N10-009
Free trial
Verified
Question 1
SIMULATION -
A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.
INSTRUCTIONS -
Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the correct settings:
Ensure each device accesses only its correctly associated network.
Disable all unused switchports.
Require fault-tolerant connections between the switches.
Only make necessary changes to complete the above requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
Question 2
Which of the following technologies are X.509 certificates most commonly associated with?
- A: PKI
- B: VLAN tagging
- C: LDAP
- D: MFA
Question 3
A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?
- A: SNMP trap
- B: Port mirroring
- C: Syslog collection
- D: API integration
Question 4
Which of the following most likely requires the use of subinterfaces?
- A: A router with only one available LAN port
- B: A firewall performing deep packet inspection
- C: A hub utilizing jumbo frames
- D: A switch using Spanning Tree Protocol
Question 5
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
- A: MAC security
- B: Content filtering
- C: Screened subnet
- D: Perimeter network
Question 6
Which of the following requires network devices to be managed using a different set of IP addresses?
- A: Console
- B: Split tunnel
- C: Jump box
- D: Out of band
Question 7
A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?
- A: Neighbor adjacency
- B: Link state flooding
- C: Administrative distance
- D: Hop count
Question 8
Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
- A: Duplicate the problem.
- B: Identify the symptoms.
- C: Gather information.
- D: Determine any changes.
Question 9
A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?
- A: 4096
- B: 8192
- C: 32768
- D: 36684
Question 10
A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?
- A: Stronger wireless connection
- B: Roaming between access points
- C: Advanced security
- D: Increased throughput
Question 11
A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?
- A: /24
- B: /26
- C: /28
- D: /30
Question 12
An attacker follows an employee through a badge-secured door before the door closes. Which of the following types of attacks is occurring?
- A: Shoulder surfing
- B: Tailgating
- C: Phishing
- D: On-path
Question 13
A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?
- A: Captive portal
- B: Enterprise authentication
- C: Ad hoc network
- D: WPA3
Question 14
A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?
- A: 802.1Q tagging
- B: Network address translation
- C: Port duplex
- D: Link aggregation
Question 15
A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?
- A: Trunk all VLANs on the port.
- B: Configure the native VLAN.
- C: Tag the traffic to voice VLAN.
- D: Disable VLANs.
Question 16
Which of the following can support a jumbo frame?
- A: Access point
- B: Bridge
- C: Hub
- D: Switch
Question 17
A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?
- A: NTP
- B: DNS
- C: LDAP
- D: DHCP
Question 18
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?
- A: GRE
- B: IKE
- C: ESP
- D: AH
Question 19
Which of the following protocols has a default administrative distance value of 90?
- A: RIP
- B: EIGRP
- C: OSPF
- D: BGP
Question 20
An office is experiencing intermittent connection issues. A network engineer identifies that the issue occurs whenever someone uses the fax machine that is connected to a switch. Which of the following should the engineer do first to resolve the issue?
- A: Run a new Cat 5 line.
- B: Enable 802.1Q tagging.
- C: Change the MTU.
- D: Configure a VLAN.
Question 21
A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?
- A: Update the firmware.
- B: Replace the system board.
- C: Patch the OS.
- D: Isolate the system.
Question 22
Which of the following fiber connector types is the most likely to be used on a network interface card?
- A: LC
- B: SC
- C: ST
- D: MPO
Question 23
Which of the following connectors provides console access to a switch?
- A: ST
- B: RJ45
- C: BNC
- D: SFP
Question 24
A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?
- A: Hosts file
- B: Self-signed certificate
- C: Nameserver record
- D: IP helper
Question 25
A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Choose two.)
- A: Mesh network
- B: 5GHz frequency
- C: Omnidirectional antenna
- D: Non-overlapping channel
- E: Captive portal
- F: Ad hoc network
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!