ExamGecko
Home / CompTIA / N10-008 / List of questions
Ask Question

CompTIA N10-008 Practice Test - Questions Answers, Page 67

Add to Whishlist

List of questions

Question 661

Report Export Collapse

Which of the following is a characteristic of the application layer?

Become a Premium Member for full access
  Unlock Premium Member

Question 662

Report Export Collapse

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Become a Premium Member for full access
  Unlock Premium Member

Question 663

Report Export Collapse

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

Become a Premium Member for full access
  Unlock Premium Member

Question 664

Report Export Collapse

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Become a Premium Member for full access
  Unlock Premium Member

Question 665

Report Export Collapse

A network consultant is setting up a new wireless infrastructure. The new infrastructure is primarily focused on supporting legacy equipment that does not support the newest standards. Which of the following frequency ranges will the consultant most likely have to support?

Become a Premium Member for full access
  Unlock Premium Member

Question 666

Report Export Collapse

Which of the following network cables involves bouncing light off of protective cladding?

Become a Premium Member for full access
  Unlock Premium Member

Question 667

Report Export Collapse

Which of the following attacks utilizes a network packet that contains multiple network tags?

Become a Premium Member for full access
  Unlock Premium Member

Question 668

Report Export Collapse

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 669

Report Export Collapse

To find the best subnet mask that meets the requirement of six usable IP addresses, we need to calculate the number of host bits and the number of host addresses for each option. The number of host bits is the number of 0s in the binary representation of the subnet mask, and the number of host addresses is 2^host bits - 2 (the -2 is to exclude the network address and the broadcast address). The option that has the smallest number of host addresses that is greater than or equal to six is the best choice. Here are the calculations for each option:

Become a Premium Member for full access
  Unlock Premium Member

Question 670

Report Export Collapse

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface's indicator lights are not blinking on either the computer or the switch. Which of the following is the most likely cause?

Become a Premium Member for full access
  Unlock Premium Member
Total 865 questions
Go to page: of 87
Search

Related questions