A customer wants to install a network that can utilize 802.1X authentication protocols. The customer uses a Windows laptop and does not want to install any additional software; therefore, a technician needs to configure the network to work with what is available natively. Which of the following should the technician configure for the 802.1X network?
A. PEAP
B. LDAP
C. EAP-FAST
D. NAC
Which of the following accurately describes a warm site in datacenter disaster recovery?
A. An online standby datacenter that is fully equipped without company data
B. A backup datacenter location that is ready for equipment to be installed
C. A backup datacenter location that is fully equipped bot not online
D. An online, standby datacenter that is fully equipped with all company data
A technician is planning a network wiring installation and must ensure all cabling meets the installation requirements for air-handling spaces in the celling in case of a fire. Which of the following characteristics does plenum cabling have to meet this requirement?
A. Outer jacket made of PVC
B. Outer jacket with metal shielding
C. Low-smoke material jacket
D. Fiber-optic glass core
A network technician installs a new Layer 3 switch in the accounting office. Which of the following should the technician configure on the switch to enhance network security?
A. Spanning tree
B. Access control list
C. QoS settings
D. Duplex settings
Which of the following is BEST described as a technology that allows for the segmentation of networks into different broadcast domains throughout the network?
A. DMZ
B. VLAN
C. VLSM
D. CSMA
A network technician is configuring a new firewall for a company with the necessary access requirements to be allowed through the firewall. Which of the following should be applied as the LAST rule in the firewall?
A. Secure SNMP
B. Port security
C. Implicit deny
D. DHCP snooping
A Chief Information Officer (CIO) wants to control the category of sites that employees access when using the Internet web browser. This objective must be achieved to be compliant with corporate policy and avoid some security and legal risks. Which of the following devices would BEST accomplish this task? (Choose two.)
A. IDS
B. Proxy server
C. Content filter
D. Virtual firewall
E. Hypervisor
F. Load balancer
An administrator needs to connect to a server to install security patches. The administrator requests that port 3389 be allowed through the firewall. Which of the following access methods is the administrator looking to use?
A. SSH
B. Telnet
C. SFTP
D. RDP
A network administrator has discovered a low-end managed switch connected to the company's LAN. While reading about the device's specifications on the manufacturer's website, the administrator discovers the switch does not support a command-line interface for administration. Which of the following remote access methods should the administrator use to log in to the switch?
A. Install a VNC plugin on the web browser.
B. Connect to the HTTPS management interface.
C. Replace the managed switch with an unmanaged switch.
D. Establish an SSH session.
A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same equipment?
A. MIMO
B. TKIP
C. LTE
D. SSID
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.