站内搜索
N10-004 问题列表
问题
单选题A zone transfer occurs over which of the following ports?()A
TCP 53B
UDP 67C
UDP 123D
TCP 25
问题
单选题Which of the following tools is used to show the active routes on a workstation?()A
nbstatB
arp -aC
arp pingD
netstat -r
问题
单选题A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?()A
Call their local ISPB
Verify the IP information of the serverC
Check their local Internet connectionD
Verify the hostname of the server
问题
单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()A
AshortB
Open pairsC
ESDD
EMI
问题
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()A
PAPB
CHAPC
EAP-TLSD
Kerberos
问题
单选题Keyword and blacklist filtering would be handled at which level in a network?()A
Layer 2 managed switchB
DHCP serverC
Hardware firewallD
Bridge
问题
单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A
MulticastB
UnicastC
BroadcastD
Peer-to-peer
问题
单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()A
Logical network diagramB
History logsC
Baseline configurationsD
Wiring schematics
问题
单选题Which of the following wireless technologies can operate at only 5GHz?()A
802.11b/gB
802.11gC
802.11bD
802.11a
问题
单选题Which of the following authenticates a web server to the remote client in PKI?()A
FQDNB
DNS nameC
Public keyD
Private key
问题
单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78A
tracertB
pingC
arpD
netstat
问题
单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A
WormB
SmurfC
Logic BombD
Man-in-the-middle
问题
单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()A
IGPB
EIGRPC
EGPD
BGP
问题
单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()A
IS-ISB
BGPC
OSPFD
RIP