Test Online Free CompTIA N10-008 Exam Questions and Answers

The questions for N10-008 were last updated On Dec.21 2023

Get N10-008 Full Access
 / 13

Question No : 1
After the A record of a public website was updated, some visitors were unable to access the website.
Which of the following should be adjusted to address the issue?

Answer:

Question No : 2
Which of the following policies is MOST commonly used for guest captive portals?

Answer:

Question No : 3
An administrator is investigating reports of network slowness in a building. While looking at the uplink interface statistics In the switch's CLI, the administrator discovers the uplink Is at 100% utilization However, the administrator is unsure how to Identify what traffic is causing the saturation.
Which of the following tools should the administrator utilize to identify the source and destination addresses of the traffic?

Answer:
Explanation:
To identify the source and destination addresses of the traffic causing network saturation, the network administrator should use a network protocol analyzer that supports the NetFlow protocol. NetFlow is a network protocol that collects IP traffic information as it enters or exits an interface and sends it to a NetFlow collector for analysis. This data includes the source and destination addresses of the traffic, the ports used, and the number of bytes and packets transferred.
Therefore, the correct answer is option D, NetFlow.
Reference: CompTIA Network+ Study Guide, Exam N10-007, Fourth Edition, by Todd Lammle (Chapter 6: Network Devices)

Question No : 4
A network administrator has been directed to present the network alerts from the past week to the company's executive staff.
Which of the following will provide the BEST collection and presentation of this data?

Answer:

Question No : 5
A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency.
Which of the following is MOST likely occurring?

Answer:

Question No : 6
Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?

Answer:

Question No : 7
Which of the following devices would be used to extend the range of a wireless network?

Answer:
Explanation:
A repeater is a device used to extend the range of a wireless network by receiving, amplifying, and retransmitting wireless signals. It is typically used to extend the range of a wireless network in a large area, such as an office building or a campus. Repeaters can also be used to connect multiple wireless networks together, allowing users to move seamlessly between networks. As stated in the CompTIA Network+ Study Manual, "a wireless repeater is used to extend the range of a wireless network by repeating the signal from one access point to another."

Question No : 8
An administrator would like to allow Windows clients from outside me office to access workstations without using third-party software.
Which or the following access methods would meet this requirement?

Answer:
Explanation:
To allow Windows clients from outside the office to access workstations without using third-party software, the administrator can use the Remote Desktop Protocol (RDP). RDP is a built-in feature of the Windows operating system that allows users to remotely connect to and control other Windows computers over a network connection.
To use RDP, the administrator will need to enable the Remote Desktop feature on the workstations that need to be accessed, and ensure that the appropriate firewall rules are in place to allow RDP traffic to pass through. The administrator will also need to provide the remote users with the necessary credentials to access the workstations.
Once RDP is set up and configured, the remote users can use the Remote Desktop client on their own computers to connect to the workstations and access them as if they were physically present in the office. This allows the administrator to provide remote access to the workstations without the need for any additional software or third-party tools.

Question No : 9
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on.
Which of the following authentication methods would allow this type of access?

Answer:

Question No : 10
A network is experiencing a number of CRC errors during normal network communication. At which of the following layers of the OSI model will the administrator MOST likely start to troubleshoot?

Answer:

 / 13
  TOP 50 Exam Questions
Exam