Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

N10-008Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 101

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?

  • A: IP scanner
  • B: Terminal emulator
  • C: NetFlow analyzer
  • D: Port scanner

Question 102

A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot, ping the router. Which of the following is MOST likely the cause of the incident?

  • A: Incorrect subnet mask
  • B: Incorrect DNS server
  • C: Incorrect IP class
  • D: Incorrect TCP port

Question 103

A network administrator would like to purchase a device that provides access ports to endpoints and has the ability to route between networks.
Which of the following would be BEST for the administrator to purchase?

  • A: An IPS
  • B: A Layer 3 switch
  • C: A router
  • D: A wireless LAN controller

Question 104

A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?

  • A: Detection
  • B: Recovery
  • C: Identification
  • D: Prevention

Question 105

Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?

  • A: VLAN hopping
  • B: Evil twin
  • C: DNS poisoning
  • D: Social engineering

Question 106

Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links?

  • A: OSPF
  • B: RIPv2
  • C: QoS
  • D: STP

Question 107

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds hundreds of CRC errors on an interface.
Which of the following is the MOST likely cause of these errors?

  • A: A bad wire on the Cat 5e cable
  • B: The wrong VLAN assignment to the switchport
  • C: A misconfigured QoS setting on the router
  • D: Both sides of the switch trunk set to full duplex

Question 108

Which of the following is considered a physical security detection device?

  • A: Cameras
  • B: Biometric readers
  • C: Access control vestibules
  • D: Locking racks

Question 109

A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?

  • A: ipconfig
  • B: netstat
  • C: tracert
  • D: ping

Question 110

A technician needs to configure a routing protocol for an internet-facing edge router. Which of the following routing protocols will the technician MOST likely use?

  • A: BGP
  • B: RIPv2
  • C: OSPF
  • D: EIGRP

Question 111

A technician is monitoring a network interface and notices the device is dropping packets. The cable and interfaces, however, are in working order. Which of the following is MOST likely the cause?

  • A: OID duplication
  • B: MIB mismatch
  • C: CPU usage
  • D: Encapsulation errors

Question 112

Which of the following would be BEST to use to detect a MAC spoofing attack?

  • A: Internet Control Message Protocol
  • B: Reverse Address Resolution Protocol
  • C: Dynamic Host Configuration Protocol
  • D: Internet Message Access Protocol

Question 113

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

  • A: 2.4GHz
  • B: 5GHz
  • C: 6GHz
  • D: 900MHz

Question 114

A technician installed an 8-port switch in a user's office. The user needs to add a second computer in the office, so the technician connects both PCs to the switch and connects the switch to the wall jack. However, the new PC cannot connect to network resources. The technician then observes the following:
✑ The new computer does not get an IP address on the client's VLAN.
✑ Both computers have a link light on their NICs.
✑ The new PC appears to be operating normally except for the network issue.
✑ The existing computer operates normally.
Which of the following should the technician do NEXT to address the situation?

  • A: Contact the network team to resolve the port security issue.
  • B: Contact the server team to have a record created in DNS for the new PC.
  • C: Contact the security team to review the logs on the company's SIEM.
  • D: Contact the application team to check NetFlow data from the connected switch.

Question 115

A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST flexibility and compatibility while encrypting only the connection to the web application?

  • A: Clientless VPN
  • B: Virtual desktop
  • C: Virtual network computing
  • D: mGRE tunnel

Question 116

A network engineer receives the following when connecting to a switch to configure a port: telnet 10.1.200.1
Connecting to 10.1.200.1..Could not open connection to the host, on port 23: Connect failed.
Which of the following is the MOST likely cause for the failure?

  • A: The network engineer is using the wrong protocol.
  • B: The network engineer does not have permission to configure the device.
  • C: SNMP has been secured with an ACL.
  • D: The switchport the engineer is trying to configure is down.

Question 117

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

  • A: Syslog server messages
  • B: MIB of the attacked firewall
  • C: Network baseline reports
  • D: NetFlow aggregate data

Question 118

A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal?

  • A: Link aggregation
  • B: Jumbo frames
  • C: Port security
  • D: Flow control
  • E: Lower FTP port

Question 119

Which of the following devices have the capability to allow communication between two different subnetworks? (Choose two.)

  • A: IDS
  • B: Access point
  • C: Layer 2 switch
  • D: Layer 3 switch
  • E: Router
  • F: Media converter

Question 120

A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?

  • A: SSO
  • B: LDAP
  • C: EAP
  • D: TACACS+

Question 121

An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating?

  • A: Management information bases
  • B: System baseline
  • C: Network device logs
  • D: SNMP traps

Question 122

A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch. The technician observes the following configuration output from the switch:

Image 1

Which of the following is a cause of the issue on port 1/3?

  • A: Speed
  • B: Duplex
  • C: Errors
  • D: VLAN

Question 123

Which of the following would be used when connecting devices that have different physical characteristics?

  • A: A proxy server
  • B: An industrial control system:
  • C: A load balancer
  • D: A media converter

Question 124

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?

  • A: DHCP snooping
  • B: Geofencing
  • C: Port security
  • D: Secure SNMP

Question 125

A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?

  • A: MTBF
  • B: MTTR
  • C: RPO
  • D: RTO
Page 5 of 36 • Questions 101-125 of 877

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!