Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Network + N10-008 Practice Exam 2024/Latest Update/ 175 Questions and Correct Answers/Verified

Rating
-
Sold
-
Pages
22
Grade
A+
Uploaded on
24-04-2024
Written in
2023/2024

Network + N10-008 Practice Exam 2024/Latest Update/ 175 Questions and Correct Answers/Verified

Institution
Course

Content preview

Network + N10-008 Practice
Exam 2024/Latest Update/ 175
Questions and Correct
Answers/Verified
Which of the following tools would generate this output?

Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established - -Netstat -
displays active/ listening connections

-People living near your business are using your guest Wi-Fi in order to
gain free Internet access and to download questionable files. Which of
the following can be done to most easily address this issue? - -Reduce
the wireless power levels - adjusting the power level of anAP can be an
easy way to decrease the radius in which people can connect to your
Wi-Fi. Leaving your power levels at their default can lead to many
unintended individuals seeing your network

-Which protocol would be used to exchange information between
different Autonomous systems? - -BSP - is an EGP (external gateway
protocol) and is used to exchange information between autonomous
systems.

autonomous systems. - A network or a group of networks
owned/controlled by a single entity

-Which of the following controls could be used to allow employees entry
into building to be recorded by a card reader? - -Access control
vestibules - physical or logical list of who entered a room/building. This
could be a sign in sheet or even a complex system that reads RFID
cards and records who enters/leaves in area electronically

-Which of the following can be used to centrally manage credentials for
various accounts or privilege levels on network devices? - -TACACS+

-While troubleshooting a network you notice a connection reporting
Late collisions over a half duplex link. You verify that both ends of the
device are indeed running half duplex interfaces. Given that information
which of the following answers is the most likely cause of this scenario?
- -The cable length is excessive - whenever you see lake collisions that
is a telltale sign that your cable is running past its maximum
recommended length for example twisted-pair cables shouldn't be run
further than 100 m ( 328ft)

, -While configuring a load balancer between multiple systems which of
the following must be configured in order to ensure proper connectivity
during a fail over? - -VIP - virtual IP an essential part of configuring load
balance systems as a single system

-Which of the following service models would most likely be used to
replace on premises servers with a could solution - -IaaS - client moves
whole infrastructure to the cloud minus the hardware of course which is
always controlled by the CSP in cloud deployments

-Which of the following best mitigate a hackers frequent attempts at
brute forceing A company's password - -Two factor authentication,
complex passwords. —
passwords are best protected with longer, more complex passwords
preferably pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for
"password security". Multi factor authentication protects your password
by preventing it from being a single point of failure now we should
require another factor in addition to our password such as using a
biometrics or a smart card

-After configuring new firewalls with the correct configuration to be
deployed to each remote branch, unneeded services were disabled, and
all firewalls rules were applied successfully. Which of the following
actions should be performed next to finish hardening the firewalls? - -
Update the firewalls with current firmware and software —

Keeping a device up today is an essential step in hardening any system

-Which of the following solutions would allow for high speed, low
latency, and globally disperse content distribution? - -Public cloud —
CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for
local users while also providing normal load balancing services. This is
just the idea of having many servers all around the world to serve many
people

-A new network was set up in order to facilitate more users in a building
near your companies HQ. The new network is connected to the HQ's
LAN via a fiber optic cable. However many users on the new network are
unable to access the companies Intranet despise being able to access
the Internet. Which of the following corrections would most likely
resolve this issue? - -Correct the external firewall gateway address —

Could be a misconfigured firewall

-Which of the following attacks consists of following closely behind a
real employee into a secure building by grabbing the door without their
knowledge? - -Tailgating —

, Is the act of following somebody into a secure area without their
knowledge

Piggybacking is following somebody into a secure area with their
knowledge

-IP headers would be found under which of the following OSI layers? - -
Layer 3- routers, IPv4 , IPv6, and ICMP

-Which of the following solutions would provide redundancy for a server
if our main concern is physical port failure - -NIC teaming —
Utilizing multiple physical network cards/ethernet ports in order to
connect to the network. This would allow one to physically fail while
keeping network connectivity

-Which of the following is the largest MTU for a standard ethernet frame
- -1500

-Which of the following TCP ports is used by the windows OS for file
sharing - -445- NetBIOS/SMB ( sharing files/access)

-Which of the following subnet mask's is the equivalent of a CIDR of
/20? - -255.255.240.0. - /20

-A large amount of expensive equipment is being moved into a
company warehouse this equipment needs to be tracked when it leaves
or enters the warehouse or when it is taken to be serviced which of the
following solutions would best allow us to record these changes - -Asset
tags—
Asset tags are great for tracking inventory of any type. We can scan the
tags and usually enter a note during the process to describe the actions
we took during this time

-Which of the following is most likely to generate sufficient East-West
traffic? - -A duplication of a hosted virtual server to another physical
server for redundancy.

East-West traffic is server to server traffic, while north-South traffic is
server to client

-In order to save money, you're trying to make a purchasing decision in
order to get a device that provides access ports for edge systems are
also allowing routing between networks. Which of the following pieces of
hardware would be best for fill this requirement - -A layer three switch

We want to connect our clients via access ports (The job of a switch)
and also connects to other networks ( The job of a router) this is the
perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3
switch has the capabilities of both a switch and a router

Written for

Course

Document information

Uploaded on
April 24, 2024
Number of pages
22
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$20.98
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
Nurselucy2023

Get to know the seller

Seller avatar
Nurselucy2023 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
2 year
Number of followers
0
Documents
794
Last sold
5 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions