ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 19

Add to Whishlist

List of questions

Question 181

Report Export Collapse

An international company is transferring its IT assets including a number of WAPs from the United States to an office in Europe for deployment. Which of the following considerations should the company research before Implementing the wireless hardware?

Become a Premium Member for full access
  Unlock Premium Member

Question 182

Report Export Collapse

Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of me following actions can reduce repair time?

Become a Premium Member for full access
  Unlock Premium Member

Question 183

Report Export Collapse

Which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure?

Become a Premium Member for full access
  Unlock Premium Member

Question 184

Report Export Collapse

Which of the following would be the MOST cost-effective recovery solution for a company's lower- priority applications?

Become a Premium Member for full access
  Unlock Premium Member

Question 185

Report Export Collapse

A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of me connectivity failure?

Become a Premium Member for full access
  Unlock Premium Member

Question 186

Report Export Collapse

An administrator would like to create a fault-tolerant ring between three switches within a Layer 2 network. Which of the following Ethernet features should the administrator employ?

Become a Premium Member for full access
  Unlock Premium Member

Question 187

Report Export Collapse

A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?

Become a Premium Member for full access
  Unlock Premium Member

Question 188

Report Export Collapse

Which of the following physical security methods Is the MOST effective to prevent tailgating?

Become a Premium Member for full access
  Unlock Premium Member

Question 189

Report Export Collapse

Which of the following is used to provide disaster recovery capabilities to spin up an critical devices using internet resources?

Become a Premium Member for full access
  Unlock Premium Member

Question 190

Report Export Collapse

Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions