ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 42

Add to Whishlist

List of questions

Question 411

Report Export Collapse

Which of the following architectures is used for FTP?

Become a Premium Member for full access
  Unlock Premium Member

Question 412

Report Export Collapse

A network technician is hired to review all the devices within a network and make recommendations to improve network efficiency. Which of the following should the technician do FIRST before reviewing and making any recommendations?

Become a Premium Member for full access
  Unlock Premium Member

Question 413

Report Export Collapse

A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?

Become a Premium Member for full access
  Unlock Premium Member

Question 414

Report Export Collapse

A technician is investigating an issue with connectivity at customer's location. The technician confirms that users can access resources locally but not over the internet The technician theorizes that the local router has failed and investigates further. The technician's testing results show that the route is functional: however, users still are unable to reach resources on the internal. Which of the following describes what the technician should do NEXT?

Become a Premium Member for full access
  Unlock Premium Member

Question 415

Report Export Collapse

A network technician 13 troubleshooting a network issue for employees who have reported Issues with speed when accessing a server in another subnet. The server is in another building that is 410ft (125m) away from the employees' building. The 10GBASE-T connection between the two buildings uses Cat 5e. Which of the following BEST explains the speed issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 416

Report Export Collapse

A technician is checking network devices to look for opportunities to improve security Which of the following toots would BEST accomplish this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 417

Report Export Collapse

Which of the following is an advanced distance vector routing protocol that automates routing tables and also uses some features of link-state routing protocols?

Become a Premium Member for full access
  Unlock Premium Member

Question 418

Report Export Collapse

A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?

Become a Premium Member for full access
  Unlock Premium Member

Question 419

Report Export Collapse

Which of the following devices would be used to extend the range of a wireless network?

Become a Premium Member for full access
  Unlock Premium Member

Question 420

Report Export Collapse

Which of the following describes when an active exploit is used to gain access to a network?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions