N10-006 CompTIA Network+ Certification Practice Test Set 1

A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight.  Which of the following steps of incident handling has been incorrectly performed?  


Options are :

  • Chain of custody (Correct)
  • Document the scene
  • Evidence collection
  • Forensics report

Answer : Chain of custody

A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building.  Which of the following antenna types is BEST suited for this solution?  
 


Options are :

  • Patch (Correct)
  • Yagi
  • Omni-directional
  • Parabolic

Answer : Patch

A technician has finished configuring AAA on a new network device. However, the technician is unable to log into the device with LDAP credentials but is able to do so with a local user account.  Which of the following is the MOST likely reason for the problem?  


Options are :

  • Shared secret key is mismatched (Correct)
  • Group policy has not propagated to the device
  • Username is misspelled is the device configuration file
  • IDS is blocking RADIUS

Answer : Shared secret key is mismatched

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network.  This is an example of which of the following attacks?  
 


Options are :

  • VLAN hopping (Correct)
  • Smurf attack
  • Blue snarfing
  • Spear phishing

Answer : VLAN hopping

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system.  Which of the following should the technician perform?



Options are :

  • Implicit deny all traffic on network
  • Add the system to the DMZ (Correct)
  • Configure a VLAN on Layer 2 switch
  • Disable the network based firewall

Answer : Add the system to the DMZ

During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company.  Which of the following would be identified as physical security controls? (Select THREE).  


A. RSA 
B. Passwords 
C. Man traps 
D. Biometrics 
E. Cipher locks 
F. VLANs 
G. 3DES 


Options are :

  • C,D,E (Correct)
  • A,E,F
  • D,F,G
  • C,E,F

Answer : C,D,E

Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths?  


Options are :

  • DWDM (Correct)
  • SONET
  • ADSL
  • LACP

Answer : DWDM

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?  

 


Options are :

  • The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.
  • The VoIP phone would request a different configuration from the unified communications server.
  • The VoIP phone would request a new phone number from the unified communications server.
  • The VoIP phone would cause the switch interface, that the user plugged into, to shutdown. (Correct)

Answer : The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

 A technician is setting up a new network and wants to create redundant paths through the network.  Which of the following should be implemented to prevent performance degradation?  


Options are :

  • Port mirroring
  • ARP inspection
  • Spanning tree (Correct)
  • VLAN

Answer : Spanning tree

A technician is troubleshooting a client's connection to a wireless network. The client is asked to run a "getinfo" command to list information about the existing condition.  
myClient$ wificard --getinfo 
agrCtlRSSI:-72 
agrExtRSSI:0 
state:running 
op mode: station 
lastTxRate:178 
MaxRate:300 
802.11 auth:open 
link auth:wpa2-psk 
BSSID:0F:33:AE:F1:02:0A 
SSID:CafeWireless 
Channel:149,1  
Given this output, which of the following has the technician learned about the wireless network? (Select TWO).  


A. The WAP is using RC4 encryption 
B. The WAP is using 802.11a 
C. 
CompTIA N10-006 Exam
www.braindumps.com 79
The WAP is using AES encryption 
D. The WAP issuing the 2.4GHz channel 
E. The WAP is using the 5GHz channel 
F. The WAP is using 802.11g 


Options are :

  • A,D
  • A,B
  • C,E (Correct)
  • A,F

Answer : C,E

Which of the following protocols must be implemented in order for two switches to share VLAN information?  


Options are :

  • MPLS
  • None
  • PPTP
  • STP
  • VTP (Correct)

Answer : VTP

Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server.  Which of the following is the BEST explanation that describes this scenario?  
 


Options are :

  • Smurf attack
  • Man-in-the-middle
  • SQL injection attack
  • Compromised system (Correct)

Answer : Compromised system

A training class is being held in an auditorium. Hard-wired connections are required for all laptops that will be used. The network technician must add a switch to the room through which the laptops will connect for full network access.  Which of the following must the technician configure on a switch port, for both switches, in order to create this setup?  
 


Options are :

  • Split horizon
  • CIDR
  • TRUNK (Correct)
  • DHCP

Answer : TRUNK

A technician is configuring a managed switch and needs to enable 802.3af.  Which of the following should the technician enable?  


Options are :

  • Port bonding
  • PoE (Correct)
  • VLAN
  • Trunking

Answer : PoE

Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material.  
Which of the following forensics actions should Ann perform?
  
 


Options are :

  • Erase the files created by the virus
  • Stop and escalate to the proper authorities (Correct)
  • Check the remaining directories for more .mp4 files
  • Copy the information to a network drive to preserve the evidence

Answer : Stop and escalate to the proper authorities

Which of the following physical security controls prevents an attacker from gaining access to a network closet?  
 


Options are :

  • Proximity readers (Correct)
  • CCTVs
  • IP cameras
  • Motion sensors

Answer : Proximity readers

After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers.  Which of the following should the technician perform so that Ann can get back to work as quickly as possible?  


Options are :

  • Reset Ann's equipment configuration from a backup.
  • Reformat and install the compatible drivers.
  • Restore Ann's PC to the last known good configuration.
  • None of the Above
  • Downgrade the PC to a working patch level.
  • Roll back the drivers to the previous version. (Correct)

Answer : Roll back the drivers to the previous version.

A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices.  Which of the following would need to be configured on each network device to provide that information in a secure manner?  
 


Options are :

  • SNMPv3 (Correct)
  • PGP
  • RSH
  • S/MIME
  • SYSLOG

Answer : SNMPv3

A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations.  
Which of the following standards should be consulted?  

 


Options are :

  • DWDM
  • DOCSIS
  • TEMPEST (Correct)
  • MIMO

Answer : TEMPEST

A wireless network technician for a local retail store is installing encrypted access points within the store for real-time inventory verification, as well as remote price checking capabilities, while employees are away from the registers. The store is in a fully occupied strip mall that has multiple neighbors allowing guest access to the wireless networks. There is a finite known number of approved handheld devices needing to access the store's wireless network.  Which of the following is the BEST security method to implement on the access points?  
 


Options are :

  • IP ACL
  • TLS/TTLS
  • MAC filtering (Correct)
  • Port forwarding

Answer : MAC filtering

A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks?  
 


Options are :

  • Acceptable use policies
  • Patch management (Correct)
  • Host-based intrusion detection systems
  • Incident response team

Answer : Patch management

A technician needs to secure web traffic for a new e-commerce website.  Which of the following will secure traffic between a web browser and a website?  


Options are :

  • WPA2
  • SSL (Correct)
  • DNSSEC
  • MTU

Answer : SSL

A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer.  Which of the following should be the FIRST question the helpdesk asks?  



Options are :

  • Does the printer have toner?
  • Is the printer powered up?
  • Are there any errors on the printer display?
  • Is the user able to access any network resources? (Correct)

Answer : Is the user able to access any network resources?

When two or more links need to pass traffic as if they were one physical link, which of the following would be used to satisfy the requirement?  
 


Options are :

  • 802.1w
  • LACP (Correct)
  • Port mirroring
  • VTP

Answer : LACP

Which of the following is a security benefit gained from setting up a guest wireless network?  

 


Options are :

  • Optimized device bandwidth
  • Reduced password resets
  • Isolated corporate resources (Correct)
  • Smaller ACL changes

Answer : Isolated corporate resources

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server.  Which of the following is the MOST likely mitigation for this reported item?  


Options are :

  • Implement a VPN for employees
  • Install an IDS on the network
  • Ensure patches are deployed (Correct)
  • Configure the firewall to block traffic on port 443

Answer : Ensure patches are deployed

A network technician has detected duplicate IP addresses on the network. After testing the behavior of rogue DHCP servers, the technician believes that the issue is related to an unauthorized home router.  Which of the following should the technician do NEXT in the troubleshooting methodology?  


Options are :

  • Remove the rogue DHCP server from the network.
  • Establish a plan to locate the rogue DHCP server. (Correct)
  • Document the findings and action taken.
  • Identify the root cause of the problem

Answer : Establish a plan to locate the rogue DHCP server.

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication.  Which of the following would the technician MOST likely configure?  
 


Options are :

  • Proxy server
  • Software firewall (Correct)
  • Hardware firewall
  • GRE tunneling

Answer : Software firewall

A technician needs to install software onto company laptops to protect local running services, from external threats.  Which of the following should the technician install and configure on the laptops if the threat is network based?  


Options are :

  • A cloud-based antivirus system with a heuristic and signature based engine
  • A host-based firewall which allows all outbound communication (Correct)
  • A HIDS to inspect both inbound and outbound network communication
  • A network based firewall which blocks all inbound communication

Answer : A host-based firewall which allows all outbound communication

A company wants to make sure that users are required to authenticate prior to being allowed on the network.  Which of the following is the BEST way to accomplish this?  


Options are :

  • Kerbero
  • 802.1p
  • 802.1x (Correct)
  • Single sign-on

Answer : 802.1x

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions