CompTIA N10-008 Practice Test - Questions Answers, Page 42
List of questions
Related questions
Which of the following architectures is used for FTP?
A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A technician is investigating an issue with connectivity at customer's location. The technician confirms that users can access resources locally but not over the internet The technician theorizes that the local router has failed and investigates further. The technician's testing results show that the route is functional: however, users still are unable to reach resources on the internal. Which of the following describes what the technician should do NEXT?
A network technician 13 troubleshooting a network issue for employees who have reported Issues with speed when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the employees' building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?
A technician is checking network devices to look for opportunities to improve security Which of the following toots would BEST accomplish this task?
Which of the following is an advanced distance vector routing protocol that automates routing tables and also uses some features of link-state routing protocols?
A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?
Which of the following devices would be used to extend the range of a wireless network?
Which of the following describes when an active exploit is used to gain access to a network?
Question