N10-008 Exam Question 76

Which of the following is used to track and document various types of known vulnerabilities?
  • N10-008 Exam Question 77

    A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?
  • N10-008 Exam Question 78

    A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?
  • N10-008 Exam Question 79

    A SaaS provider has decided to leave an unpatched VM available via a public DMZ port. With which of the following concepts is this technique MOST closely associated?
  • N10-008 Exam Question 80

    A technician wants to monitor and provide traffic segmentation across the network. The technician would like to assign each department a specific identifier. Which of the following will the technician MOST likely use?