Network+_N10-009_Question41-80

Network+_N10-009_Question41-80

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Mehmet güzel

Used 5+ times

FREE Resource

Student preview

quiz-placeholder

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 41 A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host bits is required?
One
Two
Three
Four

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 42 A network administrator is developing a method of device monitoring with the following requirements: *Allows for explicit, by user, privilege management *Includes centralized logging of changes *Offers widely accessible remote management *Provides support of service accounts Which of the following will most closely meet these requirements?
SNMP
API
SIEM
SSO

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 43 A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?
Screened subnet
802.1X
MAC filtering
Port security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 44 A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?
netstat
nslookup
ping
tracert

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 45 Which of the following attacks would most likely cause duplicate IP addresses in a network?
Rogue DHCP server
DNS poisoning
Social engineering
Denial-of-service

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 46 A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
MAC security
Content filtering
Screened subnet
Perimeter network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

QUESTION NO: 47 Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

Router
Switch
Firewall
Load Balancer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?