A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator Is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
A. Network access control
B. Least privilege
C. Multifactor authentication
D. Separation of duties
Correct Answer: B
Question 802:
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
A. MTTR
B. MOU
C. NDA
D. SLA
Correct Answer: D
A Service Level Agreement (SLA) is a contract between a service provider and a customer that outlines the level of service that the provider will deliver. It typically includes details on the scope of the service being provided, the availability and
performance of the service, and any support or maintenance that is included.
The Mean Time To Repair (MTTR) is a measure of the time it takes to repair a failed component or system. It is not directly related to determining the scope of an issue.
A Memorandum of Understanding (MOU) is a formal agreement between two or more parties that outlines the terms and conditions of their relationship. It is not typically used to determine the scope of an issue.
A Non-Disclosure Agreement (NDA) is a legal document that prohibits the disclosure of confidential information. It is not related to determining the scope of an issue.
Question 803:
An international company is transferring its IT assets including a number of WAPs from the United States to an office in Europe for deployment. Which of the following considerations should the company research before Implementing the wireless hardware?
A. WPA2 cipher
B. Regulatory Impacts
C. CDMA configuration
D. 802.11 standards
Correct Answer: B
When transferring IT assets, including wireless access points (WAPs), from one country to another, it's important to research the regulatory impacts of the move. Different countries have different regulations and compliance requirements for wireless devices, such as frequency bands, power levels, and encryption standards. Failing to comply with these regulations can result in fines or other penalties.
Question 804:
A technician removes an old PC from the network and replaces it with a new PC that is unable to connect to the LAN. Which of the Mowing is MOST likely the cause of the issue?
A. Port security
B. Port tagging
C. Port aggregation
D. Port mirroring
Correct Answer: A
The most likely cause of the issue is port security. When a new device is connected to a network, port security can prevent the device from connecting if it is not authorized. The old PC might have been authorized to connect, but the new PC is not. To resolve the issue, the technician will need to configure port security to allow the new PC to connect.
Question 805:
A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified m the SLA. Which of the following would BEST help measure the throughput?
A. iPerf
B. Ping
C. NetFlow
D. Netstat
Correct Answer: A
iPerf is a tool that is commonly used to measure network throughput. It works by sending a stream of data packets between two devices on a network and measuring the amount of data that can be transferred over a given period of time. This allows you to test the performance of a network connection and determine whether it is capable of meeting the throughput requirements specified in the Service Level Agreement (SLA).
Ping, NetFlow, and Netstat are all useful tools for troubleshooting and monitoring networks, but they are not designed specifically for measuring throughput. Ping is used to test the reachability of a host on a network, NetFlow is used to collect data about network traffic, and Netstat is used to display information about active network connections.
Question 806:
Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cawing?
A. RJ11
B. LC ports
C. Patch panel
D. F-type connector
Correct Answer: C
To achieve a Cat 6a certification for a company's data cabling, the patch panel needs to be tested.
A patch panel is a device that allows cables to be terminated and then connected to a switch, router, or other networking device. It is a central location for all of the incoming and outgoing cabling for a network. When certifying a Cat 6a cabling installation, the patch panel needs to be tested to ensure that it meets the standards for Cat 6a performance.
Question 807:
Which of the following physical security methods Is the MOST effective to prevent tailgating?
A. Biometrics in an access control vestibule
B. IP cameras with motion detection
C. Smart lockers with tamper protection
D. Badge readers plus a PIN pad
Correct Answer: A
Biometrics is a type of authentication that uses a person's physical characteristics, such as fingerprints, iris, or face, to verify their identity. An access control vestibule is a small room or area that separates two spaces and allows only one person to enter or exit at a time. Biometrics in an access control vestibule is the most effective physical security method to prevent tailgating, which is the unauthorized entry of a person behind another person who has legitimate access. References: Network+ Study Guide Objective 5.1: Summarize the importance of physical security controls.
Question 808:
A help desk technician is concerned that a client's network cable issues may be causing intermittent connectivity. Which of the following would help the technician determine if this is the issue?
A. Run the show interface command on the switch
B. Run the tracerouute command on the server
C. Run iperf on the technician's desktop
D. Ping the client's computer from the router
E. Run a port scanner on the client's IP address
Correct Answer: A
To determine if a client's network cable issues may be causing intermittent connectivity, the help desk technician can run the show interface command on the switch. This command allows the technician to view the status and statistics of the various interfaces on the switch, including the physical link status and the number of transmitted and received packets. If the interface is experiencing a large number of errors or dropped packets, this could indicate a problem with the network cable or with the connection between the client's device and the switch.
Question 809:
When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does this BEST represent?
A. SSO
B. Zero Trust
C. VPN
D. Role-based access control
Correct Answer: B
Question 810:
A false camera is installed outside a building to assist with physical security. Which of the following is the device assisting?
A. Detection
B. Recovery
C. Identification
D. Prevention
Correct Answer: D
The false camera is seen by people. They think it is real and this prevents them from doing something wrong.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.