CompTIA Network+ N10-008 – Question211

A network administrator installed an additional IDF during a building expansion project. Which of the following
documents need to be updated to reflect the change? (Choose two.)


A.
Data loss prevention policy
B. BYOD policy
C. Acceptable use policy
D. Non-disclosure agreement
E. Disaster recovery plan
F. Physical network diagram

Correct Answer: EF

CompTIA Network+ N10-008 – Question210

A Fortune 500 firm is deciding on the kind of data center equipment to install given its five-year budget outlook.
The Chief Information Officer is comparing equipment based on the life expectancy of different models. Which
of the following concepts BEST represents this metric?


A.
MTBF
B. MTTR
C. RPO
D. RTO

Correct Answer: A

CompTIA Network+ N10-008 – Question208

A network technician receives a report about a performance issue on a client PC that is connected to port 1/3 on a network switch. The technician observes the following configuration output from the switch:

Which of the following is a cause of the issue on port 1/3?

A.
Speed
B. Duplex
C. Errors
D. VLAN

Correct Answer: A

CompTIA Network+ N10-008 – Question207

An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices
the system is similar to another one on the network; however, the new one has an updated OS version. Which
of the following should the administrator consider updating?


A.
Management information bases
B. System baseline
C. Network device logs
D. SNMP traps

Correct Answer: B

CompTIA Network+ N10-008 – Question206

A network technician is implementing a solution that will allow end users to gain access to multiple applications
after logging on. Which of the following authentication methods would allow this type of access?


A.
SSO
B. LDAP
C. EAP
D. TACACS+

Correct Answer: A

CompTIA Network+ N10-008 – Question204

A network engineer needs to reduce the overhead of file transfers. Which of the following configuration
changes would accomplish that goal?


A.
Link aggregation
B. Jumbo frames
C. Port security
D. Flow control
E. Lower FTP port

Correct Answer: B

CompTIA Network+ N10-008 – Question203

A network attack caused a network outage by wiping the configuration and logs of the border firewall. Which of
the following sources, in an investigation to determine how the firewall was compromised, can provide the
MOST detailed data?


A.
Syslog server messages
B. MIB of the attacked firewall
C. Network baseline reports
D. NetFlow aggregate data

Correct Answer: D