CompTIA N10-008 Practice Test - Questions Answers, Page 76

List of questions
Question 751

A user returns to the office after working remotely for an extended period. The user is reporting limited access to the office wireless network and the inability to reach company resources on the network. The user connected to the guest network, ensured all patches were applied, and checked to make sure software was up to date. Which of the following is most likely the cause of the issue?
Question 752

A customer hired a network consultant to install a new wireless network with the following specifications:
2.4GHz
11Mbps
20MHz
Which of the following standards best fits these requirements?
Question 753

An IT intern moved the location of a WAP from one conference room to another. The WAP was unable to boot following the move. Which of the following should be used to fix the issue?
Question 754

Which of the following DNS records maps an alias to a true name?
Question 755

A network technician is troubleshooting an issue that involves connecting to a server via SSH. The server has one network interface that does not support subinterfaces. The technician runs a command on the server and receives the following output:
On the host, the technician runs another command and receives the following:
Which of the following best explains the issue?
Question 756

A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer use to upgrade the gateway?
Question 757

Which of the following would be used to indicate when unauthorized access to physical internal hardware has occurred?
Question 758

A network engineer installed a new fiber uplink for an office and wants to make sure that the link meets throughput requirements. Which of the following tools should the engineer use to verify that the new link is sufficient?
Question 759

A network administrator wants to know which systems on the network are at risk of a known vulnerability. Which of the following should the administrator reference?
Question 760

Which of the following best describes the purpose of an access control vestibule?
Question