A technician reviews a network performance report and finds a high level of collisions happening on the network. At which of the following layers of the OSI model would these collisions be found?
A. Layer 1
B. Layer 3
C. Layer 4
D. Layer 7
An attacker is using an unknown vulnerability that allows malicious actors to utilize the print spooler to gain system privileges on a computer. Which of the following is this scenario an example of?
A. Honeypot
B. Zero-day attack
C. Internal threat
D. External threat
Which of the following is the first step to troubleshoot a network issue?
A. Identify the problem.
B. Document the findings.
C. Establish a theory of probable cause.
D. Test the theory to determine the cause.
Which of the following is most closely associated with attempting to actively prevent network intrusion?
A. IDS
B. Firewall
C. IPS
D. VPN
A network administrator connects two unmanaged switches together with a straight-through Ethernet cable. The administrator reviews the connection and notices that the uplinks are not on. Which of the following options offers the best solution for the issue?
A. A rollover cable needs to be used.
B. The switches needs to be rebooted after connecting.
C. The ports need to be enabled.
D. The ports need the IP address configured.
E. A crossover cable needs to be used.
A network administrator has been assigned to a team that is currently troubleshooting a large-scale outage. The network administrator makes some configuration changes to an on-premises router to see if the link comes up. Which of the following troubleshooting stages is described in this scenario?
A. Establish a theory of probable cause.
B. Verify full system functionality
C. Establish a plan of action to resolve the problem.
D. Test the theory to determine the cause.
A network administrator is investigating a network connectivity issue. The administrator runs a command to view the status of the network cards. The administrator receives the following output:
RX packets:45332 errors: 45332 dropped:0 overruns 0 frame:0
Which of the following should the administrator troubleshoot based on the output?
A. Physical layer components
B. VLAN tagging configuration
C. Buffers on the card filling up
D. TCP/IP address settings
Which of the following records is the main type in a reverse DNS lookup zone?
A. PTR
B. AAAA
C. CNAME
D. TXT
Which of the following policies would be best to refer to when trying to prevent a disgruntled employee from copying sensitive materials off company servers after termination?
A. Incident response plan
B. Offboarding
C. Change management
D. Acceptable use
Which of the following routing protocols uses attributes to select the best path?
A. EIGRP
B. BGP
C. OSPF
D. RIP
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.