Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

N10-008 Exam Dumps - CompTIA Network+ Questions and Answers

Question # 4

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

Options:

A.

Establish a plan of action to resolve the issue and identify potential effects

B.

Verify full system functionality and, if applicable, implement preventive measures

C.

Implement the solution or escalate as necessary

D.

Test the theory to determine the cause

Buy Now
Question # 5

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

Options:

A.

Captive portal

B.

Two-factor authentication

C.

Complex passwords

D.

Geofencing

E.

Role-based access

F.

Explicit deny

Buy Now
Question # 6

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Question # 7

The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained. Which of the following documents would BEST support this?

Options:

A.

An incident response plan

B.

A business continuity plan

C.

A change management policy

D.

An acceptable use policy

Buy Now
Question # 8

A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

Options:

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Buy Now
Question # 9

A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.)

Options:

A.

CPU usage

B.

Memory

C.

Temperature

D.

Bandwidth

E.

Latency

F.

Jitter

Buy Now
Question # 10

Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the cause of the issue?

Options:

A.

Verify the session time-out configuration on the captive portal settings

B.

Check for encryption protocol mismatch on the client’s wireless settings

C.

Confirm that a valid passphrase is being used during the web authentication

D.

Investigate for a client’s disassociation caused by an evil twin AP

Buy Now
Question # 11

A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?

Options:

A.

Increased CRC errors

B.

Increased giants and runts

C.

Increased switching loops

D.

Increased device temperature

Buy Now
Question # 12

A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?

Options:

A.

Asset tags

B.

A smart locker

C.

An access control vestibule

D.

A camera

Buy Now
Question # 13

Which of the following is used to track and document various types of known vulnerabilities?

Options:

A.

CVE

B.

Penetration testing

C.

Zero-day

D.

SIEM

E.

Least privilege

Buy Now
Question # 14

Which of the following systems would MOST likely be found in a screened subnet?

Options:

A.

RADIUS

B.

FTP

C.

SQL

D.

LDAP

Buy Now
Question # 15

Which of the following TCP ports is used by the Windows OS for file sharing?

Options:

A.

53

B.

389

C.

445

D.

1433

Buy Now
Question # 16

Which of the following ports is commonly used by VoIP phones?

Options:

A.

20

B.

143

C.

445

D.

5060

Buy Now
Question # 17

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?

Options:

A.

MIB

B.

Trap

C.

Syslog

D.

Audit log

Buy Now
Question # 18

Which of the following DNS records works as an alias to another record?

Options:

A.

AAAA

B.

CNAME

C.

MX

D.

SOA

Buy Now
Exam Code: N10-008
Exam Name: CompTIA Network+ Exam
Last Update: Feb 22, 2025
Questions: 856
N10-008 pdf

N10-008 PDF

$25.5  $84.99
N10-008 Engine

N10-008 Testing Engine

$28.5  $94.99
N10-008 PDF + Engine

N10-008 PDF + Testing Engine

$40.5  $134.99