N10-008 Practice Test Questions

203 Questions


Which of the following TCP ports is used by the Windows OS for file sharing?


A.

53


B.

389


C.

445


D.

1433





C.
  

445



A local firm has hired a consulting company to clean up its IT infrastructure. The consulting
company notices remote printing is accomplished by port forwarding via publicly accessible
IPs through the firm's firewall Which of the following would be the MOST appropriate way
to enable secure remote printing?


A.

SSH


B.

VPN


C.

Telnet


D.

SSL





A.
  

SSH



A network technician needs to ensure outside users are unable to telnet into any of the
servers at the datacenter. Which of the following ports should be blocked when checking
firewall configuration?


A.

22


B.

23


C.

80


D.

3389


E.

8080





B.
  

23



A store owner would like to have secure wireless access available for both business equipment andpatron use. Which of the following features should be configured to allow different wireless access through the same equipment?


A.

MIMO


B.

TKIP


C.

LTE


D.

SSID





D.
  

SSID



Which of the following systems would MOST likely be found in ascreened subnet?


A.

RADIUS


B.

FTP


C.

SQL


D.

LDAP





B.
  

FTP



An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex. Which of the following is the MOST likely cause of this issue?


A.

The link is improperly terminated


B.

One of the devices is misconfigured


C.

The cable length is excessive


D.

One of the devices has a hardware issue





C.
  

The cable length is excessive



Which of the following is used to track and document various types of known
vulnerabilities?


A.

A. CVE


B.

Penetration testing


C.

Zero-day


D.

SIEM


E.

Least privilege





A.
  

A. CVE



Which of the following is used to prioritize Internet usage per application and per user on the network?


A.

Bandwidth management


B.

Load balance routing


C.

Border Gateway Protocol


D.

Administrative distance





A.
  

Bandwidth management



Which of the following would MOST likely be used to review previous upgrades to a system?


A.

Business continuity plan


B.

Change management


C.

System life cycle


D.

Standard operating procedures





B.
  

Change management



Which of the following is the physical topology for an Ethernet LAN?


A.

Bus


B.

Ring


C.

Mesh


D.

Star





D.
  

Star



A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the sameSSID for client access. Which of the following BEST describes this deployment?


A.

Extended service set


B.

Basic service set


C.

Unified service set


D.

Independent basic service set





A.
  

Extended service set



A technician isdeploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?


A.

MIB


B.

Trap


C.

Syslog


D.

Audit log





A.
  

MIB




Page 5 out of 17 Pages
Previous