An administrator recently implemented new SOHO routers for a company's teleworking employees. Before deploying the routers, the administrator changed the default credentials and disabled unnecessary services. Within a few days of deployment, hackers gained access to the routers. Which of the following is the MOST important thing the administrator forgot to do?
A. Disable unused physical router ports.
B. Generate new encryption keys.
C. Upgrade the router firmware.
D. Create a database of file hashes on the router.
Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?
A. BYOD
B. NDA
C. SLA
D. AUP
A small company decided to use a single virtual appliance lo filter spam as well as a reverse proxy to filter traffic to its internal web server. Which of the following did the company MOST likely deploy?
A. IPS
B. Firewall
C. SIEM
D. UTM
E. Content filler
A network administrator installed a WAP to extend the network. However, the company wants to contain the signal so it does not extend beyond the company's parking structure. Which of the following solutions would work BEST?
A. Create MAC filtering.
B. Change the channel.
C. Change the encryption.
D. Install a directional antenna.
A network engineer is provisioning a new Linux server in a public cloud. Which of the following types of cloud service should be utilized?
A. PaaS
B. SaaS
C. DaaS
D. laaS
A network administrator has implemented file integrity monitoring on all relevant devices. This will provide the ability to detect whenever the files are:
A. reinstalled.
B. executed.
C. read.
D. written.
Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?
A. EIGRP
B. BGP
C. IPv6
D. MPLS
Which of the following are considered physical security detection methods? (Select TWO).
A. Cameras
B. Asset tags
C. Biometric readers
D. Access control vestibules
E. IPS infrastructure
F. Locking racks
A technician has completed configuration on a new satellite location. The location has a new firewall and a small internal network. The technician has been asked to perform basic vulnerability testing. Which of the following tools would BEST assist the technician in verifying the security of the site?
A. Packet sniffer
B. Bandwidth tester
C. Port scanner
D. Protocol analyzer
Which of the following technologies can be implemented on network devices to increase throughput in network storage systems?
A. Trunking
B. Frame Relay
C. Jumbo frames D. InfiniBand
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.