Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html
Question No.181
Which of the following uses types and codes rather than ports?
-
EIGRP
-
ICMP
-
UDP
-
IPv6
Correct Answer: B
Question No.182
Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?
-
An IPS
-
A protocol analyzer
-
A traffic shaper
-
An IDS
Correct Answer: A
Question No.183
Which of the following uses certificates as a form of security?
-
Kerberos
-
LDAP
-
PKI
-
CHAP
Correct Answer: C
Question No.184
Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO)
-
dig
-
nslookup
-
nbstat
-
ifconfig
-
ipconfig
Correct Answer: DE
Question No.185
Which of the following provides the MOST protection against zero day attacks via email attachments?
-
Anti-spam
-
Anti-virus
-
Host-based firewalls
-
Patch management
Correct Answer: A
Question No.186
Which of the following default ports would need to be disabled to block TFTP traffic?
A. |
20 |
B. |
21 |
C. |
69 |
D. |
123 |
Correct Answer: C
Question No.187
Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
A. |
21 |
B. |
22 |
C. |
23 |
D. |
25 |
Correct Answer: A
Question No.188
Which of the following defines an IP address that is NOT routed on the Internet?
-
Multicast
-
Public
-
Private
-
Classful
Correct Answer: C
Question No.189
A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress?
-
Phishing
-
Social engineering
-
Man-in-the-middle
-
Smurfing
Correct Answer: B
Question No.190
Which of the following is the network topology in which computers connect in a closed circle?
-
Bus
-
Mesh
-
Ring
-
Star
Correct Answer: C
Get Full Version of the Exam
N10-007 Dumps
N10-007 VCE and PDF