Which of the following is a characteristic of the application layer?
- A. It relies upon other layers for packet delivery
- B. It checks independently for packet loss
- C. It encrypts data in transit
- D. It performs address translation
Free N10-008 sample questions for the CompTIA Network+ exam. No account required: study at your own pace.
Want an interactive quiz? Take the full N10-008 practice testLooking for more? Click here to get the full PDF with 823+ practice questions for $10 for offline study and deeper preparation.
Which of the following is a characteristic of the application layer?
Which of the following describes a network in which users and devices need to mutually authenticate before any network resource can be accessed?
A network administrator needs to implement routing capabilities in a hypervisor. Which of the following should the administrator most likely implement?
Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers. However, when they connect the fibers to the router interface, the link does not connect. Which of the following would explain the issue? (Choose two.)
A network technician added a new workstation to the network and needs to make a custom, shielded cable that is 492ft (150m) with both ends wired to TIA/EIA-568A standards. The workstation is not establishing a link to the switchport. Which of the following is the cause of the issue?
To access production applications and data, developers must first connect remotely to a different server. From there, the developers are able to access production data. Which of the following does this BEST represent?
Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?
A network administrator is concerned about a rainbow table being used to help access network resources. Which of the following must be addressed to reduce the likelihood of a rainbow table being effective?
Which of the following would be BEST to use to detect a MAC spoofing attack?
A network administrator corrected a rule on a misconfigured firewall. Which of the following should the administrator do NEXT when applying the network troubleshooting methodology?
A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST?
A network administrator is reviewing the network device logs on a syslog server. The messages are normal, but the time stamps on the messages are incorrect. Which of the following actions should the administrator take to ensure the log message time stamps are correct?
Which of the following are environmental factors that should be considered when installing equipment in a building? (Choose two.)
A company has multiple offices around the world. The computer rooms in some office locations are too warm. Dedicated sensors are in each room, but the process of checking each sensor takes a long time. Which of the following options can the company put in place to automate temperature readings with internal resources?
A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access?
A network technician is troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration?
A network administrator is preparing new switches that will be deployed to support a network extension project. The lead network engineer has already provided documentation to ensure the switches are set up properly. Which of the following did the engineer most likely provide?
A network requirement calls for segmenting departments into different networks. The campus network is set up with users of each department in multiple buildings. Which of the following should be configured to keep the design simple and efficient?
Which of the following routing protocols has routes that are classified with an administrative distance of 110?
A technician is contracted to install a redundant cluster of devices from the ISP in case of hardware failure within the network. Which of the following would provide BEST redundant solution in Layer 2 devices?
Download the complete N10-008 study bundle with 823+ questions in a single printable PDF.