CompTIA N10-007 Network+ Take Ten Challenge #1Step 1 of 1010%1-1: A network administrator has informed you that access to a switch at a remote site is only available through out-of-band management. Which of these would apply to this configuration? All access is based on a centralized name service You will need an SSL VPN to access the switch All access is provided over a serial connection A browser with HTTPS is used for management File transfers must use FTPS 1-2: Which of these technologies would be the best choice for encrypting terminal communication across the network? DTLS SSL SFTP TLS SSH 1-3: Which security mechanism can identify and block invalid STP traffic from a workstation? BPDU guard Broadcast guard QoS DHCP snooping Flood guard 1-4: A network administrator is working at the command line of a Linux server to determine if traffic from a remote site is communicating with the server. Which of these commands would best identify this traffic? route pathping nmap iptables tcpdump 1-5: A server administrator has identified two devices on the network with duplicate IP addresses. Which layer of the OSI model would best represent this issue? Layer 3 Layer 5 Layer 2 Layer 4 Layer 1 Layer 7 Layer 6 1-6: A manufacturing company has built a disaster recovery site that maintains an exact hardware duplicate of their data center, and all software is synchronized between the sites every hour. Which of the following would best describe this site? Clustering Snapshot Load balanced Hybrid Hot site 1-7: A security administrator would like to limit the number of devices that can communicate through a switch interface. Which of the following would allow this functionality? Flood guard STP DHCP snooping VLAN trunking BPDU guard 1-8: A network engineer is concerned that nearby wireless networks may be interfering with internal wireless communication. Which of these could be used to verify this concern? Loopback plug TDR Spectrum analyzer Multimeter Tone generator 1-9: A developer is designing an application to use network-based remote storage. This application will access information at the block-level of the storage device. Which of these technologies would be the best match for this application? MAN NAS WAN CAN SAN 1-10: A network engineer is connecting two switches directly together in the data center. Which type of cable would be the best choice for this connection? Straight-through Loopback Serial Shielded Crossover