Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
N10-008
Free trial
Verified
Question 151
A user from a remote office is reporting slow file transfers. Which of the following tools will an engineer MOST likely use to get detailed measurement data?
- A: Packet capture
- B: iPerf
- C: NetFlow analyzer
- D: Internet speed test
Question 152
When accessing corporate network resources, users are required to authenticate to each application they try to access. Which of the following concepts does this
BEST represent?
- A: SSO
- B: Zero Trust
- C: VPN
- D: Role-based access control
Question 153
Logs show an unauthorized IP address entering a secure part of the network every night at 8:00 p.m. The network administrator is concerned that this IP address will cause an issue to a critical server and would like to deny the IP address at the edge of the network. Which of the following solutions would address these concerns?
- A: Changing the VLAN of the web server
- B: Changing the server's IP address
- C: Implementing an ACL
- D: Installing a rule on the firewall connected to the web server
Question 154
A network administrator is troubleshooting a connectivity performance issue. As part of the troubleshooting process, the administrator performs a traceroute from the client to the server, and also from the server to the client. While comparing the outputs, the administrator notes they show different hops between the hosts. Which of the following BEST explains these findings?
- A: Asymmetric routing
- B: A routing loop
- C: A switch loop
- D: An incorrect gateway
Question 155
A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of the connectivity failure?
- A: Incorrect VLAN
- B: DNS failure
- C: DHCP scope exhaustion
- D: Incorrect gateway
Question 156
A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use?
- A: Network access control
- B: Least privilege
- C: Multifactor authentication
- D: Separation of duties
Question 157
A network engineer performs the following tasks to increase server bandwidth:
✑ Connects two network cables from the server to a switch stack
✑ Configure LACP on the switchports
Verifies the correct configurations on the switch interfaces
Which of the following needs to be configured on the server?
- A: Load balancing
- B: Multipathing
- C: NIC teaming
- D: Clustering
Question 158
A technician is connecting a Cat 6 Ethernet cable to a device that only has LC ports. Which of the following will the technician MOST likely use to accomplish this task?
- A: A bridge
- B: A media converter
- C: A repeater
- D: A router
Question 159
After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes.
Which of the following would be BEST to use for these notifications?
- A: Traps
- B: MIB
- C: NetFlow
- D: Syslog
Question 160
Users in a branch can access an in-house database server, but it is taking too long to fetch records. The analyst does not know whether the issue is being caused by network latency. Which of the following will the analyst MOST likely use to retrieve the metrics that are needed to resolve this issue?
- A: SNMP
- B: Link state
- C: Syslog
- D: QoS
- E: Traffic shaping
Question 161
At which of the following OSI model layers does an IMAP client run?
- A: Layer 2
- B: Layer 4
- C: Layer 6
- D: Layer 7
Question 162
Which of the following would be the MOST cost-effective recovery solution for a company's lower-priority applications?
- A: Warm site
- B: Cloud site
- C: Hot site
- D: Cold site
Question 163
Which of the following network devices can perform routing between VLANs?
- A: Layer 2 switch
- B: Layer 3 switch
- C: Load balancer
- D: Bridge
Question 164
A network administrator wants to test the throughput of a new metro Ethernet circuit to verify that its performance matches the requirements specified in the SLA.
Which of the following would BEST help measure the throughput?
- A: iPerf
- B: Ping
- C: NetFlow
- D: Netstat
Question 165
A Wi-Fi network was recently deployed in a new, multilevel building. Several issues are now being reported related to latency and drops in coverage. Which of the following is the FIRST step to troubleshoot the issues?
- A: Perform a site survey.
- B: Review the AP placement.
- C: Monitor channel utilization.
- D: Test cable attenuation.
Question 166
Which of the following is the primary function of the core layer of the three-tiered model?
- A: Routing
- B: Repeating
- C: Bridging
- D: Switching
Question 167
An IT officer is installing a new WAP. Which of the following must the officer change to connect users securely to the WAP?
- A: AES encryption
- B: Channel to the highest frequency within the band
- C: TKIP encryption protocol
- D: Dynamic selection of the frequency
Question 168
A network technician is manually configuring the network settings for a new device and is told the network block is 192.168.0.0/20. Which of the following subnets should the technician use?
- A: 255.255.128.0
- B: 255.255.192.0
- C: 255.255.240.0
- D: 255.255.248.0
Question 169
To comply with an industry regulation, all communication destined to a secure server should be logged and archived on a storage device. Which of the following can be configured to fulfill this requirement?
- A: QoS traffic classification
- B: Port mirroring
- C: Flow control
- D: Link Aggregation Control Protocol
Question 170
Which of the following routing protocols is generally used by major ISPs for handling large-scale internet traffic?
- A: RIP
- B: EIGRP
- C: OSPF
- D: BGP
Question 171
A technician is consolidating a topology with multiple SSIDs into one unique SSID deployment. Which of the following features will be possible after this new configuration?
- A: Seamless roaming
- B: Basic service set
- C: WPA
- D: MU-MIMO
Question 172
Which of the following is used to provide disaster recovery capabilities to spin up all critical devices using internet resources?
- A: Cloud site
- B: Hot site
- C: Cold site
- D: Warm site
Question 173
Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?
- A: Virus
- B: Botnet
- C: ARP spoofing
- D: DDoS
Question 174
Several end users viewing a training video report seeing pixelated images while watching. A network administrator reviews the core switch and is unable to find an immediate cause. Which of the following BEST explains what is occurring?
- A: Jitter
- B: Bandwidth
- C: Latency
- D: Giants
Question 175
An international company is transferring its IT assets, including a number of WAPs, from the United States to an office in Europe for deployment. Which of the following considerations should the company research before implementing the wireless hardware?
- A: WPA2 cipher
- B: Regulatory impacts
- C: CDMA configuration
- D: 802.11 standards
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!