Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

N10-008 Exam Dumps - CompTIA Network+ Exam

Go to page:
Question # 137

Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?

A.

Replication traffic between an on-premises server and a remote backup facility

B.

Traffic between VMs running on different hosts

C.

Concurrent connections generated by Internet DDoS attacks

D.

VPN traffic from remote offices to the datacenter’s VMs

Full Access
Question # 138

Which of the following systems would MOST likely be found in a screened subnet?

A.

RADIUS

B.

FTP

C.

SQL

D.

LDAP

Full Access
Question # 139

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?

A.

A VoIP sales call with a customer

B.

An in-office video call with a coworker

C.

Routing table from the ISP

D.

Firewall CPU processing time

Full Access
Question # 140

Which of the following is used to track and document various types of known vulnerabilities?

A.

CVE

B.

Penetration testing

C.

Zero-day

D.

SIEM

E.

Least privilege

Full Access
Question # 141

Which of the following is the physical topology for an Ethernet LAN?

A.

Bus

B.

Ring

C.

Mesh

D.

Star

Full Access
Question # 142

A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following needs to be configured for these networks to reach each other?

A.

Network address translation

B.

Default gateway

C.

Loopback

D.

Routing protocol

Full Access
Question # 143

A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this task?

A.

dig

B.

arp

C.

show interface

D.

hostname

Full Access
Question # 144

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

A.

Layer 3 switch

B.

VPN headend

C.

Next-generation firewall

D.

Proxy server

E.

Intrusion prevention

Full Access
Go to page: