100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Network + N10-008 practice exam Questions With 100% Solved Solutions!!

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
10-04-2024
Written in
2023/2024

Which of the following tools would generate this output? Protocol. Local address. Foreign address. State TCP 127.0.0.1:48512 Desktop-Open:64251. Established TCP 127.0.0.1:64251. Desktop-Open:48512. Established - Answer-Netstat - displays active/ listening connections People living near your business are using your guest Wi-Fi in order to gain free Internet access and to download questionable files. Which of the following can be done to most easily address this issue? - Answer-Reduce the wireless power levels - adjusting the power level of anAP can be an easy way to decrease the radius in which people can connect to your Wi-Fi. Leaving your power levels at their default can lead to many unintended individuals seeing your network Which protocol would be used to exchange information between different Autonomous systems? - Answer-BSP - is an EGP (external gateway protocol) and is used to exchange information between autonomous systems. autonomous systems. - A network or a group of networks owned/controlled by a single entity Which of the following controls could be used to allow employees entry into building to be recorded by a card reader? - Answer-Access control vestibules - physical or logical list of who entered a room/building. This could be a sign in sheet or even a complex system that reads RFID cards and records who enters/leaves in area electronically Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices? - Answer-TACACS+ While troubleshooting a network you notice a connection reporting Late collisions over a half duplex link. You verify that both ends of the device are indeed running half duplex interfaces. Given that information which of the following answers is the most likely cause of this scenario? - Answer-The cable length is excessive - whenever you see lake collisions that is a telltale sign that your cable is running pastits maximum recommended length for example twisted-pair cables shouldn't be run further than 100 m ( 328ft) While configuring a load balancer between multiple systems which of the following must be configured in order to ensure proper connectivity during a fail over? - Answer-VIP - virtual IP an essential part of configuring load balance systems as a single system Which of the following service models would most likely be used to replace on premises servers with a could solution - Answer-IaaS - client moves whole infrastructure to the cloud minus the hardware of course which is always controlled by the CSP in cloud deployments Which of the following best mitigate a hackers frequent attempts at brute forceing A company's password - Answer-Two factor authentication, complex passwords. — passwords are best protected with longer, more complex passwords preferably pass phrases made up of multiple words. Additionally some form of MFA is considered essential today for "password security". Multi factor authentication protects your password by preventing it from being a single point of failure now we should require another factor in addition to our password such as using a biometrics or a smart card After configuring new firewalls with the correct configuration to be deployed to each remote branch, unneeded services were disabled, and all firewalls rules were applied successfully. Which of the following actions should be performed next to finish hardening the firewalls? - Answer-Update the firewalls with current firmware and software — Keeping a device up today is an essential step in hardening any system Which of the following solutions would allow for high speed, low latency, and globally disperse content distribution? - Answer-Public cloud — CDNs or content delivery networks are load balance networks that are geographically separated in order to provide the best connection for local users while also providing normal load balancing services. This is just the idea of having many servers all around the world to serve many people A new network was set up in order to facilitate more users in a building near your companies HQ. The new network is connected to the HQ's LAN via a fiber optic cable. However many users on the new network are unable to access the companies Intranet despise being able to access the Internet. Which ofthe following corrections would most likely resolve this issue? - Answer-Correct the external firewall gateway address — Could be a misconfigured firewall Which of the following attacks consists of following closely behind a real employee into a secure building by grabbing the door without their knowledge? - Answer-Tailgating — Is the act of following somebody into a secure area without their knowledge Piggybacking is following somebody into a secure area with their knowledge IP headers would be found under which of the following OSI layers? - Answer-Layer 3- routers, IPv4 , IPv6, and ICMP Which of the following solutions would provide redundancy for a server if our main concern is physical port failure - Answer-NIC teaming — Utilizing multiple physical network cards/ethernet ports in order to connect to the network. This would allow one to physically fail while keeping network connectivity Which of the following is the largest MTU for a standard ethernet frame - Answer-1500 Which of the following TCP ports is used by the windows OS for file sharing - Answer-445- NetBIOS/SMB ( sharing files/access) Which of the following subnet mask's is the equivalent of a CIDR of /20? - Answer-255.255.240.0. - /20 A large amount of expensive equipment is being moved into a company warehouse this equipment needs to be tracked when it leaves or enters the warehouse or when it is taken to be serviced which of the following solutions would best allow us to record these changes - Answer-Asset tags— Asset tags are great for tracking inventory of any type. We can scan the tags and usually enter a note during the process to describe the actions we took during this timeWhich of the following is most likely to generate sufficient East-West traffic? - Answer-A duplication of a hosted virtual server to another physical server for redundancy. East-West traffic is server to server traffic, while north-South traffic is server to client In order to save money, you're trying to make a purchasing decision in order to get a device that provides access ports for edge systems are also allowing routing between networks. Which of the following pieces of hardware would be best for fill this requirement - Answer-A layer three switch — We want to connect our clients via access ports (The job of a switch) and also connects to other networks ( The job of a router) this is the perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3 switch has the capabilities of both a switch and a router While installing Wi-Fi for a large amount of users, we want to utilize and 802.11 Standard with the maximum amount of channels in order to prioritize reducing interference. While researching which standard we should utilize, we see if you different frequencies that different 802.11 standards utilize. Which of the following frequencies ranges should we utilize given the above requirement? - Answer-5 GHz. — 23 non overlapping channels Which of the following would most likely be used to review previous upgrades to a system - AnswerChange management Which of the following commands can be used to display the pass that networking traffic takes to reach other networks - Answer-Show route While using many unmanaged switches in your home you decided to connect redundant cables between the switches in order to increase redundancy. However, since this change was made you started experiencing extreme amounts of latency. Which of the following problems is most likely occurring? - Answer-A broadcast storm — Having redundant connections between switches runs the risk of allowing broadcast storms to propagate through your network. This is especially true of unmanaged switches which would like many of the basic security controls of manage switches, such as STP Which of the following best describes a network appliance that warns of unapproved devices that are accessing the network - Answer-IDS - intrusion detection systemWhich of the following technologies will allow many WAP's to broadcast the same SSID across a multi story building while providing continuous connectivity? - Answer-Extended service set — ESSID allows users to seamlessly reconnect to a different access point when they walk far enough away from their original access point. This is great for a company with a large physical footprint that wants one consistent wireless network Which transceiver type can support up to 40 Gbps? - Answer-QSFP+ QSFP+ 10 Gbps per channel / 40 Gbps channels When a large amount of users are remotely accessing a centralized VM hosting server, which of the following concerns are raised assuming the network can readily support this increase in traffic - AnswerCPU usage and. Memory VMs much like physical systems however do you have both CPU and RAM requirements the more systems running on the VM host the hire the requirements Client devices cannot enter network and the network administrator determines the DHCP scope is exhausted the administrator wants to avoid creating a new DH pool which of the following in the administrator perform to resolve the issue - Answer-Decrease the number of VLANs —

Show more Read less
Institution
Network + N10-008
Course
Network + N10-008










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Network + N10-008
Course
Network + N10-008

Document information

Uploaded on
April 10, 2024
Number of pages
27
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
PatrickKaylian Delaware State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1807
Member since
2 year
Number of followers
1043
Documents
22126
Last sold
15 hours ago

3.8

316 reviews

5
147
4
60
3
54
2
15
1
40

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions