ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 33

Add to Whishlist

List of questions

Question 321

Report Export Collapse

Which of the following would be the MOST likely attack used to bypass an access control vestibule?

Become a Premium Member for full access
  Unlock Premium Member

Question 322

Report Export Collapse

A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?

Become a Premium Member for full access
  Unlock Premium Member

Question 323

Report Export Collapse

While waking from the parking lot lo an access-controlled door an employee sees an authorized user open the door. Then the employee notices that another person catches the door before It closes and goes inside Which of the following attacks Is taking place?

Become a Premium Member for full access
  Unlock Premium Member

Question 324

Report Export Collapse

Which of the Mowing architectures reduces network latency by enforcing a limit on the number of switching devices on the frame's path between any internal hosts?

Become a Premium Member for full access
  Unlock Premium Member

Question 325

Report Export Collapse

A network engineer needs to create a subnet that has the capacity for five VLANs. with the following number of clients lo be allowed on each:

CompTIA N10-008 image Question 325 96209 10022024175235000000

Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?

Become a Premium Member for full access
  Unlock Premium Member

Question 326

Report Export Collapse

An engineer recently decided to upgrade the firmware on a router. During the upgrade, the help desk received calls about a network outage, and a critical ticket was opened. The network manager would like to create a policy to prevent this from happening in the future. Which of the following documents should the manager create?

Become a Premium Member for full access
  Unlock Premium Member

Question 327

Report Export Collapse

Which of the following bandwidth management techniques uses buffers al the client side to prevent TCP retransmissions from occurring when the ISP starts to drop packets of specific types that exceed the agreed traffic rate?

Become a Premium Member for full access
  Unlock Premium Member

Question 328

Report Export Collapse

A network administrator is getting reports of some internal users who cannot connect to network resources. The users slate they were able to connect last week, but not today. No changes have been configured on the network devices or server during the last few weeks. Which of the following is the MOST likely cause of the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 329

Report Export Collapse

A company is deploying a SAN at headquarters and a branch office 1, 000ml (1,609km) away that w« access small amounts of dat

Become a Premium Member for full access
  Unlock Premium Member

Question 330

Report Export Collapse

Users within a corporate network need to connect to the Internet, but corporate network policy does not allow direct connections. Which of the following is MOST likely to be used?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions