A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
A. Least privilege network access
B. Dynamic inventories
C. Central policy management
D. Zero-touch provisioning
E. Configuration drift prevention
F. Subnet range limits
A network administrator wants to know which systems on the network are at risk of a known vulnerability. Which of the following should the administrator reference?
A. SLA
B. Patch management policy
C. NDA
D. Site survey report
E. CVE
A network engineer is upgrading an existing edge gateway. The company currently uses a router and needs to be able to filter on all OSI layers. Which of the following should the engineer use to upgrade the gateway?
A. NGFW
B. Proxy
C. Layer 3 switch
D. Load balancer
Which of the following passwords would provide the best defense against a brute-force attack?
A. ThisIsMyPasswordForWork
B. Qwerty!@#$
C. Password!1
D. T5!8j5
Which of the following is most likely to be implemented to actively mitigate intrusions on a host device?
A. HIDS
B. NIDS
C. HIPS
D. NIPS
A user took a laptop on a trip and made changes to the network parameters while at the airport. The user can access all internet websites but not corporate intranet websites. Which of the following is the most likely cause of the issue?
A. Duplicate IP address
B. Duplicate SSID
C. Incorrect DNS
D. Incorrect subnet mask
Which of the following best describe the functions of Layer 2 of the OSI model? (Choose two.)
A. Local addressing
B. Error preventing
C. Logical addressing
D. Error detecting
E. Port addressing
F. Error correcting
A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?
A. Captive portal
B. Enterprise authentication
C. Ad hoc network
D. WPA3
Which of the following would be best suited for use at the access layer in a three-tier architecture system?
A. Router
B. Multilayer switch
C. Layer 2 switch
D. Access point
Following the implementation of a BYOD policy, some users in a high-density environment report slowness over the wireless connection. Some wireless controller reports indicate high latency and airttime contention. Which of the following is the most probable root cause?
A. The AP is configured with 2.4GHz frequency, which the new personal devices do not support.
B. The AP is configured with 2.4GHz frequency without band-steering capabilities.
C. The AP is configured with 5Ghz frequency with band-steering capabilities.
D. The AP is configured with 5Ghz frequency, which the new personal devices do not support
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.