1. Which of the following tools would generate this output?
Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established: Netstat - displays
active/ listening connections
2. People living near your business are using your guest Wi-Fi in order to
gain free Internet access and to download questionable files. Which of
the following can be done to most easily address this issue?: Reduce the
wireless power levels - adjusting the power level of anAP can be an easy way
to decrease the radius in which people can connect to your Wi-Fi. Leaving
your power levels at their default can lead to many unintended individuals
seeing your network
3. Which protocol would be used to exchange information between
different Autonomous systems?: BSP - is an EGP (external gateway
protocol) and is used to exchange information between autonomous systems.
autonomous systems. - A network or a group of networks owned/controlled by a
single entity
4. Which of the following controls could be used to allow employees entry
into building to be recorded by a card reader?: Access control vestibules -
physical or logical list of who entered a room/building. This could be a sign in
sheet or even a complex system that reads RFID cards and records who
enters/leaves in area electronically
5. Which of the following can be used to centrally manage credentials for
various accounts or privilege levels on network devices?: TACACS+
6. While troubleshooting a network you notice a connection reporting Late
collisions over a half duplex link. You verify that both ends of the device
are indeed running half duplex interfaces. Given that information which
of the following answers is the most likely cause of this scenario?: The
cable length is excessive - whenever you see lake collisions that is a telltale
sign that your cable is running past its maximum recommended length for
example twisted-pair cables shouldn't be run further than 100 m ( 328ft)
7. While configuring a load balancer between multiple systems which of the
following must be configured in order to ensure proper connectivity
during a fail over?: VIP - virtual IP an essential part of configuring load
balance systems as a single system
, Network + N10-008 practice exam
8. Which of the following service models would most likely be used to
replace on premises servers with a could solution: IaaS - client moves
whole infrastructure to the cloud minus the hardware of course which is always
controlled by the
CSP in cloud deployments
9. Which of the following best mitigate a hackers frequent attempts at brute
forceing A company's password: Two factor authentication, complex
passwords.
—
passwords are best protected with longer, more complex passwords preferably
pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for "password
security". Multi factor authentication protects your password by preventing it from
being a single point of failure now we should require another factor in addition to
our password such as using a biometrics or a smart card
10. After configuring new firewalls with the correct configuration to be
deployed to each remote branch, unneeded services were disabled, and
all firewalls rules were applied successfully. Which of the following
actions should be performed next to finish hardening the firewalls?:
Update the firewalls with current firmware and software —
Keeping a device up today is an essential step in hardening any system
11. Which of the following solutions would allow for high speed, low latency,
and globally disperse content distribution?: Public cloud —
CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for local users
while also providing normal load balancing services. This is just the idea of having
many servers all around the world to serve many people
12. A new network was set up in order to facilitate more users in a building
near your companies HQ. The new network is connected to the HQ's LAN
via a fiber optic cable. However many users on the new network are
unable to access the companies Intranet despise being able to access
the Internet. Which of the following corrections would most likely resolve
this issue?: Correct the external firewall gateway address —
Could be a misconfigured firewall
, Network + N10-008 practice exam
13. Which of the following attacks consists of following closely behind a real
employee into a secure building by grabbing the door without their
knowledge?: Tailgating —
Is the act of following somebody into a secure area without their knowledge
Piggybacking is following somebody into a secure area with their knowledge
14. IP headers would be found under which of the following OSI layers?:
Layer
3- routers, IPv4 , IPv6, and ICMP
15. Which of the following solutions would provide redundancy for a server
if our main concern is physical port failure: NIC teaming —
Utilizing multiple physical network cards/ethernet ports in order to connect to the
network. This would allow one to physically fail while keeping network connectivity
16. Which of the following is the largest MTU for a standard ethernet frame:
1500
17. Which of the following TCP ports is used by the windows OS for file
sharing: 445- NetBIOS/SMB ( sharing files/access)
18. Which of the following subnet mask's is the equivalent of a CIDR of
/20?: 255.255.240.0. - /20
19. A large amount of expensive equipment is being moved into a company
warehouse this equipment needs to be tracked when it leaves or enters the
warehouse or when it is taken to be serviced which of the following
solutions would best allow us to record these changes: Asset tags—
Asset tags are great for tracking inventory of any type. We can scan the tags and
usually enter a note during the process to describe the actions we took during this
time
20. Which of the following is most likely to generate sufficient East-West
traffic?: A duplication of a hosted virtual server to another physical server for
redundancy.
East-West traffic is server to server traffic, while north-South traffic is server to
client 21. In order to save money, you're trying to make a purchasing
decision in order to get a device that provides access ports for edge
systems are also allowing routing between networks. Which of the following
pieces of hardware would be best for fill this requirement: A layer three switch
—
We want to connect our clients via access ports (The job of a switch) and also
connects to other networks ( The job of a router) this is the perfect opportunity to
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller QUALITYGRADES. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.49. You're not tied to anything after your purchase.