Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

N10-008 Exam Dumps - CompTIA Network+ Exam

Go to page:
Question # 65

A technician is connecting DSL for a new customer. After installing and connecting the on-premises equipment, the technician verifies DSL synchronization. When connecting to a workstation, however, the link LEDs on the workstation and modem do not light up. Which of the following should the technician perform during troubleshooting?

A.

Identify the switching loops between the modem and the workstation.

B.

Check for asymmetrical routing on the modem.

C.

Look for a rogue DHCP server on the network.

D.

Replace the cable connecting the modem and the workstation.

Full Access
Question # 66

During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied'

A.

Privileged user accounts

B.

Role separation

C.

Container administration

D.

Job rotation

Full Access
Question # 67

Which of the following attacks encrypts user data and requires a proper backup implementation to recover?

A.

DDoS

B.

Phishing

C.

Ransomware

D.

MAC spoofing

Full Access
Question # 68

A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations The manufacturer says the system will work if ping times are less than 50ms. The company has recorded the following ping times:

Which of the following is MOST likely causing the issue?

A.

Attenuation

B.

Latency

C.

VLAN mismatch

D.

Jitter

Full Access
Question # 69

A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?

A.

Mandatory access control

B.

User-based permissions

C.

Role-based access

D.

Least privilege

Full Access
Question # 70

An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?

A.

Spanning Tree Protocol

B.

Neighbor Discovery Protocol

C.

Link Aggregation Control Protocol

D.

Address Resolution Protocol

Full Access
Question # 71

A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?

A.

CRC errors

B.

Giants

C.

Runts

D.

Flooding

Full Access
Question # 72

Which of the following would be used to expedite MX record updates to authoritative NSs?

A.

UDP forwarding

B.

DNS caching

C.

Recursive lookup

D.

Time to live

Full Access
Go to page: