comptia n10-008 practice test

Exam Title: CompTIA Network+ (N10-008)

Last update: Dec 02 ,2025
Question 1

After the A record of a public website was updated, some visitors were unable to access the website. Which of the following should be adjusted to address the issue?

  • A. TTL
  • B. MX
  • C. TXT
  • D. SOA
Answer:

a

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue?

  • A. Adjust the proper logging level on the new firewall.
  • B. Tune the filter for logging the severity level on the syslog server.
  • C. Activate NetFlow traffic between the syslog server and the firewall.
  • D. Restart the SNMP service running on the syslog server.
Answer:

a

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Choose two.)

  • A. SNMPv3
  • B. SSH
  • C. Telnet
  • D. IPSec
  • E. ESP
  • F. Syslog
Answer:

bd

vote your answer:
A
B
C
D
E
F
A 0 B 0 C 0 D 0 E 0 F 0
Comments
Question 4

The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

  • A. Captive portal
  • B. Two-factor authentication
  • C. Complex passwords
  • D. Geofencing
  • E. Role-based access
  • F. Explicit deny
Answer:

bc

vote your answer:
A
B
C
D
E
F
A 0 B 0 C 0 D 0 E 0 F 0
Comments
Question 5

A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?

  • A. ipconfig
  • B. netstat
  • C. tracert
  • D. ping
Answer:

c

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring?

  • A. Jitter
  • B. Bandwidth
  • C. Latency
  • D. Giants
Answer:

b

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which of the following attacks MOST likely utilizes a botnet to disrupt traffic?

  • A. DDoS
  • B. Deauthentication
  • C. Social engineering
  • D. Ransomware
  • E. DNS poisoning
Answer:

a

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 8

Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 p.m. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?

  • A. Changing the VLAN of the web server
  • B. Changing the server's IP address
  • C. Implementing an ACL
  • D. Installing a rule on the firewall connected to the web server
Answer:

c

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

  • A. 2.4GHz
  • B. 5GHz
  • C. 6GHz
  • D. 900MHz
Answer:

b

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?

  • A. Mandatory access control
  • B. User-based permissions
  • C. Role-based access
  • D. Least privilege
Answer:

c

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 56
Viewing questions 1-10 out of 565
Go To
page 2