CompTIA N10-008 Practice Test - Questions Answers, Page 30
List of questions
Related questions
During an annual review of policy documents, a company decided to adjust its recovery time frames. The company agreed that critical applications can be down for no more than six hours, and the acceptable amount of data loss is no more than two hours. Which of the following should be documented as the RPO?
A new global ISP needs to connect from central offices in North America to the United Kingdom. Which of the following would be the BEST cabling solution for this project?
Which of the following would be BEST to install to find and block any malicious users within a network?
Which of the following records can be used to track the number of changes on a DNS zone?
A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket
• The server's IP address can be pinged from the client PCs,
• Access to the web resource works correctly when on the server's console.
• No clients can access the servers data via URL.
• The server does not have a firewall configured
• No ACLs are preventing connectivity from the client's network.
• All services on the server are operating normally,
which was confirmed by the server team.
Which of the following actions will resolve the issue?
A Chief Executive Officer and a network administrator came to an agreement With a vendor to purchase new equipment for the data center A document was drafted so all parties would be Informed about the scope of the project before It started. Which of the following terms BEST describes the document used?
A technician is trying to install a VolP phone, but the phone is not turning on. The technician checks the cable gong from the phone to the switch, and the cable is good. Which of the following actions IS needed for this phone to work?
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO).
A user calls the IT department to report being unable to log in after locking the computer The user resets the password, but later in the day the user is again unable to log in after locking the computer Which of the following attacks against the user IS MOST likely taking place?
An administrator needs to connect two laptops directly to each other using 802.11ac but does not have an AP available. Which of the following describes this configuration?
Question