N10-008 Practice Questions Free – 50 Exam-Style Questions to Sharpen Your Skills
Are you preparing for the N10-008 certification exam? Kickstart your success with our N10-008 Practice Questions Free – a carefully selected set of 50 real exam-style questions to help you test your knowledge and identify areas for improvement.
Practicing with N10-008 practice questions free gives you a powerful edge by allowing you to:
- Understand the exam structure and question formats
- Discover your strong and weak areas
- Build the confidence you need for test day success
Below, you will find 50 free N10-008 practice questions designed to match the real exam in both difficulty and topic coverage. They’re ideal for self-assessment or final review. You can click on each Question to explore the details.
An administrator is working with the local ISP to troubleshoot an issue. Which of the following should the ISP use to define the furthest point on the network that the administrator is responsible for troubleshooting?
A. Firewall
B. A CSU/DSU
C. Demarcation point
D. Router
E. Patch panel
A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.)
A. Jitter
B. Speed mismatch
C. QoS misconfiguration
D. Protocol mismatch
E. CRC errors
F. Encapsulation errors
A systems administrator wants to use the least amount of equipment to segment two departments that have cables terminating in the same room. Which of the following would allow this to occur?
A. A load balancer
B. A proxy server
C. A Layer 3 switch
D. A hub
E. A Layer 7 firewall
A technician manages a DHCP scope but needs to allocate a portion of the scope's subnet for statically assigned devices. Which of the following DHCP concepts would be BEST to use to prevent IP address conflicts?
A. Dynamic assignment
B. Exclusion range
C. Address reservation
D. IP helper
Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?
A. EIGRP
B. BGP
C. IPv6
D. MPLS
Which of the following is the physical topology for an Ethernet LAN?
A. Bus
B. Ring
C. Mesh
D. Star
A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?
A. Site-to-site
B. Secure Shell
C. In-band management
D. Remote desktop connection
The following instructions were published about the proper network configuration for a videoconferencing device: "configure a valid static RFC1918 address for your network. Check the option to use a connection over NAT." Which of the following is a valid IP address configuration for the device?
A. FE80::1
B. 100.64.0.1
C. 169.254.1.2
D. 172.19.0.2
E. 224.0.0.12
The power company noti es a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?
A. Redundant power supplies
B. Uninterruptible power supply
C. Generator
D. Power distribution unit
Which of the following can be used to store various types of devices and provide contactless delivery to users?
A. Asset tags
B. Biometrics
C. Access control vestibules
D. Smart lockers
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack
A network technician recently installed 35 additional workstations. After installation, some users are unable to access network resources. Many of the original workstations that are experiencing the network access issue were offline when the new workstations were turned on. Which of the following is the MOST likely cause of this issue?
A. Incorrect VLAN setting
B. insuficient DHCP scope
C. Improper NIC setting
D. Duplicate IP address
A user is having difficulty with video conferencing and is looking for assistance. Which of the following would BEST improve performance?
A. Packet shaping
B. Quality of service
C. Port mirroring
D. Load balancing
Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue?
A. Install load balancers
B. Install more switches
C. Decrease the number of VLANs
D. Reduce the lease time
Which of the following attacks MOST likely utilizes a botnet to disrupt traffic?
A. DDoS
B. Deauthentication
C. Social engineering
D. Ransomware
E. DNS poisoning
A help desk technician is troubleshooting a Windows server named SQL.local and wants to check which port a specific application is running on. Which of the following commands should the technician run?
A. dig
B. traceroute
C. arp
D. netstat
A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSI
A. However, all users share the company’s network hardware. The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.
The following settings are common to all network configurations:
Which of the following actions would MOST likely reduce this issue? (Choose two.)
B. Change to WPA encryption.
C. Change the DNS server to 10.1.10.1.
D. Change the default gateway to 10.0.0.1.
E. Change the DHCP scope end to 10.1.10.250.
F. Disable AP isolation.
G. Change the subnet mask to 255.255.255.192.
H. Reduce the DHCP lease time to four hours.
A company's VoIP phone connection is cutting in and out. Which of the following should be configured to resolve this issue?
A. 802.1Q tagging
B. Jumbo frames
C. Native VLAN
D. Link aggregation
Which of the following is the MOST cost-effective alternative that provides proper cabling and supports gigabit Ethernet devices?
A. Twisted cable with a minimum Cat 5e certi cation
B. multimodefiber with an SC connector
C. Twinaxial cabling using an F-type connector
D. Cable termination using TIA/EIA-568-B
While troubleshooting a network, a VoIP systems engineer discovers a significant inconsistency in the amount of time required for data to reach its destination and return. Which of the following terms BEST describes this issue?
A. Bandwidth
B. Latency
C. Jitter
D. Throughput
A Fortune 500 rm is deciding on the kind of data center equipment to install given its five-year budget outlook. The Chief Information officer is comparing equipment based on the life expectancy of different models. Which of the following concepts BEST represents this metric?
A. MTBF
B. MTTR
C. RPO
D. RTO
After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes. Which of the following would be BEST to use for these notifications?
A. Traps
B. MIB
C. NetFlow
D. Syslog
Which of the following security controls indicates unauthorized hardware modifications?
A. Biometric authentication
B. Media device sanitization
C. Change management policy
D. Tamper-evident seals
The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
A. Captive portal
B. Two-factor authentication
C. Complex passwords
D. Geofencing
E. Role-based access
F. Explicit deny
A new cabling certi cation is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certi ed) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?
A. CSMA/CD
B. LACP
C. PoE+
D. MDIX
Which of the following DNS records works as an alias to another record?
A. AAAA
B. CNAME
C. MX
D. SOA
A technician uses a badge to enter a security checkpoint on a corporate campus. An unknown individual quickly walks in behind the technician without speaking. Which of the following types of attacks did the technician experience?
A. Tailgating
B. Evil twin
C. On-path
D. Piggybacking
A network engineer needs to reduce the overhead of file transfers. Which of the following configuration changes would accomplish that goal?
A. Link aggregation
B. Jumbo frames
C. Port security
D. Flow control
E. Lower FTP port
A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?
A. 2.4GHz
B. 5GHz
C. 6GHz
D. 900MHz
A network administrator determines that even when optimal wireless coverage is configured, the network users still report constant disconnections. After troubleshooting, the administrator determines that moving from one location to another causes the disconnection. Which of the following settings should provide better network stability?
A. Client association timeout
B. RSSI roaming threshold
C. RF attenuation ratio
D. EIRP power setting
A packet is assigned a value to ensure it does not traverse a network inde nitely. Which of the following BEST represents this value?
A. Zero Trust
B. Planned obsolescence
C. Time to live
D. Caching
A fiber patch cable, which was being stored in an unsecure telecommunications closet with janitorial supplies, was damaged and caused an outage. A network technician replaced the broken cable with a new cable from a sealed bag. However, this solution did not resolve the outage. Which of the following is the MOST likely explanation?
A. Incorrect pinout
B. Incorrect transceivers
C. Reversed transmit and receive
D. Dirty optical cables
A network requirement calls for the network traffic of a specific department within a campus network to be monitored. The network has users from each department located in multiple buildings. Which of the following should be configured to meet this requirement? (Choose two.)
A. MDIX
B. 802.1Q
C. Jumbo frames
D. Port mirroring
E. Flow control
F. LACP
A network resource was accessed by an outsider as a result of a successful phishing campaign. Which of the following strategies should be employed to mitigate the effects of phishing?
A. Multifactor authentication
B. Single sign-on
C. RADIUS
D. VPN
A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would BEST describe this setup?
A. Bus
B. Spine-and-leaf
C. Hub-and-spoke
D. Mesh
A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WAN connection available. Which of the following would be MOST affected by this statistic?
A. A VoIP sales call with a customer
B. An in-office video call with a coworker
C. Routing table from the ISP
D. Firewall CPU processing time
A network administrator is configuring logging on an edge switch. The requirements are to log each time a switch port goes up or down. Which of the following logging levels will provide this information?
A. Warnings
B. notifications
C. Alert
D. Errors
A network administrator is designing a wireless network. The administrator must ensure a rented office space has a su cient signal. Reducing exposure to the wireless network is important, but it is secondary to the primary objective. Which of the following would MOST likely facilitate the correct accessibility to the Wi-Fi network?
A. Polarization
B. Channel utilization
C. Channel bonding
D. Antenna type
E. MU-MIMO
Which of the following ports is a secure protocol?
A. 20
B. 23
C. 443
D. 445
A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue?
A. ipconfig
B. netstat
C. tracert
D. ping
The management team needs to ensure unnecessary modifications to the corporate network are not permitted and version control is maintained. Which of the following documents would BEST support this?
A. An incident response plan
B. A business continuity plan
C. A change management policy
D. An acceptable use policy
An office area contains two PoE-enabled WAPs. After the area was remodeled, new cable uplinks were installed in the ceiling above the uorescent lights. However, after the WAPs were reconnected, users reported slowness and application errors. An intern reviewed the network and discovered a lot of CRC errors. A network engineer reviewed the intern's work and realized UTP cabling was used. Which of the following is the MOST likely cause of the CRC errors?
A. insuficient power at the antennas
B. PoE and UTP incompatibility
C. Electromagnetic interference
D. Wrong cable pinout
A company is opening a new building on the other side of its campus. The distance from the closest building to the new building is 1,804ft (550m). The company needs to connect the networking equipment in the new building to the other buildings on the campus without using a repeater. Which of the following transceivers should the company use?
A. 10GBASE-SW
B. 10GBASE-LR
C. 10GBASE-LX4 over multimodefiber
D. 10GBASE-SR
A new office space is being designed. The network switches are up, but no services are running yet. A network engineer plugs in a laptop configured as a DHCP client to a switch. Which of the following IP addresses should be assigned to the laptop?
A. 10.1.1.1
B. 169.254.1.128
C. 172.16.128.128
D. 192.168.0.1
A network administrator needs to provide remote clients with access to an internal web application. Which of the following methods provides the HIGHEST exibility and compatibility while encrypting only the connection to the web application?
A. Clientless VPN
B. Virtual desktop
C. Virtual network computing
D. mGRE tunnel
A coffee shop owner hired a network consultant to provide recommendations for installing a new wireless network. The coffee shop customers expect high speeds even when the network is congested. Which of the following standards should the consultant recommend?
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
Which of the following attacks becomes more effective because of global leakages of users' passwords?
A. Dictionary
B. Brute-force
C. Phishing
D. Deauthentication
A technician notices that equipment is being moved around and misplaced in the server room, even though the room has locked doors and cabinets. Which of the following would be the BEST solution to identify who is responsible?
A. Install motion detection.
B. Install cameras.
C. Install tamper detection.
D. Hire a security guard.
Which of the following would be used to expedite MX record updates to authoritative NSs?
A. UDP forwarding
B. DNS caching
C. Recursive lookup
D. Time to live
Which of the following architectures would allow the network-forwarding elements to adapt to new business requirements with the least amount of operating effort?
A. Software-defined network
B. Spine and leaf
C. Three-tier
D. Backbone
Free Access Full N10-008 Practice Questions Free
Want more hands-on practice? Click here to access the full bank of N10-008 practice questions free and reinforce your understanding of all exam objectives.
We update our question sets regularly, so check back often for new and relevant content.
Good luck with your N10-008 certification journey!