Network+ N10-008 ALL IN ONE EXAMBANK
(Questions and Answers) ACCURATE AND
VERIFIED.
An attack where someone tries to hack a password using every possible
password permutation is called what?
A. Man-in-the-middle
B. Spoofing
C. Rainbow table
D. Brute force
Verified Answer -Brute force uses every possible permutation and is often
used in password cracking.
Which Windows utility displays open ports on a host?
A. netstat
B. ping
C. ipconfig
D. nbtstat
Verified Answer -Only netstat shows all open ports on a Windows system.
Which of the following protocols are notorious for cleartext passwords?
(Select two.)
A. SSH
B. Telnet
C. HTTPS
D. POP3
Verified Answer -Both Telnet and POP3 use cleartext passwords.
,The NSA's TEMPEST security standards are used to combat which risk?
A. RF emanation
B. Spoofing
C. DDoS
D. Malware
Verified Answer -TEMPEST is designed to reduce RF emanation using
enclosures, shielding, and even paint.
Bob is told by his administrator to update his anti-malware program
before he
runs it. What kind of anti-malware is he most likely using?
A. Host-based
B. Network-based
C. Cloud-based
D. FTP-based
Verified Answer -The fact that he has to update the software first suggests
it is host-based.
Which PDU does an SNMP manager use to query agents?
A. Get
B. Response
C. Set
D. Trap
Verified Answer -SNMP managers use Get protocol data units (PDUs) to
query agents.
,In an SNMP managed network, which software does a managed device
run?
A. Agent
B. NMS
C. SNMP manager
D. MIB
Verified Answer -Managed devices run agent software.
How does an SNMP managed system categorize data that can be queried?
A. QoS
B. MIBs
C. PDUs
D. UDP
Verified Answer -SNMP managed systems use management information
bases to categorize data to be queried.
An SNMP manager uses which port when used with TLS?
A. 161
B. 162
C. 10161
D. 10162
Verified Answer -An SNMP manager uses port 10162 with Transport Layer
Security (TLS).
Jason is concerned about the communication between two workstations
and wants to capture and analyze that traffic to see if anything illicit is
going on. Which tool would best serve his needs?
A. Interface monitor
, B. Packet flow monitor
C. Packet sniffer
D. Performance monitor
Verified Answer -Jason would use packet flow monitoring software to
monitor the flow between two devices.
Where does a packet sniffer put information it collects?
A. Answer file
B. Capture file
C. Pocket file
D. Sniffer file
Verified Answer -Packet sniffers put information in capture files.
An analysis of a network shows a lot of traffic on one machine on port
161. What kind of machine is it?
A. Managed device
B. SNMP manager
C. PDU
D. MIB
Verified Answer -Managed devices use port 161.
What should you create when a network is running normally?
A. Answer file
B. Capture file
C. MIB
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller saraciousstuvia. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $16.49. You're not tied to anything after your purchase.