N10-005 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented?
In computer security, a DMZ is a physical or logical subnetwork that contains and exposes an organization's external-facing services to a larger and untrusted network, usually the Internet.
Which of the following uses port 23 by default?
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP).
Which of the following addresses is a class B private address?
After a technician has identified the problem and its impact, which of the following steps should be performed NEXT?
Implement preventative measures.
Establish a plan of action to resolve the problem.
Establish a theory of probable cause.
Implement the solution or escalate as necessary.
By sorting out the probable causes and establishing a theorey on them he will come to know wheather it is right cause or not.
A technician receives a work order that a user can no longer access any external websites. The user is the only one affected, but can still access websites by IP address. Which of the following is the MOST likely cause?
The workstation has been removed from the domain and needs to be re-added in directory services.
The workstation is configured to use the IPv4 protocol instead of IPv6.
The workstation is configured with an incorrect IP address of the DNS server.
The workstation’s DHCP IP address has expired and has assigned itself an APIPA address.
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
Counter Cipher Mode with Block Chaining Message Authentication Code Protocol or CCMP (CCM mode Protocol) is an encryption protocol designed for Wireless LAN products that implement the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard. It was created to address the vulnerabilities presented by WEP, a dated, insecure protocol.
Joe, a network technician, is troubleshooting in a wiring closet in 2011. The cabling to all the equipment does not match the documentation from 2007. Which of the following configuration management methods has been overlooked?
Change management is the request for to change any configuration which is documented.
Which of the following would a technician do to monitor remote traffic through an access point?
Enable an SNMP agent
Enable network mapping
Set monitoring SSID
Large networks with hundreds or thousands of nodes are difficult to manage without a large staff to monitor every computer. SNMP, which is widely used in local area networks (LANs), lets you monitor network nodes from a management host. You can monitor network devices such as servers, workstations, printers, routers, bridges, and hubs, as well as services such as Dynamic Host Configuration Protocol (DHCP) or Windows Internet Name Service (WINS).
A network administrator tests a multimode fiber cable from end-to-end on a new link that is down and notices that the dB loss is -.09. Which of the following is the MOST likely cause?
dB loss too high
dB loss too low
Some Ethernet switches support medium dependent interface crossover (MDIX),which allows a switch port to properly configure its leads as transmit (Tx) or receive (Rx) leads. You can interconnect such switches with a straight-through cable (as opposed to a crossover cable). However, if a network device does not support MDIX, it needs an appropriate cable (that is, a crossover cable ) to allow its Tx leads to connect to the Rx leads on a connected device, and vice versa. Therefore, care must be taken when selecting cable types interconnecting network components.
A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?
Rogue access point
A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments?
The newly installed switch is defective and must be returned.
The newly installed switch is using a different MAC address than the previous switch.
The technician forgot to change the VTP mode on the new switch to server.
The technician did not use the correct cable when trunking the new switch.
A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?
Read more Details »