. Cat 5e
B. Cat 6a
C. Cat 7
D. Cat 8
Correct Answer: D
For a long cable run with a 40Gbps bandwidth, the BEST option would be Cat 8 cable. Cat 8 is designed to support up to 40Gbps over a distance of up to 30 meters, making it the most suitable option for long cable runs with high bandwidth requirements.
Question 653:
A network technician is troubleshooting a network issue for employees who have reported issues with speed when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the employees' building. The 10GBASE-T connection between the two buildings uses Cat 5e.
Which of the following BEST explains the speed issue?
A. The connection type is not rated for that distance
B. A broadcast storm is occurring on the subnet.
C. The cable run has interference on it
D. The connection should be made using a Cat 6 cable
Correct Answer: A
10GBASE-T is a type of Ethernet standard that supports data transfer rates up to 10 Gbps over twisted-pair copper cabling. However, the maximum distance supported by 10GBASE-T over Cat 5e cabling is 328 feet (100 meters). In this scenario, the distance between the two buildings is 410 feet (125 meters), which exceeds the maximum distance limit for 10GBASE-T over Cat 5e cabling.
Question 654:
An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?
A. Subinterfaces
B. Link aggregation
C. Load balancing
D. Tunneling
Correct Answer: A
To configure multiple devices with network isolation on a single switch port, the organization can use subinterfaces.
subinterfaces can be used to divide a single physical interface into multiple logical interfaces. The switch port connected to the VoIP phone can be configured with multiple subinterfaces, with each subinterface carrying traffic for a specific
VLAN. The desktop and VoIP phone can then be configured to use the appropriate subinterface for their traffic.
Question 655:
A technician manages a DHCP scope but needs to allocate a portion of the scope's subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts?
A. Dynamic assignment
B. Exclusion range
C. Address reservation
D. IP helper
Correct Answer: B
To prevent IP address conflicts when allocating a portion of a DHCP scope's subnet for statically assigned devices, it is recommended to use the concept of DHCP exclusion ranges. DHCP exclusion ranges allow a DHCP administrator to specify a range of IP addresses within the scope that should not be assigned to DHCP clients. This can be useful in situations where some devices on the network need to be assigned static IP addresses, as it ensures that the statically assigned addresses do not overlap with addresses assigned by the DHCP server. To set up a DHCP exclusion range, the administrator needs to specify the start and end IP addresses of the range, as well as the subnet mask. The DHCP server will then exclude the specified range of addresses from its pool of available addresses, and will not assign them to DHCP clients. By using DHCP exclusion ranges, the technician can ensure that the statically assigned addresses do not conflict with addresses assigned by the DHCP server, and can prevent IP address conflicts on the network.
Anthony Sequeira "Another frequent configuration you might make in a DHCP implementation is to configure an exclusion range. This is a portion of the address pool that you never want leased out to clients in the network. Perhaps you have numbered your servers 192.168.1.1?92.168.1.10. Because the servers are statically configured with these addresses, you exclude these addresses from the 192.168.1.0/24 pool of addresses."
Mike Meyers "Exclusion ranges represent an IP address or range of IP addresses from the pool of addresses that are not to be given out by the DHCP server. Exclusions should be made for the static addresses manually configured on servers and router interfaces, so these IP addresses won't be offered to DHCP clients."
Question 656:
An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the fluorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern's work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?
A. Insufficient power at the antennas
B. PoE and UTP incompatibility
C. Electromagnetic interference
D. Wrong cable pinout
Correct Answer: C
"EMI is a problem when cables are installed near electrical devices, such as air conditioners or fluorescent light fixtures. If a network medium is placed close enough to such a device, the signal within the cable might become corrupt. Network media vary in their resistance to the effects of EMI. Standard unshielded twisted-pair (UTP) cable is susceptible to EMI, whereas fiber cable, with its light transmissions, is resistant to EMI. When deciding on a particular medium, consider where it will run and the impact EMI can have on the installation."
Question 657:
Which of the following is the IEEE link cost for a Fast Ethernet interface in STP calculations?
A. 2
B. 4
C. 19
D. 100
Correct Answer: C
Link Speed Cost Value 10 Gbps 2 1 Gbps 4 100 Mbps 19 10 Mbps 100
Question 658:
Due to space constraints in an IDF, a network administrator can only a do a single switch to accommodate three data networks. The administrator needs a configuration that will allow each device to access its expected network without additional connections. The configuration must also allow each device to access the rest of the network. Which of the following should the administrator do to meet these requirements? (Select TWO).
A. Untag the three VLANs across the uplink
B. Tag an individual VLAN across the uplink
C. Untag an individual VLAN per device port
D. Tag an individual VLAN per device port
E. Tag the three VLANs across the uplink.
F. Tag the three VLANs per device port.
Correct Answer: AC
To achieve this, you should do two things:
Tag the three VLANs across the uplink port that connects to another switch or router. This will allow data packets from different VLANs to cross over into other networks. Untag an individual VLAN per device port that connects to an end
device. This will assign each device to its expected network without additional connections.
Question 659:
A Wi-Fi network was originally configured to be able to handle interference from a microwave oven. The microwave oven was recently removed from the office. Now the network administrator wants to optimize the system to maximize the range of the signal. The main sources of signal degradation are the numerous cubicles and wooden walls between the WAP and the intended destination. Which of the following actions should the administrator take?
A. Implement CDMA.
B. Change from omni to directional.
C. Change the SSID.
D. Change the frequency.
Correct Answer: D
-
the microwave was already removed from the office
-
the signal is OK now
-
Notice that the question mentions "numerous cubicles and wooden walls" - meaning the signal now won't have the interference as before
-
KEY POINT: the admin wants to "maximize the range of the signal:"
Manually change the frequency to 2.4 GHz for more reliable speeds and range. While 5 GHz gives you a stronger signal, it doesn't travel through walls or ceilings as well, so it doesn't give you the best range.
"Microwave ovens: Older microwave ovens, which might not have sufficient shielding, can emit relatively high-powered signals in the 2.4GHz band, resulting in significant interference with WLAN devices operating in the 2.4GHz band."
Question 660:
A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode, but it contains sensitive information about clients and vendors. Which of the following should also be enabled?
A. Factory reset
B. Autolock
C. Encryption
D. Two-factor authentication
Correct Answer: C
Encryption is a process that converts sensitive information into an unreadable format, which can only be accessed with a decryption key. In the event of a device being stolen, encryption can help protect the sensitive data from unauthorized access. Without encryption, a thief may be able to access the data stored on the phone by bypassing the passcode or removing the device's memory card.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.