Computer Networking > EXAM > N10-006 - Transcender Exam Solved 100% (All)
1. You are a network administrator for a company that maintains LANs in Los Angeles and Paris. You want to use PPTP to create a VPN connection between the LAN in Paris and the LAN in Los Angeles. A PP... TP server has been configured on each LAN. Which protocol should you use to establish a connection between the PPTP servers? a) HTTP b) PPP c) SLIP d) Telnet - ANSWER b) PPP 2. What is the advantage of using wireless bridges over E1/T1 leased lines? a) Wireless bridges generate less noise than E1/T1 lines. b) Wireless bridges support higher bandwidth than E1/T1. c) Wireless bridges support more distance than E1/T1 lines. d) Wireless bridges support higher reliability than E1/T1 lines. - ANSWER b) Wireless bridges support higher bandwidth than E1/T1. 3. What should you implement to isolate two of the devices that are located on a storage area network (SAN) fabric containing eight devices? a) SAN snapshots b) HBA allocation c) virtual SAN d) VLAN - ANSWER c) virtual SAN 4. The network you administer is a Fast Ethernet network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter cables. The network uses Category 5 unshielded twisted-pair (CAT 5 UTP) cable. You use a 15-meter patch cable to connect a server named Shipping to a wall outlet. You connect the Shipping computer to the network, start the computer, and properly configure it. However, clients cannot connect to the Shipping server. Clients can connect to other servers on the network. What will most likely solve the connection problem? a) replacing the CAT 5 UTP with CAT 1 UTP b) replacing the CAT 5 UTP with CAT 3 UTP c) replacing the 15-meter patch cable with a 10-meter patch cable d) replacing the 15-meter patch cable with a 3-meter patch cable - ANSWER d) replacing the 15-meter patch cable with a 3-meter patch cable 5. Your company has decided to implement either a 1000Base-LX or 1000-Base-SX network. Which type of cable should you use? a) UTP b) STP c) coaxial d) fiber optic - ANSWER d) fiber optic 6. What is typically used to conceal the nature of a social engineering attack? a) encryption b) believable language c) excess bandwidth d) users' good intentions - ANSWER b) believable language 7. You are troubleshooting a connectivity problem on an Ethernet network that contains both NetWare and Windows servers. A Windows 7 client cannot connect to the Internet or any network resources. However, other computers on the same subnet as the client can access network resources and the Internet. You issue the ipconfig command at the workstation and find that the IP address is 169.254.184.25 and the subnet mask is 255.255.0.0. This IP network and subnet are different from the IP network and subnet that other computers on the same segment are using. What is the most likely problem? a) The client selected the IP address using APIPA. b) The client obtained the IP address from a NetWare server. c) The client obtained the IP address from a Windows server. d) The client obtained the IP address from a DHCP server it found on the Internet. - ANSWER a) The client selected the IP address using APIPA. 8. You are the network administrator for an organization whose network uses the Open Shortest Path First (OSPF) routing protocol. Which metric does this protocol use for optimal path calculation? a) MTU b) Cost c) Delay d) Hop count - ANSWER b) Cost 9. Management has decided to implement a diversity antenna system at its main headquarters. What is the advantage of using this system? a) A diversity antenna system adds more bandwidth. b) A diversity antenna system avoids multipath distortion. c) A diversity antenna system increases the coverage area. d) A diversity antenna system increases the transmission power. - ANSWER b) A diversity antenna system avoids multipath distortion. 10. You need to configure a remote access server to authenticate remote users with smart cards. Which protocol should you use? a) EAP b) MS-CHAP c) CHAP d) PAP - ANSWER a) EAP 11. You need to determine the length of a network cable. Which device should you use? a) a crossover cable b) a hardware loopback c) a TDR d) a tone generator - ANSWER c) a TDR (time domain reflectometer) 12. You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next? a) Replace all the patch cables. b) Document the problem and the solution. c) Have other users reboot their workstations. d) Connect to the network and try to transfer a file. - ANSWER d) Connect to the network and try to transfer a file. 13. You suspect that there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI Network layer to allow this? a) Link-state addressing b) Logical network addressing c) Physical device addressing d) Distance vector addressing - ANSWER b) Logical network addressing 14. A company has an 802.11b wireless network deployed to allow mobile devices to connect to the network. Which frequency band is used in this network? a) 2.4 GHz b) 2.9 GHz c) 5 GHz d) 900 MHz - ANSWER a) 2.4 GHz 15. As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? a) Network b) Session c) Physical d) Transport - ANSWER c) Physical 16. You have changed the IP address scheme for two of your company's networks. In addition, the names of two servers have changed. Which change management documentation should you revise? a) logical network diagram b) physical network diagram c) network baseline d) wiring schematic - ANSWER b) physical network diagram 17. You want to install a device between your company's private network and the Internet that will prevent users on the Internet from transferring HTTP messages into the company's network. Which device should you install? a) a bridge b) a firewall c) a hub d) a router - ANSWER b) a firewall 18. During a recent network redesign meeting, one team member suggested that you implement a device that operates at both the Data Link layer and the Network layer of the OSI model. Which device operates at both of these layers? a) a bridge b) a brouter c) a hub d) a repeater e) a router - ANSWER b) a brouter 19. Your network contains four segments. Which network devices can you use to connect two or more of the LAN segments together? (Choose four.) a) Hub b) Router c) Switch d) Bridge d) Repeater e) Wireless Access Point - ANSWER b) Router c) Switch d) Bridge e) Wireless Access Point 20. Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide? a) baselines b) guidelines c) standards d) procedures - ANSWER a) baselines 21. A hacker has called a company employee and learned the employee's user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered? a) buffer overflow b) denial of service c) brute force d) social engineering - ANSWER d) social engineering [Show More]
Last updated: 2 years ago
Preview 1 out of 32 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 28, 2022
Number of pages
32
Written in
This document has been written for:
Uploaded
Aug 28, 2022
Downloads
0
Views
73
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·