Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
N10-008
Free trial
Verified
Question 126
A network administrator installed an additional IDF during a building expansion project. Which of the following documents need to be updated to reflect the change? (Choose two.)
- A: Data loss prevention policy
- B: BYOD policy
- C: Acceptable use policy
- D: Non-disclosure agreement
- E: Disaster recovery plan
- F: Physical network diagram
Question 127
Which of the following BEST describes hosting several businesses on the same physical infrastructure?
- A: Hybrid
- B: Elasticity
- C: IaaS
- D: Multitenancy
Question 128
A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?
- A: Enable IGMP snooping on the switches.
- B: Implement another DHCP server.
- C: Reconfigure port tagging for the video traffic.
- D: Change the SSID of the APs.
Question 129
The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?
- A: Redundant power supplies
- B: Uninterruptible power supply
- C: Generator
- D: Power distribution unit
Question 130
A technician is trying to determine whether an LACP bundle is fully operational. Which of the following commands will the technician MOST likely use?
- A: show interface
- B: show config
- C: show route
- D: show arp
Question 131
A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line?
- A: netstat
- B: netstat -a
- C: netstat -e
- D: netstat -n
Question 132
Which of the following connectors and terminations are required to make a Cat 6 cable that connects from a PC to a non-capable MDIX switch? (Choose two.)
- A: TIA-568-A - TIA-568-B
- B: TIA-568-B - TIA-568-B
- C: RJ11
- D: RJ45
- E: F-type
Question 133
A technician is configuring a wireless network and needs to ensure users agree to an AUP before connecting. Which of the following should be implemented to achieve this goal?
- A: Captive portal
- B: Geofencing
- C: Wireless client isolation
- D: Role-based access
Question 134
A network technician needs to determine the IPv6 address of a malicious website. Which of the following record types would provide this information?
- A: A
- B: AAAA
- C: CNAME
- D: PTR
Question 135
Which of the following is used to track and document various types of known vulnerabilities?
- A: CVE
- B: Penetration testing
- C: Zero-day
- D: SIEM
- E: Least privilege
Question 136
A technician is troubleshooting a report about network connectivity issues on a workstation. Upon investigation, the technician notes the workstation is showing an
APIPA address on the network interface. The technician verifies that the VLAN assignment is correct and that the network interface has connectivity. Which of the following is MOST likely the issue the workstation is experiencing?
- A: DHCP exhaustion
- B: A rogue DHCP server
- C: A DNS server outage
- D: An incorrect subnet mask
Question 137
A network technician has determined the cause of a network disruption. Which of the following is the NEXT step for the technician to perform?
- A: Validate the findings in a top-to-bottom approach.
- B: Duplicate the issue, if possible.
- C: Establish a plan of action to resolve the issue.
- D: Document the findings and actions.
Question 138
Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols?
- A: Client-to-site VPN
- B: Clientless VPN
- C: RDP
- D: Site-to-site VPN
- E: SSH
Question 139
A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise. Each team member has been assigned an area to troubleshoot. Which of the following approaches is being used?
- A: Divide-and-conquer
- B: Top-to-bottom
- C: Bottom-to-top
- D: Determine if anything changed
Question 140
Which of the following use cases would justify the deployment of an mGRE hub-and-spoke topology?
- A: An increase in network security using encryption and packet encapsulation
- B: A network expansion caused by an increase in the number of branch locations to the headquarters
- C: A mandatory requirement to increase the deployment of an SDWAN network
- D: An improvement in network efficiency by increasing the useful packet payload
Question 141
Which of the following needs to be tested to achieve a Cat 6a certification for a company's data cabling?
- A: RJ11
- B: LC ports
- C: Patch panel
- D: F-type connector
Question 142
A network technician is responding to an issue with a local company. To which of the following documents should the network technician refer to determine the scope of the issue?
- A: MTTR
- B: MOU
- C: NDA
- D: SLA
Question 143
A company wants to set up a backup data center that can become active during a disaster. The site needs to contain network equipment and connectivity. Which of the following strategies should the company employ?
- A: Active-active
- B: Warm
- C: Cold
- D: Cloud
Question 144
Which of the following would be used to forward requests and replies between a DHCP server and client?
- A: Relay
- B: Lease
- C: Scope
- D: Range
Question 145
Network connectivity in an extensive forest reserve was achieved using fiber optics. A network fault was detected, and now the repair team needs to check the integrity of the fiber cable. Which of the following actions can reduce repair time?
- A: Using a tone generator and wire map to determine the fault location
- B: Using a multimeter to locate the fault point
- C: Using an OTDR in one end of the optic cable to get the fiber length information
- D: Using a spectrum analyzer and comparing the current wavelength with a working baseline
Question 146
The network administrator is informed that a user's email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)
- A: Captive portal
- B: Two-factor authentication
- C: Complex passwords
- D: Geofencing
- E: Role-based access
- F: Explicit deny
Question 147
A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause?
- A: The configuration of the encryption protocol
- B: Interference from other devices
- C: Insufficient bandwidth capacity
- D: Duplicate SSIDs
Question 148
Which of the following is a benefit of the spine-and-leaf network topology?
- A: Increased network security
- B: Stable network latency
- C: Simplified network management
- D: Eliminated need for inter-VLAN routing
Question 149
A technician performed a manual reconfiguration of a firewall, and network connectivity was reestablished. Some connection events that were previously sent to a syslog server are no longer being generated by the firewall. Which of the following should the technician perform to fix the issue?
- A: Adjust the proper logging level on the new firewall.
- B: Tune the filter for logging the severity level on the syslog server.
- C: Activate NetFlow traffic between the syslog server and the firewall.
- D: Restart the SNMP service running on the syslog server.
Question 150
A company rents out a large event space and includes wireless internet access for each tenant. Tenants reserve a two-hour window from the company each week, which includes a tenant-specific SSID. However, all users share the company's network hardware.
The network support team is receiving complaints from tenants that some users are unable to connect to the wireless network. Upon investigation, the support team discovers a pattern indicating that after a tenant with a particularly large attendance ends its sessions, tenants throughout the day are unable to connect.
The following settings are common to all network configurations:
Which of the following actions would MOST likely reduce this issue? (Choose two.)
- A: Change to WPA encryption.
- B: Change the DNS server to 10.1.10.1.
- C: Change the default gateway to 10.0.0.1.
- D: Change the DHCP scope end to 10.1.10.250.
- E: Disable AP isolation.
- F: Change the subnet mask to 255.255.255.192.
- G: Reduce the DHCP lease time to four hours.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!