N10-007 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam

Question No.51

A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed.

Which of the following BEST explains this response?

  1. The ports belong to an active system and are denying requests

  2. The ports are associated with deprecated services

  3. The ports do not belong to a live system

  4. The ports replied with a SYN/ACK response

Correct Answer: B

Question No.52

A device operating at Layer 3 of the OSI model uses which of the following protocols to determine the path to a different network?

  1. STP

  2. RTP

  3. RIP

  4. NTP

  5. SIP

Correct Answer: C

Question No.53

Which of the following protocols can be both connection-oriented and connectionless?

  1. 20 FTP

  2. 53 DNS

  3. 67 DHCP

  4. 80 HTTP

Correct Answer: B

Question No.54

A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?

  1. Straight-through

  2. Console

  3. Rollover

  4. Crossover

Correct Answer: D

Question No.55

A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?

  1. Device software

  2. Printer drivers

  3. Printer firmware

  4. NIC drivers

Correct Answer: C

Question No.56

A disgruntled employee executes a man-in-the-middle attack on the company network. Layer 2 traffic destined for the gateway is redirected to the employee#39;s computer. This type of attack is an example of:

  1. ARP cache poisoning

  2. IP spoofing

  3. amplified DNS attack

  4. evil twin

Correct Answer: A

Question No.57

A network technician configures a firewall#39;s ACL to allow outgoing traffic for several popular

services such as email and web browsing. However, after the firewall#39;s deployment, users are still unable to retrieve their emails. Which of the following would BEST resolve this issue?

  1. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389

  2. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443

  3. Set the firewall to operate in transparent mode

  4. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123

Correct Answer: B

Question No.58

A network technician receives a call from a use who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced to the network?

  1. Rogue DHCP server

  2. Evil twin

  3. VLAN mismatch

  4. Honeypot

Correct Answer: A

Question No.59

A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following

802.11 standards provides the MOST bandwidth?

  1. a

  2. ac

  3. g

  4. n

Correct Answer: B

Question No.60

A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the application. Which of the following would be the MOST cost effective for the administrator to recommend?

  1. Create Ethernet VLANs

  2. Disable autonegotiation on the servers

  3. Install 10Gb Ethernet NICs in the servers

  4. Install Fibre Channel for the server network

Correct Answer: C

Get Full Version of N10-007 Dumps