N10-006
Free trial
Verified
Question 1
A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other.
Which of the following options would satisfy these requirements?
- A: Add a router and enable OSPF.
- B: Add a layer 3 switch and create a VLAN.
- C: Add a bridge between two switches.
- D: Add a firewall and implement proper ACL.
Question 2
A network technician must utilize multimode fiber to uplink a new networking device.
Which of the following Ethernet standards could the technician utilize? (Select TWO).
- A: 1000Base-LR
- B: 1000Base-SR
- C: 1000Base-T
- D: 10GBase-LR
- E: 10GBase-SR
- F: 10GBase-T
Question 3
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions.
Which of the following topologies would the engineer implement?
- A: Star
- B: Bus
- C: Ring
- D: Mesh
Question 4
A company wants to create highly available datacenters.
Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
- A: Load balancer
- B: VRRP
- C: OSPF
- D: BGP
Question 5
A technician is helping a SOHO determine where to install the server.
Which of the following should be considered FIRST?
- A: Compatibility requirements
- B: Environment limitations
- C: Cable length
- D: Equipment limitations
Question 6
Which of the following is used to define how much bandwidth can be used by various protocols on the network?
- A: Traffic shaping
- B: High availability
- C: Load balancing
- D: Fault tolerance A
Question 7
Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO).
- A: OSPF
- B: VTP trunking
- C: Virtual PBX
- D: RADIUS
- E: 802.1x
Question 8
A company is experiencing accessibility issues reaching services on a cloud-based system.
Which of the following monitoring tools should be used to locate possible outages?
- A: Network analyzer
- B: Packet analyzer
- C: Protocol analyzer
- D: Network sniffer
Question 9
After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers.
Which of the following should the technician perform so that Ann can get back to work as quickly as possible?
- A: Reformat and install the compatible drivers.
- B: Reset Ann's equipment configuration from a backup.
- C: Downgrade the PC to a working patch level.
- D: Restore Ann's PC to the last known good configuration.
- E: Roll back the drivers to the previous version.
Question 10
A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure.
Which of the following would be required to resolve the exploit?
- A: Utilize a FTP service
- B: Install recommended updates
- C: Send all log files through SMTP
- D: Configure the firewall to block port 22 B
Question 11
A technician is setting up a new network and wants to create redundant paths through the network.
Which of the following should be implemented to prevent performance degradation?
- A: Port mirroring
- B: Spanning tree
- C: ARP inspection
- D: VLAN B
Question 12
A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the
VLAN subnet are able to reach the Internet.
Which of the following is MOST likely the source of the problem?
- A: 802.1q is not configured on the switch port
- B: APIPA has been misconfigured on the VLAN
- C: Bad SFP in the PC's 10/100 NIC
- D: OS updates have not been installed
Question 13
A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account.
Which of the following is the MOST likely reason for the problem?
- A: Username is misspelled is the device configuration file
- B: IDS is blocking RADIUS
- C: Shared secret key is mismatched
- D: Group policy has not propagated to the device
Question 14
After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs.
Which of the following systems should be used?
- A: Event log
- B: Syslog
- C: SIEM
- D: SNMP
Question 15
During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company.
Which of the following would be identified as physical security controls? (Select THREE).
- A: RSA
- B: Passwords
- C: Man traps
- D: Biometrics
- E: Cipher locks
- F: VLANs
- G: 3DES
Question 16
A network technician is troubleshooting a problem at a remote site. It has been determined that the connection from router A to router B is down. The technician at the remote site re-terminates the CAT5 cable that connects the two routers as a straight through cable. The cable is then tested and is plugged into the correct interface.
Which of the following would be the result of this action?
- A: The normal amount of errors and the connection problem has been resolved.
- B: The interface status will indicate that the port is administratively down.
- C: The traffic will flow, but with excessive errors.
- D: The interface status will show line protocol down.
Question 17
An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation.
Which of the following systems are they MOST likely discussing?
- A: Fire suppression
- B: Mantraps at the entry
- C: HVAC
- D: UPS and battery backups
Question 18
Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443?
- A: Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.
- B: Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates.
- C: Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies.
- D: Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.
Question 19
When troubleshooting a network problem, browsing through the log of a switch, it is discovered that multiple frames contain errors.
In which of the following layers does the problem reside? (Select TWO).
- A: Layer 2
- B: Layer 3
- C: Layer 5
- D: Transport layer
- E: Data link
- F: Physical layer
Question 20
Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?
- A: CSMA/CD
- B: OSPF
- C: DOCSIS
- D: BGP A
Question 21
DRAG DROP -
You are tasked with creating a network that will accomplish the following requirements
Requirements:
- The remote sales team must be able to connect to the corporate network
- Each department must have ONLY two PCs and a server
- Each department must be segmented from each other
- The following VLANs have been designated:
a ) VLAN 2- Finance
b ) VLAN 12- Sales
c ) VLAN 22- Human Resources (HR)
Complete the network by dragging the required objects into the diagram
INSTRUCTIONS: Objects can be used multiple times and not all placeholders need to be filled
Select and Place:
Question 22
A company utilizes a patching server to regularly update their PC's. After the latest round of patching all of the older PCs with non-gigabit Ethernet cards become disconnected from the network and now require a technician to fix the issue locally at each PC.
Which of the following should be done to prevent this issue in the future?
- A: Enable automatic rebooting of the PCs after patching is completed
- B: Require the patching server to update the oldest PCs off hours
- C: Disable automatic driver updates to PCs on the patching server
- D: Throttle the connection speed of the patching server to match older PCs
That’s the end of your free questions
You’ve reached the preview limit for N10-006Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!