Discount Offer
Go Back on N10-008 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99



Pass exam with Dumps4free or we will provide you with three additional months of access for FREE.

N10-008 Practice Test


Page 14 out of 41 Pages

A technician is installing a new fiber connection toa network device in a datacenter. The
connection from the device to the switch also traverses a patch panel connection. The
chain of connections is in the following order:
Device
LC/LC patch cable
Patch panel
Cross-connect fiber cable
Patch panel
LC/LC patch cable
Switch
The connection is not working. The technician has changed both patch cables with known
working patch cables. The device had been tested and was working properly before being
installed. Which of the following is the MOST likely cause of the issue?


A.

TX/RX is reversed


B.

An incorrect cable was used


C.

The device failed during installation


D.

Attenuation is occurring





A.
  

TX/RX is reversed



Which of the following would be BEST to use to detect a MAC spoofing attack?


A.

Internet Control MessageProtocol


B.

Reverse Address Resolution Protocol


C.

Dynamic Host Configuration Protocol


D.

Internet Message Access Protocol





B.
  

Reverse Address Resolution Protocol



Wireless users are reporting intermittent internet connectivity. Connectivity is restored
when the users disconnect and reconnect, utilizing the web authentication process each
time. The network administrator can see the devices connected to the APs at all times.
Which of the following steps will MOST likelydetermine the cause of the issue?


A.

Verify the session time-out configuration on the captive portal settings


B.

Check for encryption protocol mismatch on the client’s wireless settings


C.

Confirm that a valid passphrase is being used during the web authentication


D.

Investigate for a client’s disassociation caused by an evil twin AP





A.
  

Verify the session time-out configuration on the captive portal settings



Which of the following is MOST likely to generate significant East-West traffic in a
datacenter?


A.

A backup of a large video presentation to cloud storage for archival purposes


B.

A duplication of a hosted virtual server to another physical server for redundancy


C.

A download of navigation data to a portable device for offline access


D.

A query from an IoT device to a cloud-hosted server for a firmware update





B.
  

A duplication of a hosted virtual server to another physical server for redundancy



An attacker is attempting to find the password to a network by inputting common words and
phrases in plaintext to the password prompt. Which of the following attack types BEST describes this action?


A.

Pass-the-hash attack


B.

Rainbow table attack


C.

Brute-force attack


D.

Dictionary attack





D.
  

Dictionary attack



Explanation:
QUESTIONNO: 53
Which of the following technologies provides a failover mechanism for the default gateway?
A. FHRP
B. LACP
C. OSPF
D. STP
Answer: A


Page 14 out of 41 Pages
Previous