[Up to date] comptia network+ exam objectives n10-006

N10-006 Royal Pack Testengine pdf

100% Actual & Verified — 100% PASS

Unlimited access to the world's largest Dumps library!

https://www.2passeasy.com/dumps/N10-006/

Exam Code: N10-006 (Practice Exam Latest Test Questions VCE PDF)
Exam Name: CompTIA Network+
Certification Provider: CompTIA
Free Today! Guaranteed Training- Pass N10-006 Exam.

2016 May N10-006 Study Guide Questions:

Q21. Which of the following describes a smurf attack? 

A. Attack on a target using spoofed ICMP packets to flood it 

B. Intercepting traffic intended for a target and redirecting it to another 

C. Spoofed VLAN tags used to bypass authentication 

D. Forging tags to bypass QoS policies in order to steal bandwidth 

Answer: A 


Q22. A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks? 

A. Host-based intrusion detection systems 

B. Acceptable use policies 

C. Incident response team 

D. Patch management 

Answer: D 


Q23. After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used? 

A. Event log 

B. Syslog 

C. SIEM 

D. SNMP 

Answer: C 


2passeasy.com

Down to date comptia network+ n10-006 cbt nuggets:

Q24. The network install is failing redundancy testing at the MDF. The traffic being transported is a mixture of multicast and unicast signals. Which of the following would BEST handle the rerouting caused by the disruption of service? 

A. Layer 3 switch 

B. Proxy server 

C. Layer 2 switch 

D. Smart hub 

Answer: A 


Q25. Network segmentation provides which of the following benefits? 

A. Security through isolation 

B. Link aggregation 

C. Packet flooding through all ports 

D. High availability through redundancy 

Answer: A 


Q26. During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE). 

A. RSA 

B. Passwords 

C. Man traps 

D. Biometrics 

E. Cipher locks 

F. VLANs 

G. 3DES 

Answer: CDE 


2passeasy.com

Simulation n10-005 or n10-006:

Q27. A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution? 

A. Yagi 

B. Omni-directional 

C. Parabolic 

D. Patch 

Answer: A 


Q28. Which of the following is used to define how much bandwidth can be used by various protocols on the network? 

A. Traffic shaping 

B. High availability 

C. Load balancing 

D. Fault tolerance 

Answer: A 


Q29. Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443? 

A. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption. 

B. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates. 

C. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies. 

D. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks. 

Answer: A 


Q30. A technician is configuring a managed switch and needs to enable 802.3af. Which of the following should the technician enable? 

A. PoE 

B. Port bonding 

C. VLAN 

D. Trunking 

Answer: A 



see more CompTIA Network+