N10-007 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Exam

Question No.61

The IT manager at a small firm is in the process of renegotiating an SLA with the organization#39;s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization#39;s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?

  1. Session hijacking

  2. Blocking

  3. Throttling

  4. Data usage limits

  5. Bandwidth quotas

Correct Answer: C

Question No.62

A network administrator configures a router with the following IP address information: Gigabit Ethernet 1 Interface:

Serial 0 Interface:

Clients are connected to a switch on the gigabit Ethernet interface; the ISP is connected to the Serial 0 interface. When the router configuration is complete and client devices are reconfigured, all clients report that they are unable to connect to the Internet. Which of the following is the MOST likely reason?

  1. The router was configured with an incorrect IP address

  2. The router was configured with an incorrect default gateway

  3. The router was configured with an incorrect subnet mask

  4. The router was configured with an incorrect loopback address

Correct Answer: C

Question No.63

A network technician has created a network that consists of a router, a firewall, a switch, and several PC#39;s. Which of the following physical network topologies was created?

  1. Star

  2. Mesh

  3. Ring

  4. Bus

Correct Answer: D

Question No.64

A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the technician use to reveal the location of the fault?

  1. OTDR

  2. Light meter

  3. Tone generator

  4. CSU/DSU

Correct Answer: A

Question No.65

Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.)

  1. VPN concentrator

  2. Proxy server

  3. Wireless controller

  4. RADIUS server

  5. Multilayer switch

Correct Answer: CD

Question No.66

Which of the following policies would Joe, a user have to agree to when he brings in his personal tablet to connect to the company#39;s Guest wireless Internet?

  1. NDA

  2. IRP

  3. BYOD

  4. SLA

Correct Answer: C

Question No.67

A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?

  1. Remove SNMP polling and configure SNMP traps on each network device

  2. Remove SNMP polling and implement snmpwalk on each network device

  3. Upgrade SNMP to the latest version to mitigate vulnerabilities

  4. Modify SNMP polling to poll only during business hours

Correct Answer: A

Question No.68

Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?

  1. DHCP lease me

  2. IP helper

  3. TTL

  4. DNS record type

Correct Answer: B

Question No.69

A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. Which of the following represents the MOST secure method to configure guest access to the wireless network?

  1. Guests should log into a separate wireless network using a captive portal

  2. Guests should log into the current wireless network using credentials obtained upon entering the facility

  3. The existing wireless network should be configured to allow guest access

  4. An additional wireless network should be configured to allow guest access

Correct Answer: A

Question No.70

A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?

  1. VLAN

  2. DMZ

  3. SNMP

  4. NTP

Correct Answer: B

Get Full Version of N10-007 Dumps