N10-008 Practice Test Questions

203 Questions


A customer wants to segregate the traffic between guests on a hypervisor. Which of the following does a technician need to configure to meet the requirement?


A.

Virtual switches


B.

OSPF routing


C.

Load balancers


D.

NIC teaming


E.

Fibre Channel





A.
  

Virtual switches



Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improveperformance for these applications?


A.

Link Aggregation Control Protocol


B.

Dynamic routing


C.

Quality of service


D.

Network load balancer


E.

Static IP addresses





C.
  

Quality of service



An ITdirector is setting up new disaster and HA policies for a company. Limited downtime is critical to operations. To meet corporate requirements, the director set up two different datacenters across the country that will stay current on data and applications.In the event of an outage, the company can immediately switch from one datacenter to another. Which of the following does this BEST describe?


A.

A warm site


B.

Data mirroring


C.

Multipathing


D.

Load balancing


E.

A hot site





E.
  

A hot site



A new cabling certification is being requested every time a network technician rebuilds one
end of a Cat 6 (vendor-certified)cable to create a crossover connection that is used to
connect switches. Which of the following would address this issue by allowing the use of
the original cable?


A.

CSMA/CD


B.

LACP


C.

PoE+


D.

MDIX





D.
  

MDIX



A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4 GHz and 5 GHz. Which of the followingshould the systems administrator select to meet this requirement?


A.

802.11ac


B.

802.11ax


C.

802.11g


D.

802.11n





B.
  

802.11ax



A technician is installing a new fiber connection toa network device in a datacenter. The
connection from the device to the switch also traverses a patch panel connection. The
chain of connections is in the following order:
Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch panel
LC/LC patch cable
Switch
The connection is not working. The technician has changed both patch cables with known
working patch cables. The device had been tested and was working properly before being
installed. Which of the following is the MOST likely cause of the issue?


A.

TX/RX is reversed


B.

An incorrect cable was used


C.

The device failed during installation


D.

Attenuation is occurring





A.
  

TX/RX is reversed



Which of the following would be BEST to use to detect a MAC spoofing attack?


A.

Internet Control MessageProtocol


B.

Reverse Address Resolution Protocol


C.

Dynamic Host Configuration Protocol


D.

Internet Message Access Protocol





B.
  

Reverse Address Resolution Protocol



Wireless users are reporting intermittent internet connectivity. Connectivity is restored
when the users disconnect and reconnect, utilizing the web authentication process each
time. The network administrator can see the devices connected to the APs at all times.
Which of the following steps will MOST likelydetermine the cause of the issue?


A.

Verify the session time-out configuration on the captive portal settings


B.

Check for encryption protocol mismatch on the client’s wireless settings


C.

Confirm that a valid passphrase is being used during the web authentication


D.

Investigate for a client’s disassociation caused by an evil twin AP





A.
  

Verify the session time-out configuration on the captive portal settings



Which of the following is MOST likely to generate significant East-West traffic in a
datacenter?


A.

A backup of a large video presentation to cloud storage for archival purposes


B.

A duplication of a hosted virtual server to another physical server for redundancy


C.

A download of navigation data to a portable device for offline access


D.

A query from an IoT device to a cloud-hosted server for a firmware update





B.
  

A duplication of a hosted virtual server to another physical server for redundancy



An attacker is attempting to find the password to a network by inputting common words and
phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?


A.

Pass-the-hash attack


B.

Rainbow table attack


C.

Brute-force attack


D.

Dictionary attack





D.
  

Dictionary attack



Explanation:
QUESTIONNO: 53
Which of the following technologies provides a failover mechanism for the default gateway?
A. FHRP
B. LACP
C. OSPF
D. STP
Answer: A

Which of the following routing protocols is used to exchange routeinformation between public autonomous systems?


A.

OSPF


B.

BGP


C.

EGRIP


D.

RIP





B.
  

BGP



An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which ofthe following switch features will MOST likely be used to assist with this task?


A.

Spanning Tree Protocol


B.

Discovery Protocol


C.

Link Aggregation Control Protocol


D.

Address Resolution Protocol





B.
  

Discovery Protocol




Page 6 out of 17 Pages
Previous