Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

N10-008Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 126

A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Choose two.)

  • A: Data loss prevention policy
  • B: BYOD policy
  • C: Acceptable use policy
  • D: Non-disclosure agreement
  • E: Disaster recovery plan
  • F: Physical network diagram

Question 127

Which of the following BEST describes hosting several businesses on the same physical infrastructure?

  • A: Hybrid
  • B: Elasticity
  • C: IaaS
  • D: Multitenancy

Question 128

A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?

  • A: Enable IGMP snooping on the switches.
  • B: Implement another DHCP server.
  • C: Reconfigure port tagging for the video traffic.
  • D: Change the SSID of the APs.

Question 129

The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?

  • A: Redundant power supplies
  • B: Uninterruptible power supply
  • C: Generator
  • D: Power distribution unit

Question 130

A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?

  • A: show interface
  • B: show config
  • C: show route
  • D: show arp

Question 131

A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line?

  • A: netstat
  • B: netstat -a
  • C: netstat -e
  • D: netstat -n

Question 132

Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)

  • A: TIA-568-A - TIA-568-B
  • B: TIA-568-B - TIA-568-B
  • C: RJ11
  • D: RJ45
  • E: F-type

Question 133

A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal?

  • A: Captive portal
  • B: Geofencing
  • C: Wireless client isolation
  • D: Role-based access

Question 134

A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?

  • A: A
  • B: AAAA
  • C: CNAME
  • D: PTR

Question 135

Which of the following is used to track and document various types of known vulnerabilities?

  • A: CVE
  • B: Penetration testing
  • C: Zero-day
  • D: SIEM
  • E: Least privilege

Question 136

A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing an
APIPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interface has connectivity. Which of the following is MOST likely the issue the workstation is experiencing?

  • A: DHCP exhaustion
  • B: A rogue DHCP server
  • C: A DNS server outage
  • D: An incorrect subnet mask

Question 137

A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?

  • A: Validate the findings in a top-to-bottom approach.
  • B: Duplicate the issue, if possible.
  • C: Establish a plan of action to resolve the issue.
  • D: Document the findings and actions.

Question 138

Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?

  • A: Client-to-site VPN
  • B: Clientless VPN
  • C: RDP
  • D: Site-to-site VPN
  • E: SSH

Question 139

A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise. Each team member has been assigned an area to troubleshoot. Which of the following approaches is being used?

  • A: Divide-and-conquer
  • B: Top-to-bottom
  • C: Bottom-to-top
  • D: Determine if anything changed

Question 140

Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?

  • A: An increase in network security using encryption and packet encapsulation
  • B: A network expansion caused by an increase in the number of branch locations to the headquarters
  • C: A mandatory requirement to increase the deployment of an SDWAN network
  • D: An improvement in network efficiency by increasing the useful packet payload

Question 141

Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cabling?

  • A: RJ11
  • B: LC ports
  • C: Patch panel
  • D: F-type connector

Question 142

A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?

  • A: MTTR
  • B: MOU
  • C: NDA
  • D: SLA

Question 143

A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?

  • A: Active-active
  • B: Warm
  • C: Cold
  • D: Cloud

Question 144

Which of the following would be used to forward requests and replies between a DHCP server and client?

  • A: Relay
  • B: Lease
  • C: Scope
  • D: Range

Question 145

Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of the following actions can reduce repair time?

  • A: Using a tone generator and wire map to determine the fault location
  • B: Using a multimeter to locate the fault point
  • C: Using an OTDR in one end of the optic cable to get the fiber length information
  • D: Using a spectrum analyzer and comparing the current wavelength with a working baseline

Question 146

The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

  • A: Captive portal
  • B: Two-factor authentication
  • C: Complex passwords
  • D: Geofencing
  • E: Role-based access
  • F: Explicit deny

Question 147

A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?

  • A: The configuration of the encryption protocol
  • B: Interference from other devices
  • C: Insufficient bandwidth capacity
  • D: Duplicate SSIDs

Question 148

Which of the following is a benefit of the spine-and-leaf network topology?

  • A: Increased network security
  • B: Stable network latency
  • C: Simplified network management
  • D: Eliminated need for inter-VLAN routing

Question 149

A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue?

  • A: Adjust the proper logging level on the new firewall.
  • B: Tune the filter for logging the severity level on the syslog server.
  • C: Activate NetFlow traffic between the syslog server and the firewall.
  • D: Restart the SNMP service running on the syslog server.

Question 150

A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company's network hardware.
The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.
The following settings are common to all network configurations:

Image 1

Which of the following actions would MOST likely reduce this issue? (Choose two.)

  • A: Change to WPA encryption.
  • B: Change the DNS server to 10.1.10.1.
  • C: Change the default gateway to 10.0.0.1.
  • D: Change the DHCP scope end to 10.1.10.250.
  • E: Disable AP isolation.
  • F: Change the subnet mask to 255.255.255.192.
  • G: Reduce the DHCP lease time to four hours.
Page 6 of 36 • Questions 126-150 of 877

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!