The cybersecurity department needs to monitor historical IP network traffic on the WAN interface of the outside router without installing network sensors. Which of the following would be best to allow the department to complete this task?
A. Enabling NetFlow on the interface
B. Enabling SSH on the interface
C. Enabling SNMP on the interface
D. Enabling 802.1Q on the interface
An attack is redirecting traffic from network hosts by changing their assigned DNS server. None of the hosts have static IP addresses, and the rogue DNS server was assigned automatically during the hosts' lease renewal for the network configuration. Which of the following should be implemented to prevent this type of attack from occurring again?
A. DHCP snooping
B. Port security
C. 802.1X authentication
D. MAC filtering
A network administrator wants all outgoing traffic to the internet to flow through a single device for web content inspection. Which of the following devices is the most appropriate?
A. VPN headend
B. Router
C. Proxy server
D. Load balancer
A packet has a destination address that is located outside of the local network. Which of the following should be used to route this packet out of the local network?
A. DNS server
B. Load balancer
C. DHCP server
D. Default gateway
A network technician plugged a workstation in to a network device. When the technician turned on the workstation, it was not connected at full duplex. Which of the following devices was the workstation connected to?
A. Media converter
B. Hub
C. Bridge
D. Layer 3 switch
A user is trying to map a network fileshare to a local drive and needs to open a firewall port for this traffic. Which of the following ports needs to be opened to accomplish this task?
A. 389
B. 445
C. 514
D. 636
Which of the following OSI layers is ICMP a part of?
A. Application
B. Session
C. Network
D. Transport
Outside traffic from local subnet is using an infernal web server. A technician must apply best practices to ensure outside users can only access the web server and not any other internal resources. Which of the following should the technician do to best addresses the issue?
A. Move the web server to a perimeter network.
B. Connect the web server to the WAN.
C. Connect the server directly to a second port on the cable modem.
D. Block incoming port 80 and port 443 traffic to the server.
A technician is working on a solution to isolate traffic between specific types of devices, servers, and users on the internal firewall. Which of the following traffic flows should be isolated?
A. East-west
B. Access/edge
C. Core/distribution
D. North-south
A network engineer performed a detailed network analysis. The engineer has decided to update the STP port cost in order to optimize the network. Which of the following processes should the engineer use to gain approval for the network optimization?
A. Business continuity
B. Disaster recovery
C. Incident response
D. Change management
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.