CompTIA Network+ N10-008 – Question512

A network engineer is investigating reports of poor performance on a videoconferencing application. Upon
reviewing the report, the engineer finds that available bandwidth at the WAN connection is low. Which of the
following is the MOST appropriate mechanism to handle this issue?


A.
Traffic shaping
B. Flow control
C. NetFlow
D. Link aggregation

Correct Answer: A

CompTIA Network+ N10-008 – Question511

A network engineer is designing a wireless network that has the following requirements:
Network speed must be higher than 100Mbps
Must use the 2.4GHz and 5GHz bands
Which of the following 802.11 standards should the engineer select?


A.
802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Correct Answer: D

CompTIA Network+ N10-008 – Question510

A user reports that a crucial fileshare is unreachable following a network upgrade that was completed the night
before. A network technician confirms the problem exists. Which of the following troubleshooting steps should
the network technician perform NEXT?


A.
Establish a theory of probable cause.
B. Implement a solution to fix the problem.
C. Create a plan of action to resolve the problem.
D. Document the problem and the solution.

Correct Answer: A

CompTIA Network+ N10-008 – Question508

A technician thinks one of the router ports is flapping. Which of the following available resources should the
technician use in order to determine if the router is flapping?


A.
Audit logs
B. NetFlow
C. Syslog
D. Traffic logs

Correct Answer: B

CompTIA Network+ N10-008 – Question507

A network administrator notices excessive wireless traffic occurring on an access point after normal business
hours. The access point is located on an exterior wall. Which of the following should the administrator do to limit
wireless access outside the building?


A.
Set up a private VLAN.
B. Disable roaming on the WAP.
C. Change to a directional antenna.
D. Stop broadcasting of the SSID.

Correct Answer: D

CompTIA Network+ N10-008 – Question506

Which of the following can be used to limit the ability of devices to perform only HTTPS connections to an
internet update server without exposing the devices to the public internet?


A.
Allow connections only to an internal proxy server.
B. Deploy an IDS system and place it in line with the traffic.
C. Create a screened network and move the devices to it.
D. Use a host-based network firewall on each device.

Correct Answer: C

CompTIA Network+ N10-008 – Question505

An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing
the results, the engineer notices a number of workstations that are currently verified as being online are not
listed in the report.
The tool was configured to scan using the following information:
Network address: 172.28.16.0
CIDR: /22
The engineer collected the following information from the client workstation:
IP address: 172.28.17.206
Subnet mask: 255.255.252.0
Which of the following MOST likely explains why the tool is failing to detect some workstations?


A.
The scanned network range is incorrect.
B. The subnet mask on the client is misconfigured.
C. The workstation has a firewall enabled.
D. The tool is unable to scan remote networks.

Correct Answer: A

CompTIA Network+ N10-008 – Question504

A large number of PCs are obtaining an APIPA IP address, and a number of new computers were added to the
network. Which of the following is MOST likely causing the PCs to obtain an APIPA address?


A.
Rogue DHCP server
B. Network collision
C. Incorrect DNS settings
D. DHCP scope exhaustion

Correct Answer: D