N10-008 Dumps

N10-008 Free Practice Test

CompTIA N10-008: CompTIA Network+Exam

QUESTION 66

- (Topic 3)
Which of the following has the capability to centrally manage configuration, logging, and firmware versioning for distributed devices?

Correct Answer: A
A WLAN controller is a device that manages and controls multiple wireless access points (WAPs) in a wireless LAN (WLAN). A WLAN controller has the capability to centrally manage configuration, logging, and firmware versioning for distributed WAPs. A WLAN controller can also provide load balancing, security, and quality of service (QoS) for the WLAN.
References: Network+ Study Guide Objective 3.1: Explain the purposes and use cases for advanced networking devices.

QUESTION 67

- (Topic 3)
A technician monitors a switch interface and notices it is not forwarding frames on a trunked port. However, the cable and interfaces are in working order. Which of the following is MOST likely the cause of the issue?

Correct Answer: C
802.1Q configuration is the most likely cause of the issue where a switch interface is not forwarding frames on a trunked port. 802.1Q is a standard that defines how to create and manage virtual LANs (VLANs) on a switched network. VLANs are logical segments of a network that group devices based on criteria such as function, department, or security level. VLANs can improve network performance, security, and manageability by reducing broadcast domains, isolating traffic, and enforcing policies. A trunked port is a switch port that can carry traffic from multiple VLANs over a single physical link by adding a VLAN tag to each frame. A VLAN tag is a 4-byte header that identifies the VLAN ID and priority of each frame. A trunked port requires 802.1Q configuration to specify which VLANs are allowed or disallowed on the port, and which VLAN is the native or untagged VLAN. If the 802.1Q configuration is incorrect or mismatched between switches, frames may be dropped or misrouted on the trunked port. References: [CompTIA Network+ Certification Exam Objectives], VLAN Trunking Protocol (VTP) Explained | NetworkLessons.com

QUESTION 68

- (Topic 3)
A company’s VolP phone connection is cutting in and out. Which of the following should be configured to resolve this issue?

Correct Answer: A
* 802.1 Q tagging is a method of adding a VLAN identifier to an Ethernet frame to indicate which VLAN the frame belongs to. This allows different VLANs to share the same physical link and device without interfering with each other. 802.1 Q tagging also supports a quality of service (QoS) scheme that can prioritize different classes of traffic based on the priority code point (PCP) field in the tag12
VoIP phone connection issues can be caused by network congestion, packet loss, jitter, or latency, which affect the quality and reliability of voice transmission over the Internet. By using 802.1 Q tagging, VoIP traffic can be separated from other data traffic and assigned a higher priority level, which reduces the chances of dropping or delaying voice packets. 802.1 Q tagging can also improve the security and scalability of VoIP networks by isolating different voice domains and preventing unauthorized access34

QUESTION 69

- (Topic 2)
Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?

Correct Answer: D
A door lock would be the best security device to use to provide mechanical access control to the MDF/IDF. A door lock is a device that prevents unauthorized access to a physical area by requiring a key, a code, a card, a biometric scan, or a combination of these factors to open it. A door lock can provide mechanical access control to the MDF/IDF, which are rooms that house network equipment such as switches, routers, servers, or patch panels. A door lock can prevent unauthorized persons from tampering with or stealing the network equipment or data. References: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCIn fra_6.html

QUESTION 70

- (Topic 3)
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?

Correct Answer: B
Active-active refers to more than one NIC being active at the same time. In my opinion, this question is referring to a recovery site (hot, warm, cold, cloud)