Exam Details

  • Exam Code
    :N10-008
  • Exam Name
    :CompTIA Network+
  • Certification
    :CompTIA Certifications
  • Vendor
    :CompTIA
  • Total Questions
    :1219 Q&As
  • Last Updated
    :Feb 16, 2025

CompTIA CompTIA Certifications N10-008 Questions & Answers

  • Question 331:

    A firewall administrator observes log entries of traffic being allowed to a web server on port 80 and port 443. The policy for this server is to only allow traffic on port 443. The firewall administrator needs to investigate how this change occurred to prevent a reoccurrence. Which of the following should the firewall administrator do next?

    A. Consult the firewall audit logs.

    B. Change the policy to allow port 80.

    C. Remove the server object from the firewall policy.

    D. Check the network baseline.

  • Question 332:

    Which of the following is the DNS feature that controls how long a lookup is stored in cache on a server?

    A. CNAME

    B. TTL

    C. SOA

    D. SRV

  • Question 333:

    Which of the following policies outlines the software and hardware requirements for using personally owned devices to conduct business?

    A. DLP

    B. AUP

    C. BYOD

    D. NDA

  • Question 334:

    Which of the following routing technologies uses a successor and a feasible successor?

    A. IS-IS

    B. OSPF

    C. BGP

    D. EIGRP

  • Question 335:

    Which of the following indicates a computer has reached end-of-support?

    A. The computer does not have any users.

    B. The antivirus protection is expired.

    C. The operating system license is expired.

    D. No more patches or bug fixes are available indefinitely.

  • Question 336:

    Users in a remote office report that corporate web server pages are taking a long time to load, whereas users in the main corporate office do not have any issues. Which of the following is the best metric for a network administrator to check?

    A. Jitter across the network

    B. Hop-by-hop network latency

    C. Server interface CRC errors

    D. Server NetFlow data

  • Question 337:

    A security analyst found the following vulnerability on the company's website:

    Which of the following should be implemented to prevent this type of attack in the future?

    A. Input sanitization

    B. Output encoding

    C. Code obfuscation

    D. Prepared statements

  • Question 338:

    To find the best subnet mask that meets the requirement of six usable IP addresses, we need to calculate the number of host bits and the number of host addresses for each option. The number of host bits is the number of 0s in the binary representation of the subnet mask, and the number of host addresses is 2^host bits - 2 (the -2 is to exclude the network address and the broadcast address). The option that has the smallest number of host addresses that is greater than or equal to six is the best choice. Here are the calculations for each option:

    A. 255.255.255.128 Binary: 11111111.11111111.11111111.10000000 Host bits: 7 Host addresses: 2^7 - 2 = 126 - 2 = 124 This option has too many host addresses for the requirement.

    B. 255.255.255.192 Binary: 11111111.11111111.11111111.11000000 Host bits: 6 Host addresses: 2^6 - 2 = 64 - 2 = 62 This option also has too many host addresses for the requirement.

    C. 255.255.255.224 Binary: 11111111.11111111.11111111.11100000 Host bits: 5 Host addresses: 2^5 - 2 = 32 - 2 = 30 This option has the smallest number of host addresses that is greater than or equal to six, so this is the best choice.

    D. 255.255.255.240 Binary: 11111111.11111111.11111111.11110000 Host bits: 4 Host addresses: 2^4 - 2 = 16 - 2 = 14 This option has fewer host addresses than the requirement, so this is not a valid choice.

  • Question 339:

    A security engineer wants to provide a secure, dedicated, alternate access method into an IT network infrastructure to administer connected devices and IT assets. Which of the following is the engineer most likely to implement?

    A. Remote desktop gateway

    B. Authentication and authorization controls

    C. Out-of-band management

    D. Secure Shell

  • Question 340:

    Which of the following is the first step a network administrator should take in the troubleshooting methodology?

    A. Establish a plan of action.

    B. Document findings and outcomes.

    C. Test the theory to determine cause.

    D. Identify the problem.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.