Win IT Exam with Last Dumps 2024

CompTIA N10-008 Exam

Page 3/14
Viewing Questions 21 30 out of 140 Questions

Question 21
A technician is configuring a network switch to be used in a publicly accessible __cpLocation. Which of the following should the technician configure on the switch to prevent unintended connections?
A. DHCP snooping
B. Geofencing
C. Port security
D. Secure SNMP

Question 22
Which of the following is used to track and document various types of known vulnerabilities?
B. Penetration testing
C. Zero-day
E. Least privilege

Question 23
The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny

Question 24
A network engineer performs the following tasks to increase server bandwidth:
- Connects two network cables from the server to a switch stack
- Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering

Question 25
A network technician is manually configuring the network settings for a new device and is told the network block is Which of the following subnets should the technician use?

Question 26
Which of the following is the LARGEST MTU for a standard Ethernet frame?
A. 1452
B. 1492
C. 1500
D. 2304

Question 27
Given the following information:
Which of the following command-line tools would generate this output?
Image N10-008_27Q.png related to the CompTIA N10-008 Exam
A. netstat
B. arp
C. dig
D. tracert

Question 28
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
A. Establish a plan of action to resolve the issue and identify potential effects
B. Verify full system functionality and, if applicable, implement preventive measures
C. Implement the solution or escalate as necessary
D. Test the theory to determine the cause

Question 29
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
A. Firewall
C. Proxy server

Question 30
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
A. Coaxial
B. Single-mode fiber
C. Cat 6e
D. Multimode fiber