Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd 1. Which of the following tools would generate this output? Netstat - displays active/ listening connections Protocol. Local address. Foreign address. State TCP 127.0.0.1:48512 Desktop-Open:64251. Established TCP 127.0.0.1:64251. Desktop-Open:48512. Established 2. People living near your business are using your guest Wi-Fi in order to gain free Internet access and to download questionable files. Which of the following can be done to most easily address this issue? Reduce the wireless power levels - adjusting the power level of anAP can be an easy way to decrease the radius in which people can connect to your Wi-Fi. Leaving your power levels at their default can lead to many unintended individuals seeing your network 3. Which protocol would be used BSP - is an EGP (external gateway prototo exchange information becol) and is used to exchange information tween different Autonomous between autonomous systems. systems? autonomous systems. - A network or a group of networks owned/controlled by a single entity 4. Which of the following controls could be used to allow employees entry into building to be recorded by a card reader? 5. Which of the following can be TACACS+ used to centrally manage credentials for various accounts or privilege levels on network devices? Access control vestibules - physical or logical list of who entered a room/building. This could be a sign in sheet or even a complex system that reads RFID cards and records who enters/leaves in area electronically 1 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd 6. While troubleshooting a network you notice a connection reporting Late collisions over a half duplex link. You verify that both ends of the device are indeed running half duplex interfaces. Given that information which of the following answers is the most likely cause of this scenario? The cable length is excessive - whenever you see lake collisions that is a telltale sign that your cable is running past its maximum recommended length for example twisted-pair cables shouldn't be run further than 100 m ( 328ft) 7. While configuring a load bal- VIP - virtual IP an essential part of conancer between multiple sysfiguring load balance systems as a single tems which of the following system must be configured in order to ensure proper connectivity during a fail over? 8. Which of the following service models would most likely be used to replace on premises servers with a could solution IaaS - client moves whole infrastructure to the cloud minus the hardware of course which is always controlled by the CSP in cloud deployments 9. Which of the following best mitigate a hackers frequent attempts at brute forceing A company's password Two factor authentication, complex passwords. — passwords are best protected with longer, more complex passwords preferably pass phrases made up of multiple words. Additionally some form of MFA is considered essential today for "password security". Multi factor authentication protects your password by preventing it from being a single point of failure now we should require another factor in addition to our password such as using a biometrics or a smart card 10. After configuring new firewalls Update the firewalls with current firmware with the correct configuration and software — to be deployed to each re2 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd mote branch, unneeded serKeeping a device up today is an essential vices were disabled, and all fire- step in hardening any system walls rules were applied successfully. Which of the following actions should be performed next to finish hardening the firewalls? 11. Which of the following solutions would allow for high speed, low latency, and globally disperse content distribution? Public cloud — CDNs or content delivery networks are load balance networks that are geographically separated in order to provide the best connection for local users while also providing normal load balancing services. This is just the idea of having many servers all around the world to serve many people 12. A new network was set up in Correct the external firewall gateway adorder to facilitate more users in dress — a building near your companies HQ. The new network is conCould be a misconfigured firewall nected to the HQ's LAN via a fiber optic cable. However many users on the new network are unable to access the companies Intranet despise being able to access the Internet. Which of the following corrections would most likely resolve this issue? 13. Which of the following attacks consists of following closely behind a real employee into a secure building by grabbing the door without their knowledge? Tailgating — Is the act of following somebody into a secure area without their knowledge 14. Layer 3- routers, IPv4 , IPv6, and ICMP Piggybacking is following somebody into a secure area with their knowledge 3 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd IP headers would be found under which of the following OSI layers? 15. Which of the following solutions would provide redundancy for a server if our main concern is physical port failure NIC teaming — Utilizing multiple physical network cards/ethernet ports in order to connect to the network. This would allow one to physically fail while keeping network connectivity 16. Which of the following is the 1500 largest MTU for a standard ethernet frame 17. Which of the following TCP ports is used by the windows OS for file sharing 445- NetBIOS/SMB ( sharing files/access) 18. Which of the following subnet 255.255.240.0. - /20 mask's is the equivalent of a CIDR of /20? 19. A large amount of expensive equipment is being moved into a company warehouse this equipment needs to be tracked when it leaves or enters the warehouse or when it is taken to be serviced which of the following solutions would best allow us to record these changes Asset tags— Asset tags are great for tracking inventory of any type. We can scan the tags and usually enter a note during the process to describe the actions we took during this time 20. Which of the following is most A duplication of a hosted virtual server to likely to generate sufficient another physical server for redundancy. East-West traffic? East-West traffic is server to server traffic, while north-South traffic is server to client 21. 4 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd In order to save money, you're trying to make a purchasing decision in order to get a device that provides access ports for edge systems are also allowing routing between networks. Which of the following pieces of hardware would be best for fill this requirement A layer three switch — We want to connect our clients via access ports (The job of a switch) and also connects to other networks ( The job of a router) this is the perfect opportunity to utilize a layer 3/ Multi layer switch. A layer 3 switch has the capabilities of both a switch and a router 22. While installing Wi-Fi for a large 5 GHz. — 23 non overlapping channels amount of users, we want to utilize and 802.11 Standard with the maximum amount of channels in order to prioritize reducing interference. While researching which standard we should utilize, we see if you different frequencies that different 802.11 standards utilize. Which of the following frequencies ranges should we utilize given the above requirement? 23. Which of the following would Change management most likely be used to review previous upgrades to a system 24. Which of the following comShow route mands can be used to display the pass that networking traffic takes to reach other networks 25. While using many unmanaged switches in your home you decided to connect redundant cables between the switches in order to increase redundancy. However, since this change was made you started experienc- A broadcast storm — Having redundant connections between switches runs the risk of allowing broadcast storms to propagate through your network. This is especially true of unmanaged switches which would like many 5 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd ing extreme amounts of laten- of the basic security controls of manage cy. Which of the following prob- switches, such as STP lems is most likely occurring? 26. Which of the following best IDS - intrusion detection system describes a network appliance that warns of unapproved devices that are accessing the network 27. Which of the following technologies will allow many WAP's to broadcast the same SSID across a multi story building while providing continuous connectivity? Extended service set — ESSID allows users to seamlessly reconnect to a different access point when they walk far enough away from their original access point. This is great for a company with a large physical footprint that wants one consistent wireless network 28. Which transceiver type can support up to 40 Gbps? QSFP+ QSFP+ 10 Gbps per channel / 40 Gbps channels 29. When a large amount of users are remotely accessing a centralized VM hosting server, which of the following concerns are raised assuming the network can readily support this increase in traffic CPU usage and. Memory 30. Client devices cannot enter network and the network administrator determines the DHCP scope is exhausted the administrator wants to avoid creating a new DH pool which of the following in the administrator perform to resolve the issue Decrease the number of VLANs — VMs much like physical systems however do you have both CPU and RAM requirements the more systems running on the VM host the hire the requirements While we would generally increase the scope of the DHCP pool that may cause other problems which is why we see this question states we want to avoid increasing the scope by reducing the least time we will cycle through IP at a quicker rate 6 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd then we otherwise would allowing us to reuse IP address is much more quickly 31. What type of cable would likely Coaxial be used to connect to the WAN Port on a cable modem 32. Which of the following would need to be configured to ensure a device with a specific Mac addresses always assigned the same IP address from DHCP Reservation — 33. What port enables telnet access to a device 23 While a static assignment would ensure a device would have a consistent IP address the question states that it Has to be from DHCP making a Mac reservation our best answer Telnet 34. What should be reviewed on a MAC table— switch in order to review physical network addresses Mac addresses are physical network addresses 35. You were troubleshooting a network switch that seem to have stopped responding to request when the login level was set to debugging which of the following should be checked to begin troubleshooting the switch CPU utilization — If setting logging to debugging the highest level/lease severe level of logging you end up asking the device for all logs which is information on an incredible amount of traffic 36. What is used to track and doc- CVEument various types of known vulnerabilities Common vulnerability and exposure 37. After a DNS record was updated TTL — some users report being unable to access the website associat- DNS TTL keeps records cached for a cered with that record which of the tain period of time any cached do you 7 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd following should be changed to know would point towards the wrong site fix the issue if the A (IPv4) record was changed 38. Which of the following IEEE CSMA/CA 802.11 standards Would be best to use for multiple simultane- Carrier sense multiple access with colous client access lision avoidance allow multiple users to connect to a Wi-Fi network while minimizing collisions/interference on the network 39. Which system would most like- FTP — ly be found and a screen subnet Screen subnets it's also known as DMZ's are areas of the network that are used to separate the Internet from our corporate network devices that need to be directly access from the Internet will be placed here such as websites email server and file sharing servers 40. After trying to set up a port mir- Ifconfig eth0 promisc — ror with the following configura- Turns on promiscuous mode tion: Switch mirror port details: eth0:10.1.2.3 AA:BB:CC:DD:EE:FF Which of the following commands could be entered on the PC to finish this configuration? 41. Which of the following comNslookup— mand can confirm the name of The OS of the server who's name we are a Linux server confirming doesn't affect the command we run we determine the command we use based on the OS that we are actively using if we were running commands in order to query in the DNS( name) information of a device we would use nslookup 8 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd on a Windows system or DIG on a Linux system 42. A new cabling certification is being requested every time and network technician rebuilds one end of a CAT 6 (vendor-certified) Cable to create a crossover connection that is used to connect switches which of the following will address this issue by allowing the use of the original cable MDIX— Auto MDIX allows a cable to take the correct connection requirements. (Crossover vs straight through) and that's the opposite end of the cable becomes less important to the tech 43. Which of the following devices Ip scanner could be used to detect which devices exit on a given netA simply IP scanning tool could tell you work? which devices exist on your network and what their IP addresses are a port scanner would be a close second but it would provide more information in the question is asking for making an IP scanner a better answer ( it would should open/close ports as well as services running) 44. After investigating reporter for network performance and network admin finds hundreds of CRC Errors on an interface which of the following is the most likely cause of these errors A bad wire on the Cat 5e cable 45. Considering that hubs are vastly outdated in terms of network hardware you've decided to replace all hubs on your network with their devices of the following devices which are you most likely to replace your hubs with A layer 3 switch CRC Errors can because by a multitude of issues these issues can range from corrupt data to noise (interference) On the cable to just plain bad cabling Herbs were used to move traffic ( poorly) threw out a network so some form of switch would be the best choice for replacing them 9 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd 46. A company has an access layer switch in the lobby of their headquarters which of the following security technology should we consider first given the placement of the switch Port security - 47. The technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building several APs are mounted in this office that users report that the network connections frequently disconnect and reconnect throughout the day which of the following is the most likely cause of this issue Channel overlap is occurring 48. The network device is configured to send critical events to a syslog server but severity five alerts are not being received from networking devices The network device is not configured to log that level to the syslog server. 49. Which of the following can be used to centrally manage credentials for various accounts or privilege levels on network devices TACACS+ Considering physical access is provided to the switch we need to lock it down to the best of our abilities. Portsecurity attempts to do justice by limiting who and how many devices can plug into an individual switch port though in general you need to be careful allowing anybody untrustworthy to have physical access to your network equipment A high-rise building is likely to have many AP's set up by various businesses which is likely to cause considerable interference resulting in an unstable connection Whenever a particular syslog level is configured A system returns all events from that level and more severe SSO Is a tempting answer we are asking what can actually manage these accounts not the terminology used to describe having a centrally manage account 50. 10 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd When assigned 196.168.1.0/26 The incorrect IP address was configured as a network, an admin gave a router the following up configu- A CIDR of /26 is the equivalent of the rations subnet mask 255.255.255.192 Ip address: 192.168.1.30 Subnet mask: 255.255.255.224 Gateway: 192.168.1.1 Users on the network immediately lost connectivity what is the most likely reason as to why? 51. Which of the following features Seamless roaming would allow us to condense multiple SSID into a single SSID Seamless roaming allows you to dynamically connect to different APs as your room through building all of these APs would have the same SSID in order to signify they are the same network 52. Which of the following techniques will help aid with congestion reported by users on networks was large amounts of video and VoIP traffic Quality of service QoS gives delay sensitive traffic( such as streaming video and voice) A higher priority you are moving through the network this generally works by delaying other sets of traffic slightly in order to give considerable increases to prioritize traffic 53. Which of the following techFHRP nologies provide a failover for mechanisms for the default When multiple routers are used on a LAN gateway you need a protocol which manages a single VIP ( virtual IP) The enables clients to connect to redundant routers as FHRP protocols fill this job perfectly 54. A wireless controller 11 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd Which of the following devices would be used to manage a corporate WLAN? 55. A workstation is configured with the following information IP :172.20.5.25 Mask: 172.20.5.0/27 Gateway: 172.20.5.1 Which of the following addresses would represent the broadcast address of this network 172.20.5.31 A /27 network could contain 32 IP address (5.0-5.31) the first address (5.0) is the network ID the last address (5.31) is the broadcast address and all addresses between those are valid assignable hosts (5.1-5.30) 56. And network is experiencing a Layer 2 number of CRC errors during normal operations which of the CRC errors are contained within an etherfollowing layers of the OSI mod- net header ( layer2) el will likely need troubleshooting? 57. A network tech is reviewing the interface counters on a routers interface the tech is attempting to confirm a cabling issue given the information below which of the following metrics confirms that there is a cabling issue? CRC's CRC's Measure the number of frame errors detected over an interface which could be caused by corrupt data noise ( interference) on the cable or just plain bad cabling CRC's :170 Giants :0 Runts :0 Multicast:12 58. Which of the following records SOA can be used to track the number of changes on a DNS zone Start of authority ( admninstrative DNS info/ for zone transfers) 59. Are use her in a branch office reports that access to all files Incorrect subnet mask 12 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd has been lost after receiving a new PC all other users in the branch can access file shares the IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router but the machine cannot ping the router which of the following is most likely the cause of the incident? 60. Which of the following ports is commonly used by VoIP phones? The machine cannot access files or ping the router which illuminates DNS (which isn't required unless contacting by device name) and TCP port( which would affect a single service) Past that you are more likely to sign the wrong mask which could be a simple typo rather than a different class which would be an entirely different IP range 5060 Sip - VoIP setup Process of elimination can be your best friend 61. Which of the following topolo- Meshgies would have the highest number of connections com- A mesh network is designed to allow most pared to other topologies devices to have redundant connections with most other devices in order to provide a highly available network 62. Which of the following proto- RDP cols would allow you to install and manage a Windows server in a different building than the one you're currently in 63. Which of the following is a Star physical topology for an ethernet LAN? 64. After installing and connecting the on premise equipment for a DSL connection you noticed the modem will not sync which of the following process- Use a toner probe to identify the circuit Checking the hardware issues is common during any installation you just need to know the right tool for the job 13 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd es should be followed first to troubleshoot the issue 65. Which of the following docuA change management policy ments would you help ensure proper versioning is followed and unnecessary upgrades are not made to the equipment 66. Which of the following proto- Neighbor discovery protocol cols would be used to resolve an IPv6 address to a MAC ad- Neighbor discovery serves a purpose the dress ARP did on IPv4 networks 67. Our new server farm is being set up somewhere in California that are a higher base business plans to migrate to however there will be a years period of time we're both server firms are in use and the sensitivity of our data is a concern which of the following technologies could alleviate our concern Site to site VPN When going from one physical location to another without a physical connection between the two locations it is always a good idea to utilize encrypted VPN when security is a concern 68. Which of the following tools OTDR could be used to detect the exact break point of a fiber optic Optical time domain reflectometer link 69. Which of the following DNS CNAME records works as an alias to another record Alias record 70. Which of the following best represents the concept of connecting to a secure server in order to securely access a second server A jump box A secure system which is used as a single access point for other systems this hardens remote management of the remote system since access is limited 14 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd 71. To comply with an industry regulation all communications Dustin to secure server should be logged in archived on a storage device which of the following can be configured to for fill this requirement Port mirroring 72. Which of the following IP ranges falls between 169.254.0.0 and 169.254.255.255 APIPA Port mirroring allows all traffic to be copied and sent to another device such as secure secure storage device 73. After installing a fiber optic link They used the wrong type of fiber transbetween routers and using a ceiver tool to verify the cable the link Incorrect TX/RX Polarity exists on the link does not connect which of the following would explain the issue 74. After pulling a new stitch and MIB adding it to the existing network monitoring software do Contains a string of possible metrics that you want to determine which the switch contract metrics can be gathered from a given switch which of the following should be utilized from the switch 75. Which of the following step should be done after confirming the cause of a problem Establish a plan of action to resolve the issue and identify potential effects 76. An IT director is setting up a new disaster and HA policies for a company limited downtime is critical to operations to meet corporate requirements for the director set up two dif- Hot site According to comp Tia a hot site is a back up site that can fail over almost immediately and is working with a live data set 15 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd ferent data centers across the country that will stay current on data and applications in the event of an outage the company can immediately switch from one data center to another which of the following does this best describe 77. Which of the following types of devices can provide content filtering and threat protection and manage multiple IPSec site to site connection Next generation firewall 78. When configuring redundant network links between switches which of the following should be enable to prevent network stability issues STP Next generation firewall are firewalls with many capabilities beyond that of a regular firewall they are very similar to UTMs ( many controls in one) that mini allow a company to customize their solution while UTMs are generally bundled products Isn't technology which detect potential loops on the network which would otherwise cause broadcast storms. Broadcast storm which is an infinitely repeating broadcast can bring the network down or at least slow it down considerably 79. Which of the following factors Replication traffic between an on premise should be considered when server and a remote back up facility evaluating a firewall to protect a data center is east west traffic East west traffic is server to server traffic while north south traffic is server to client 80. Despite confirming that all devices are connected to the network throughout the entirety of the day some of your users are reporting intermittent Internet connectivity some users report connectivity and contemporari- Verify the session time and configuration on the captive portal settings Despite being connected to a wireless network you may not be allowed to access certain networking resources or the Internet depending on the access grant16 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd ly re-establish a connection by ed to you by the network many networks disconnecting and reconnect- are protected by captive portals which are ing through the web authenti- webpages that may ask for additional crecation process which of the fol- dentials or knowledge may have a user lowing steps and most likely de- agreement before you can access the nettermine the cause of this issue work 81. A use reports being unable to access the network resources after making changes in the office which of the following should be done first Ask which changes were made 82. Layer 1 Physical Layer 83. Layer 2 Data Link Layer 84. Layer 3 Network Layer 85. Layer 4 Transport Layer 86. Layer 5 Session Layer 87. Layer 6 Presentation Layer 88. Layer 7 Application Layer 89. You Want to have separate Wi-Fi networks for your employees and your guests. Which of the following features should be configures to allow different wireless access through the same equipment SSID Ask for details on the changes made first so that going forward we can make more informed decisions on how to troubleshoot the network Most modern WAPs can support multiple frequencies/SSIDs in order to facilitate multiple networks. So here we can simply assign on SSID to the corporate network and another SSID for the guest network 90. Which would be the best use to Internet Control Message Protocol detect MAC spoofing? 91. 17 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd the chain of connections from a TX/RX was reversed device to a switch on your network is as follows: simply reverse the TX/RX on the connector Device> LC/LC patch cable> Patch Panel> Cross-connect fiber cable> Patch Panel> LC/LC patch cable> Switch Despite using known working patch cables, the connection isn't working and the device has been tested and was working before being installed. Which of the following if the most likely cause of a problem in this connection? 92. Which of the following types SSO of authentication technologies will allow a single account to One account that gives access to varibe used to access multiple ser- ous/applications vices/applications? 93. Which of the following OSI lay- Transport ers do TCP and UDP operate within? 94. The length of an IPv6 address 128 bits is? 95. A network admin wants to nar- 192.1.0.124/30 row the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation? 96. 18 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd What best describes the func- Provides connectionless communication tion of OSI layer 3 using logical addresses 97. You are reviewing a network di- a Circle with 4 outward arrows agram and are looking for the edge router. What is MOST likely symbol used for a router? 98. A company is implementing EUI-64 IPv6 addressing and wants to ensure there are consistent addresses for printers and servers that will not change. However, the company does not want to use static addresses. Which of the following IPv6 schemes will provide the same address for the devices? 99. the length of a MAC address is? 6 bytes 48 bits, aka 6 bytes (1B=8b) 100. what is the default mask for the /16 IP address 190.25.250.10? since the first octet is 190 this is a class B address. Class B addresses use a default of /16 (aka 255.255.0.0) 101. class A address 1-126 102. class b address 128-191 103. class c address 192-223 104. class d address 224-239 105. class e address 240-255 106. 19 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd Which of the following CIDR matches the IPv4 VLSM? Choose all that apply /21 is 255.255.248.0 /30 is 255.255.255.252 107. which of the following OSI mod- Layer 2- Data Link el layers is responsible for ensuring proper transmission of Frames are found on Layer 2 frames using a frame-check-sequence value? 108. the length of an IPv4 address is? 32 bits 109. what best describes the function of OSI Layer 2? provides error detection through the FCS for frames transmitted 110. host alpha has an IP address 255.255.255.224 of 192.168.35.209 and is part of the 19.2168.35.192 subnet. If explanation is on PowerPoint 100 if needthe options below, which mask ed would be correct? 111. a network tech is reviewing a a rectangle with 2 horizontal arrows network diagram and is looking for Layer 2 switch. What symbol should they be looking for? 112. a senior engineer has asked Ops/26, Marketing/27, Admin/28, IT/28 you to create several subnet out of the provided/25 network. Each department will need their own subnet and they should be no larger than necessary. What CIDR notations would be needed for each department? Ops: 52 Hosts, Marketing: 28 host, Admin:13 hosts, IT: 7 hosts 20 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd 113. Which of the following OSI Presentation model layers is responsible for compression and data encoding? 114. of the devices listed which will Multilayer Switch provide a high number of interfaces and offer routing services for a LAN? 115. Which of the following would 4 PCs all connected to a single hub, and act ad a standalone star netnothing else. work with a layer 1 network device? a hub is a layer 1 device 116. a firewall as configures with a role that forwards FTP traffic to an internal server that is listening on a non-standard port. What best describes the rule configured on this firewall? PAT They are describing a process known as ' port forwarding' which is considered a component of PAT 117. To support redundancy at Com- Mesh pany A, all care switches are connected to each other. What type of network topology is being utilized? 118. what is the best reason for us- It creates various paths to a particular ing wireless mesh topology to destination support IoT sensors? 119. in the event of WAN outage, or configuration error, you may be required to remotely reconfigure a company router. What method would best provide access in this situation? Out-of-band The WAN connection would be considered 'in-band' because WAN traffic passes through the router. If we want to access this router even when the WAN connection is down, we will need an out-of-band connection 21 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd 120. a new device transmits data Data is flooded out of every port in that into a stich for the first time. VLAN, except the one it came in on Which of the statements below is true? 121. A network engineer has been The modem is places in bridge mode, the assigned the replace a failed router is places behind the modem and router. The network already has the web server is places behind the router. a switch, cable modem and static IP assignments. furthermore, there is a web server running on this network that should remain available to the internet. What is the correct configuration and placement for the devices above? 122. A network engineer is review- The PC's NIC and/or the switchport are ing a network statistics and no- set to half-duplex tices a nigh level of collisions between a switch and a PC. What is the most likely source of this issue? 123. Which addresses are routable 172.35.10.250 over the internet without using any form of NAT? this is a public address! 124. Which of the following would a Power-over-ethernet switch network tech most likely connect to power wireless access points in drop ceilings? 125. A nearby city offers wireless MAN internet access throughout the public areas. What type of network is this? 126. NAS 22 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd Data has been stored locally on a subnet for access by several employee devices. What is being described in this situation? 127. A network engineer is adjust- They have set a default gateway ing the network settings on a server. They issue the following command: route add 0.0.0.0 mask 0.0.0.0 10.1.5.1 metric1 what setting has the engineer attempted to alter? 128. A switch without and VLANs Flood the frame out all interfaces except receives a frame with the one it was received on a destination address of FF:FF:FF:FF:FF:FF. What will the switch do with this frame? 129. Which of the following technologies should be used in high-throughput networks to reduce networks overhead? Jumbo Frames 130. A network engineer is asked SAN to create a solution that will serve the data needs of the entire company. There are 3000+ users and the data must remain onsite. What option listed below would meet these conditions 131. You receive a switch that has VLANs configured on all of its ports. At what layer is the switch operating? Layer 2 132. STP 23 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd What protocol uses BPDUs to detect loops on Layer 2 of the OSI model? 133. A network technician needs to Use port mirroring monitor the traffic going into a mission-critical in the datacenter. Which of the following is the best method to perform this? 134. You've been tasked with con- Bridge necting two hubs together. To avoid problems that would arise from increasing the size of the collision domain, what device should you use to connect the hubs together? 135. After a broadcast storm that Gateway brought down the corporate Bridge network a technician has ben asked to install hardware to mitigate this risk in the future. What could be installed to accomplish this assignment? ( pick 2) 136. A switch is to be configured so a trunk port that it can carry five VLANs over a single physical link. What type of port can facilitate this? 137. An eight port switch was con- An Access port figures to have three VLANs. Of the eight ports on the back of the switch, one was designates a trunk port, while the other seven where each assigned to only one LVAN. What type of 24 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd port is only assigned to a single VLAN? 138. Users report the network is Layer 3 Switch slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains? 139. The corporate network consists 1 of 3 switches, a router, and a hub. The switches are connected together in a chain, to a single port on the router. Each of the switches had 8 ports. coming off the second switch is a hub, which has 4 computers attached to it. How many broadcast domains exist in the corporate network? 140. A manager wants to deploy a Aggregates switch logs for easier review syslog server on the network. and correlation What benefit would a syslog server provide to the company? 141. A new server has ben deployed SSH- is encrypted in the cloud that does not support a GUI. Which of the following could be used to star a secure remote console session with this server? 142. You discover that an employ- The PC had DHCP reservation which is ee's PC is not receiving an IP invalidated by the new NIC. address via DDHCP. An change log outlines that the PC'S had its OS Patches and a new NIC 25 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd installed (1Gbps), to replace an older slower card (100Mbps) The user is a member of a group that accesses a server hidden behind a firewall. Other group members are not having a problem and the switchports are up and set for auto negotiate. What is the MOST likely problem? 143. Of the options below, What VoIP Gateway could be used translate and tie in legacy phones into a VoIP so- Is used to bridge (connect) legacy phones lution? into a VoIP deployment, Typically this gateway is connected to the physical (legacy) PBX. 144. Your organization just moved TXT to a cloud based email service. Many email recipients are complaining that any email sent from the organization is going into the junk folder because the sends identity cannot be confirmed. Which of the following DNS record should be modified to minimize this problem? 145. You already have a DNS record that resolved ABC.123.net to your company's webserver. You would like a new DNS record to allow DEF.123.net to point to the same IP as ABC.123.net. What type of DNS record needs to be created to facilitate this? CNAME Is a type of DNS record that maps an alternative name to a true or 'canonical' domain name. 146. Over the summer a college has Reduce DHCP lease time form 8 days to been hosting one dat training 8 hours exercises, from Monday to Fri26 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd day, with guests and students. Each day there are 250 attendees, most of which are new, and they all need access to the guest Wi-Fi. The guest network uses a /24 subnet. On Tuesday several users complain that the Wi-Fi is unavailable, The complaints increase the following day. What could be done to prevent this issue from occurring in the future? 147. To prevent outgoing emails as being categorized as spam, which of the DMS records below should be updated with the organization's SPF information? TXT SPF allows the receiving mail server to check during mail delivery that a mail claiming to come from a specific domain is submitted by an IP address authorized by that domains administrators. This mechanism helps detect spam! The list of authorized sending hosts and IP addresses for a domain is published in the DNS-TXT record for that domain. 148. Which protocol is used to send SMTP out emails across a network infrastructure or between email servers? 149. When using a network monitor- MIB ing system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring 27 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd system to describe these object identifiers? 150. What ports can be used for email ( pick 3) 25- smtp 143- imap 110-pop SMTP= Simple Mail Transfer Protocol. emails coming into an email server, or going between servers. IMAP= Instant Messaging Access Protocol. for viewing emails as they exist on the email server. POP= Post Office Protocol For downloading emails from the email server 151. Which of the following cloud service models would best support an organization looking to have a hosted database, such as SQL or Oracle? PaaS 152. A cloud storage server has been brought online that is intended to serve hospitals exclusively. Several hospitals, all owned by different entities, have begun using this highly secured cloud server. What type of cloud deployment model matches this type of server? Community ( Platform as a Service): typically used to provide development and database platforms for developers or database admins A community cloud is shared by a group of similar organizations that all have similar needs. In this example, it is a server built only to serve hospitals. 153. Which of the following is con- IP helper figured on a network device to enable hosts to receive the proper DHCP configuration if the server is on a different subnet 154. 28 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd Which of the following is the DHCP failure most likely cause for network PC to have an APIPA address? APIPA stands for Automatically Procured IP Address . In Windows, APIPA addresses are 169.54.X.X unless configured otherwise. An APIPA is the address a computer will give itself if the DHCP server is unreachable. Windows will retry to contact the DHCP server every five minutes until it gets a response. 155. Several computers in a factory need to be connected together. What medium would be acceptable for short distances and also the most cost effective? BNC and a RG-59 cable RG-59 cables (coaxial) are only good for short distances, and can have BNC connectors! Plenum cables are expensive! ST, a fiber connector, shoulder be put on a UTP cable (copper) RJ11 is for terminating phone lines and shoulder be attached to a Cat 6 cable 156. At IT company is installing Plenum WAPs in a new business complex. Some of the network cables must run above the drop ceiling and through or near are condition ducts. What type of cable would be best suited for this need? 157. To connect the new serve to Attenuation the switch a pair of Cat5e cables had to be coupled together. By themselves, each cable was 200 feet (61 Meters) long. Users have been reporting an intermittent loss of connectivity 29 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd to the server. What is the most likely cause of this problem? 158. Where is an office building would a network tech find the entry point for the ISP? Demarc 159. The company has deployed a FCoE, PATA network storage solution to support future growth. What types of connections can be used that will not require new network cables and dedicated switches? ( pick 2) 160. An organization is moving into Employees are connected to a hub an office that was unused for several years. While continuing to use the infrastructure already in place, several employees report that the network connections, workstations, and switches are rated for 100Mbps, and set to auto-negotiate. What is most likely the issue with the slow speeds? 161. Two Cat5e cables need to be Bridge connected together to tie in a new workstation. Each cable is 200 feet (61 meters) long. Instead of using a coupler, what should be used to connect the cables together to avoid attenuation? 162. A technician is installing a remote call box that requires a single copper ethernet connection. The uplink rom the Media Converter 30 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd business network is over single-mode fiber. Which of the following devices should be installed to bet facilitate the connection? 163. Tyler connected his laptop directly to Joe's laptop that has a gigabit Ethernet port, using a straight-through cable. Through this connection he successfully transferred several large files. Later, Tyler directly connected to a desktop that has a 10/100 ethernet port, but was unable to establish a connection using the same cable. What best describes the cause of this problem? Tyler's laptop does not support autoMDIX We don't know what type of NIC is in Tyler's Laptop. What we do know: when one side is a non-gigabit standard, like when Tyler connected to the desktop, we need to use a crossover cable. Alternatively is one side of the connection supports auto- MDIX that device can reconfigure itself to support a straight-through cable even when it should be crossover. The only answer then is that both Tyler's laptop, and the desktop, lack auto-MDIX. Lastly, auto-MDIX is built into the gigabit ethernet standard, so its safe to assume gigabit ethernet ports have auto-MDIX 164. a PoE phone is not receiving Bad Switchport power at the employees desk. A network engineer tests the network components with a PoE injector at the switch and this resolves the issue. Which of the following was the most likely cause of the problem? 165. A series of WAPs are being STP deployed around the corporate campus to provide better Wi-Fi coverage. The placement of one of the APs required the network cable to be run alongside power 31 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd cables that pass through a conduit. What type of cable would be the best fit for this situation? 166. A company requires an ether- Cat 5e net cable capable of providing 1Gpbs for the lowest possible 1 Gbps (older and cheaper than CAT 6) cost. Of the options below, what cable standard should they select? 167. What type of cable would most RG-6 likely be terminated with an F connector? A coaxial cable, such as RG-6, can be terminated with either a BNC or F connector. 168. Which of the following cable Ethernet types should be used to connect a cable modem to a SOHO router? 169. which of the following connec- RJ-11 tor types is used to terminate household telephone cabling? used for phones RJ-11 had 4 copper wires. 170. Of the internet connections be- Cable. low, which is the fastest? Cable can support up to 10 Gbps down, 1 Gbps up when running the latest version of DOCSIS. The others max out before they even reach 1 Gbps 171. Joe needs a WAP that can support speeds of at least 1Gbps.Which of the following standard will meet Joe's needs? 802.11ac 172. WPA 32 / 33 Network + N10-008 practice exam Study online at https://quizlet.com/_a9ievd Which Wi-fi security mode utilizes TKIP for its encryption? 173. The organization WLAN offers Band Steering complete 2.4 and 5.0 Ghz network, are connected to the crowded 2.4 Ghz network. What technology could be deployed to better distribute more users to the faster and less congested 5Ghz network? 174. An employee is attempting to use a video conferencing app from the company's meeting room on the second floor. However, they report that the WiFi occasionally stops working during the video calls. The signal strength is reported as being -75dBm. What should be installed to resolve this issue? A range extender With -75dBm , our signal is too weak to sustain a reliable streaming session. If we want to install something to resolve this issue, we need another access point The closer to zero the better our single 175. A network built in bridge mode 54 Mbs contains 802.11g, 802.11n and 802.11 ac access points. What speeds would this wireless network perform at? 33 / 33