CompTIA Network+ N10-008 – Question352

Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an
application is not affected by the use of buffering but is heavily impacted by packet drops?


A.
Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification

Correct Answer: B

CompTIA Network+ N10-008 – Question351

A technician is trying to install a VoIP phone, but the phone is not turning on. The technician checks the cable
going from the phone to the switch, and the cable is good. Which of the following actions is needed for this
phone to work?


A.
Add a PoE injector.
B. Enable MDIX.
C. Use a crossover cable.
D. Reconfigure the port.

Correct Answer: A

CompTIA Network+ N10-008 – Question350

Classification using labels according to information sensitivity and impact in case of unauthorized access or
leakage is a mandatory component of:


A.
an acceptable use policy.
B. a memorandum of understanding.
C. data loss prevention.
D. a non-disclosure agreement.

Correct Answer: C

CompTIA Network+ N10-008 – Question349

A network administrator is preparing answers for an annual risk assessment that is required for compliance
purposes. Which of the following would be an example of an internal threat?


A.
An approved vendor with on-site offices
B. An infected client that pulls reports from the firm
C. A malicious attacker from within the same country
D. A malicious attacker attempting to socially engineer access into corporate offices

Correct Answer: C

CompTIA Network+ N10-008 – Question346

A company's primary ISP is experiencing an outage. However, the network administrator notices traffic
continuing to flow through a secondary connection to the same ISP. Which of the following BEST describes this
configuration?


A.
Diverse paths
B. Load balancing
C. Multipathing
D. Virtual Router Redundancy Protocol

Correct Answer: A

CompTIA Network+ N10-008 – Question345

A network engineer is investigating issues on a Layer 2 switch. The department typically shares a switchport
during meetings for presentations, but after the first user shares, no other users can connect. Which of the
following is MOST likely related to this issue?


A.
Spanning Tree Protocol is enabled on the switch.
B. VLAN trunking is enabled on the switch.
C. Port security is configured on the switch.
D. Dynamic ARP inspection is configured on the switch.

Correct Answer: C

Explanation:

Reference: https://www.computernetworkingnotes.com/ccna-study-guide/switchport…
with-examples.html#:~:text=To%20configure%20port%20security%20we,move%20in%20Privilege%20Exec%
20mode

CompTIA Network+ N10-008 – Question344

A client who shares office space and an IT closet with another company recently reported connectivity issues
throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT
closet. Which of the following security techniques would BEST secure the physical networking equipment?


A.
Disabling unneeded switchports
B. Implementing role-based access
C. Changing the default passwords
D. Configuring an access control list

Correct Answer: B

CompTIA Network+ N10-008 – Question343

An administrator would like to allow Windows clients from outside the office to access workstations without
using third-party software. Which of the following access methods would meet this requirement?


A.
Remote desktop gateway
B. Split tunnel
C. Site-to-site VPN
D. VNC

Correct Answer: A