CompTIA Network+ Certification Exam

 

QUESTION 231

A technician needs to set up uplink ports for multiple switches to communicate with one another. ALL VLANs should be transferred from the designed server switch. Which of the following should be set on the uplink ports if VLAN 1 is not the management VLAN? (Select two.)

 

A.

STP

B.

Port mirroring

C.

Port security

D.

802.1x

E.

802.1q

F.

VTP

G.

Link aggregation

 

Correct Answer: AF

Explanation:

http://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/98155-tshoot-vlan.html#topic12

 

 

QUESTION 232

A network technician is using telnet to connect to a router on a network that has been compromised. A new user and password has been added to the router with full rights. The technician is concerned that the regularly used administrator account has been compromised. After changing the password on all networking devices, which of the following should the technician perform to prevent the password for the administrator account from being sniffed on the network?

 

A.

Use SNMPv1 for all configurations involving the router

B.

Ensure the password is 10 characters, containing letter and numbers

C.

Copy all configurations to routers using TFTP for secuirty

D.

Only allow administrators to access routers using port 22

 

Correct Answer: D

 

 

QUESTION 233

A network technician is troubleshooting a network connection error, when pinging the default gateway no reply is received. The default gateway is found to be functioning properly but cannot connect to any workstations. At which of the following OSI layers could the problem exist? (Select TWO)

 

A.

Presentation

B.

Transport

C.

Session

D.

Data link

E.

Application

F.

Physical

 

Correct Answer: DF

 

 

QUESTION 234

A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. Which of the following is MOST likely the cause of this issue?

 

A.

Latency

B.

Throttling

C.

Interference

D.

Split horizon

 

Correct Answer: C

QUESTION 235

A client is concerned with theft of equipment from the datacenter. Which of the following would provide the highest level of physical security for the client?

 

A.

Cipher lock

B.

Proximity reader

C.

Magnetic key swipe

D.

Man trap

E.

CCTV

 

Correct Answer: D

 

 

QUESTION 236

A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it?

 

A.

An SNMP GET

B.

A top listener tool

C.

An intrusion detection system

D.

Apacket sniffer

 

Correct Answer: D

 

 

QUESTION 237

A network technician has downloaded the latest vendor switch O/S. which includes new features and enhancements. Which of the following should the technician perform FIRST when updating the switches?

 

A.

Backup the current configuration for each switch

B.

Install during non-business hours to test the system

C.

Test the O/S on one of the production switches

D.

Power cycle the company’s border router

 

Correct Answer: A

 

 

QUESTION 238

A network technician is tasked with designing a firewall to improve security for an existing FTP server that is on the company network and is accessible from the internet. The security concern is that the FTP server is compromised it may be used as a platform to attack other company servers. Which of the following is the BEST way to mitigate this risk?

 

A.

Add an outbound ACL to the firewall

B.

Change the FTP server to a more secure SFTP

C.

Use t
he implicit deny of the firewall

D.

Move the server to the DMZ of the firewall

 

Correct Answer: D

 

 

QUESTION 239

A network architect is designing a highly redundant network with a distance vector routing protocol in order to prevent routing loops, the architect has configured the routers to advertise failed routes with the addition of an infinite metric. Which of the following methods has the architect chosen?

 

A.

Spanning tree

B.

Split horizon

C.

Route poisoning

D.

Hold down timers

 

Correct Answer: C

Explanation:

https://books.google.co.za/books?id=C5G6DAAAQBAJ&pg=PT1507&lpg=PT1507&dq=advertise+failed+routes+with+the+addition+of+an+infinite+metric&source=bl&ots=hPhUeuDuis&sig=d2zmlLrjHOSadqWLfeFEPjfNJjU&hl=en&sa=X&ved=0ahUKEwi_z9Gr5vXQAhUhJMAKHRFHCeQQ6AEIGjAA#v=onepage&q=advertise%20failed%20routes%20with%20the%20addition%20of%20an%20infinite%20metric&f=false

 

 

QUESTION 240

Which of the following anti-malware solutions should be implemented to deter attackers from loading custom files onto a distributed target platform?

 

A.

Cloud-based anti-malware

B.

Host-based anti-malware

C.

Network-based anti-malware

D.

Signature-based anti-malware

 

Correct Answer: B

Explanation:

https://en.wikipedia.org/wiki/Intrusion_detection_system

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …