Massive Halloween Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

N10-008 Questions and Answers

Question # 4

Given thefollowing information:

Which of the following command-line tools would generate this output?

A.

netstat

B.

arp

C.

dig

D.

tracert

Full Access
Question # 5

Within the realm of network security, Zero Trust:

A.

prevents attackers from moving laterally through a system.

B.

allows a server to communicate with outside networks without a firewall.

C.

block malicious software that is too new to be found in virus definitions.

D.

stops infected files from being downloaded via websites.

Full Access
Question # 6

The following configuration is applied to a DHCP server connected to a VPNconcentrator:

There are 300 non-concurrent sales representatives who log in for one hour a day to upload reports, and 252 of these representatives are able to connect to the VPN without any Issues. The remaining sales representatives cannot connect tothe VPN over the course of the day. Which of the following can be done to resolve the issue without utilizing additional resources?

A.

Decrease the lease duration

B.

Reboot the DHCP server

C.

Install a new VPN concentrator

D.

Configure a new router

Full Access
Question # 7

A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of thefiber link?

A.

OTDR

B.

Tone generator

C.

Fusion splicer

D.

Cable tester

E.

PoE injector

Full Access
Question # 8

Which of the following types of devices can provide content filtering and threat protection, and manage multiple IPSec site-to-site connections?

A.

Layer 3 switch

B.

VPN headend

C.

Next-generation firewall

D.

Proxy server

E.

Intrusion prevention

Full Access
Question # 9

Anetwork administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover?

A.

VIP

B.

NAT

C.

APIPA

D.

IPv6 tunneling

E.

Broadcast IP

Full Access
Question # 10

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

A.

Physical diagram

B.

Heat map

C.

Asset list

D.

Device map

Full Access
Question # 11

A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

A.

Confirm the patch's MD5 hash prior to the upgrade

B.

Schedule the switches to reboot after an appropriate amount of time.

C.

Download each switch's current configuration before the upgrade

D.

Utilize FTP rather than TFTP to upload the patch

Full Access
Question # 12

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

A.

Captive portal

B.

Two-factor authentication

C.

Complex passwords

D.

Geofencing

E.

Role-based access

F.

Explicit deny

Full Access
Question # 13

A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in completing this task?

A.

IP scanner

B.

Terminal emulator

C.

NetFlow analyzer

D.

Port scanner

Full Access
Question # 14

A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, but a strong signal when walking 20ft in the opposite direction The technician has reviewed the configuration and confirmed the channel type is correct There is no jitter or latency on the connection Which of the following would be the MOST likely cause of the issue?

A.

Antenna type

B.

Power levels

C.

Frequency

D.

Encryption type

Full Access
Question # 15

A network engineer is investigating reports of poor network performance. Upon reviewing a report, the engineer finds that jitter at the office is greater than 10ms on the only WANconnection available. Which of the following would be MOST affected by this statistic?

A.

A VoIP sales call with a customer

B.

An in-office video call with a coworker

C.

Routing table from the ISP

D.

Firewall CPU processing time

Full Access
Question # 16

A company that uses VoIP telephones is experiencing intermittent issues with one-way audio and dropped conversations The manufacturer says the system will work if ping times are less than 50ms. The company has recorded the following ping times:

Which of the following is MOST likely causing the issue?

A.

Attenuation

B.

Latency

C.

VLAN mismatch

D.

Jitter

Full Access
Question # 17

A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST?

A.

Validate the roaming settings on the APs and WLAN clients

B.

Verify that the AP antenna type is correct for the new layout

C.

Check to see if MU-MIMO was properly activated on the APs

D.

Deactivate the 2.4GHz band on the APS

Full Access
Question # 18

A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the sameSSID for client access. Which of the following BEST describes this deployment?

A.

Extended service set

B.

Basic service set

C.

Unified service set

D.

Independent basic service set

Full Access
Question # 19

Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?

A.

SSO

B.

TACACS+

C.

Zero Trust

D.

Separation of duties

E.

Multifactor authentication

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 27 Oct 2021