Download CompTIA Network+.PracticeTest.N10-006.2018-07-29.1e.418q.vcex

Download Dump

File Info

Exam CompTIA Network+
Number N10-006
File Name CompTIA Network+.PracticeTest.N10-006.2018-07-29.1e.418q.vcex
Size 1.42 Mb
Posted July 29, 2018
Downloaded 13



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
A network technician is assisting the company with developing a new business continuity plan. 
Which of the following would be an appropriate suggestion to add to the plan?

  • A: Build redundant links between core devices
  • B: Physically secure all network equipment
  • C: Maintain up-to-date configuration backups
  • D: Perform reoccurring vulnerability scans



Question 2
Which of the following describes a smurf attack?

  • A: Attack on a target using spoofed ICMP packets to flood it
  • B: Intercepting traffic intended for a target and redirecting it to another
  • C: Spoofed VLAN tags used to bypass authentication
  • D: Forging tags to bypass QoS policies in order to steal bandwidth



Question 3
A malicious user floods a switch with frames hoping to redirect traffic to the user's server. 
Which of the following attacks is the user MOST likely using?

  • A: DNS poisoning
  • B: ARP poisoning
  • C: Reflection
  • D: SYN attack



Question 4
An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. 
This is an example of which of the following attacks?

  • A: Smurf attack
  • B: VLAN hopping
  • C: Blue snarfing
  • D: Spear phishing



Question 5
Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. 
Which of the following is the BEST explanation that describes this scenario?

  • A: Compromised system
  • B: Smurf attack
  • C: SQL injection attack
  • D: Man-in-the-middle



Question 6
A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. 
Which of the following standards should be consulted?

  • A: DWDM
  • B: MIMO
  • C: TEMPEST
  • D: DOCSIS



Question 7
A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. 
Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

  • A: Install host-based anti-malware software
  • B: Implement MAC filtering on all wireless access points
  • C: Add an implicit deny to the core router ACL
  • D: Block port 80 outbound on the company firewall
  • E: Require users to utilize two-factor authentication



Question 8
Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?

  • A: The VoIP phone would request a new phone number from the unified communications server.
  • B: The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.
  • C: The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.
  • D: The VoIP phone would request a different configuration from the unified communications server.



Question 9
A network technician has been tasked to configure a new network monitoring tool that will examine interface settings throughout various network devices. 
Which of the following would need to be configured on each network device to provide that information in a secure manner?

  • A: S/MIME
  • B: SYSLOG
  • C: PGP
  • D: SNMPv3
  • E: RSH



Question 10
A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22 
11. Allow 10.200.0.0/16 to Any DMZ eq to Any 
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443 
13. Deny Any Trust to Any DMZ eq to Any 

A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. 

Reordering the ACL in which of the following manners would meet the company's objectives?

  • A: 11, 10, 12, 13
  • B: 12, 10, 11, 13
  • C: 13, 10, 12, 11
  • D: 13, 12, 11, 10









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset