Network + N10-008 practice exam |
QUESTIONS AND ANSWERS | 100%
CORRECT|| ALREADY GRADED A+|| PASS!!
While configuring a load balancer between multiple systems which of
the following must be configured in order to ensure proper
connectivity during a fail over? - ANSWERS-VIP - virtual IP an essential
part of configuring load balance systems as a single system
Which of the following service models would most likely be used to
replace on premises servers with a could solution - ANSWERS-IaaS -
client moves whole infrastructure to the cloud minus the hardware of
course which is always controlled by the CSP in cloud deployments
Which of the following best mitigate a hackers frequent attempts at
brute forceing A company's password - ANSWERS-Two factor
authentication, complex passwords. —
passwords are best protected with longer, more complex passwords
preferably pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for
"password security". Multi factor authentication protects your
password by preventing it from being a single point of failure now we
should require another factor in addition to our password such as
using a biometrics or a smart card
,After configuring new firewalls with the correct configuration to be
deployed to each remote branch, unneeded services were disabled,
and all firewalls rules were applied successfully. Which of the
following actions should be performed next to finish hardening the
firewalls? - ANSWERS-Update the firewalls with current firmware and
software —
Keeping a device up today is an essential step in hardening any
system
Which of the following solutions would allow for high speed, low
latency, and globally disperse content distribution? - ANSWERS-Public
cloud —
Which of the following tools would generate this output?
Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established - ANSWERS-
Netstat - displays active/ listening connections
People living near your business are using your guest Wi-Fi in order to
gain free Internet access and to download questionable files. Which of
the following can be done to most easily address this issue? -
ANSWERS-Reduce the wireless power levels - adjusting the power level
of anAP can be an easy way to decrease the radius in which people
can connect to your Wi-Fi. Leaving your power levels at their default
can lead to many unintended individuals seeing your network
,Which protocol would be used to exchange information between
different Autonomous systems? - ANSWERS-BSP - is an EGP (external
gateway protocol) and is used to exchange information between
autonomous systems.
autonomous systems. - A network or a group of networks
owned/controlled by a single entity
Which of the following controls could be used to allow employees
entry into building to be recorded by a card reader? - ANSWERS-
Access control vestibules - physical or logical list of who entered a
room/building. This could be a sign in sheet or even a complex system
that reads RFID cards and records who enters/leaves in area
electronically
Which of the following can be used to centrally manage credentials for
various accounts or privilege levels on network devices? - ANSWERS-
TACACS+
While troubleshooting a network you notice a connection reporting
Late collisions over a half duplex link. You verify that both ends of the
device are indeed running half duplex interfaces. Given that
information which of the following answers is the most likely cause of
this scenario? - ANSWERS-The cable length is excessive - whenever
you see lake collisions that is a telltale sign that your cable is running
past its maximum recommended length for example twisted-pair
cables shouldn't be run further than 100 m ( 328ft)
, CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for
local users while also providing normal load balancing services. This
is just the idea of having many servers all around the world to serve
many people
A new network was set up in order to facilitate more users in a
building near your companies HQ. The new network is connected to
the HQ's LAN via a fiber optic cable. However many users on the new
network are unable to access the companies Intranet despise being
able to access the Internet. Which of the following corrections would
most likely resolve this issue? - ANSWERS-Correct the external
firewall gateway address —
Could be a misconfigured firewall
Which of the following attacks consists of following closely behind a
real employee into a secure building by grabbing the door without their
knowledge? - ANSWERS-Tailgating —
Is the act of following somebody into a secure area without their
knowledge
Piggybacking is following somebody into a secure area with their
knowledge
IP headers would be found under which of the following OSI layers? -
ANSWERS-Layer 3- routers, IPv4 , IPv6, and ICMP
QUESTIONS AND ANSWERS | 100%
CORRECT|| ALREADY GRADED A+|| PASS!!
While configuring a load balancer between multiple systems which of
the following must be configured in order to ensure proper
connectivity during a fail over? - ANSWERS-VIP - virtual IP an essential
part of configuring load balance systems as a single system
Which of the following service models would most likely be used to
replace on premises servers with a could solution - ANSWERS-IaaS -
client moves whole infrastructure to the cloud minus the hardware of
course which is always controlled by the CSP in cloud deployments
Which of the following best mitigate a hackers frequent attempts at
brute forceing A company's password - ANSWERS-Two factor
authentication, complex passwords. —
passwords are best protected with longer, more complex passwords
preferably pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for
"password security". Multi factor authentication protects your
password by preventing it from being a single point of failure now we
should require another factor in addition to our password such as
using a biometrics or a smart card
,After configuring new firewalls with the correct configuration to be
deployed to each remote branch, unneeded services were disabled,
and all firewalls rules were applied successfully. Which of the
following actions should be performed next to finish hardening the
firewalls? - ANSWERS-Update the firewalls with current firmware and
software —
Keeping a device up today is an essential step in hardening any
system
Which of the following solutions would allow for high speed, low
latency, and globally disperse content distribution? - ANSWERS-Public
cloud —
Which of the following tools would generate this output?
Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established - ANSWERS-
Netstat - displays active/ listening connections
People living near your business are using your guest Wi-Fi in order to
gain free Internet access and to download questionable files. Which of
the following can be done to most easily address this issue? -
ANSWERS-Reduce the wireless power levels - adjusting the power level
of anAP can be an easy way to decrease the radius in which people
can connect to your Wi-Fi. Leaving your power levels at their default
can lead to many unintended individuals seeing your network
,Which protocol would be used to exchange information between
different Autonomous systems? - ANSWERS-BSP - is an EGP (external
gateway protocol) and is used to exchange information between
autonomous systems.
autonomous systems. - A network or a group of networks
owned/controlled by a single entity
Which of the following controls could be used to allow employees
entry into building to be recorded by a card reader? - ANSWERS-
Access control vestibules - physical or logical list of who entered a
room/building. This could be a sign in sheet or even a complex system
that reads RFID cards and records who enters/leaves in area
electronically
Which of the following can be used to centrally manage credentials for
various accounts or privilege levels on network devices? - ANSWERS-
TACACS+
While troubleshooting a network you notice a connection reporting
Late collisions over a half duplex link. You verify that both ends of the
device are indeed running half duplex interfaces. Given that
information which of the following answers is the most likely cause of
this scenario? - ANSWERS-The cable length is excessive - whenever
you see lake collisions that is a telltale sign that your cable is running
past its maximum recommended length for example twisted-pair
cables shouldn't be run further than 100 m ( 328ft)
, CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for
local users while also providing normal load balancing services. This
is just the idea of having many servers all around the world to serve
many people
A new network was set up in order to facilitate more users in a
building near your companies HQ. The new network is connected to
the HQ's LAN via a fiber optic cable. However many users on the new
network are unable to access the companies Intranet despise being
able to access the Internet. Which of the following corrections would
most likely resolve this issue? - ANSWERS-Correct the external
firewall gateway address —
Could be a misconfigured firewall
Which of the following attacks consists of following closely behind a
real employee into a secure building by grabbing the door without their
knowledge? - ANSWERS-Tailgating —
Is the act of following somebody into a secure area without their
knowledge
Piggybacking is following somebody into a secure area with their
knowledge
IP headers would be found under which of the following OSI layers? -
ANSWERS-Layer 3- routers, IPv4 , IPv6, and ICMP