Which of the following best describes what an organization would use port address translation for?
A. VLANs on the perimeter
B. Public address on the perimeter router
C. Non-routable address on the perimeter router
D. Servers on the perimeter
Which of the following should be implemented to allow remote users to access network resources while only redirecting necessary traffic?
A. Split-tunnel VPN
B. Geofencing
C. Client-to-site VPN
D. Remote desktop gateway
A network technician is troubleshooting a port channel issue. When logging in to one of the switches, the technician sees the following information displayed:
Native VLAN mismatch detected on interface g0/1
Which of the following layers of the OSI model is most likely to be where the issue resides?
A. Layer 2
B. Layer 3
C. Layer 5
D. Layer 6
Which of the following is the most accurate NTP time source that is capable of being accessed across a network connection?
A. Stratum 0 device
B. Stratum 1 device
C. Stratum 7 device
D. Stratum 16 device
A network engineer is configuring new switches. Some of the trunk ports are in a blocking state. Which of the following should the network engineer reconfigure?
A. STP
B. Port mirroring
C. Flow control
D. LACP
A user is tricked into providing log-in credentials to an attacker over the telephone. Which of the following attacks is this an example of?
A. Shoulder surfing
B. Tailgating
C. Phishing
D. Dumpster diving
A network administrator is working to configure a new device to provide Layer 2 connectivity to various endpoints including several WAPs. Which of the following devices will the administrator MOST likely configure?
A. WLAN controller
B. Cable modem
C. Load balancer
D. Switch
E. Hub
Which of the following cloud components can filter inbound and outbound traffic between cloud resources?
A. NAT gateways
B. Service endpoints
C. Network security groups
D. Virtual private cloud
A technician is troubleshooting intermittent connectivity between devices and viewing the following syslog entries from a switch:
Which of the following are these entries indicative of?
A. DDoS attack
B. Jitter
C. Latency
D. Link flapping
Which of the following network management methods is able to perform various automated tasks?
A. SSH
B. CLI
C. GUI
D. API
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.