Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CompTIA N10-008 Practice Exam with Questions & Answers | Set: 6

Questions 76

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?

Options:
A.

SSO

B.

TACACS+

C.

Zero Trust

D.

Separation of duties

E.

Multifactor authentication

CompTIA N10-008 Premium Access
Questions 77

Which of the Mowing architectures reduces network latency by enforcing a limit on the number of switching devices on the frame's path between any internal hosts?

Options:
A.

Spine and leaf

B.

Software-defined network

C.

Three-tiered

D.

Collapsed core

Questions 78

Which of the following fouling protocols is generally used by major ISPs for handing large-scale internet traffic?

Options:
A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Questions 79

Which of the following routing technologies is used to prevent network failure at the gateway by protecting data traffic from a failed router?

Options:
A.

BGP

B.

OSPF

C.

EIGRP

D.

FHRP

Questions 80

A network security engineer is investigating a potentially malicious Insider on the network. The network security engineer would like to view all traffic coming from the user's PC to the switch without interrupting any traffic or having any downtime. Which of the following should the network security engineer do?

Options:
A.

Turn on port security.

B.

Implement dynamic ARP inspection.

C.

Configure 802.1Q.

D.

Enable port mirroring.

Questions 81

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not

labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Options:
A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Questions 82

A network administrator needs to monitor traffic on a specific port on a switch. Which of the following should the administrator configure to accomplish the task?

Options:
A.

Port security

B.

Port tagging

C.

Port mirroring

D.

Media access control

Questions 83

A technician is tasked with setting up a mail server and a DNS server. The mail port should be secured and have the ability to transfer large files. Which of the following ports should be opened? (Select TWO).

Options:
A.

22

B.

53

C.

110

D.

389

E.

995

F.

3389

Questions 84

A malicious user is using special software 10 perform an on-path attack. Which of the following best practices should be configured to mitigate this threat?

Options:
A.

Dynamic ARP inspection

B.

Role-based access

C.

Control plane policing

D.

MAC filtering

Questions 85

A user is required to log in to a main web application, which then grants the user access to all other programs needed to complete job-related tasks. Which of the following authentication methods does this setup describe?

Options:
A.

SSO

B.

RADIUS

C.

TACACS+

D.

Multifactor authentication

E.

802.1X

Questions 86

Which of the following would MOST likely be used to review previous upgrades to a system?

Options:
A.

Business continuity plan

B.

Change management

C.

System life cycle

D.

Standard operating procedures

Questions 87

An engineer is designing a network topology for a company that maintains a large on-premises private cloud. A design requirement mandates internet-facing hosts to be partitioned off from the internal LAN and internal server IP ranges. Which of the following defense strategies helps meet this requirement?

Options:
A.

Implementing a screened subnet

B.

Deploying a honeypot

C.

Utilizing network access control

D.

Enforcing a Zero Trust model

Questions 88

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

Options:
A.

Establish a plan of action to resolve the issue and identify potential effects

B.

Verify full system functionality and, if applicable, implement preventive measures

C.

Implement the solution or escalate as necessary

D.

Test the theory to determine the cause

Questions 89

An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following technologies BEST meets the organization’s requirements?

Options:
A.

Load balancing

B.

Geofencing

C.

Public cloud

D.

Content delivery network

E.

Infrastructure as a service

Questions 90

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

Options:
A.

Layer 3 switch

B.

VPN headend

C.

Next-generation firewall

D.

Proxy server

E.

Intrusion prevention