Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html
Question No.151
The process of attempting to exploit a weakness in a network after being given permission by the company is known as:
-
penetration testing
-
vulnerability scanning
-
reconnaissance
-
social engineering
Correct Answer: A
Question No.152
Which of the following WAP security features offers the STRONGEST encryption?
-
WPA
-
WPA2
-
WEP
-
Hidden SSID
Correct Answer: B
Question No.153
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?
-
Spam filter
-
Protocol analyzer
-
Web application firewall
-
Load balancer
Correct Answer: B
Question No.154
Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?
-
RTP
-
NTP
-
TFTP
-
ARP
Correct Answer: B
Question No.155
Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?
-
CAT3
-
CAT5
-
CAT5e
-
CAT6
Correct Answer: B
Question No.156
Which of the following ports is the default telnet port?
A. |
20 |
B. |
21 |
C. |
22 |
D. |
23 |
Correct Answer: D
Question No.157
Which of the following standards can operate at both the 2.4GHz and 5GHz frequencies?
A. 802.11a B. 802.11b C. 802.11g D. 802.11n
Correct Answer: D
Question No.158
Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?
-
RDP
-
SSL VPN
-
ISAKMP
-
TLS 2.0
Correct Answer: B
Question No.159
Which of the following mediums is circuit switched?
-
PSTN
-
ATM
-
Frame relay
-
MPLS
Correct Answer: A
Question No.160
Which of the following is a secure way to connect to a device?
-
RSH
-
TFTP
-
SNMPv2
-
SFTP
Correct Answer: D
Get Full Version of the Exam
N10-007 Dumps
N10-007 VCE and PDF