00:00

QUESTION 106

- (Topic 3)
Which of the following objectives does an evil twin achieve?

Correct Answer: B
The objective that an evil twin achieves is log-in credentials. An evil twin is a type of rogue access point that mimics a legitimate wireless network by using the same SSID, encryption, and authentication methods. An evil twin can trick unsuspecting users into connecting to it instead of the real network, and then capture their log-in credentials or other sensitive data. An evil twin can also perform man-in-the-middle attacks, redirecting or modifying the user’s traffic. References: CompTIA Network+ N10-008 Certification Study Guide, page 358; The Official CompTIA Network+ Student Guide (Exam N10-008), page 14-1.

QUESTION 107

- (Topic 3)
A company wants to implement a disaster recovery site for non-critical applications, which can tolerate a short period of downtime. Which of the following types of sites should the company implement to achieve this goal?

Correct Answer: C
The type of site that the company should implement for non-critical applications that can tolerate a short period of downtime is a warm site. A warm site is a disaster recovery site that has some pre-installed equipment and software, but not as much as a hot site, which is fully operational and ready to take over the primary site’s functions in case of a disaster. A warm site requires some time and effort to activate and synchronize with the primary site, but not as much as a cold site, which has no equipment or software installed and requires a lot of configuration and testing. A passive site is not a common term for a disaster recovery site, but it could refer to a site that only receives backups from the primary site and does not actively participate in the network operations. References: CompTIA Network+ N10- 008 Certification Study Guide, page 347; The Official CompTIA Network+ Student Guide (Exam N10-008), page 13-10.

QUESTION 108

- (Topic 3)
A company is sending a switch to a remote site to be reused. An administrator needs to move the switch and ensure no network settings persist. Which of the following databases does the administrator need to delete?

Correct Answer: A
The VLAN database is the database that stores the VLAN configuration information on a switch, such as the VLAN IDs, names, and ports. The VLAN database is stored in a separate file from the switch configuration file, and it is not affected by the erase startup- config or reload commands. Therefore, to delete the VLAN database, the administrator needs to use a specific command, such as delete flash:vlan.dat or delete vlan.dat, depending on the switch model. Deleting the VLAN database will ensure that no network settings related to VLANs persist on the switch when it is moved to a remote site. References
✑ 1: CompTIA Network+ N10-008 Certification Study Guide, page 163
✑ 2: N10-008 CompTIA Network+ : 5.5 - Professor Messer IT Certification Training Courses
✑ 3: CompTIA Network+ (N10-008) Practice Exam w/PBQ & Solution, question 6

QUESTION 109

- (Topic 3)
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?

Correct Answer: A
The device that is required when connecting an endpoint device with an RJ45 port to a network device with an ST port is a media converter. A media converter is a device that converts signals between different types of media, such as copper and fiber. An RJ45 port is used for twisted-pair copper cables, while an ST port is used for fiber-optic cables. A media converter allows these two types of cables to interconnect and communicate. References: CompTIA Network+ N10-008 Certification Study Guide, page 54; The Official CompTIA Network+ Student Guide (Exam N10-008), page 2-5.

QUESTION 110

- (Topic 3)
A network administrator is working to configure a new device to provide Layer 2 connectivity to various endpoints including several WAPs. Which of the following devices will the administrator MOST likely configure?

Correct Answer: D
A switch is a device that provides Layer 2 connectivity to various endpoints by forwarding frames based on MAC addresses. A switch can also connect to several WAPs (wireless access points) to provide wireless connectivity to wireless devices.