CompTIA N10-008 CompTIA Network+Exam Online Training
CompTIA N10-008 Online Training
The questions for N10-008 were last updated at Jan 28,2025.
- Exam Code: N10-008
- Exam Name: CompTIA Network+Exam
- Certification Provider: CompTIA
- Latest update: Jan 28,2025
A branch of a company recently switched to a new ISP. The network engineer was given a new IP range to assign.
The ISP assigned 196.26.4.0/26, and the branch gateway router now has the following configurations on the interface that peers to the ISP:
The network engineer observes that all users have lost Internet connectivity.
Which of the following describes the issue?
- A . The incorrect subnet mask was configured
- B . The incorrect gateway was configured
- C . The incorrect IP address was configured
- D . The incorrect interface was configured
Within the realm of network security, Zero Trust:
- A . prevents attackers from moving laterally through a system.
- B . allows a server to communicate with outside networks without a firewall.
- C . block malicious software that is too new to be found in virus definitions.
- D . stops infected files from being downloaded via websites.
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
- A . PaaS
- B . IaaS
- C . SaaS
- D . Disaster recovery as a Service (DRaaS)
Which of the following factors should be considered when evaluating a firewall to protect a datacenter’s east-west traffic?
- A . Replication traffic between an on-premises server and a remote backup facility
- B . Traffic between VMs running on different hosts
- C . Concurrent connections generated by Internet DDoS attacks
- D . VPN traffic from remote offices to the datacenter’s VMs
You are tasked with verifying the following requirements are met in order to ensure network security.
Requirements:
Datacenter
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage
Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic Building A
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage
Provide devices to support 5 additional different office users Add an additional mobile user
Replace the Telnet server with a more secure solution
Screened subnet
Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage
Provide a server to handle external 80/443 traffic
Provide a server to handle port 20/21 traffic
INSTRUCTIONS
Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.
Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Which of the following is used to prioritize Internet usage per application and per user on the network?
- A . Bandwidth management
- B . Load balance routing
- C . Border Gateway Protocol
- D . Administrative distance
A network administrator needs to query the NSs for a remote application.
Which of the following commands would BEST help the administrator accomplish this task?
- A . dig
- B . arp
- C . show interface
- D . hostname
Which of the following would MOST likely be used to review previous upgrades to a system?
- A . Business continuity plan
- B . Change management
- C . System life cycle
- D . Standard operating procedures
A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch.
Which of the following should the technician utilize for the switch?
- A . MIB
- B . Trap
- C . Syslog
- D . Audit log
A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?
- A . The network device is not configured to log that level to the syslog server
- B . The network device was down and could not send the event
- C . The syslog server is not compatible with the network device
- D . The syslog server did not have the correct MIB loaded to receive the message