Network + N10-008 practice exam 2024/175
Questions with correct Answers/Verifi ed
Which of the following tools would generate this output?
Protocol. Local address. Foreign address. State
TCP 127.0.0.1:48512 Desktop-Open:64251. Established
TCP 127.0.0.1:64251. Desktop-Open:48512. Established - >>Netstat - displays
active/ listening connections
-People living near your business are using your guest Wi-Fi in order to gain free
Internet access and to download questionable files. Which of the following can
be done to most easily address this issue? - >>Reduce the wireless power levels
- adjusting the power level of anAP can be an easy way to decrease the radius in
which people can connect to your Wi-Fi. Leaving your power levels at their
default can lead to many unintended individuals seeing your network
-Which protocol would be used to exchange information between different
Autonomous systems? - >>BSP - is an EGP (external gateway protocol) and is
used to exchange information between autonomous systems.
autonomous systems. - A network or a group of networks owned/controlled by a
single entity
-Which of the following controls could be used to allow employees entry into
building to be recorded by a card reader? - >>Access control vestibules -
physical or logical list of who entered a room/building. This could be a sign in
sheet or even a complex system that reads RFID cards and records who
enters/leaves in area electronically
-Which of the following can be used to centrally manage credentials for various
accounts or privilege levels on network devices? - >>TACACS+
-While troubleshooting a network you notice a connection reporting Late
collisions over a half duplex link. You verify that both ends of the device are
indeed running half duplex interfaces. Given that information which of the
following answers is the most likely cause of this scenario? - >>The cable length
is excessive - whenever you see lake collisions that is a telltale sign that your
cable is running past its maximum recommended length for example twisted-
pair cables shouldn't be run further than 100 m ( 328ft)
, -While configuring a load balancer between multiple systems which of the
following must be configured in order to ensure proper connectivity during a fail
over? - >>VIP - virtual IP an essential part of configuring load balance systems as
a single system
-Which of the following service models would most likely be used to replace on
premises servers with a could solution - >>IaaS - client moves whole
infrastructure to the cloud minus the hardware of course which is always
controlled by the CSP in cloud deployments
-Which of the following best mitigate a hackers frequent attempts at brute
forceing A company's password - >>Two factor authentication, complex
passwords. —
passwords are best protected with longer, more complex passwords preferably
pass phrases made up of multiple words.
Additionally some form of MFA is considered essential today for "password
security". Multi factor authentication protects your password by preventing it
from being a single point of failure now we should require another factor in
addition to our password such as using a biometrics or a smart card
-After configuring new firewalls with the correct configuration to be deployed to
each remote branch, unneeded services were disabled, and all firewalls rules
were applied successfully. Which of the following actions should be performed
next to finish hardening the firewalls? - >>Update the firewalls with current
firmware and software —
Keeping a device up today is an essential step in hardening any system
-Which of the following solutions would allow for high speed, low latency, and
globally disperse content distribution? - >>Public cloud —
CDNs or content delivery networks are load balance networks that are
geographically separated in order to provide the best connection for local users
while also providing normal load balancing services. This is just the idea of
having many servers all around the world to serve many people
-A new network was set up in order to facilitate more users in a building near
your companies HQ. The new network is connected to the HQ's LAN via a fiber
optic cable. However many users on the new network are unable to access the
companies Intranet despise being able to access the Internet. Which of the
following corrections would most likely resolve this issue? - >>Correct the
external firewall gateway address —
, Could be a misconfigured firewall
-Which of the following attacks consists of following closely behind a real
employee into a secure building by grabbing the door without their knowledge? -
>>Tailgating —
Is the act of following somebody into a secure area without their knowledge
Piggybacking is following somebody into a secure area with their knowledge
-IP headers would be found under which of the following OSI layers? - >>Layer
3- routers, IPv4 , IPv6, and ICMP
-Which of the following solutions would provide redundancy for a server if our
main concern is physical port failure - >>NIC teaming —
Utilizing multiple physical network cards/ethernet ports in order to connect to
the network. This would allow one to physically fail while keeping network
connectivity
-Which of the following is the largest MTU for a standard ethernet frame -
>>1500
-Which of the following TCP ports is used by the windows OS for file sharing -
>>445- NetBIOS/SMB ( sharing files/access)
-Which of the following subnet mask's is the equivalent of a CIDR of /20? -
>>255.255.240.0. - /20
-A large amount of expensive equipment is being moved into a company
warehouse this equipment needs to be tracked when it leaves or enters the
warehouse or when it is taken to be serviced which of the following solutions
would best allow us to record these changes - >>Asset tags—
Asset tags are great for tracking inventory of any type. We can scan the tags and
usually enter a note during the process to describe the actions we took during
this time
-Which of the following is most likely to generate sufficient East-West traffic? -
>>A duplication of a hosted virtual server to another physical server for
redundancy.
East-West traffic is server to server traffic, while north-South traffic is server to
client
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseSallyD. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $15.99. You're not tied to anything after your purchase.