Certbus > CompTIA > CompTIA Certifications > N10-008 > N10-008 Online Practice Questions and Answers

N10-008 Online Practice Questions and Answers

Questions 4

Which of the following systems would MOST likely be found in a screened subnet?

A. RADIUS

B. FTP

C. SQL

D. LDAP

Browse 1219 Q&As
Questions 5

A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actor's actions was logged. The administrator notes that the server receiving and storing the events was not compromised by any attack and is properly communicating with all network devices.

Which of the following can the administrator employ to improve network access accountability?

A. Activate the audit logs on the network server and resources.

B. Configure SNMP on the network server.

C. Deploy a central SIEM server into the network.

D. Collect traffic statistics from the servers using NetFlow data.

Browse 1219 Q&As
Questions 6

A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?

A. RST

B. FIN

C. ICMP Time Exceeded

D. Redirect

Browse 1219 Q&As
Questions 7

Due to a surge in business, a company is onboarding an unusually high number of salespeople. The salespeople are assigned desktops that are wired to the network. The last few salespeople to be onboarded are able to access corporate materials on the network but not sales-specific resources. Which of the following is MOST likely the cause?

A. The switch was configured with port security.

B. Newly added machines are running into DHCP conflicts.

C. The IPS was not configured to recognize the new users.

D. Recently added users were assigned to the wrong VLAN

Browse 1219 Q&As
Questions 8

An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure?

A. Fiber

B. Leased line

C. Satellite

D. Metro optical

Browse 1219 Q&As
Questions 9

A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:

A. a divide-and-conquer approach

B. a bottom-up approach.

C. a top-to-bottom approach

D. Implementing a solution

Browse 1219 Q&As
Questions 10

Which of the following protocol types describes secure communication on port 443?

A. ICMP

B. UDP

C. TCP

D. IP

Browse 1219 Q&As
Questions 11

Which of the following would be BEST suited for use at the access layer in a three-tier architecture system?

A. Router

B. Multilayer switch

C. Layer 2 switch

D. Access point

Browse 1219 Q&As
Questions 12

An IT technician is working on a support ticket regarding an unreachable website. The technician has utilized the ping command to the website, but the site is still unreachable. Which of the following tools should the technician use NEXT?

A. ipconfig

B. tracert

C. arp

D. netstat

Browse 1219 Q&As
Questions 13

A company has multiple offices around the world. The computer rooms in some office locations are too warm Dedicated sensors are in each room, but the process of checking each sensor takes a long time. Which of the following options can the company put In place to automate temperature readings with internal resources?

A. Implement NetFlow.

B. Hire a programmer to write a script to perform the checks

C. Utilize ping to measure the response.

D. Use SNMP with an existing collector server

Browse 1219 Q&As
Questions 14

An IT administrator received an assignment with the following objectives

1.

Conduct a total scan within the company's network tor all connected hosts

2.

Detect all the types of operating systems running on all devices

3.

Discover all services offered by hosts on the network

4.

Find open ports and detect security risks.

Which of the following command-line tools can be used to achieve these objectives?

A. nmap

B. arp

C. netatat

D. tcpdump

Browse 1219 Q&As
Questions 15

An online gaming company needs a cloud solution that will allow for more virtual resources to be deployed when tournaments are held. The number of users who access the service increases during tournaments. The company also needs the resources to return to baseline levels once the resources are not needed in order to reduce cost. Which of the following cloud concepts would provide the best solution?

A. Scalability

B. Hybrid

C. Multitenancy

D. Elasticity

Browse 1219 Q&As
Questions 16

Which of the following layers of the OSI model is responsible for end-to-end encryption?

A. Presentation

B. Application

C. Session

D. Transport

Browse 1219 Q&As
Questions 17

Which of the following passwords would provide the best defense against a brute-force attack?

A. ThisIsMyPasswordForWork

B. Qwerty!@#$

C. Password!1

D. T5!8j5

Browse 1219 Q&As
Questions 18

A network technician for a bank configured a WLAN that provides good coverage. Bank employees are now reporting Wi-Fi issues when the microwave in the lunch room area is used. Which of the following frequencies should the technician use to minimize interference?

A. 2.4GHz

B. 5MHz

C. 5GHz

D. 700MHz

Browse 1219 Q&As
Exam Code: N10-008
Exam Name: CompTIA Network+
Last Update: Feb 16, 2025
Questions: 1219 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99