Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?
A. Virus
B. Botnet
C. ARP spooling
D. DOoS
Correct Answer: D
DDoS (Distributed Denial of Service) attack is an attack vector in which a large number of devices send access requests to a website, making it unavailable to respond. In a DDoS attack, the devices used to send the access requests are often part of a botnet, which is a network of compromised devices that are controlled by a single entity. The goal of a DDoS attack is to overwhelm the website with traffic, making it difficult or impossible for legitimate users to access the site. Other attack vectors such as viruses, ARP spoofing, or individual devices sending access requests are not likely to cause the same level of disruption as a DDoS attack.
Question 822:
A company's data center is hosted at its corporate office to ensure greater control over the security of sensitive data. During times when there are increased workloads, some of the company's non-sensitive data is shifted to an external cloud provider. Which of the following cloud deployment models does this describe?
A. Hybrid
B. Community
C. Public
D. Private
Correct Answer: A
Question 823:
A lab environment hosts Internet-facing web servers and other experimental machines, which technicians use for various tasks A technician installs software on one of the web servers to allow communication to the company's file server, but it is unable to connect to it Other machines in the building are able to retrieve files from the file server. Which of the following is the MOST likely reason the web server cannot retrieve the files, and what should be done to resolve the problem?
A. The lab environment's IDS is blocking the network traffic 1 he technician can whitelist the new application in the IDS
B. The lab environment is located in the DM2, and traffic to the LAN zone is denied by default. The technician can move the computer to another zone or request an exception from the administrator.
C. The lab environment has lost connectivity to the company router, and the switch needs to be rebooted. The technician can get the key to the wiring closet and manually restart the switch
D. The lab environment is currently set up with hubs instead of switches, and the requests are getting bounced back The technician can submit a request for upgraded equipment to management.
Correct Answer: B
The lab environment is located in the DMZ, and traffic to the LAN zone is denied by default. This is the most likely reason why the web server cannot retrieve files from the file server, and the technician can either move the computer to another zone or request an exception from the administrator to resolve the problem. A DMZ (Demilitarized Zone) is a network segment that separates the internal network (LAN) from the external network (Internet). It usually hosts public-facing servers such as web servers, email servers, or FTP servers that need to be accessed by both internal and external users. A firewall is used to control the traffic between the DMZ and the LAN zones, and usually denies traffic from the DMZ to the LAN by default for security reasons. Therefore, if a web server in the DMZ needs to communicate with a file server in the LAN, it would need a special rule or permission from the firewall administrator.
Two users on a LAN establish a video call. Which of the following OSI model layers ensures the initiation coordination, and termination of the call?
A. Session
B. Physical
C. Transport
D. Data link
Correct Answer: A
The OSI model layer that ensures the initiation, coordination, and termination of a video call is the session layer. The session layer is responsible for establishing, maintaining, and terminating communication sessions between two devices on a network.
Question 825:
Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.)
A. They used the wrong type of fiber transceiver.
B. Incorrect TX/RX polarity exists on the link
C. The connection has duplexing configuration issues.
D. Halogen light fixtures are causing interference.
E. One of the technicians installed a loopback adapter.
F. The RSSI was not strong enough on the link
Correct Answer: AB
Question 826:
A technician is connecting a Cat 6 Ethernet cable to a device mat only has LC poos. Which of the following win the technician MOST likely use to accomplish this task?
A. A bridge
B. A media converter
C. A repeater
D. A router
Correct Answer: B
The technician would MOST likely use a media converter to connect the Cat 6 Ethernet cable to a device that only has LC ports.
Media converters are devices that convert one type of network media to another, such as converting fiber optic signals to copper Ethernet signals. In this case, the media converter would convert the Cat 6 Ethernet cable signals to the fiber
optic signals required by the device's LC ports.
Question 827:
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?
A. Elastic computing
B. Scalable networking
C. Hybrid deployment
D. Multitenant hosting
Correct Answer: A
Elastic computing involves the allocation of resources on demand, so that the resources available to a virtual web server can be increased or decreased as needed in order to handle varying levels of traffic or demand. This can help to ensure that the web server has the resources it needs to handle any workload, without wasting resources when demand is low.
Scalable networking refers to the ability of a network to expand or contract as needed in order to meet changing demand. Hybrid deployment involves the use of a combination of on-premises and cloud-based resources. Multitenant hosting involves the use of a single instance of a software application to serve multiple customers, each with their own customized version of the application.
Which of the following routing protocols is generally used by major ISPs for handling large-scale internet traffic?
A. RIP
B. EIGRP
C. OSPF
D. BGP
Correct Answer: D
BGP (Border Gateway Protocol) is generally used by major ISPs for handling large-scale internet traffic. BGP is a routing protocol that is used to exchange routing and reachability information between networks. It is particularly well-suited for handling internet traffic, as it can scale to handle a large number of routes and is capable of routing traffic across multiple Autonomous Systems (ASes). BGP is the main routing protocol used by major ISPs to exchange routing information with each other and with other networks on the internet. Other routing protocols such as RIP, EIGRP, and OSPF may be used in smaller networks or for specific purposes, but are not typically used by major ISPs for handling large-scale internet traffic
Question 829:
An administrator would like to allow Windows clients from outside me office to access workstations without using third-party software. Which or the following access methods would meet this requirement?
A. Remote desktop gateway
B. Spit tunnel
C. Site-to-site VPN
D. VNC
Correct Answer: A
To allow Windows clients from outside the office to access workstations without using third-party software, the administrator can use the Remote Desktop Protocol (RDP). RDP is a built-in feature of the Windows operating system that allows users to remotely connect to and control other Windows computers over a network connection.
To use RDP, the administrator will need to enable the Remote Desktop feature on the workstations that need to be accessed, and ensure that the appropriate firewall rules are in place to allow RDP traffic to pass through. The administrator will also need to provide the remote users with the necessary credentials to access the workstations.
Once RDP is set up and configured, the remote users can use the Remote Desktop client on their own computers to connect to the workstations and access them as if they were physically present in the office. This allows the administrator to provide remote access to the workstations without the need for any additional software or third-party tools.
Question 830:
An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure?
A. Fiber
B. Leased line
C. Satellite
D. Metro optical
Correct Answer: C
Satellite internet is a reliable alternative when cable and DSL services are unavailable in remote areas. With satellite internet, the user can connect to the internet via a satellite signal and a satellite dish. This is often the most cost-effective and practical option for remote areas where other types of internet services are not feasible due to distance or lack of infrastructure.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.