Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
N10-008
Free trial
Verified
Question 76
Which of the following can be used to store various types of devices and provide contactless delivery to users?
- A: Asset tags
- B: Biometrics
- C: Access control vestibules
- D: Smart lockers
Question 77
A technician recently set up a small office network for nine users. When the installation was complete, all the computers on the network showed addresses ranging from 169.254.0.0 to 169.254.255.255. Which of the following types of address ranges does this represent?
- A: Private
- B: Public
- C: APIPA
- D: Classless
Question 78
Which of the following OSI model layers is where a technician would view UDP information?
- A: Physical
- B: Data link
- C: Network
- D: Transport
Question 79
A user reports being unable to access network resources after making some changes in the office. Which of the following should a network technician do FIRST?
- A: Check the system's IP address
- B: Do a ping test against the servers
- C: Reseat the cables into the back of the PC
- D: Ask what changes were made
Question 80
A network technician at a university is assisting with the planning of a simultaneous software deployment to multiple computers in one classroom in a building.
Which of the following would be BEST to use?
- A: Multicast
- B: Anycast
- C: Unicast
- D: Broadcast
Question 81
Which of the following describes the BEST device to configure as a DHCP relay?
- A: Bridge
- B: Router
- C: Layer 2 switch
- D: Hub
Question 82
Which of the following compromises Internet-connected devices and makes them vulnerable to becoming part of a botnet? (Choose two.)
- A: Deauthentication attack
- B: Malware infection
- C: IP spoofing
- D: Firmware corruption
- E: Use of default credentials
- F: Dictionary attack
Question 83
A network administrator is planning a WLAN for a soccer stadium and was advised to use MU-MIMO to improve connection performance in high-density areas.
The project requires compatibility with clients connecting using 2.4GHz or 5GHz frequencies. Which of the following would be the BEST wireless standard for this project?
- A: 802.11ac
- B: 802.11ax
- C: 802.11g
- D: 802.11n
Question 84
An organization purchased an allocation of public IPv4 addresses. Instead of receiving the network address and subnet mask, the purchase paperwork indicates the allocation is a /28. This type of notation is referred to as:
- A: CIDR
- B: classful
- C: classless
- D: RFC1918
Question 85
A network technician is reviewing a document that specifies how to handle access to company resources, such as the Internet and printers, when devices are not part of the company's assets. Which of the following agreements would a user be required to accept before using the company's resources?
- A: BYOD
- B: DLP
- C: AUP
- D: MOU
Question 86
Which of the following records can be used to track the number of changes on a DNS zone?
- A: SOA
- B: SRV
- C: TXT
- D: NS
Question 87
A network administrator is trying to add network redundancy for the server farm. Which of the following can the network administrator configure to BEST provide this capability?
- A: VRRP
- B: DNS
- C: UPS
- D: RPO
Question 88
A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production?
- A: Disable unneeded ports
- B: Disable SSH service
- C: Disable MAC filtering
- D: Disable port security
Question 89
A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.)
- A: tcpdump
- B: show config
- C: hostname
- D: show route
- E: netstat
- F: show ip arp
Question 90
A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?
- A: CSMA/CD
- B: LACP
- C: PoE+
- D: MDIX
Question 91
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
- A: Secure web access to internal corporate resources.
- B: Upgrade security via the use of an NFV technology.
- C: Connect two datacenters across the Internet.
- D: Increase VPN availability by using a SDWAN technology.
Question 92
Which of the following security controls indicates unauthorized hardware modifications?
- A: Biometric authentication
- B: Media device sanitization
- C: Change management policy
- D: Tamper-evident seals
Question 93
A network technician needs to install security updates on several switches on the company's network. The management team wants this completed as quickly and efficiently as possible. Which of the following should the technician do to perform the updates?
- A: Upload the security update onto each switch using a terminal emulator and a console cable.
- B: Configure a TFTP server, SSH into each device, and perform the update.
- C: Replace each old switch with new switches that have the updates already performed.
- D: Connect a USB memory stick to each switch and perform the update.
Question 94
Which of the following describes traffic going in and out of a data center from the internet?
- A: Demarcation point
- B: North-South
- C: Fibre Channel
- D: Spine and leaf
Question 95
A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources. Which of the following needs to be reconfigured?
- A: The IP address
- B: The subnet mask
- C: The gateway address
- D: The DNS servers
Question 96
An IT administrator received an assignment with the following objectives:
✑ Conduct a total scan within the company's network for all connected hosts.
✑ Detect all the types of operating systems running on all devices.
✑ Discover all services offered by hosts on the network.
✑ Find open ports and detect security risks.
Which of the following command-line tools can be used to achieve these objectives?
- A: nmap
- B: arp
- C: netstat
- D: tcpdump
Question 97
A network manager is configuring switches in IDFs to ensure unauthorized client computers are not connecting to a secure wired network. Which of the following is the network manager MOST likely performing?
- A: Disabling unneeded switchports
- B: Changing the default VLAN
- C: Configuring DHCP snooping
- D: Writing ACLs to prevent access to the switch
Question 98
At which of the following OSI model layers does routing occur?
- A: Data link
- B: Transport
- C: Physical
- D: Network
Question 99
An auditor assessing network best practices was able to connect a rogue switch into a network jack and get network connectivity. Which of the following controls would BEST address this risk?
- A: Activate port security on the switchports providing end user access.
- B: Deactivate Spanning Tree Protocol on network interfaces that are facing public areas.
- C: Disable Neighbor Resolution Protocol in the Layer 2 devices.
- D: Ensure port tagging is in place for network interfaces in guest areas.
Question 100
A technician knows the MAC address of a device and is attempting to find the device's IP address. Which of the following should the technician look at to find the
IP address? (Choose two.)
- A: ARP table
- B: DHCP leases
- C: IP route table
- D: DNS cache
- E: MAC address table
- F: STP topology
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!