Free N10-006 Real Exam Questions - Free N10-006 Dumps PDF


John25519

Uploaded on Apr 18, 2020

Category Education

You choice of study material matters a lot for your preparation so you are suggested to download N10-006 dumps from Realexamcollection.Experts on this site have worked very smartly for the production of this handy material.Although is a compact file but the information has been arranged in a way that it covers all the aspects of the field. You will find a very brief description of each exam topic. Purpose of N10-006 dumps is to make students competent with the knowledge of the field. You will also be given money back guarantee which can be claimed in case of unfortunate failure in the final.

Category Education

Comments

                     

Free N10-006 Real Exam Questions - Free N10-006 Dumps PDF

CompTIA Exam N10-006 CompTIA Network+ Certification Version: Demo [ Total Questions: 10 ] https://www.realexamcollection.com/comptia/n10-006-dumps.html Topic break down Topic No. of Questions Topic 1: Network architecture 1 Topic 3: Network security 1 Topic 6: Mix questions 8 2 Topic 1, Network architecture Question No : 1 - (Topic 1) Which of the following provides accounting, authorization, and authentication via a centralized privileged database, as well as, challenge/response and password encryption? A. Multifactor authentication B. ISAKMP C. TACACS+ D. Network access control Answer: C Explanation: TACACS+ (Terminal Access Controller Access-Control System Plus) is aprotocol that handles authentication, authorization, and accounting (AAA) services. Similar to RADIUS, TACACS+ is a centralized authentication solution used to provide access to network resources. TACACS+ separates the authentication, authorization, and accounting services enabling you to host each service on a separate server if required. Topic 3, Network security 3 Question No : 2 - (Topic 3) A company has decided to update their usage policy to allow employees to surf the web unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy? A. Install host-based anti-malware software B. Implement MAC filtering on all wireless access points C. Add an implicit deny to the core router ACL D. Block port 80 outboundon the company firewall E. Require users to utilize two-factor authentication Answer: A Explanation: To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems. After asingle machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee. Topic 6, Mix questions 4 Question No : 3 - (Topic 6) Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO). A. MAC addressing B. IP addressing C. Port speed D. IPv6 addressing E. Duplex Answer: C,E Question No : 4 - (Topic 6) Privilege creep among long-term employees can be mitigated by which of the following procedures? A. User permission reviews B. Mandatory vacations C. Separation of duties D. Job function rotation Answer: A Question No : 5 - (Topic 6) Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO). A. 22 B. 23 C. 143 D. 161 5 E. 162 F. 8080 Answer: D,E Question No : 6 - (Topic 6) A company has added several new employees, which has caused the network traffic to increase by 200%. The network traffic increase from the new employees was only expected to be 20% to 30%. The administration suspects that the network may have been compromised. Which of the following should the network administrator have done previously to minimize the possibility of a network breach? A. Create VLANs to segment the network traffic B. Place a network sniffer on segments with newemployees C. Provide end user awareness and training for employees D. Ensure best practices were implemented when creating new user accounts Answer: C Question No : 7 - (Topic 6) Which of the following describes what occurs with the ID of a specified native VLAN when traffic passes over a trunk? A. It becomes the gateway of last resort for the switch or router. B. it becomes the default VLAN for the untagged frames. C. it becomes the priority ID for all the VLAN traffic across the device. D. It becomes the default gateway for the port or ports. Answer: B Question No : 8 - (Topic 6) A technician is dispatched to investigate sporadic network outages. After looking at the event logs of the network equipment, the technician finds that all of the equipment is restarting at the same time every day. Which of the following can the technician deploy to correct this issue? 6 A. Grounding bar B. Rack monitoring C. UPS D. Air flow management E. Surge protector Answer: C Question No : 9 - (Topic 6) A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot the connectivity issues? A. Router logs B. History logs C. Startup/bootup config logs D. Event Viewer logs Answer: B Question No : 10 - (Topic 6) Which of the following routing protocols relies on hop count as its ONLY metric? A. BGP B. EIGRP C. OSPF D. RIP Answer: D https://www.realexamcollection.com/comptia/n10-006-dumps.html