Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

N10-008 Questions and Answers

Question # 6

Which of the following topologies requites the MOST connections when designing a network?

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Full Access
Question # 7

A network engineer is investigating reports of poor network performance. Upon reviewing a device configuration, the engineer finds that duplex settings are mismatched on both ends. Which of the following would be the MOST likely result of this finding?

A.

Increased CRC errors

B.

Increased giants and runts

C.

Increased switching loops

D.

Increased device temperature

Full Access
Question # 8

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

A.

Scope options

B.

Reservation

C.

Dynamic assignment

D.

Exclusion

E.

Static assignment

Full Access
Question # 9

Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?

A.

MPLS

B.

mGRE

C.

EIGRP

D.

VRRP

Full Access
Question # 10

A network technician is having issues connecting an loT sensor to the internet The WLAN settings were enabled via a custom command line, and a proper IP address assignment was received on the wireless interlace. However, when trying to connect to the internet, only HTTP redirections are being received when data Is requested. Which of the following will point to the root cause of the Issue?

A.

Verifying if an encryption protocol mismatch exists.

B.

Verifying If a captive portal is active for the WLAN.

C.

Verifying the minimum RSSI for operation in the device's documentation

D.

Verifying EIRP power settings on the access point.

Full Access
Question # 11

Which of the following policies should be referenced when a user wants to access work email on a personal cell phone?

A.

Offboarding policy

B.

Acceptable use policy

C.

BYOD policy

D.

Remote access policy

Full Access
Question # 12

A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue?

A.

Correct the DNS server entries in the DHCP scope

B.

Correct the external firewall gateway address

C.

Correct the NTP server settings on the clients

D.

Correct a TFTP Issue on the company’s server

Full Access
Question # 13

A network technician is investigating an issue with handheld devices in a warehouse. Devices have not been connecting to the nearest APs, but they have been connecting to an AP on the far side of the warehouse. Which of the following is the MOST likely cause of this issue?

A.

The nearest APs are configured for 802.11g.

B.

An incorrect channel assignment is on the nearest APs.

C.

The power level is too high for the AP on the far side.

D.

Interference exists around the AP on the far side.

Full Access
Question # 14

A security engineer is installing a new IOS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?

A.

Install a network tap for the IDS

B.

Configure ACLs to route traffic to the IDS.

C.

Install an additional NIC into the IDS

D.

Install a loopback adapter for the IDS.

E.

Add an additional route on the router for the IDS.

Full Access
Question # 15

Two network technicians are installing a fiber-optic link between routers. The technicians used a light meter to verify the correct fibers However, when they connect the fibers to the router interface the link does not connect. Which of the following would explain the issue? (Select TWO).

A.

They used the wrong type of fiber transceiver.

B.

Incorrect TX/RX polarity exists on the link

C.

The connection has duplexing configuration issues.

D.

Halogen light fixtures are causing interference.

E.

One of the technicians installed a loopback adapter.

F.

The RSSI was not strong enough on the link

Full Access
Question # 16

A network device is configured to send critical events to a syslog server; however, the following alerts are not being received:

Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down

Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down

Which of the following describes the reason why the events are not being received?

A.

The network device is not configured to log that level to the syslog server

B.

The network device was down and could not send the event

C.

The syslog server is not compatible with the network device

D.

The syslog server did not have the correct MIB loaded to receive the message

Full Access
Question # 17

Which of the following is the LARGEST MTU for a standard Ethernet frame?

A.

1452

B.

1492

C.

1500

D.

2304

Full Access
Question # 18

Which of the following topologies requires me MOST connections when designing a network?

A.

Mesh

B.

Star

C.

Bus

D.

Ring

Full Access
Question # 19

Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?

A.

PaaS

B.

IaaS

C.

SaaS

D.

Disaster recovery as a Service (DRaaS)

Full Access
Question # 20

At which of the following OSI model layers would a technician find an IP header?

A.

Layer 1

B.

Layer 2

C.

Layer 3

D.

Layer 4

Full Access
Question # 21

A technician is deploying a new switch model and would like to add it to the existing network monitoring software. The technician wants to know what metrics can be gathered from a given switch. Which of the following should the technician utilize for the switch?

A.

MIB

B.

Trap

C.

Syslog

D.

Audit log

Full Access
Question # 22

An IT technician suspects a break in one of the uplinks that provides connectivity to the core switch. Which of the following command-line tools should the technician use to determine where the incident is occurring?

A.

nslookup

B.

show config

C.

netstat

D.

show interface

E.

show counters

Full Access
Question # 23

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?

A.

Transceiver mismatch

B.

VLAN mismatch

C.

Port security

D.

Damaged cable

E.

Duplex mismatch

Full Access
Question # 24

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

A.

Omni

B.

Directional

C.

Yagi

D.

Parabolic

Full Access
Question # 25

A network administrator is installing a wireless network at a client’s office. Which of the following IEEE 802.11 standards would be BEST to use for multiple simultaneous client access?

A.

CDMA

B.

CSMA/CD

C.

CSMA/CA

D.

GSM

Full Access
Question # 26

A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?

A.

Static IP

B.

Default gateway

C.

DNS entries

D.

Local host file

Full Access
Question # 27

An administrator notices that after contact with several switches in an MDF they failed due to electrostatic discharge. Which of the Mowing sensors should the administrator deploy to BEST monitor static electricity conditions in the MDF?

A.

Temperature

B.

Humidity

C.

Smoke

D.

Electrical

Full Access
Question # 28

Which of the following ports is commonly used by VoIP phones?

A.

20

B.

143

C.

445

D.

5060

Full Access
Question # 29

A rogue AP was found plugged in and providing Internet access to employees in the break room. Which of the following would be BEST to use to stop this from happening without physically removing the WAP?

A.

Password complexity

B.

Port security

C.

Wireless client isolation

D.

Secure SNMP

Full Access
Question # 30

A new cabling certification is being requested every time a network technician rebuilds one end of a Cat 6 (vendor-certified) cable to create a crossover connection that is used to connect switches. Which of the following would address this issue by allowing the use of the original cable?

A.

CSMA/CD

B.

LACP

C.

PoE+

D.

MDIX

Full Access
Question # 31

The following configuration is applied to a DHCP server connected to a VPN concentrator:

There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect to the VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?

A.

Decrease the lease duration

B.

Reboot the DHCP server

C.

Install a new VPN concentrator

D.

Configure a new router

Full Access
Question # 32

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

A.

Physical diagram

B.

Heat map

C.

Asset list

D.

Device map

Full Access
Question # 33

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 34

Which of the following TCP ports is used by the Windows OS for file sharing?

A.

53

B.

389

C.

445

D.

1433

Full Access
Question # 35

A packet is assigned a value to ensure it does not traverse a network indefinitely. Which of the following BEST represents this value?

A.

Zero Trust

B.

Planned obsolescence

C.

Time to live

D.

Caching

Full Access
Question # 36

After a critical power issue, the network team was not receiving UPS status notifications. The network team would like to be alerted on these status changes. Which of the following would be BEST to use tor these notifications?

A.

Traps

B.

MB

C.

NetFlow

D.

Syslog

Full Access
Question # 37

A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of me connectivity failure?

A.

Incorrect VLAN

B.

DNS failure

C.

DHCP scope exhaustion

D.

Incorrect gateway

Full Access
Question # 38

A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of:

A.

using a bottom-to-top approach.

B.

establishing a plan of action.

C.

documenting a finding.

D.

questioning the obvious.

Full Access
Question # 39

Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?

A.

Elastic computing

B.

Scalable networking

C.

Hybrid deployment

D.

Multitenant hosting

Full Access
Question # 40

Which of the following is the physical security mechanism that would MOST likely be used to enter a secure site?

A.

A landing page

B.

An access control vestibule

C.

A smart locker

D.

A firewall

Full Access
Question # 41

According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue?

A.

Establish a plan of action to resolve the issue and identify potential effects

B.

Verify full system functionality and, if applicable, implement preventive measures

C.

Implement the solution or escalate as necessary

D.

Test the theory to determine the cause

Full Access