ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 27

Add to Whishlist

List of questions

Question 261

Report Export Collapse

Which of the following devices have the capability to allow communication between two different subnetworks? (Select TWO).

Become a Premium Member for full access
  Unlock Premium Member

Question 262

Report Export Collapse

Which of the following describes traffic going in and out of a data center from the internet?

Become a Premium Member for full access
  Unlock Premium Member

Question 263

Report Export Collapse

A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 264

Report Export Collapse

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface. Which of the following is the MOST likely cause of these errors?

Become a Premium Member for full access
  Unlock Premium Member

Question 265

Report Export Collapse

A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?

Become a Premium Member for full access
  Unlock Premium Member

Question 266

Report Export Collapse

A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?

Become a Premium Member for full access
  Unlock Premium Member

Question 267

Report Export Collapse

A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?

Become a Premium Member for full access
  Unlock Premium Member

Question 268

Report Export Collapse

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

Become a Premium Member for full access
  Unlock Premium Member

Question 269

Report Export Collapse

Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?

Become a Premium Member for full access
  Unlock Premium Member

Question 270

Report Export Collapse

A newly installed VoIP phone is not getting the DHCP IP address it needs to connect to the phone system. Which of the following tasks needs to be completed to allow the phone to operate correctly?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions