Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Network + N10-008 Practice Exam 2024/Latest Update/ 175 Questions and Correct Answers/Verified

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A+
Geüpload op
24-04-2024
Geschreven in
2023/2024

Network + N10-008 Practice Exam 2024/Latest Update/ 175 Questions and Correct Answers/Verified

Instelling
Vak

Voorbeeld van de inhoud

Network + N10-008 Practice
Exam 2024/Latest Update/ 175
Questions and Correct
Answers/Verified
Which of the following tools would generate this output?

Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established - -Netstat -
displays active/ listening connections

-People living near your business are using your guest Wi-Fi in order to
gain free Internet access and to download questionable files. Which of
the following can be done to most easily address this issue? - -Reduce
the wireless power levels - adjusting the power level of anAP can be an
easy way to decrease the radius in which people can connect to your
Wi-Fi. Leaving your power levels at their default can lead to many
unintended individuals seeing your network

-Which protocol would be used to exchange information between
different Autonomous systems? - -BSP - is an EGP (external gateway
protocol) and is used to exchange information between autonomous
systems.

autonomous systems. - A network or a group of networks
owned/controlled by a single entity

-Which of the following controls could be used to allow employees entry
into building to be recorded by a card reader? - -Access control
vestibules - physical or logical list of who entered a room/building. This
could be a sign in sheet or even a complex system that reads RFID
cards and records who enters/leaves in area electronically

-Which of the following can be used to centrally manage credentials for
various accounts or privilege levels on network devices? - -TACACS+

-While troubleshooting a network you notice a connection reporting
Late collisions over a half duplex link. You verify that both ends of the
device are indeed running half duplex interfaces. Given that information
which of the following answers is the most likely cause of this scenario?
- -The cable length is excessive - whenever you see lake collisions that
is a telltale sign that your cable is running past its maximum
recommended length for example twisted-pair cables shouldn't be run
further than 100 m ( 328ft)

, -While configuring a load balancer between multiple systems which of
the following must be configured in order to ensure proper connectivity
during a fail over? - -VIP - virtual IP an essential part of configuring load
balance systems as a single system

-Which of the following service models would most likely be used to
replace on premises servers with a could solution - -IaaS - client moves
whole infrastructure to the cloud minus the hardware of course which is
always controlled by the CSP in cloud deployments

-Which of the following best mitigate a hackers frequent attempts at
brute forceing A company's password - -Two factor authentication,
complex passwords. —
passwords are best protected with longer, more complex passwords
preferably pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for
"password security". Multi factor authentication protects your password
by preventing it from being a single point of failure now we should
require another factor in addition to our password such as using a
biometrics or a smart card

-After configuring new firewalls with the correct configuration to be
deployed to each remote branch, unneeded services were disabled, and
all firewalls rules were applied successfully. Which of the following
actions should be performed next to finish hardening the firewalls? - -
Update the firewalls with current firmware and software —

Keeping a device up today is an essential step in hardening any system

-Which of the following solutions would allow for high speed, low
latency, and globally disperse content distribution? - -Public cloud —
CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for
local users while also providing normal load balancing services. This is
just the idea of having many servers all around the world to serve many
people

-A new network was set up in order to facilitate more users in a building
near your companies HQ. The new network is connected to the HQ's
LAN via a fiber optic cable. However many users on the new network are
unable to access the companies Intranet despise being able to access
the Internet. Which of the following corrections would most likely
resolve this issue? - -Correct the external firewall gateway address —

Could be a misconfigured firewall

-Which of the following attacks consists of following closely behind a
real employee into a secure building by grabbing the door without their
knowledge? - -Tailgating —

, Is the act of following somebody into a secure area without their
knowledge

Piggybacking is following somebody into a secure area with their
knowledge

-IP headers would be found under which of the following OSI layers? - -
Layer 3- routers, IPv4 , IPv6, and ICMP

-Which of the following solutions would provide redundancy for a server
if our main concern is physical port failure - -NIC teaming —
Utilizing multiple physical network cards/ethernet ports in order to
connect to the network. This would allow one to physically fail while
keeping network connectivity

-Which of the following is the largest MTU for a standard ethernet frame
- -1500

-Which of the following TCP ports is used by the windows OS for file
sharing - -445- NetBIOS/SMB ( sharing files/access)

-Which of the following subnet mask's is the equivalent of a CIDR of
/20? - -255.255.240.0. - /20

-A large amount of expensive equipment is being moved into a
company warehouse this equipment needs to be tracked when it leaves
or enters the warehouse or when it is taken to be serviced which of the
following solutions would best allow us to record these changes - -Asset
tags—
Asset tags are great for tracking inventory of any type. We can scan the
tags and usually enter a note during the process to describe the actions
we took during this time

-Which of the following is most likely to generate sufficient East-West
traffic? - -A duplication of a hosted virtual server to another physical
server for redundancy.

East-West traffic is server to server traffic, while north-South traffic is
server to client

-In order to save money, you're trying to make a purchasing decision in
order to get a device that provides access ports for edge systems are
also allowing routing between networks. Which of the following pieces of
hardware would be best for fill this requirement - -A layer three switch

We want to connect our clients via access ports (The job of a switch)
and also connects to other networks ( The job of a router) this is the
perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3
switch has the capabilities of both a switch and a router

Geschreven voor

Vak

Documentinformatie

Geüpload op
24 april 2024
Aantal pagina's
22
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$20.98
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Nurselucy2023

Maak kennis met de verkoper

Seller avatar
Nurselucy2023 Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
2 jaar
Aantal volgers
0
Documenten
794
Laatst verkocht
5 maanden geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen