ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 37

Add to Whishlist

List of questions

Question 361

Report Export Collapse

Network traffic is being compromised by DNS poisoning every time a company's router is connected to the internet. The network team detects a non-authorized DNS server being assigned to the network clients and remediates the incident by setting a trusted DNS server, but the issue occurs again after internet exposure. Which of the following best practices should be implemented on the router?

Become a Premium Member for full access
  Unlock Premium Member

Question 362

Report Export Collapse

Which of the following can be used to validate domain ownership by verifying the presence of pre- agreed content contained in a DNS record?

Become a Premium Member for full access
  Unlock Premium Member

Question 363

Report Export Collapse

An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?

Become a Premium Member for full access
  Unlock Premium Member

Question 364

Report Export Collapse

An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port?

Become a Premium Member for full access
  Unlock Premium Member

Question 365

Report Export Collapse

An organization is interested in purchasing a backup solution that supports the organization's goals. Which of the following concepts would specify the maximum duration that a given service can be down before impacting operations?

Become a Premium Member for full access
  Unlock Premium Member

Question 366

Report Export Collapse

A company cell phone was stolen from a technician's vehicle. The cell phone has a passcode, but it contains sensitive information about clients and vendors. Which of the following should also be enabled?

Become a Premium Member for full access
  Unlock Premium Member

Question 367

Report Export Collapse

A corporation is looking for a method to secure all traffic between a branch office and its data center in order to provide a zero-touch experience for all staff members who work there. Which of the following would BEST meet this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 368

Report Export Collapse

ARP spoofing would normally be a part of:

Become a Premium Member for full access
  Unlock Premium Member

Question 369

Report Export Collapse

Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services?

Become a Premium Member for full access
  Unlock Premium Member

Question 370

Report Export Collapse

Which of the following layers of the OSI model receives data from the application layer and converts it into syntax that is readable by other devices on the network?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions