N10-006 CompTIA Network+ Certification Practice Test Set 2

A company has seen an increase in ransomware across the enterprise.  Which of the following should be implemented to reduce the occurrences?  


Options are :

  • Port filtering
  • Web content filtering (Correct)
  • Intrusion detection system
  • ARP inspection

Answer : Web content filtering

Network segmentation provides which of the following benefits?  


Options are :

  • Packet flooding through all ports
  • Link aggregation
  • High availability through redundancy
  • Security through isolation (Correct)

Answer : Security through isolation

Which of the following types of network would be set up in an office so that customers could access the Internet but not be given access to internal resources such as printers and servers?  
 


Options are :

  • Quarantine network
  • Core network
  • Wireless network
  • Guest network (Correct)

Answer : Guest network

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure.  Which of the following would be required to resolve the exploit?  


Options are :

  • Send all log files through SMTP
  • Utilize a FTP service
  • Install recommended updates (Correct)
  • Configure the firewall to block port 22

Answer : Install recommended updates

A firewall ACL is configured as follows:  
10. Deny Any Trust to Any DMZ eq to TCP port 22 
11. Allow 10.200.0.0/16 to Any DMZ eq to Any 
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
CompTIA N10-006 Exam
www.braindumps.com 71
13. Deny Any Trust to Any DMZ eq to Any  
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only.  
Reordering the ACL in which of the following manners would meet the company's objectives?  



Options are :

  • 13, 12, 11, 10
  • 12, 10, 11, 13
  • 11, 10, 12, 13 (Correct)
  • 13, 10, 12, 11

Answer : 11, 10, 12, 13

A malicious user floods a switch with frames hoping to redirect traffic to the user's server.  Which of the following attacks is the user MOST likely using?  
 


Options are :

  • ARP poisoning (Correct)
  • Reflection
  • DNS poisoning
  • SYN attack

Answer : ARP poisoning

Which of the following requires the network administrator to schedule a maintenance window?  


Options are :

  • A major release upgrade of a core switch in a test lab.
  • When a company-wide email notification must be sent.
  • When the network administrator's laptop must be rebooted.
  • A minor release upgrade of a production router. (Correct)

Answer : A minor release upgrade of a production router.

Which of the following concepts are MOST important for a company's long term health in the event of a disaster? (Select TWO).  


A. Redundancy 
B. Implementing acceptable use policy 
C. Offsite backups 
D. Uninterruptable power supplies 
E. Vulnerability scanning 


Options are :

  • C,D
  • A,C (Correct)
  • B,E
  • A,E

Answer : A,C

A network technician is using a network monitoring system and notices that every device on a particular segment has lost connectivity.  
Which of the following should the network technician do NEXT?  

 


Options are :

  • Determine next steps to solve the problem.
  • Establish a theory of probable cause.
  • Determine if anything has changed. (Correct)
  • Document actions and findings.

Answer : Determine if anything has changed.

A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers.  
Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?  



Options are :

  • Implement MAC filtering on all wireless access points
  • Add an implicit deny to the core router ACL
  • Require users to utilize two-factor authentication
  • Block port 80 outbound on the company firewall
  • Install host-based anti-malware software (Correct)

Answer : Install host-based anti-malware software

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time.  Which of the following should be done to correct this issue?  


Options are :

  • Increase the number of virtual terminals available. (Correct)
  • Increase the number of VLANs configured on the switch.
  • Increase installed memory and install a larger flash module.
  • Decrease the number of VLANs configured on the switch.

Answer : Increase the number of virtual terminals available.

A network technician is assisting the company with developing a new business continuity plan.Which of the following would be an appropriate suggestion to add to the plan?  
 


Options are :

  • Perform reoccurring vulnerability scans
  • Build redundant links between core devices (Correct)
  • Maintain up-to-date configuration backups
  • Physically secure all network equipment

Answer : Build redundant links between core devices

A technician wants to securely manage several remote network devices.  Which of the following should be implemented to securely manage the devices?  


Options are :

  • SNMPv3 (Correct)
  • RIPv2
  • IPv6
  • WPA2

Answer : SNMPv3

Which of the following describes a smurf attack?  


Options are :

  • Attack on a target using spoofed ICMP packets to flood it (Correct)
  • Intercepting traffic intended for a target and redirecting it to another
  • Spoofed VLAN tags used to bypass authentication
  • Forging tags to bypass QoS policies in order to steal bandwidth

Answer : Attack on a target using spoofed ICMP packets to flood it

The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?  


Options are :

  • Persistent agents
  • POsture assessment (Correct)
  • Quarantine network
  • Non-persistent agents

Answer : POsture assessment

Which of the following technologies is designed to keep systems uptime running in the event of a disaster?  
 


Options are :

  • High availability (Correct)
  • Quality of service
  • Caching engines
  • Load balancing

Answer : High availability

An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies.  Which of the following has MOST likely been implemented at the site with the fewest security issues?  
 


Options are :

  • End-user awareness training (Correct)
  • Consent to monitoring
  • Business continuity measures
  • Vulnerability scanning

Answer : End-user awareness training

A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure.  Which of the following allows 802.11n to reach higher speeds?  


Options are :

  • PoE
  • MU-MIMO
  • LWAPP
  • MIMO (Correct)

Answer : MIMO

A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus.  Which of the following could the technician do for vendors to validate the proper security patch?  



Options are :

  • Provide an MD5 hash for each file (Correct)
  • Require biometric authentication for patch updates
  • Use TFTP for tested and secure downloads
  • Implement a RADIUS authentication

Answer : Provide an MD5 hash for each file

A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet.  Which of the following is MOST likely the source of the problem?  
 


Options are :

  • None
  • Bad SFP in the PC's 10/100 NIC
  • 802.1q is not configured on the switch port (Correct)
  • OS updates have not been installed
  • APIPA has been misconfigured on the VLAN

Answer : 802.1q is not configured on the switch port

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk's wireless network.  Which of the following should be implemented to provide wireless access only to the employees working at the kiosk?  
 


Options are :

  • MAC filtering (Correct)
  • Firewall
  • Host-based antivirus
  • Web filtering

Answer : MAC filtering

A network technician is asked to redesign an Ethernet network before new monitoring software is added to each host on the network. The new software will broadcast statistics from each host to a monitoring host for each of the five departments in the company. The added network traffic is a concern of management that must be addressed.  Which of the following solutions should the technician design into the new network?  



Options are :

  • Increase the collision domain to compensate for the added broadcasts
  • Increase the number of switches on the network to reduce broadcasts
  • Place each department in a separate VLAN (Correct)
  • Add a router and create a segment for all the monitoring host stations

Answer : Place each department in a separate VLAN

A technician wants to implement a network for testing remote devices before allowing them to connect to the corporate network.  Which of the following could the technician implement?  


Options are :

  • High availability
  • MAN network
  • Honeynet
  • Quarantine (Correct)

Answer : Quarantine

A network administrator noticed that when one computer goes down, all the other computers in the office will not work.  Which of the following topologies is in use?  


Options are :

  • Bus (Correct)
  • Hybrid
  • Ring
  • Star
  • Mesh

Answer : Bus

A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP.  Which of the following default ports needs to be opened?  
 


Options are :

  • 3389 (Correct)
  • 5004
  • 445
  • 5060

Answer : 3389

Ann, a system administrator, is troubleshooting an issue with a DNS server. She notices that the security logs have filled up and that they need to be cleared from the event viewer. She recalls this being a daily occurrence.  Which of the following solutions would BEST resolve this problem?  


Options are :

  • Increase the maximum log size
  • Delete the logs when full
  • Install an event management tool (Correct)
  • Log into the DNS server every hour to check if the logs are full

Answer : Install an event management tool

A technician is attempting to resolve an issue with users on the network not being able to access websites. The technician pings the default gateway and DNS servers successfully. Pinging a website by URL is unsuccessful but using a known IP address is successful.  Which of the following will resolve the issue?  
 


Options are :

  • Ensure ICMP messages can pass through the firewall
  • Enable port 53 on the firewall (Correct)
  • Update the HOST file with the URLs for all websites
  • Use NSLOOKUP to resolve URLs

Answer : Enable port 53 on the firewall

The Chief Information Officer (CIO) wants to improve the security of the company's data.  Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information?  
 


Options are :

  • VPN
  • Standards
  • HTTPS
  • Policies (Correct)

Answer : Policies

Which of the following ports should be allowed to provide access to certain VoIP applications?  


Options are :

  • 110
  • 139
  • 1720
  • 5060 (Correct)

Answer : 5060

A technician has determined the most likely cause of an issue and implement a solution.  Which of the following is the NEXT step that should be taken?  


Options are :

  • Document the findings, actions, and outcomes
  • Verify system functionality (Correct)
  • Duplicate the problem if possible
  • Make an archival backup

Answer : Verify system functionality

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions