CompTIA N10-008 Practice Test - Questions Answers, Page 3
List of questions
Related questions
Which of the following is used to track and document various types of known vulnerabilities?
The network administrator is informed that a user’s email password is frequently hacked by brute- force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A network engineer performs the following tasks to increase server bandwidth:
Connects two network cables from the server to a switch stack Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?
Which of the following is the LARGEST MTU for a standard Ethernet frame?
Given the following information:
Which of the following command-line tools would generate this output?
According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?
Which of the following BEST describes a network appliance that warns of unapproved devices that are accessing the network?
A technician is installing a cable modem in a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?
A network technician is reviewing the interface counters on a router interface. The technician is attempting to confirm a cable issue. Given the following information:
Which of the following metrics confirms there is a cabling issue?
Question