ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 63

Add to Whishlist

List of questions

Question 621

Report Export Collapse

Which of the following cloud deployment models involves servers that are hosted at a company's property and are only used by that company?

Become a Premium Member for full access
  Unlock Premium Member

Question 622

Report Export Collapse

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Become a Premium Member for full access
  Unlock Premium Member

Question 623

Report Export Collapse

A network engineer needs to enable device monitoring using authentication and encryption. Which of the following protocols offers this option?

Become a Premium Member for full access
  Unlock Premium Member

Question 624

Report Export Collapse

Which of the following describes a network in which users and devices need to mutually authenticate before any network resource can be accessed?

Become a Premium Member for full access
  Unlock Premium Member

Question 625

Report Export Collapse

Which of the following architectures would allow the network-forwarding elements to adapt to new business requirements with the least amount of operating effort?

Become a Premium Member for full access
  Unlock Premium Member

Question 626

Report Export Collapse

Which of the following best describe the functions of Layer 2 of the OSI model? (Select two).

Become a Premium Member for full access
  Unlock Premium Member

Question 627

Report Export Collapse

A company is designing a new complex. The primary and alternate data centers will be in separate buildings 6.2mi (10km) apart and will be connected via fiber.

Which of the following types of SFP is the best choice?

Become a Premium Member for full access
  Unlock Premium Member

Question 628

Report Export Collapse

Which of the following fiber connector types is the most likely to be used on a network interface card?

Become a Premium Member for full access
  Unlock Premium Member

Question 629

Report Export Collapse

A VOIP phone is plugged in to a port but cannot receive calls. Which Of the following needs to be done on the port to address the issue?

Become a Premium Member for full access
  Unlock Premium Member

Question 630

Report Export Collapse

A network security technician is designing a solution for a secure remote access scheme with the following requirements:

* The solution must allow for users at multiple locations to access corporate resources.

* The on-premises equipment will not handle non-corporate, resource-bound traffic.

Which of the following should the network security technician consider when designing the solution? (Select two).

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions