Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
N10-008
Free trial
Verified
Question 26
A company's network is set up so all Internet-bound traffic from all remote offices exits through a main datacenter. Which of the following network topologies would
BEST describe this setup?
- A: Bus
- B: Spine-and-leaf
- C: Hub-and-spoke
- D: Mesh
Question 27
To comply with industry requirements, a security assessment on the cloud server should identify which protocols and weaknesses are being exposed to attackers on the Internet. Which of the following tools is the MOST appropriate to complete the assessment?
- A: Use tcpdump and parse the output file in a protocol analyzer.
- B: Use an IP scanner and target the cloud WAN network addressing.
- C: Run netstat in each cloud server and retrieve the running processes.
- D: Use nmap and set the servers' public IPs as the targets.
Question 28
A systems administrator is configuring a firewall using NAT with PAT. Which of the following would be BEST suited for the LAN interface?
- A: 172.15.0.0/18
- B: 172.18.0.0/10
- C: 172.23.0.0/16
- D: 172.28.0.0/8
- E: 172.32.0.0/14
Question 29
A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?
- A: Zero Trust
- B: Planned obsolescence
- C: Time to live
- D: Caching
Question 30
Which of the following policies should be referenced when a user wants to access work email on a personal cell phone?
- A: Offboarding policy
- B: Acceptable use policy
- C: BYOD policy
- D: Remote access policy
Question 31
After a firewall replacement, some alarms and metrics related to network availability stopped updating on a monitoring system relying on SNMP. Which of the following should the network administrator do FIRST?
- A: Modify the device's MIB on the monitoring system.
- B: Configure syslog to send events to the monitoring system.
- C: Use port mirroring to redirect traffic to the monitoring system.
- D: Deploy SMB to transfer data to the monitoring system.
Question 32
At the destination host, which of the following OSI model layers will discard a segment with a bad checksum in the UDP header?
- A: Network
- B: Data link
- C: Transport
- D: Session
Question 33
A voice engineer is troubleshooting a phone issue. When a call is placed, the caller hears echoes of the receiver's voice. Which of the following are the causes of this issue? (Choose two.)
- A: Jitter
- B: Speed mismatch
- C: QoS misconfiguration
- D: Protocol mismatch
- E: CRC errors
- F: Encapsulation errors
Question 34
Which of the following VPN configurations should be used to separate Internet and corporate traffic?
- A: Split-tunnel
- B: Remote desktop gateway
- C: Site-to-site
- D: Out-of-band management
Question 35
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel connection. The chain of connections is in the following order:
✑ Device
✑ LC/LC patch cable
✑ Patch panel
✑ Cross-connect fiber cable
✑ Patch panel
✑ LC/LC patch cable
✑ Switch
The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working properly before being installed. Which of the following is the MOST likely cause of the issue?
- A: TX/RX is reversed
- B: An incorrect cable was used
- C: The device failed during installation
- D: Attenuation is occurring
Question 36
Which of the following is required when connecting an endpoint device with an RJ45 port to a network device with an ST port?
- A: A media converter
- B: A bridge
- C: An MDIX
- D: A load balancer
Question 37
The management team has instituted a 48-hour RTO as part of the disaster recovery plan. Which of the following procedures would meet the policy's requirements?
- A: Recover all systems to a loss of 48 hours of data.
- B: Limit network downtime to a maximum of 48 hours per year.
- C: Recover all systems within 48 hours.
- D: Require 48 hours of system backup maintenance.
Question 38
Which of the following cable types would MOST likely be used to provide high-speed network connectivity between nearby buildings?
- A: UTP
- B: Coaxial
- C: Fiber
- D: Cat 5
- E: Twinaxial
Question 39
Which of the following is the physical security mechanism that would MOST likely be used to enter a secure site?
- A: A landing page
- B: An access control vestibule
- C: A smart locker
- D: A firewall
Question 40
Which of the following BEST describes a North-South traffic flow?
- A: A public Internet user accessing a published web server
- B: A database server communicating with another clustered database server
- C: A Layer 3 switch advertising routes to a router
- D: A management application connecting to managed devices
Question 41
A network switch was installed to provide connectivity to cameras monitoring wildlife in a remote location. The organization is concerned that intruders could potentially leverage unattended equipment in the remote location to connect rogue devices and gain access to the organization's resources. Which of the following techniques would BEST address the concern?
- A: Configure port security using MAC filtering.
- B: Manually register the cameras on the switch address table.
- C: Activate PoE+ on the active switchports.
- D: Disable Neighbor Discovery Protocol on the switch.
Question 42
A technician is documenting an application that is installed on a server and needs to verify all existing web and database connections to the server. Which of the following tools should the technician use to accomplish this task?
- A: tracert
- B: ipconfig
- C: netstat
- D: nslookup
Question 43
A technician is assisting a user who cannot access network resources when the workstation is connected to a VoIP phone. The technician identifies the phone as faulty and replaces it. According to troubleshooting methodology, which of the following should the technician do NEXT?
- A: Implement the solution.
- B: Test the theory.
- C: Duplicate the issue.
- D: Document the findings.
- E: Verify functionality.
Question 44
Which of the following OSI model layers contains IP headers?
- A: Presentation
- B: Application
- C: Data link
- D: Network
- E: Transport
Question 45
A small office is running WiFi 4 APs, and neighboring offices do not want to increase the throughput to associated devices. Which of the following is the MOST cost-efficient way for the office to increase network performance?
- A: Add another AP.
- B: Disable the 2.4GHz radios.
- C: Enable channel bonding.
- D: Upgrade to WiFi 5.
Question 46
A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port?
- A: IP route table
- B: VLAN tag
- C: MAC table
- D: QoS tag
Question 47
A network technician is troubleshooting an application issue. The technician is able to recreate the issue in a virtual environment. According to the troubleshooting methodology, which of the following actions will the technician most likely perform NEXT?
- A: Gather information from the initial report.
- B: Escalate the issue to a supervisor.
- C: Implement a solution to resolve the issue.
- D: Establish a theory of probable cause.
Question 48
Which of the following types of datacenter architectures will MOST likely be used in a large SDN and can be extended beyond the datacenter?
- A: iSCSI
- B: FCoE
- C: Three-tiered network
- D: Spine and leaf
- E: Top-of-rack switching
Question 49
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information:
Which of the following is MOST likely the cause of the issue?
- A: Channel overlap
- B: Poor signal
- C: Incorrect power settings
- D: Wrong antenna type
Question 50
A network technician reviews an entry on the syslog server and discovers the following message from a switch:
SPANNING-TREE Port 1/1 BLOCKED -
Which of the following describes the issue?
- A: A loop was discovered, and the impact was mitigated.
- B: An incorrectly pinned cable was disconnected.
- C: The link-local address on the port is incorrect.
- D: The port was shut down, and it needs to be reactivated.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!