A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
A. SSO
B. LDAP
C. EAP
D. TACACS+
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?
A. Client-to-site VPN
B. Clientless VPN
C. RDP
D. Site-to-site VPN
E. SSH
An auditor assessing network best practices was able to connect a rogue switch into a network Jack and get network connectivity. Which of the following controls would BEST address this risk?
A. Activate port security on the switchports providing end user access.
B. Deactivate Spanning Tree Protocol on network interfaces that are facing public areas.
C. Disable Neighbor Resolution Protocol in the Layer 2 devices.
D. Ensure port tagging is in place for network interfaces in guest areas
Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO)
A. Deauthentication attack
B. Malware infection
C. IP spoofing
D. Firmware corruption
E. Use of default credentials
F. Dictionary attack
Which of the following would be used when connecting devices that have different physical characteristics?
A. A proxy server
B. An industrial control system
C. A load balancer
D. A media converter
A network client is trying to connect to the wrong TCP port. Which of the following responses would the client MOST likely receive?
A. RST
B. FIN
C. ICMP Time Exceeded
D. Redirect
Which of the following can be used to store various types of devices and provide contactless delivery to users?
A. Asset tags
B. Biometrics
C. Access control vestibules
D. Smart lockers
Which of the following protocols is widely used in large-scale enterprise networks to support complex networks with multiple routers and balance traffic load on multiple links?
A. OSPF
B. RIPv2
C. QoS
D. STP
A company wants to add a local redundant data center to its network in case of failure at its primary location. Which of the following would give the LEAST amount of redundancy for the company's network?
A. Cold site
B. Hot site
C. Cloud site
D. Warm site
A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?
A. Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.