aiotestking uk

N10-006 Exam Questions - Online Test


N10-006 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Q1. Which of the following is a security benefit gained from setting up a guest wireless network? 

A. Optimized device bandwidth 

B. Isolated corporate resources 

C. Smaller ACL changes 

D. Reduced password resets 

Answer:

Q2. Which of the following is used to authenticate remote workers who connect from offsite? (Select TWO). 

A. OSPF 

B. VTP trunking 

C. Virtual PBX 

D. RADIUS 

E. 802.1x 

Answer: DE 

Q3. A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks? 

A. Does the printer have toner? 

B. Are there any errors on the printer display? 

C. Is the user able to access any network resources? 

D. Is the printer powered up? 

Answer:

Q4. A PC technician has installed a new network printer that was preconfigured with the correct static IP address, subnet mask, and default gateway. The printer was installed with a new cable and appears to have link activity, but the printer will not respond to any network communication attempts. Which of the following is MOST likely the cause of the problem? 

A. Damaged cable 

B. Duplex mismatch 

C. Incorrect VLAN assignment 

D. Speed mismatch 

Answer:

Q5. A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account. Which of the following is the MOST likely reason for the problem? 

A. Username is misspelled is the device configuration file 

B. IDS is blocking RADIUS 

C. Shared secret key is mismatched 

D. Group policy has not propagated to the device 

Answer:

Q6. Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform? 

A. Erase the files created by the virus 

B. Stop and escalate to the proper authorities 

C. Check the remaining directories for more .mp4 files 

D. Copy the information to a network drive to preserve the evidence 

Answer:

Q7. HOTSPOT 

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location. Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department. 

Alter accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic. All drop downs must be filled. 

Instructions: When the simulation is complete, please select the Done button to submit. 

All Networks have the range form /0 to/32 

Answer:  

Explanation:

Sales network – /26 – This will provide up to 62 usable IP addresses (64-2 for 

subnet and broadcast IP) 

HR network - /27 – This will provide for up to 30 usable IP’s (32-2) 

IT - /28 – This will provide for up to 14 usable IP’s (16-2) 

Finance - /26 – Note that a /27 is 32 IP addresses but 2 of those are reserved for the network and 

broadcast IP’s and can’t be used for hosts. 

Marketing - /28 

If we add up how many IP blocks are used that is 64+32+16+64+16=192. 

A /24 contains 256 IP addresses, so 256-192=64. 

So the last unused box should be a /26, which equates to 64 addresses

Q8. A network technician has been tasked with designing a WLAN for a small office. One of the requirements of this design is that it is capable of supporting HD video streaming to multiple devices. Which of the following would be the appropriate wireless technology for this design? 

A. 802.11g 

B. 802.11ac 

C. 802.11b 

D. 802.11a 

Answer:

Q9. A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit? 

A. Utilize a FTP service 

B. Install recommended updates 

C. Send all log files through SMTP 

D. Configure the firewall to block port 22 

Answer:

Q10. A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall? 

A. Cable certifier 

B. Multimeter 

C. Cable tester 

D. Toner probe 

Answer: