A user reports that a new VoIP phone works properly, but the computer that is connected to the phone cannot access any network resources. Which of the following MOST likely needs to be configured correctly to provide network connectivity to the computer?
A. Port duplex settings
B. Port aggregation
C. ARP settings
D. VLAN tags
E. MDIX settings
A Chief Executive Officer and a network administrator came to an agreement with a vendor to purchase new equipment for the data center. A document was drafted so all parties would be informed about the scope of the project before it started. Which of the following terms BEST describes the document used?
A. Contract
B. Project charter
C. Memorandum of understanding
D. Non-disclosure agreement
A company joins a bank's financial network and establishes a connection to the clearinghouse servers in the range 192 168.124.0/27. An IT technician then realizes the range exists within the VM pool at the data center. Which of the following is the BEST way for the technician to connect to the bank's servers?
A. NAT
B. PAT
C. CIDR
D. SLAAC
Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?
A. MPLS
B. mGRE
C. EIGRP
D. VRRP
An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating?
A. Management information bases
B. System baseline
C. Network device logs
D. SNMP traps
A network administrator needs to provide evidence to confirm that recent network outages were caused by increased traffic generated by a recently released application. Which of the following actions will BEST support the administrator's response?
A. Generate a network baseline report for comparison.
B. Export the firewall traffic logs.
C. Collect the router's NetFlow data.
D. Plot interface statistics for dropped packets.
A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server.
C. Install a network access control agent on the server.
D. Deploy a new server to host the application.
A technician discovered that some information on the local database server was changed during a tile transfer to a remote server. Which of the following should concern the technician the MOST?
A. Confidentiality
B. Integrity
C. DDoS
D. On-path attack
Which of the following would MOST likely utilize PoE?
A. A camera
B. A printer
C. A hub
D. A modem
Which of the following is used to elect an STP root?
A. A bridge ID
B. A bridge protocol data unit
C. Interface port priority
D. A switch's root port
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.