ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 58

Add to Whishlist

List of questions

Question 571

Report Export Collapse

Which of the following security concepts is related to ensuring that encrypted data is not edited while in transit?

Become a Premium Member for full access
  Unlock Premium Member

Question 572

Report Export Collapse

Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 573

Report Export Collapse

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels.

Which of the following would be the best choice?

Become a Premium Member for full access
  Unlock Premium Member

Question 574

Report Export Collapse

Which of the following focuses on application delivery?

Become a Premium Member for full access
  Unlock Premium Member

Question 575

Report Export Collapse

A customer calls the help desk to report that users are unable to access any network resources_ The issue started earlier in the day when an employee rearranged the wiring closet A technician goes to the site but does not observe any obvious damage. The statistics output on the switch indicates high

CPI-J usage, and all the lights on the switch are blinking rapidly in unison_ Which of the following is the most likely explanation for these symptoms?

Become a Premium Member for full access
  Unlock Premium Member

Question 576

Report Export Collapse

Which of the following OSI model layers are responsible for handling packets from the sources to the destination and checking for errors? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 577

Report Export Collapse

Which of the following network topologies best describes a central device connected to multiple independent devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 578

Report Export Collapse

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?

Become a Premium Member for full access
  Unlock Premium Member

Question 579

Report Export Collapse

While working in a coffee shop, an attacker watches a user log in to a corporate system and writes down the user's log-in credentials. Which of the following social engineering attacks is this an example of?

Become a Premium Member for full access
  Unlock Premium Member

Question 580

Report Export Collapse

A network technician is troubleshooting internet connectivity issues with users in a subnet. From a host, the technician runs and then attempts to navigate to a website using a web browser.

CompTIA N10-008 image Question 580 96464 10022024175235000000

The technician receives the following output:

Afterward, the browser displays an error. Which of the following explains this issue?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions