N10-004 题目列表
单选题Which of the following tools is used to show the active routes on a workstation?()AnbstatBarp -aCarp pingDnetstat -r
单选题A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?()ACall their local ISPBVerify the IP information of the serverCCheck their local Internet connectionDVerify the hostname of the server
单选题Users are unable to stay connected to the company's wireless network. Several times throughout the day the users' signals are dropped and they are forced to reconnect to the network. A technician determines the network cabling that supplies the WAP has been run inside with several power lines. Which of the following is the MOST likely cause of the network issue?()AAshortBOpen pairsCESDDEMI
单选题Which of the following authentication protocols uses certificates to negotiate access to the network?()APAPBCHAPCEAP-TLSDKerberos
单选题Keyword and blacklist filtering would be handled at which level in a network?()ALayer 2 managed switchBDHCP serverCHardware firewallDBridge
单选题An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()AMulticastBUnicastCBroadcastDPeer-to-peer
单选题An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()ALogical network diagramBHistory logsCBaseline configurationsDWiring schematics
单选题Which of the following wireless technologies can operate at only 5GHz?()A802.11b/gB802.11gC802.11bD802.11a
单选题Which of the following authenticates a web server to the remote client in PKI?()AFQDNBDNS nameCPublic keyDPrivate key
单选题Which of the following utilities will produce the results printed below?() Tracing route to 172.30.0.78 over a maximum of 30 hops . 1 1 ms 1 ms172.30.0.78AtracertBpingCarpDnetstat
单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()AWormBSmurfCLogic BombDMan-in-the-middle
单选题A technician needs to troubleshoot connectivity between two devices located on the same network. Which of the following BEST describes the type of protocol being used?()AIGPBEIGRPCEGPDBGP
单选题A company is about to install a second network connect on with a new ISP. Which of the followingrouting protocols is the BEST choice?()AIS-ISBBGPCOSPFDRIP