Lead2pass 2017 September New CompTIA N10-006 Exam Dumps!
100% Free Download! 100% Pass Guaranteed!
CompTIA N10-006 exam is very popular in CompTIA field, many CompTIA candidates choose this exam to add their credentials. There are many resource online to offering CompTIA N10-006 exam questions, through many good feedbacks, we conclude that Lead2pass can help you pass your test easily with CompTIA N10-006 exam questions. Choose Lead2pass to get your CompTIA N10-006 certification.
Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/n10-006.html
A company is looking for the simplest solution to help prioritize VoIP traffic on its congested network. Which of the following would BEST accomplish this?
B. Caching engines
D. Load balancing
Explanation: QoS is the service where you can prioritize traffic running over one protocol as compared to the other. It is very similar to the term where you are opening a VIP queue for allowing that traffic to pass.
Honeypots and honeynets are different in which of the following ways?
A. Honeynets are managed collections of honeypots.
B. Honeypots only test software security, not hardware.
C. Honeynets require specialized hardware to implement.
D. Honeypots are usually servers and honeynets are routers and switches.
A honeynet is a network set up with intentional vulnerabilities; its purpose is to invite attack, so that an attacker’s activities and methods can be studied and that information used to increase network security. A honeynet contains one or more honey pots, which are computer systems on the Internet expressly set up to attract and “trap” people who attempt to penetrate other people’s computer systems.
A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:
Biometric fingerprint scan
Complex 12 character password
5 digit pin code authorization
Randomized security question prompt upon login
Which of the following security setups does this company employ?
A. Single factor authentication
B. Three factor authentication
C. Two factor authentication
D. Single sign-on
According to proponents, two-factor authentication could drastically reduce the incidence of online identity theft, phishing expeditions, and other online fraud, because the victim’s password would no longer be enough to give a thief access to their information.
Which of the following wireless standards would BEST allow a company to utilize new and old devices on the 5GHz spectrum while allowing for the highest possible speeds?
802.11n is an amendment which improves upon the previous 802.11 standards by adding multiple-input multiple-output antennas (MIMO). 802.11n operates on both the 2.4 GHz and the lesser used 5 GHz bands
A technician has received a trouble ticket from a user who has intermittent wireless access. Moving the computer farther from the WAP results in a more stable connection. Which of the following is MOST likely the cause of this instability?
A. Wrong encryption type
B. SSID mismatch
C. Signal bounce
D. Incorrect channel
Bouncing is the tendency of any two metal contacts in an electronic device to generate multiple signals as the contacts close or open.
Which of the following is the MAXIMUM potential speed of CAT5e UTP cable?
Category 5 e cable (Cat 5) is a twisted pair cable for carrying signals. This type of cable is used in structured cabling for computer networks such as Ethernet. The cable standard provides performance of up to 100 MHz and is suitable for 10BASE-T, 100BASE-TX (Fast Ethernet), and 1000BASE-T (Gigabit Ethernet).
A technician sees suspicious traffic coming from a computer connected to a WAP. Which of the following can be used to stop this traffic while troubleshooting the problem?
D. MAC filtering
By doing MAC filtering technician can block the data coming from a specific mac address.
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
A. IP filtering
B. Port filtering
C. MAC address filtering
D. DHCP lease
IPFilter(commonly referred to asipf) is an open source software package that provides firewall
services and network address translation (NAT) for many UNIX-like operating systems. The author and software maintainer is Darren Reed. IPFilter supports both IPv4 and IPv6 protocols, and is a stateful firewall.
Which of the following remote access types requires a certificate for connectivity?
Secure Shell(SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively)
A network administrator is deploying a new wireless network with over 50 thin WAPs and needs to ensure all WAPs use consistent firmware and settings. Which of the following methods provides this functionality?
A. Use WAP auto-configuration
B. Use a wireless controller
C. Use PXE to load and track WAPs
D. Use DHCP scope options
A wireless controller is used in combination with the Lightweight Access Point Protocol (LWAPP) to manage light-weight access points in large quantities by the network administrator ornetwork operations center. The wireless LAN controller is part of the Data Plane within the Cisco Wireless Model. The WLAN controller automatically handles the configuration of anywhere from 6 to 6000 wireless access-points, depending on the model.
The APIPA address 169.254.10.123 falls into which of the following class of addresses?
As the range for class B is from 22.214.171.124 to 126.96.36.199
An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?
A. Load balancing internal web servers
B. Redundant network resources
C. Implement fault tolerance on the WAN
D. Implement caching engines
A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise’s bandwidth.
A technician is troubleshooting Internet connectivity for a PC. Which of the following is MOST likely the reason for Internet connectivity issues upon inspecting the routing table?
A. The router should be listed as 188.8.131.52
B. The NIC is set to the wrong subnet mask
C. The route of last resort is missing
D. Loopback traffic is weighted higher than NIC interface traffic
The default route is missing from the table.
It looks like this:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.12 25
Compare the settings below to determine which of the following issues is preventing the user from connecting to a wireless network.
Which of the following settings is incorrect on the client?
A. The mode is incorrect
B. SSID Mismatch
C. Incorrect WEP Key
D. Channel is set incorrectly
the first thing which will be checked is the SSID and it is case sensitive but in the above shown example, it is not same so it will stop user from connecting.
A technician replaces a failed router in an office with the same model unit using the default settings. After the installation, the technician reboots all of the PCs and servers. Upon reboot some of the PCs are receiving IP addresses on the same subnet as the new router; other PCs are receiving addresses on the same subnet as the servers. Which of the following most likely describes the issue?
A. The DHCP lease pool was not large enough
B. DHCP lease times were set too low
C. The router is not the only DHCP server
D. DHCP was not enabled on the replacement router
This happens when there are multiple DHCP servers in the same LAN subnet. Here some machines are getting ip address from the router while some are getting ip address from another DHCP server present in the same domain.
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
Kerberos is a distributed authentication service that allows a process (a client) running on behalf of a principal (a user) to prove its identity to a verifier (an application server, or just server) without sending data across the network that might allow an attacker or theverifier to subsequently impersonate the principal. Kerberos optionally provides integrity and confidentiality for data sent between the client and server.
Which of the following wireless standards uses a block encryption cipher rather than a stream
Counter Cipher Mode with Block Chaining Message Authentication Code Protocol or CCMP (CCM mode Protocol) is an encryption protocol designed for Wireless LAN products that implement the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM) of the AES standard. It was created to address the vulnerabilities presented by WEP, a dated, insecure protocol.
Which of the following is the OSI layer that handles file compression such as LZMA or DEFLATE?
A. Layer 3
B. Layer 5
C. Layer 6
D. Layer 7
The presentation level is translator between the application and network format. Unlike the lower layers, its concern is with the syntax and semantics of the informationtransmitted. Most user programs do not exchange random binary bit strings. They exchange data such as names, addresses, dates, etc. Different computers store the data in a different way. In order to allow these computers to transmit the data to each other the presentation layer translates the data into a standard form to be used on the network. Another function is data compression which can be used to reduce the number of bits needed to send the packet of information. Security is also added at this layer by using data encryption and decryption. This prevents others from intercepting the data and being able to decipher the meaning of the bits.
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
B. Buffer overflow
C. Dictionary file
D. SQL injection
A file used by the debugger. It contains information about a program’s structure and contents. The Compiler creates the dictionary file in the first phase of compilation, when checking the syntax. A dictionary file has the filename extension.idy, and is often referred to an.idyfile.
Which of the following can be used to compromise a WPA encrypted wireless network when the
rainbow table does not contain the key?
A. Evil twin
B. War chalking
C. Buffer overflow
An evil twin is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider.This type of evil twin attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.
A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?
A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
Signature detection involves searching network traffic for a series of bytes or packet sequences known to be malicious. A key advantage of this detection method is that signatures are easy to develop and understand if you know what network behavior you’re trying to identify.
A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?
A. Change management
B. Asset management
C. Network sniffer
D. System logs
Assetmanagement is defined as the business practice of managing and optimizing the purchase, deployment, maintenance, utilization, and disposal of hardware and software applications within an organization.
Which of the following can be described as a DoS attack?
A. Disabling a specific system and making it unavailable to users
B. Implementing a keylogger
C. Intercepting a packet and decrypting the contents
D. Communicating with employees to get company information
A denial of service (DoS) attack is a malicious attempt to make a server or a network resource unavailable to users, usually by temporarily interrupting or suspending the services of a host connected to the Internet.
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
B. Social engineering
A man in the middle attack is one in which the attacker intercepts messages in a public key exchange and then retransmits them, substituting his own public key for the requested one, so that the two original parties still appear to be communicating with each other.
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
A. Antivirus scanner
C. Packet sniffer
D. Toner probe
Packet Sniffer is a tool that can help you locate network problems by allowing you to capture and view the packet level data on your network.So we can capture the session and find the cause of failure.
More free Lead2pass N10-006 exam new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDVzI0bUdJdU1ESkk
CompTIA N10-006 exam questions are available in PDF and VCE format. This makes it very convenient for you to follow the course and study the exam whenever and wherever you want. The CompTIA N10-006 exam questions follow the exact paper pattern and question type of the actual N10-006 certification exam, it lets you recreate the exact exam scenario, so you are armed with the correct information for the N10-006 certification exam.
2017 CompTIA N10-006 (All 1521 Q&As) exam dumps (PDF&VCE) from Lead2pass:
https://www.lead2pass.com/n10-006.html [100% Exam Pass Guaranteed]