N10-008 Dumps

N10-008 Free Practice Test

CompTIA N10-008: CompTIA Network+Exam

QUESTION 6

- (Exam Topic 3)
A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of the following sources, in an investigation to determine how the firewall was compromised, can provide the MOST detailed data?

Correct Answer: A

QUESTION 7

- (Exam Topic 3)
An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules?

Correct Answer: A
"Use private VLANs: Also known as port isolation, creating a private VLAN is a method of restricting switch ports (now called private ports) so that they can communicate only with a particular uplink. The private VLAN usually has numerous private ports and only one uplink, which is usually connected to a router, or firewall."

QUESTION 8

- (Exam Topic 3)
A network administrator views a network pcap and sees a packet containing the following:
N10-008 dumps exhibit
Which of the following are the BEST ways for the administrator to secure this type of traffic? (Select TWO).

Correct Answer: CD

QUESTION 9

- (Exam Topic 3)
A network technician recently installed 35 additional workstations. After installation, some users are unable to access network resources. Many of the original workstations that are experiencing the network access issue were offline when the new workstations were turned on. Which of the following is the MOST likely cause of this issue?

Correct Answer: B

QUESTION 10

- (Exam Topic 3)
Which of the following provides guidance to an employee about restricting non-business access to the company's videoconferencing solution?

Correct Answer: A
An acceptable use policy (AUP) is a set of rules that outline the proper and improper use of an organization's resources, such as its videoconferencing solution. An AUP can provide guidance to employees about what is expected of them when using the organization's videoconferencing solution, including restricting non-business
access to it.