Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Network + N10-008 practice exam 2024/175 Questions with correct Answers/Verified

Beoordeling
-
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
14-04-2024
Geschreven in
2023/2024

Network + N10-008 practice exam 2024/175 Questions with correct Answers/Verified

Instelling
Vak

Voorbeeld van de inhoud

Network + N10-008 practice exam 2024/175
Questions with correct Answers/Verifi ed
Which of the following tools would generate this output?

Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established - >>Netstat - displays
active/ listening connections

-People living near your business are using your guest Wi-Fi in order to gain free
Internet access and to download questionable files. Which of the following can
be done to most easily address this issue? - >>Reduce the wireless power levels
- adjusting the power level of anAP can be an easy way to decrease the radius in
which people can connect to your Wi-Fi. Leaving your power levels at their
default can lead to many unintended individuals seeing your network

-Which protocol would be used to exchange information between different
Autonomous systems? - >>BSP - is an EGP (external gateway protocol) and is
used to exchange information between autonomous systems.

autonomous systems. - A network or a group of networks owned/controlled by a
single entity

-Which of the following controls could be used to allow employees entry into
building to be recorded by a card reader? - >>Access control vestibules -
physical or logical list of who entered a room/building. This could be a sign in
sheet or even a complex system that reads RFID cards and records who
enters/leaves in area electronically

-Which of the following can be used to centrally manage credentials for various
accounts or privilege levels on network devices? - >>TACACS+

-While troubleshooting a network you notice a connection reporting Late
collisions over a half duplex link. You verify that both ends of the device are
indeed running half duplex interfaces. Given that information which of the
following answers is the most likely cause of this scenario? - >>The cable length
is excessive - whenever you see lake collisions that is a telltale sign that your
cable is running past its maximum recommended length for example twisted-
pair cables shouldn't be run further than 100 m ( 328ft)

, -While configuring a load balancer between multiple systems which of the
following must be configured in order to ensure proper connectivity during a fail
over? - >>VIP - virtual IP an essential part of configuring load balance systems as
a single system

-Which of the following service models would most likely be used to replace on
premises servers with a could solution - >>IaaS - client moves whole
infrastructure to the cloud minus the hardware of course which is always
controlled by the CSP in cloud deployments

-Which of the following best mitigate a hackers frequent attempts at brute
forceing A company's password - >>Two factor authentication, complex
passwords. —
passwords are best protected with longer, more complex passwords preferably
pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for "password
security". Multi factor authentication protects your password by preventing it
from being a single point of failure now we should require another factor in
addition to our password such as using a biometrics or a smart card

-After configuring new firewalls with the correct configuration to be deployed to
each remote branch, unneeded services were disabled, and all firewalls rules
were applied successfully. Which of the following actions should be performed
next to finish hardening the firewalls? - >>Update the firewalls with current
firmware and software —

Keeping a device up today is an essential step in hardening any system

-Which of the following solutions would allow for high speed, low latency, and
globally disperse content distribution? - >>Public cloud —
CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for local users
while also providing normal load balancing services. This is just the idea of
having many servers all around the world to serve many people

-A new network was set up in order to facilitate more users in a building near
your companies HQ. The new network is connected to the HQ's LAN via a fiber
optic cable. However many users on the new network are unable to access the
companies Intranet despise being able to access the Internet. Which of the
following corrections would most likely resolve this issue? - >>Correct the
external firewall gateway address —

, Could be a misconfigured firewall

-Which of the following attacks consists of following closely behind a real
employee into a secure building by grabbing the door without their knowledge? -
>>Tailgating —
Is the act of following somebody into a secure area without their knowledge

Piggybacking is following somebody into a secure area with their knowledge

-IP headers would be found under which of the following OSI layers? - >>Layer
3- routers, IPv4 , IPv6, and ICMP

-Which of the following solutions would provide redundancy for a server if our
main concern is physical port failure - >>NIC teaming —
Utilizing multiple physical network cards/ethernet ports in order to connect to
the network. This would allow one to physically fail while keeping network
connectivity

-Which of the following is the largest MTU for a standard ethernet frame -
>>1500

-Which of the following TCP ports is used by the windows OS for file sharing -
>>445- NetBIOS/SMB ( sharing files/access)

-Which of the following subnet mask's is the equivalent of a CIDR of /20? -
>>255.255.240.0. - /20

-A large amount of expensive equipment is being moved into a company
warehouse this equipment needs to be tracked when it leaves or enters the
warehouse or when it is taken to be serviced which of the following solutions
would best allow us to record these changes - >>Asset tags—
Asset tags are great for tracking inventory of any type. We can scan the tags and
usually enter a note during the process to describe the actions we took during
this time

-Which of the following is most likely to generate sufficient East-West traffic? -
>>A duplication of a hosted virtual server to another physical server for
redundancy.

East-West traffic is server to server traffic, while north-South traffic is server to
client

Geschreven voor

Vak

Documentinformatie

Geüpload op
14 april 2024
Aantal pagina's
25
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NurseSallyD UNITED STATES
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
40
Lid sinds
3 jaar
Aantal volgers
35
Documenten
1104
Laatst verkocht
8 maanden geleden

4.9

7 beoordelingen

5
6
4
1
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen