[Free] 2018(Aug) Dumps4cert CompTIA N10-006 Dumps with VCE and PDF Download 61-70

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 Aug CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 61 – (Topic 2)

A system administrator wants to update a web-based application to the latest version. Which of the following procedures should the system administrator perform FIRST?

  1. Remove all user accounts on the server

  2. Isolate the server logically on the network

  3. Block all HTTP traffic to the server

  4. Install the software in a test environment

Answer: D Explanation:

We should test the new version of the application in a test/lab environment first. This way any potential issues with thenew software would not affect the production environment.

Set up a test lab on an isolated network in your organization. Do not set up your test lab in your production environment.

Question No: 62 – (Topic 2)

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company#39;s encryption to become unsecure. Which of the following would be required to resolve the exploit?

  1. Utilize a FTP service

  2. Install recommended updates

  3. Send all log files through SMTP

  4. Configure the firewall to block port 22

Answer: B Explanation:

If the encryption is unsecure then we must look forencryption software updates or patches. If they are available we must install them.

As vulnerabilities are discovered, the vendors of the operating systems or applications often respond by releasing a patch. A patch is designed to correct a known bug or fix a known vulnerability in a piece of software.

A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

Question No: 63 – (Topic 2)

A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?

  1. Regression test

  2. Speed test

  3. Baseline

  4. Statement of work

Answer: C

Explanation:

In networking, baseline can refer to the standard level of performance ofa certain device or to the normal operating capacity for your whole network. High-quality documentation should include a baseline for network performance, because you and your client need to know what “normal” looks like in order to detect problems beforethey develop into disasters.

A network baseline delimits the amount of available bandwidth available and when. For networks and networked devices, baselines include information about four key components:

Processor Memory

Hard-disk (or other storage) subsystem Network adapter or subsystem

Question No: 64 – (Topic 2)

The administrator#39;s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue?

Output:

Fast Ethernet 0 is up, line protocol is up Int ip address is 10.20.130.5/25

MTU 1500 bytes, BW10000 kbit, DLY 100 usec

Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set

Keep alive 10

Half duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts

0 input errors

983881 packets output, 768588 bytes

0 output errors, 0 collisions, 0 resets

  1. Set the loopback address

  2. Change the IP address

  3. Change the slash notation

  4. Change duplex to full

Answer: D Explanation:

From the output we see that the half-duplex is configured. This would not use the full capacity of ports on the network. By changing to full duplex the throughput would be doubled.

Note: All communications are either half-duplex or full-duplex. During half-duplex communication, a device can either send communication or receive communication, but not both at the same time. In full-duplex communication, both devices can send and receive communication at the same time. This means that the effective throughput is doubled and communication is much more efficient.

Question No: 65 – (Topic 2)

Which of the following communication technologies would MOST likely be used to increase bandwidth over an existing fiber optic network by combining multiple signals at different wavelengths?

  1. DWDM

  2. SONET

  3. ADSL

  4. LACP

Answer: A Explanation:

Dense wavelength-division multiplexing (DWDM) is a high-speed optical network type commonly used in MANs (metropolitan area networks).DWDM uses as many as 32 light wavelengths on a single fiber, where each wavelength can support as many as 160 simultaneous transmissions using more than eight active wavelengths per fiber.

Question No: 66 – (Topic 2)

A desktop computer is connected to the network and receives an APIPA address but is unable to reach the VLAN gateway of 10.10.100.254. Other PCs in the VLAN subnet are able to reach the Internet. Which of the following is MOST likely the source of the problem?

  1. 802.1q is not configured on the switch port

  2. APIPA has been misconfigured on the VLAN

  3. Bad SFP in the PC#39;s 10/100 NIC

  4. OS updates havenot been installed

Answer: A Explanation:

APIPA addresses are self-configured and are used when the client is unable to get proper IP configuration from a DHCP server. One possible source of this problem is that switch port, to which the computer is connected, is misconfigured. The 802.1q protocol is used to configure VLAN trunking on switch ports.

Question No: 67 – (Topic 2)

A system administrator has been tasked to ensure that the software team is not affecting the production software when developing enhancements. The software that is being updated is on a very short SDLC and enhancements must be developed rapidly. These enhancements must be approved before being deployed. Which of the following will mitigate production outages before the enhancements are deployed?

  1. Implement an environment to test the enhancements.

  2. Implement ACLs that only allow management access to the enhancements.

  3. Deploy an IPS on the production network.

  4. Move the software team#39;s workstations to the DMZ.

Answer: A Explanation:

Environments are controlled areas where systems developers can build, distribute, install, configure, test, and execute systems that move through the Software Development Life Cycle (SDLC). The enhancements can be deployed and tested in a test environment before they are installed in the production environment.

Question No: 68 – (Topic 2)

A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable?

  1. PoE

  2. Port bonding

  3. VLAN

  4. Trunking

Answer: A Explanation:

Power over Ethernet (PoE) is defined by the IEEE 802.3af and 802.3at standards.

PoE allows an Ethernet switch to provide power to an attached device (for example, a wireless access point, security camera, orIP phone) by applying power to the same wires in

a UTP cable that are used to transmit and receive data.

Topic 3, Network security

Question No: 69 – (Topic 3)

An organization notices a large amount of malware and virus incidents at one satellite office, but hardly any at another. All users at both sites are running the same company image and receive the same group policies. Which of the following has MOST likely been implemented at the site with the fewest security issues?

  1. Consent to monitoring

  2. Business continuity measures

  3. Vulnerability scanning

  4. End-user awareness training

Answer: D Explanation:

Users should have security awareness training and should have all accepted and signed acceptable usepolicy (AUP) agreements. User awareness training is one of the most significant countermeasures the company can implement.

Question No: 70 – (Topic 3)

A company wants to make sure that users are required to authenticate prior to being allowed on the network. Which of the following is the BEST way to accomplish this?

A. 802.1x

B. 802.1p

  1. Single sign-on

  2. Kerberos

Answer: A Explanation:

For security purposes, some switchesrequire users to authenticate themselves (that is, provide credentials, such as a username and password, to prove who they are) before gaining access to the rest of the network. A standards-based method of enforcing user authentication is IEEE 802.1X.

100% Dumps4cert Free Download!
N10-006 PDF
100% Dumps4cert Pass Guaranteed!
N10-006 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

You must be logged in to post a comment.

Proudly powered by WordPress   Premium Style Theme by www.gopiplus.com