aiotestking uk

N10-006 Exam Questions - Online Test


N10-006 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram? 

A. Building layout 

B. Patch panel labeling 

C. Packet sniffing 

D. Naming conventions 

Answer:

Q2. During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE). 

A. RSA 

B. Passwords 

C. Man traps 

D. Biometrics 

E. Cipher locks 

F. VLANs 

G. 3DES 

Answer: CDE 

Q3. A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation? 

A. Port mirroring 

B. Spanning tree 

C. ARP inspection 

D. VLAN 

Answer:

Q4. A company is deploying a new wireless network and requires 800Mbps network throughput. Which of the following is the MINIMUM configuration that would meet this need? 

A. 802.11ac with 2 spatial streams and an 80MHz bandwidth 

B. 802.11ac with 3 spatial streams and a 20MHz bandwidth 

C. 802.11ac with 3 spatial streams and a 40MHz bandwidth 

D. 802.11ac with 4 spatial streams and a 160MHz bandwidth 

Answer:

Q5. A malicious user floods a switch with frames hoping to redirect traffic to the user's server. Which of the following attacks is the user MOST likely using? 

A. DNS poisoning 

B. ARP poisoning 

C. Reflection 

D. SYN attack 

Answer:

Q6. After repairing a computer infected with malware, a technician determines that the web browser fails to go to the proper address for some sites. Which of the following should be checked? 

A. Server host file 

B. Subnet mask 

C. Local hosts file 

D. Duplex settings 

Answer:

Q7. Which of the following connection types is used to terminate DS3 connections in a telecommunications facility? 

A. 66 block 

B. BNC 

C. F-connector 

D. RJ-11 

Answer:

Q8. Which of the following describes a smurf attack? 

A. Attack on a target using spoofed ICMP packets to flood it 

B. Intercepting traffic intended for a target and redirecting it to another 

C. Spoofed VLAN tags used to bypass authentication 

D. Forging tags to bypass QoS policies in order to steal bandwidth 

Answer:

Q9. A network technician is performing a tracert command to troubleshoot a website-related issue. The following output is received for each hop in the tracert: 1 * * * Request timed out. 

2 * * * Request timed out. 

3 * * * Request timed out. 

The technician would like to see the results of the tracert command. Which of the following will allow the technician to perform tracert on external sites but not allow outsiders to discover information from inside the network? 

A. Enable split horizon to allow internal tracert commands to pass through the firewall 

B. Enable IGMP messages out and block IGMP messages into the network 

C. Configure the firewall to allow echo reply in and echo request out of the network 

D. Install a backdoor to access the router to allow tracert messages to pass through 

Answer:

Q10. A service provider is unable to maintain connectivity to several remote sites at predetermined speeds. The service provider could be in violation of the: 

A. MLA. 

B. SLA. 

C. SOW. 

D. MOU. 

Answer: