Comptia (N10-007) Exam Questions And Answers page 92
A SAN serves out storage to a company s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?
iSCSI
Fibre Channel
CIFS
Networking Concepts
Network Operations
Which of the following physical security devices is used to detect unauthorized server room access?
Access badge
Biometrics
Smart card
Video surveillance
Network Security
A network technician has been asked to provide daily reports on network saturation. Which of the following would BEST reflect these statistics?
Processor utilization for the Internet router
Average bandwidth usage
Error rate on trunk ports
Packet drops to the ISP
Network Operations
Network Troubleshooting and Tools
A network administrator has discovered a low-end managed switch connected to the company s LAN. While reading about the device s specifications on the manufacturer s website, the administrator discovers the switch does not support a command-line interface for administration. Which of the following remote access methods should the administrator use to log in to the switch?
Install a VNC plugin on the web browser.
Connect to the HTTPS management interface.
Replace the managed switch with an unmanaged switch.
Establish an SSH session.
Network Operations
A network engineer has been assigned a support ticket for a PC that will not connect to the network in a new area of the building. The engineer knows the PC should be assigned to the PC VLAN (VLAN 1101) and should have an IP in the 172.16.250.0/22 range. While talking with the hardware team, the engineer is told this is the first PC to be installed in this area. The engineer then logs into the edge switch the PC is connected to and looks at the configuration. Given the output below:
Which of the following BEST explains the reason why the PC cannot connect?
Which of the following BEST explains the reason why the PC cannot connect?
The VLAN interface is missing.
The VLAN is not allows across the trunk.
The PC is in the wrong VLAN.
The PC does not have a valid IP.
Networking Concepts
Network Operations
A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?
Safety procedures
System life-cycle procedures
Off-boarding procedures
Appropriate use policy
Network Security
A network administrator is reviewing the following output from a switch:
Which of the following attacks has occurred on the switch?
Which of the following attacks has occurred on the switch?
DNS poisoning
ARP poisoning
VLAN hopping
MAC address spoofing
Network Security
When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?
SFTP
SSH
SNMPv1
LDAPS
Network Security
A network technician is running copper cable from a core switch to a network closet that is approximately 574ft (175m) away. Which of the following should the technician use to accomplish this?
Bridge
Hub
Patch panel
Load balancer
Networking Concepts
Network Operations
A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer s requirements?
The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.
Network Operations
Network Management
Comments