Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

N10-008Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 76

Which of the following can be used to store various types of devices and provide contactless delivery to users?

  • A: Asset tags
  • B: Biometrics
  • C: Access control vestibules
  • D: Smart lockers

Question 77

A technician recently set up a small office network for nine users. When the installation was complete, all the computers on the network showed addresses ranging from 169.254.0.0 to 169.254.255.255. Which of the following types of address ranges does this represent?

  • A: Private
  • B: Public
  • C: APIPA
  • D: Classless

Question 78

Which of the following OSI model layers is where a technician would view UDP information?

  • A: Physical
  • B: Data link
  • C: Network
  • D: Transport

Question 79

A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?

  • A: Check the system's IP address
  • B: Do a ping test against the servers
  • C: Reseat the cables into the back of the PC
  • D: Ask what changes were made

Question 80

A network technician at a university is assisting with the planning of a simultaneous software deployment to multiple computers in one classroom in a building.
Which of the following would be BEST to use?

  • A: Multicast
  • B: Anycast
  • C: Unicast
  • D: Broadcast

Question 81

Which of the following describes the BEST device to configure as a DHCP relay?

  • A: Bridge
  • B: Router
  • C: Layer 2 switch
  • D: Hub

Question 82

Which of the following compromises Internet-connected devices and makes them vulnerable to becoming part of a botnet? (Choose two.)

  • A: Deauthentication attack
  • B: Malware infection
  • C: IP spoofing
  • D: Firmware corruption
  • E: Use of default credentials
  • F: Dictionary attack

Question 83

A network administrator is planning a WLAN for a soccer stadium and was advised to use MU-MIMO to improve connection performance in high-density areas.
The project requires compatibility with clients connecting using 2.4GHz or 5GHz frequencies. Which of the following would be the BEST wireless standard for this project?

  • A: 802.11ac
  • B: 802.11ax
  • C: 802.11g
  • D: 802.11n

Question 84

An organization purchased an allocation of public IPv4 addresses. Instead of receiving the network address and subnet mask, the purchase paperwork indicates the allocation is a /28. This type of notation is referred to as:

  • A: CIDR
  • B: classful
  • C: classless
  • D: RFC1918

Question 85

A network technician is reviewing a document that specifies how to handle access to company resources, such as the Internet and printers, when devices are not part of the company's assets. Which of the following agreements would a user be required to accept before using the company's resources?

  • A: BYOD
  • B: DLP
  • C: AUP
  • D: MOU

Question 86

Which of the following records can be used to track the number of changes on a DNS zone?

  • A: SOA
  • B: SRV
  • C: TXT
  • D: NS

Question 87

A network administrator is trying to add network redundancy for the server farm. Which of the following can the network administrator configure to BEST provide this capability?

  • A: VRRP
  • B: DNS
  • C: UPS
  • D: RPO

Question 88

A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?

  • A: Disable unneeded ports
  • B: Disable SSH service
  • C: Disable MAC filtering
  • D: Disable port security

Question 89

A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.)

  • A: tcpdump
  • B: show config
  • C: hostname
  • D: show route
  • E: netstat
  • F: show ip arp

Question 90

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?

  • A: CSMA/CD
  • B: LACP
  • C: PoE+
  • D: MDIX

Question 91

Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?

  • A: Secure web access to internal corporate resources.
  • B: Upgrade security via the use of an NFV technology.
  • C: Connect two datacenters across the Internet.
  • D: Increase VPN availability by using a SDWAN technology.

Question 92

Which of the following security controls indicates unauthorized hardware modifications?

  • A: Biometric authentication
  • B: Media device sanitization
  • C: Change management policy
  • D: Tamper-evident seals

Question 93

A network technician needs to install security updates on several switches on the company's network. The management team wants this completed as quickly and efficiently as possible. Which of the following should the technician do to perform the updates?

  • A: Upload the security update onto each switch using a terminal emulator and a console cable.
  • B: Configure a TFTP server, SSH into each device, and perform the update.
  • C: Replace each old switch with new switches that have the updates already performed.
  • D: Connect a USB memory stick to each switch and perform the update.

Question 94

Which of the following describes traffic going in and out of a data center from the internet?

  • A: Demarcation point
  • B: North-South
  • C: Fibre Channel
  • D: Spine and leaf

Question 95

A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources. Which of the following needs to be reconfigured?

  • A: The IP address
  • B: The subnet mask
  • C: The gateway address
  • D: The DNS servers

Question 96

An IT administrator received an assignment with the following objectives:
✑ Conduct a total scan within the company's network for all connected hosts.
✑ Detect all the types of operating systems running on all devices.
✑ Discover all services offered by hosts on the network.
✑ Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?

  • A: nmap
  • B: arp
  • C: netstat
  • D: tcpdump

Question 97

A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?

  • A: Disabling unneeded switchports
  • B: Changing the default VLAN
  • C: Configuring DHCP snooping
  • D: Writing ACLs to prevent access to the switch

Question 98

At which of the following OSI model layers does routing occur?

  • A: Data link
  • B: Transport
  • C: Physical
  • D: Network

Question 99

An auditor assessing network best practices was able to connect a rogue switch into a network jack and get network connectivity. Which of the following controls would BEST address this risk?

  • A: Activate port security on the switchports providing end user access.
  • B: Deactivate Spanning Tree Protocol on network interfaces that are facing public areas.
  • C: Disable Neighbor Resolution Protocol in the Layer 2 devices.
  • D: Ensure port tagging is in place for network interfaces in guest areas.

Question 100

A technician knows the MAC address of a device and is attempting to find the device's IP address. Which of the following should the technician look at to find the
IP address? (Choose two.)

  • A: ARP table
  • B: DHCP leases
  • C: IP route table
  • D: DNS cache
  • E: MAC address table
  • F: STP topology
Page 4 of 36 • Questions 76-100 of 877

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!