Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
N10-009
Free trial
Verified
Question 51
Which of the following allows a user to connect to an isolated device on a stand-alone network?
- A: Jump box
- B: API gateway
- C: Secure Shell
- D: Clientless VPN
Question 52
Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?
- A: The administrator did not provision enough IP addresses.
- B: The administrator configured an incorrect default gateway.
- C: The administrator did not provision enough routes.
- D: The administrator did not provision enough MAC addresses.
Question 53
A company is implementing a policy that will not allow employees to bring personal devices to the office and connect to the wireless network. Which of the following is the best way to enforce this policy?
- A: MAC filtering
- B: 802.1X
- C: Port security
- D: ACL
Question 54
A network engineer is troubleshooting an issue with a VoIP network. After performing analysis, the engineer found that when users upload large files, voice quality is severely degraded. When no other traffic is on the network, voice quality is fine. Which of the following should the engineer do to most likely resolve the issue?
- A: Enable MAC filtering.
- B: Reduce the VLAN database.
- C: Configure QoS on the router.
- D: Implement ACLs.
Question 55
Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?
- A: MTTR
- B: RTO
- C: RPO
- D: MTBF
Question 56
A network administrator needs to improve network monitoring. Which of the following should the administrator do first?
- A: Establish baseline metrics.
- B: Implement a SIEM.
- C: Perform regular packet captures.
- D: Conduct availability monitoring.
Question 57
Which of the following attacks utilizes a network packet that contains multiple network tags?
- A: MAC flooding
- B: VLAN hopping
- C: DNS spoofing
- D: ARP poisoning
Question 58
A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?
- A: Enable IP helper.
- B: Change the subnet mask.
- C: Increase the scope size.
- D: Add address exclusions.
Question 59
Which of the following is designed to distribute network traffic among devices based on the quantity of traffic?
- A: Load balancer
- B: Router
- C: Proxy
- D: Switch
Question 60
A user recently moved a workstation to a different part of the office. The user is able to access the internet and print but is unable to access server resources. Which of the following is the most likely cause of the issue?
- A: Incorrect default gateway
- B: Wrong VLAN assignment
- C: Error-disabled port
- D: Duplicate IP address
Question 61
A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?
- A: Sides
- B: Top
- C: Front
- D: Rear
Question 62
A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?
- A: /23
- B: /25
- C: /29
- D: /32
Question 63
Which of the following allows an organization to map multiple internal devices to a single external-facing IP address?
- A: NAT
- B: BGP
- C: OSPF
- D: FHRP
Question 64
Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?
- A: Identify the problem.
- B: Document the findings and outcomes.
- C: Test the theory to determine cause.
- D: Establish a plan of action.
Question 65
Which of the following configurations exempts traffic to the internet from traversing a VPN?
- A: Client-to-site
- B: Active-passive
- C: Split-tunnel
- D: Out-of-band
Question 66
Which of the following ports creates a secure connection to a directory service?
- A: 22
- B: 389
- C: 445
- D: 636
Question 67
A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches.
Which of the following best describes the issue?
- A: The port cost should not be equal.
- B: The ports should use link aggregation.
- C: A root bridge needs to be identified.
- D: The switch should be configured for RSTP.
Question 68
A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configurations would meet this requirement?
- A: Full duplex
- B: 802.1Q tagging
- C: Native VLAN
- D: Link aggregation
Question 69
A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?
- A: ACLs
- B: Port security
- C: Content filtering
- D: NAC
Question 70
Which of the following protocols is used to route traffic on the public internet?
- A: BGP
- B: OSPF
- C: EIGRP
- D: RIP
Question 71
Which of the following protocols provides remote access utilizing port 22?
- A: SSH
- B: Telnet
- C: TLS
- D: RDP
Question 72
After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perform this testing?
- A: dig
- B: ifconfig
- C: ping
- D: nmap
Question 73
Which of the following attacks would most likely cause duplicate IP addresses in a network?
- A: Rogue DHCP server
- B: DNS poisoning
- C: Social engineering
- D: Denial-of-service
Question 74
An organization wants better network visibility. The organization's requirements include:
• Multivendor/OS-monitoring capabilities
• Real-time collection
• Data correlation
Which of the following meets these requirements?
- A: SNMP
- B: SIEM
- C: Nmap
- D: Syslog
Question 75
An administrator is evaluating the use of authentication within SNMP. Which of the following is the most secure way of authenticating devices using only SNMP?
- A: Use version 1 of SNMP and use a community string to serve as a PSK
- B: Use version 3 of SNMP and set up trap messages for critical events on the network
- C: Use version 2c of SNMP and use informs to validate device authentication
- D: Use version 2u of SNMP to authenticate devices for network monitoring
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!