Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

N10-008Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 26

A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would
BEST describe this setup?

  • A: Bus
  • B: Spine-and-leaf
  • C: Hub-and-spoke
  • D: Mesh

Question 27

To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?

  • A: Use tcpdump and parse the output file in a protocol analyzer.
  • B: Use an IP scanner and target the cloud WAN network addressing.
  • C: Run netstat in each cloud server and retrieve the running processes.
  • D: Use nmap and set the servers' public IPs as the targets.

Question 28

A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?

  • A: 172.15.0.0/18
  • B: 172.18.0.0/10
  • C: 172.23.0.0/16
  • D: 172.28.0.0/8
  • E: 172.32.0.0/14

Question 29

A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?

  • A: Zero Trust
  • B: Planned obsolescence
  • C: Time to live
  • D: Caching

Question 30

Which of the following policies should be referenced when a user wants to access work email on a personal cell phone?

  • A: Offboarding policy
  • B: Acceptable use policy
  • C: BYOD policy
  • D: Remote access policy

Question 31

After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?

  • A: Modify the device's MIB on the monitoring system.
  • B: Configure syslog to send events to the monitoring system.
  • C: Use port mirroring to redirect traffic to the monitoring system.
  • D: Deploy SMB to transfer data to the monitoring system.

Question 32

At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?

  • A: Network
  • B: Data link
  • C: Transport
  • D: Session

Question 33

A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.)

  • A: Jitter
  • B: Speed mismatch
  • C: QoS misconfiguration
  • D: Protocol mismatch
  • E: CRC errors
  • F: Encapsulation errors

Question 34

Which of the following VPN configurations should be used to separate Internet and corporate traffic?

  • A: Split-tunnel
  • B: Remote desktop gateway
  • C: Site-to-site
  • D: Out-of-band management

Question 35

A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:
✑ Device
✑ LC/LC patch cable
✑ Patch panel
✑ Cross-connect fiber cable
✑ Patch panel
✑ LC/LC patch cable
✑ Switch
The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?

  • A: TX/RX is reversed
  • B: An incorrect cable was used
  • C: The device failed during installation
  • D: Attenuation is occurring

Question 36

Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?

  • A: A media converter
  • B: A bridge
  • C: An MDIX
  • D: A load balancer

Question 37

The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy's requirements?

  • A: Recover all systems to a loss of 48 hours of data.
  • B: Limit network downtime to a maximum of 48 hours per year.
  • C: Recover all systems within 48 hours.
  • D: Require 48 hours of system backup maintenance.

Question 38

Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?

  • A: UTP
  • B: Coaxial
  • C: Fiber
  • D: Cat 5
  • E: Twinaxial

Question 39

Which of the following is the physical security mechanism that would MOST likely be used to enter a secure site?

  • A: A landing page
  • B: An access control vestibule
  • C: A smart locker
  • D: A firewall

Question 40

Which of the following BEST describes a North-South traffic flow?

  • A: A public Internet user accessing a published web server
  • B: A database server communicating with another clustered database server
  • C: A Layer 3 switch advertising routes to a router
  • D: A management application connecting to managed devices

Question 41

A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The organization is concerned that intruders could potentially leverage unattended equipment in the remote location to connect rogue devices and gain access to the organization's resources. Which of the following techniques would BEST address the concern?

  • A: Configure port security using MAC filtering.
  • B: Manually register the cameras on the switch address table.
  • C: Activate PoE+ on the active switchports.
  • D: Disable Neighbor Discovery Protocol on the switch.

Question 42

A technician is documenting an application that is installed on a server and needs to verify all existing web and database connections to the server. Which of the following tools should the technician use to accomplish this task?

  • A: tracert
  • B: ipconfig
  • C: netstat
  • D: nslookup

Question 43

A technician is assisting a user who cannot access network resources when the workstation is connected to a VoIP phone. The technician identifies the phone as faulty and replaces it. According to troubleshooting methodology, which of the following should the technician do NEXT?

  • A: Implement the solution.
  • B: Test the theory.
  • C: Duplicate the issue.
  • D: Document the findings.
  • E: Verify functionality.

Question 44

Which of the following OSI model layers contains IP headers?

  • A: Presentation
  • B: Application
  • C: Data link
  • D: Network
  • E: Transport

Question 45

A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?

  • A: Add another AP.
  • B: Disable the 2.4GHz radios.
  • C: Enable channel bonding.
  • D: Upgrade to WiFi 5.

Question 46

A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port?

  • A: IP route table
  • B: VLAN tag
  • C: MAC table
  • D: QoS tag

Question 47

A network technician is troubleshooting an application issue. The technician is able to recreate the issue in a virtual environment. According to the troubleshooting methodology, which of the following actions will the technician most likely perform NEXT?

  • A: Gather information from the initial report.
  • B: Escalate the issue to a supervisor.
  • C: Implement a solution to resolve the issue.
  • D: Establish a theory of probable cause.

Question 48

Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?

  • A: iSCSI
  • B: FCoE
  • C: Three-tiered network
  • D: Spine and leaf
  • E: Top-of-rack switching

Question 49

A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information:

Image 1

Which of the following is MOST likely the cause of the issue?

  • A: Channel overlap
  • B: Poor signal
  • C: Incorrect power settings
  • D: Wrong antenna type

Question 50

A network technician reviews an entry on the syslog server and discovers the following message from a switch:

SPANNING-TREE Port 1/1 BLOCKED -
Which of the following describes the issue?

  • A: A loop was discovered, and the impact was mitigated.
  • B: An incorrectly pinned cable was disconnected.
  • C: The link-local address on the port is incorrect.
  • D: The port was shut down, and it needs to be reactivated.
Page 2 of 36 • Questions 26-50 of 877

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!