Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 161-170

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.161

Which of the following cables has the MOST twists per inch?

  1. CAT3

  2. CAT5

  3. CAY5e

  4. CAT6

Correct Answer: D

Question No.162

A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?

  1. PoE

  2. Layer 3 switching

  3. STP

  4. VLAN

Correct Answer: A

Question No.163

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

A.

20

B.

53

C.

80

D.

3389

Correct Answer: B

Question No.164

Which of the following access controls enforces permissions based on data labeling at specific levels?

  1. Mandatory access control

  2. Separation of duties access control

  3. Discretionary access control

  4. Role based access control

Correct Answer: A

Question No.165

Which of the following cables will MOST likely be used to connect to a satellite dish?

  1. RG-6

  2. CAT5e

  3. Fiber

  4. CAT6

Correct Answer: A

Question No.166

Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

  1. RJ-11

  2. BNC

  3. LC

  4. DB-9

Correct Answer: D

Question No.167

A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage?

  1. netsh lan

  2. netsh interface

  3. netsh wlan

  4. netsh winsock

Correct Answer: D

Question No.168

Which of the following MUST be kept synchronized in order for Kerberos to work?

  1. Certificate

  2. Ticket

  3. Time

  4. Token

Correct Answer: C

Question No.169

A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO).

A.

20

B.

80

C.

143

D. 443

E. 8080

Correct Answer: BD

Question No.170

Privilege creep among long-term employees can be mitigated by which of the following procedures?

  1. User permission reviews

  2. Mandatory vacations

  3. Separation of duties

  4. Job function rotation

Correct Answer: A

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 171-180

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.171

Which of the following is a proprietary routing protocol?

  1. RIP

  2. EIGRP

  3. OSPF

  4. BGP

Correct Answer: B

Question No.172

A username provides which of the following?

  1. Biometrics

  2. Identification

  3. Authorization

  4. Authentication

Correct Answer: B

Question No.173

A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point. Which of the following is the MOST likely reason some users cannot connect?

  1. Incorrect channel

  2. Weak encryption

  3. Incompatible NICs

  4. Incorrect SSID

Correct Answer: C

Question No.174

Which of the following describes a DNS server?

  1. Translates an IP address to a name

  2. Caches commonly viewed web pages

  3. Assigns IP addresses to network devices

  4. Provides port security for a network

Correct Answer: A

Question No.175

A company has just installed wireless in their office. In one corner of the office building users are not able to establish a connection. Which of the following can be changed on the AP to help resolve this issue?

  1. SSID

  2. Channels

  3. Signal strength

  4. Encryption

Correct Answer: C

Question No.176

Which of the following specifications would Sara, an administrator, implement as a network access control?

A. 802.1q B. 802.3 C. 802.11n D. 802.1x

Correct Answer: D

Question No.177

Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?

  1. Channel

  2. WEP

  3. SSID

  4. WPA

Correct Answer: C

Question No.178

The software that allows a machine to run multiple operating systems at once is called the:

  1. Server manager

  2. Hypervisor

  3. Boot loader

  4. Partition manager

Correct Answer: B

Question No.179

After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?

  1. Punch down tool

  2. Cable certifier

  3. Loopback plug

  4. Toner probe

Correct Answer: B

Question No.180

Which of the following is true about an IP address if the first bit is a one and the second bit is a zero?

  1. The address is a Class A address.

  2. The address is a Class B address.

  3. The address is a Class C address.

  4. The address is a Class D address.

Correct Answer: B

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 151-160

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.151

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

  1. penetration testing

  2. vulnerability scanning

  3. reconnaissance

  4. social engineering

Correct Answer: A

Question No.152

Which of the following WAP security features offers the STRONGEST encryption?

  1. WPA

  2. WPA2

  3. WEP

  4. Hidden SSID

Correct Answer: B

Question No.153

Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?

  1. Spam filter

  2. Protocol analyzer

  3. Web application firewall

  4. Load balancer

Correct Answer: B

Question No.154

Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?

  1. RTP

  2. NTP

  3. TFTP

  4. ARP

Correct Answer: B

Question No.155

Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?

  1. CAT3

  2. CAT5

  3. CAT5e

  4. CAT6

Correct Answer: B

Question No.156

Which of the following ports is the default telnet port?

A.

20

B.

21

C.

22

D.

23

Correct Answer: D

Question No.157

Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?

A. 802.11a B. 802.11b C. 802.11g D. 802.11n

Correct Answer: D

Question No.158

Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?

  1. RDP

  2. SSL VPN

  3. ISAKMP

  4. TLS 2.0

Correct Answer: B

Question No.159

Which of the following mediums is circuit switched?

  1. PSTN

  2. ATM

  3. Frame relay

  4. MPLS

Correct Answer: A

Question No.160

Which of the following is a secure way to connect to a device?

  1. RSH

  2. TFTP

  3. SNMPv2

  4. SFTP

Correct Answer: D

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 101-110

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.101

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

  1. Loopback adapter

  2. Cable tester

  3. Tone generator

  4. Multimeter

Correct Answer: A

Question No.102

A technician is trying to determine the IP address of a customer#39;s router. The customer hasan IP address of 192.168.1.55/24. Which of the following is the address of the customer#39;s router?

A.

192.168.0.55

B.

192.168.1.0

C.

192.168.1.1

D.

192.168.5.5

E.

255.255.255.0

Correct Answer: C

Question No.103

A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?

  1. Test the possible solution

  2. Question the users

  3. Determine what haschanged

  4. Document the theory

Correct Answer: A

Question No.104

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?

  1. Smurf attack

  2. Rogue AP

  3. Compromised system

  4. Unintentional DoS

Correct Answer: C

Question No.105

An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?

  1. DHCP relay

  2. DHCP exclusion

  3. DHCP option

  4. DHCP reservation

Correct Answer: D

Question No.106

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?

  1. Access control lists

  2. Captive portal

  3. WPA2

  4. Port security

Correct Answer: D

Question No.107

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?

  1. Asset tracking tags

  2. Motion detectors

  3. Security guards

  4. Computer locks

Correct Answer: D

Question No.108

Which of the following would be the MOST efficient subnet mask for a point-to-point link?

A.

/28

B.

/29

C.

/31

D.

/32

Correct Answer: C

Question No.109

Which of the following methods for network performance optimization is used to distribute traffic among similar devices?

  1. Fault tolerance

  2. QoS

  3. Proxy server

  4. Load balancing

Correct Answer: D

Question No.110

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?

  1. Decreased performance of internal network

  2. Loss of full control over data resources

  3. Increased malware exposure

  4. Incompatibility with the current network

Correct Answer: B

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 111-120

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.111

A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling.

Which of the following should the network technician use to help identify the appropriate cable?

  1. Tone generator

  2. Multimeter

  3. OTDR

  4. Loopback adapter

Correct Answer: A

Question No.112

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician identify in the proposal?

  1. IaaS

  2. PaaS

  3. SaaS

  4. MaaS

Correct Answer: C

Question No.113

When enabling jumbo frames on a network device, which of the following parameters is being adjusted?

  1. Speed

  2. Duplex

  3. MTU

  4. TTL

Correct Answer: C

Question No.114

Which of the following DNS records needs to be configured for SMTP traffic?

  1. MX

  2. CNAME

  3. AAAA

  4. PTR

Correct Answer: A

Question No.115

A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician use to determine which statistics are not in the normal range?

  1. Baseline review

  2. Vulnerability scan

  3. System life-cycle report

  4. Archiving logs

Correct Answer: A

Question No.116

An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist?

A.

3

B.

12

C.

13

D.

14

E.

15

Correct Answer: D

Question No.117

A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?

  1. LC

  2. ST

  3. SC

  4. MTRJ

  5. MTP

Correct Answer: B

Question No.118

Which of the following protocols do MOST MITM attacks utilize?

  1. ARP

  2. SIP

  3. FTP

  4. SCP

Correct Answer: A

Question No.119

A technician discovers that multiple switches require a major update. Which of the following policies should be followed?

  1. Change management policy

  2. Remote access policy

  3. Acceptable use policy

  4. Memorandum of understanding

Correct Answer: A

Question No.120

When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?

  1. iSCSI

  2. Fibre Channel

  3. NAS

  4. DAS

Correct Answer: C

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 121-130

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.121

A technician is replacing a switch at a branch office and discovers the existing backbone cable does not fit in the new switch. The fiber patch panel has circular connections. The new switch has a transceiver that accepts a smaller square adapter of two strands. Which of the following patch cables would the technician need to complete the installation?

  1. LC to SC

  2. SC to ST

  3. LC to ST

  4. ST to ST

  5. SC to SC

Correct Answer: C

Question No.122

Which of the following devices should a network administrator configure on the outermost part of the network?

  1. Media converter

  2. Switch

  3. Modem

  4. Firewall

Correct Answer: D

Question No.123

A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up.

Considering that the config files are the same, which of the following is the MOST likely cause of the failure?

  1. Damaged fiber

  2. Corrupted operating system

  3. VLAN mismatch

  4. Bad port

Correct Answer: B

Question No.124

A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the following is an out-of- band method the technician would MOST likely utilize to check the branch office#39;s router status?

  1. Use a modem to console into the router

  2. Walk a user through troubleshooting the connection

  3. Travel to the branch office

  4. Hire a contractor to go on-site

Correct Answer: A

Question No.125

A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?

  1. SSH in tunnel mode

  2. RDP set to console connection

  3. EAP-PEAP

  4. SFTP

Correct Answer: A

Question No.126

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?

  1. Power levels

  2. Overcapacity

  3. Distance limitations

  4. Channel overlap

Correct Answer: A

Question No.127

A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?

  1. Adding a fingerprint reader to each workstation and providing a RSA authentication token

  2. Adding a fingerprint reader and retina scanner

  3. Using a smart card and RSA token

  4. Enforcing a stronger password policy and using a hand geometry scan

Correct Answer: A

Question No.128

A network technician is testing a new firewall configuration. The company wants Internet access using HTIP and HTIPS for web browsing following ACL files have been placed on the outside firewall interface.

Outbound

Permit TCP any any port 80 Permit TCP any any port 443 Inbound

Deny IP any any

Using the above configuration, the technician is unable to reach websites using their URLs. Which of the following actions should be taken in allow the technician to access the websites?

  1. IP port 53 needs to be permitted outbound.

  2. The inbound and outbound ACLs need to be switched.

  3. TCP ports 20 and 21 need to be used for web browsing.

  4. Web browsing requires UDP not TCP ports to be permitted.

Correct Answer: A

Question No.129

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network. Which of the following components should the technician check on the Windows workstations? (Choose two.)

  1. Start the Wired AutoConfig service in the Services console

  2. Enable IEEE 802.1q Authentication in Network Interface Card Properties

  3. Enable IEEE 802.1x Authentication in Network Interface Card Properties

  4. Start the Wireless AutoConfig service in the Services console

  5. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties

Correct Answer: AC

Question No.130

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

  1. MAC address reservation

  2. Static IP address

  3. IP address exclusion

  4. Custom DNS server entry

Correct Answer: A

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 131-140

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.131

A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?

A.

/24

B.

/25

C.

/30

D.

/32

Correct Answer: C

Question No.132

A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs between devices. Which of the following tools are MOST likely needed to complete the task? (Choose three.)

  1. Wire stripper

  2. Cable crimper

  3. RJ-11 connectors

  4. RJ-45 connectors

  5. Multimeter

  6. Punchdown tool

  7. Tone generator

Correct Answer: ABD

Question No.133

A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?

  1. Reverse the wires leading to pins 1 and 2

  2. Reverse the wires leading to pins 1 and 3

  3. Reverse the wires leading to pins 2 and 3

  4. Reverse the wires leading to pins 2 and 4

Correct Answer: B

Question No.134

A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?

  1. Bridge

  2. Access point

  3. Router

  4. Range extender

Correct Answer: C

Question No.135

A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?

  1. Move the UTM onto the LAN side of the network

  2. Enable TLS inspection on the UTM

  3. Enable stateful inspection on the UTM

  4. Configure the UTM to deny encrypted files from being transferred

Correct Answer: C

Question No.136

To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?

  1. Add a redundant power supply to the switch

  2. Implement stacking on the switches in the rack

  3. Add a second UPS into the rack

  4. Install a power converter for the switch

Correct Answer: A

Question No.137

In which of the following ways does a DDoS attack differ from a spoofing attack?

  1. DDoS attacks target multiple networks

  2. Spoofing attacks originate from a single host

  3. DDoS attacks are launched from multiple hosts

  4. Spoofing attacks require physical presence

Correct Answer: C

Question No.138

Which of the following BEST describes the differences between VLAN hopping and session hijacking?

  1. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user#39;s web connection to execute commands

  2. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection

  3. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges

  4. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web- based attack aimed at privilege escalation

Correct Answer: A

Question No.139

Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)

A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n

Correct Answer: BE

Question No.140

A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel#39;s patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?

  1. Place a switch at the hotel#39;s patch panel for connecting each room#39;s cables

  2. Place a switch on each table to ensure strong connectivity

  3. Place repeaters between the patch panel and the rooms

  4. place a switch at the wall jack and run the cables in the room from there

Correct Answer: A

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 141-150

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.141

A customer cannot access a company#39;s secure website. The company#39;s network security is reviewing the firewall for the server and finds the following output:

image

Which of the following changes should be made to allow all customers to access the company#39;s secure website?

  1. Allow any any 10.5.0.10 443

  2. Allow any any 12.73.15.5 443

  3. Allow 10.5.0.10 443 any any

D. Allow 10.5.0.10 any 10.5.0.10 80

Correct Answer: C

Question No.142

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?

  1. Proxy server

  2. UTM appliance

  3. Content filter

  4. Load balancer

Correct Answer: D

Question No.143

A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department#39;s router, but is not able to ping the machine from the IT network. Which of the following is MOST likely the cause?

  1. Incorrect default gateway

  2. Duplicate IP address

  3. Misconfigured OSPF

  4. Improper VLAN assignment

Correct Answer: A

Question No.144

A Network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Witch of the following indicates the correct IP address range?

A.

172.16.80.0 – 172.16.85.254

B.

172.16.80.0 – 172.16.88.255

C.

172.16.80.1 – 172.16.87.254

D.

172.16.80.1 – 172.16.85.255

Correct Answer: C

Question No.145

A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)

  1. RG-9

  2. DB-9

  3. RJ-11

  4. DB-25

  5. RJ-45

  6. BNC

Correct Answer: BE

Question No.146

A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users#39; laptops. Which of the following issues should be reviewed to help the user to connect to the wireless network?

  1. Wireless switch toggled off

  2. WAP settings

  3. WLAN IP address out of scope

  4. Wireless controller misconfiguration

Correct Answer: A

Question No.147

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization#39;s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization#39;s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?

  1. Bluesnarfing

  2. Session hijacking

  3. MAC spoofing

  4. VLAN hopping

  5. Man-in-the-middle

Correct Answer: E

Question No.148

Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?

A.

0

B.

1

C.

2

D.

6

E.

12

Correct Answer: B

Question No.149

An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:

WLAN architecture supporting speeds in excess of 150 Mbps Clientless remote network access

Port-based network access control

Which of the following solution sets properly addresses all of the identified requirements? A. 802.11a, IPSec VPN, 802.1x

B. 802.11ac, MPLS, 802.3 C. 802.11b, PPTP, 802.1x

D. 802.11g, MS-CHAP, 802.16 E. 802.11n, SSL-VPN, 802.1x

Correct Answer: E

Question No.150

A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the database server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the purpose of this device?

  1. Content filtering and network analysis

  2. Load balancing and providing high availability

  3. Port sniffing and protocol analysis

  4. Clustering and NIC teaming

Correct Answer: B

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.71

A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate?

  1. Air flow and cooling

  2. UPS capability

  3. Circuit labeling

  4. Power redundancy

Correct Answer: A

Question No.72

A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?

  1. The WAP antenna is damaged

  2. The WAP transmitter light is dim

  3. The terminal emulation software is misconfigured

  4. The LWAPP image is installed on the WAP

Correct Answer: C

Question No.73

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

  1. DLP

  2. AUP

  3. NDA

  4. SLA

Correct Answer: A

Question No.74

A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network administrator use to ensure the data transferred is confidential?

  1. authpriv

  2. SHA

  3. MD5

  4. Authentication passphrase

Correct Answer: A

Question No.75

An office user cannot access local network drives but has full access to the Internet. A technician troubleshoots the issue and observes the following output of the ipconfig command:

image

Which of the following would MOST likely allow the network drives to be accessed?

  1. Update the WLAN adapter driver

  2. Disable the WLAN adapter

  3. Check the wireless DHCP configuration

  4. Disable the LAN adapter

Correct Answer: B

Question No.76

A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)

  1. Enable SSID broadcasting to identify the guest network

  2. Configure visitor devices to use static IP addresses

  3. Enable two-factor authentication on visitor devices

  4. Configure the access point to use WPA2-AES encryption

  5. Ensure the access point is not running in mixed mode

Correct Answer: AB

Question No.77

The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician suspects the performance issues are network related. Which of the following should the technician do to improve performance?

  1. Utilize UDP to eliminate packet overhead

  2. Turn off MDIX settings on the NAS and server switchports

  3. Enable jumbo frames on the NAS and server

  4. Encapsulate the storage traffic in a GRE tunnel

Correct Answer: C

Question No.78

A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)

  1. tracert

  2. ping

  3. tcpdump

  4. pathping

  5. netstat

  6. nslookup

  7. route

Correct Answer: EF

Question No.79

A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?

  1. Site survey

  2. Vulnerability scanning

  3. Wardriving

  4. Checking logical diagram

  5. Bandwidth test

Correct Answer: A

Question No.80

A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?

  1. DLP

  2. IDS

  3. WAF

  4. WPA

  5. TPM

Correct Answer: C

Get Full Version of N10-007 Dumps

Categories
N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.81

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company#39;s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

  1. Document the reason for the request

  2. Scan the file for malware to protect the sales department#39;s computers

  3. Follow the company#39;s approval process for the implementation

  4. Install a TFTP server for the customers to use for the transfer

  5. Create a honeypot to store the file on for the customers to use

  6. Write the SLA for the sales department authorizing the change

Correct Answer: AC

Question No.82

Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?

  1. traceroute

  2. ping

  3. nslookup

  4. netstat

Correct Answer: A

Question No.83

A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the terminal should be configured to allow for connectivity? (Select THREE).

  1. TCP 25

  2. TCP

  3. TCP 143

  4. TCP 389

  5. TCP 587

  6. TCP 993

  7. TCP 995

Correct Answer: EFG

Question No.84

A systems administrator has recently purchased and installed a large electronic signage screen for the company#39;s parking garage. The screen#39;s management software was installed on a server with a public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?

  1. Changing the management software#39;s default credentials

  2. Disabling unnecessary services from the server and management software

  3. Changing the management software#39;s default port

  4. Replacing the management software#39;s self-signed certificate with a valid certificate

Correct Answer: A

Question No.85

An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is quot;Incompletequot;. Which of the following could cause this condition?

  1. VLAN mismatch

  2. Duplex/Speed mismatch

  3. Duplicate IP address

  4. TX/RX reverse

Correct Answer: B

Question No.86

A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST likely issue with the cable?

  1. The cable is a crossover cable

  2. The cable is rollover cable

  3. The cable has bent pins

  4. The cable is a Cat 5 cable

Correct Answer: A

Question No.87

As part of a transition from a static to a dynamic routing protocol on an organization#39;s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which

of the following should the network administrator use? (Choose two.)

  1. OSPF

  2. IS-IS

  3. RIPv1

  4. BGP

  5. VRRP

Correct Answer: AB

Question No.88

A network technician is connecting two switches together. Which of the following protocols should the technician use to increase speed and fault tolerance?

  1. SIP

  2. BGP

  3. LACP

  4. LLDP

Correct Answer: C

Question No.89

Which of the following provides the ability to deploy consistent access point configurations from a central location?

  1. Wireless controller

  2. AAA server

  3. WiFi-protected setup

  4. Proxy server

  5. VPN concentrator

Correct Answer: A

Question No.90

A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network from the other eight computers. Which of the following represents the BEST configuration for the remote site?

  1. One router connected to one 24-port switch configured with three VLANS: one for the manager#39;scomputers and printer, one for the other computers and printer, and one for the VoIP phones

  2. Two routers with each router connected to a 12-port switch, with a firewall connected to the switchconnected to the manager#39;s desktop computers, VoIP phones, and printer

  3. One router connected to one 12-port switch configured for the manager#39;s computers, phones, and printer,and one 12-port switch configured for the other computers, VoIP phones, and printer

  4. One router connected to one 24-port switch configured with two VLANS: one for the manager#39;s computers,VoIP phones, and printer, and one for the other computers, VoIP phones, and printer

Correct Answer: A

Get Full Version of N10-007 Dumps