Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

N10-006 - Transcender Exam questions with correct answers, Exams of Nursing

N10-006 - Transcender Exam questions with correct answers

Typology: Exams

2024/2025

Available from 02/22/2025

bryanryan
bryanryan 🇺🇸

4.3

(3)

6.5K documents

Partial preview of the text

Download N10-006 - Transcender Exam questions with correct answers and more Exams Nursing in PDF only on Docsity!

N10-006 - Transcender Exam questions with

correct answers

  1. You are a network administrator for a company that maintains LANs in Los Angeles and Paris. You want to use PPTP to create a VPN connection between the LAN in Paris and the LAN in Los Angeles. A PPTP server has been configured on each LAN. Which protocol should you use to establish a connection between the PPTP servers? a) HTTP b) PPP c) SLIP d) Telnet Answer✓✓ b) PPP
  2. What is the advantage of using wireless bridges over E1/T1 leased lines? a) Wireless bridges generate less noise than E1/T1 lines. b) Wireless bridges support higher bandwidth than E1/T1. c) Wireless bridges support more distance than E1/T1 lines. d) Wireless bridges support higher reliability than E1/T1 lines. Answer✓✓ b) Wireless bridges support higher bandwidth than E1/T1.
  3. What should you implement to isolate two of the devices that are located on a storage area network (SAN) fabric containing eight devices? a) SAN snapshots b) HBA allocation c) virtual SAN d) VLAN Answer✓✓ c) virtual SAN
  1. The network you administer is a Fast Ethernet network. Wall outlets are connected to patch panels by 90-meter cables. Patch panels are connected to switches by 5-meter cables. The network uses Category 5 unshielded twisted-pair (CAT 5 UTP) cable. You use a 15-meter patch cable to connect a server named Shipping to a wall outlet. You connect the Shipping computer to the network, start the computer, and properly configure it. However, clients cannot connect to the Shipping server. Clients can connect to other servers on the network. What will most likely solve the connection problem? a) replacing the CAT 5 UTP with CAT 1 UTP b) replacing the CAT 5 UTP with CAT 3 UTP c) replacing the 15-meter patch cable with a 10-meter patch cable d) replacing the 15-meter patch cable with a 3-meter patch cable Answer✓✓ d) replacing the 15-meter patch cable with a 3-meter patch cable
  2. Your company has decided to implement either a 1000Base-LX or 1000-Base- SX network. Which type of cable should you use? a) UTP b) STP c) coaxial d) fiber optic Answer✓✓ d) fiber optic
  3. What is typically used to conceal the nature of a social engineering attack? a) encryption b) believable language

a) A diversity antenna system adds more bandwidth. b) A diversity antenna system avoids multipath distortion. c) A diversity antenna system increases the coverage area. d) A diversity antenna system increases the transmission power. Answer✓✓ b) A diversity antenna system avoids multipath distortion.

  1. You need to configure a remote access server to authenticate remote users with smart cards. Which protocol should you use? a) EAP b) MS-CHAP c) CHAP d) PAP Answer✓✓ a) EAP
  2. You need to determine the length of a network cable. Which device should you use? a) a crossover cable b) a hardware loopback c) a TDR d) a tone generator Answer✓✓ c) a TDR (time domain reflectometer)
  3. You are troubleshooting a workstation that is not communicating with the network. You try a different port within the wiring closet hub, and this seems to fix the problem. What should you do next? a) Replace all the patch cables. b) Document the problem and the solution. c) Have other users reboot their workstations.

d) Connect to the network and try to transfer a file. Answer✓✓ d) Connect to the network and try to transfer a file.

  1. You suspect that there is a problem with addressing that allows data to be sent throughout your network. Which addressing method is used at the OSI Network layer to allow this? a) Link-state addressing b) Logical network addressing c) Physical device addressing d) Distance vector addressing Answer✓✓ b) Logical network addressing
  2. A company has an 802.11b wireless network deployed to allow mobile devices to connect to the network. Which frequency band is used in this network? a) 2.4 GHz b) 2.9 GHz c) 5 GHz d) 900 MHz Answer✓✓ a) 2.4 GHz
  3. As a network administrator, you decide to replace a hub on your network with an active hub. At which OSI layer does the new device function? a) Network b) Session c) Physical d) Transport Answer✓✓ c) Physical
  1. Your network contains four segments. Which network devices can you use to connect two or more of the LAN segments together? (Choose four.) a) Hub b) Router c) Switch d) Bridge d) Repeater e) Wireless Access Point Answer✓✓ b) Router c) Switch d) Bridge e) Wireless Access Point
  2. Management has requested that you document the minimum level of security for all network devices. Which of the following will this provide? a) baselines b) guidelines c) standards d) procedures Answer✓✓ a) baselines
  3. A hacker has called a company employee and learned the employee's user name and password by posing as a member of corporate technical support. Which type of attack has the company suffered? a) buffer overflow

b) denial of service c) brute force d) social engineering Answer✓✓ d) social engineering

  1. A server on your network contains several virtual servers. However, the server contains a single NIC. Which statement MOST likely describes the communication from this server? a) It transmits data from multiple IP addresses. b) It transmits data from multiple MAC addresses. c) It transmits data using IPv6. d) It transmits data using IPv4. Answer✓✓ a) It transmits data from multiple IP addresses.
  2. Which fiber-optic connector is roughly half the size of other fiber-optic connectors? a) LC b) SC c) ST d) BNC Answer✓✓ a) LC
  3. You are working with your support specialists on expanding your company's existing network. You need to determine the actual network interfaces used on all network devices. Which configuration management documentation should you consult? a) wiring schematics b) logical network diagram c) physical network diagram

b) Shielding c) Number of twists in the wires d) Separators between the wire pairs Answer✓✓ b) Shielding

  1. You have two wireless networks in your building. The wireless networks do not overlap. Both of them use Wi-Fi Protected Access (WPA). You want to ensure that no unauthorized wireless access points are established. What should you do? a) Change the two wireless networks to WPA2. b) Change the two wireless networks to WEP. c) Periodically complete a site survey. d) Disable SSID broadcast for the two wireless networks. Answer✓✓ c) Periodically complete a site survey.
  2. What attack is also considered to be a social engineering attack? a) an e-mail hoax b) a logic bomb c) a backdoor d) a Trojan horse Answer✓✓ a) an e-mail hoax
  3. You need to solve a traffic problem occurring on a large Ethernet network. Within this large segment, the accounting department is flooding the network with a high volume of data, which causes the entire network to slow down. Which device is a quick and low-cost solution to isolating the accounting department?

a) router b) bridge c) gateway d) repeater Answer✓✓ b) bridge

  1. Your organization has several wireless access points located in the building. Access point usage is based on department membership. Many users report that they are able to see multiple access points. You research this issue and discover that their computers are not connecting to the appropriate access point due to an SSID mismatch. You must ensure that the computers connect to the correct access point if that access point is available. Computers should be able to connect to other access points only if their main access point is down. What should you do? a) Reduce the signal strength on the wireless access points. b) Configure the preferred wireless network on the user's computer. c) Configure MAC filtering on the wireless access points. d) Ensure that the wireless access points in close proximity use different channels. Answer✓✓ b) Configure the preferred wireless network on the user's computer.
  2. Your network contains several virtual LANs (VLANs). What is a benefit of using this technology? a) It allows users on a LAN to communicate with remote networks. b) It connects small networks together to form a single large network. c) It allows networks to be segmented logically without being physically rewired. d) It allows users from different segments to communicate with each other. Answer✓✓ c) It allows networks to be segmented logically without being physically rewired.
  1. Which two guidelines should you implement to create the strongest passwords? (Choose two.) a) Ensure that passwords change rarely or never change. b) Configure passwords to change periodically. c) Ensure that passwords are only constructed of only alphanumeric characters. d) Ensure that passwords are at least 15 characters in length. e) Create passwords that contain at least one symbol. Answer✓✓ b) Configure passwords to change periodically. e) Create passwords that contain at least one symbol.
  2. You administer a 100BaseTX Ethernet network that is configured to use the TCP/IP network communications protocol. You have installed a firewall between the network and the Internet. Currently ports 80, 20, and 21 are open on the firewall. You want to allow only SMTP and POP3 communications between the network and the Internet. Which configurations should you make on the firewall? a) Close port 80 only. b) Close ports 20, 21, and 80, and open ports 25 and 110. c) Close ports 20 and 21, and open port 25. d) Close ports 21 and 80, and open port 110. Answer✓✓ b) Close ports 20, 21, and 80, and open ports 25 and 110.
  3. You are using DSL to connect to the Internet. You recently set up firewall software to protect your computer's resources from external users. After setting up the firewall software, you can no longer access Web sites by name.

What is the problem? a) You do not have a static IP address. b) You have a DHCP server on the network. c) Your firewall software is blocking port 53. d) Your firewall software is blocking port 25. Answer✓✓ c) Your firewall software is blocking port 53.

  1. You decide to implement a DHCP server on your network. What is the purpose of a DHCP scope? a) It is the temporary assignment of an IP address. b) It is the range of IP addresses that a DHCP server can temporarily assign. c) It is an IP address that is set aside for a certain device. d) It is an IP address that cannot be assigned. Answer✓✓ b) It is the range of IP addresses that a DHCP server can temporarily assign.
  2. Your company has recently leased the office next door to the one currently being used. Both offices will be used. The current office has a Cat 6 network installed. The new office has a fiber network installed. You need to connect the networks of the two offices. Which device should you use? a) gateway b) CSU/DSU c) modem d) media converter Answer✓✓ d) media converter

a) when the result of running the ipconfig /all command indicates a 169.254.163. address b) when recent scope changes have been made on the DHCP server c) when no IP helper address has been configured on the router between the client and the DHCP server d) when the no ip directed-broadcast command has been issued in the router interface local to the client, and no IP helper address has been configured on the router between the client and the DHCP server Answer✓✓ a) when the result of running the ipconfig /all command indicates a 169.254.163.6 address b) when recent scope changes have been made on the DHCP server

  1. You are working on the 196.11.200.71/18 client in a network. What is the base network ID for this network? a) 196.0.0. b) 196.11.0. c) 196.11.192. d) 196.11.200. e) 196.11.200.71 Answer✓✓ c) 196.11.192.
  2. You have been asked to ensure that data is scrambled before it goes out onto the network. Which technology should you implement? a) auditing b) encryption c) permissions d) compression Answer✓✓ b) encryption
  3. What is the term for the process of collection, analysis, and preservation of evidence?

a) law procedure b) evidence chain c) incident handling d) chain of custody Answer✓✓ d) chain of custody

  1. You are a desktop administrator for Nutex Corporation. Your organization uses Ethernet cable to connect network resources. A user reports that he is unable to access network resources on his portable computer. The portable computer is connected to the company's network using an Ethernet cable. When you test the cable using a time domain reflectometer (TDR), the signal returns too soon. What should you do? a) Replace the network cable. b) Reinstall the network adapter. c) Replace the network adapter. d) Re-route the network cable. Answer✓✓ a) Replace the network cable.
  2. Which term is used to describe the ability to respond to a single point of failure on a network? a) RAID b) Loopback c) Clustering d) Fault tolerance Answer✓✓ d) Fault tolerance
  3. You need to display the current IP configuration of a Windows 7 computer. Which command should you use? a) tracert
  1. You are the network administrator for a corporate network that includes a DNS server, a DHCP server, a file/print server, and a wireless subnet. Computers on the wireless subnet are having trouble connecting to internal resources and to the Internet. Upon troubleshooting the problem, you discover that some of the wireless computers can only access resources on other wireless computers. However, some of the wireless computers can access internal resources and the Internet. What is causing some of the wireless computers to be able to access other wireless computers only? a) The computers are configured to operate in ad hoc mode. b) The computers are configured to operate in infrastructure mode. c) The computers are configured with static IP addresses. d) The computers are configured with the wrong subnet mask. Answer✓✓ a) The computers are configured to operate in ad hoc mode.
  2. Which payload is produced by using IPSec in tunnel mode with the AH protocol? a) an encapsulated packet that is encrypted b) an encapsulated packet that is digitally signed c) an unencapsulated packet that is encrypted d) an unencapsulated packet that is digitally signed Answer✓✓ b) an encapsulated packet that is digitally signed
  3. Your company decides to implement a WLAN for usage by visitors. Management has requested that you implement a WLAN that supports a maximum of 11 Mbps data rate. Which WLAN technology supports this data transmission rate? a) 802.11b

b) 802.11a c) 802.11g d) 802.11e Answer✓✓ a) 802.11b

  1. You are configuring a new small office home office (SOHO) at a small insurance office. After documenting the network requirements, you decide to use Network Address Translation (NAT) so that only one public address will be needed. You want to use the IANA-designated private IP address range that provides host IP addresses with a maximum of 16 bits. What is a valid host IP address in this range? a) 10.251.250. b) 11.0.1. c) 172.30.250. d) 192.168.0.1 Answer✓✓ d) 192.168.0.
  2. You administer computers on an Ethernet 100BaseTX network, which uses the TCP/IP network communications protocol. The network uses an unsubnetted Class A IP address range. A computer on the network named Admin1 has the IP address 12.10.100.3, and a computer on the network named Marketing1 is configured with the IP address 12.10.100.4. Both computers are configured with the subnet mask 255.0.0.0 and the default gateway address 12.10.100.5. The network is connected to the Internet. RemoteWkst is a computer on a remote network that is connected to the Internet. Normally, Marketing1 and Admin1 can connect to RemoteWkst. You recently discovered that Marketing1 can connect to Admin1 and Admin1 can connect to Marketing1, but neither of these computers can connect to RemoteWkst.