[Free] 2017(Nov) Dumps4cert Testinsides CompTIA N10-006 Dumps with VCE and PDF Download 71-80

Dumps4cert 2017 Nov CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 71 – (Topic 3)

Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario?

  1. Compromised system

  2. Smurf attack

  3. SQL injection attack

  4. Man-in-the-middle

Answer: A Explanation:

As the extra unexplainable traffic comes from an internal host on your network we can assume that this host has been compromised.

If your system has been compromised, somebody is probably using your machine-possibly to scan andfind other machines to compromise

Question No: 72 – (Topic 3)

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?

  1. Hardware firewall

  2. Proxy server

  3. Software firewall

  4. GRE tunneling

Answer: C Explanation:

A host-based firewall is a computer running firewall softwarethat can protect the computer itself. A software firewall would be the most cost effective in a lab scenario.

Question No: 73 – (Topic 3)

A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?

  1. Document the scene

  2. Forensics report

  3. Evidence collection

  4. Chain of custody

Answer: D Explanation:

To verify the integrity of data since a security incident occurred, you need to be able to show a chain of custody.

A chain of custody documents who has been in possession of the data (evidence) since a security breach occurred. A well-prepared organization will have process and procedures that are used when an incident occurs.

A plan should include first responders securing the area and then escalating to senior management and authorities when required by policy or law. The chain of custody alsoincludes documentation of the scene, collection of evidence, and maintenance, e- discovery (which is theelectronic aspect of identifying, collecting, and producing electronically stored information), transportation of data, forensics reporting, and a process to preserve all forms of evidence and data when litigation is expected. The preservation of the evidence, data, and details is referred to as legal hold.

Question No: 74 – (Topic 3)

Which of the following physical security controls prevents an attacker from gaining access to a network closet?

  1. CCTVs

  2. Proximity readers

  3. Motion sensors

  4. IP cameras

Answer: B Explanation:

A proximity card is a physical card which used to get access to a physical area such as a network closet.

It is a quot;contactlessquot; smart card which can beread without inserting it into a reader device,

as required by earlier magnetic stripe cards such as credit cards and quot;contactquot; type smart cards. The proximity cards are part of the Contactless card technologies. Held near an electronic reader for a momentthey enable the identification of an encoded number.

Note: Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency,or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

Question No: 75 – (Topic 3)

Which of the following is a security benefit gained from setting up a guest wireless network?

  1. Optimized device bandwidth

  2. Isolatedcorporate resources

  3. Smaller ACL changes

  4. Reduced password resets

Answer: B Explanation:

A wireless guest network could be set up so that it has limited access (no access to local resources) but does provide Internet access for guest users. The corporate resources would be inaccessible (isolated) from the guest network.

Question No: 76 – (Topic 3)

A malicious user floods a switch with frames hoping to redirect traffic to the user#39;s server. Which of the following attacks is the user MOST likely using?

  1. DNS poisoning

  2. ARP poisoning

  3. Reflection

  4. SYN attack

Answer: B Explanation:

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer#39;s ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the hacker#39;s known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker#39;s computer first instead of sending it to the original destination. As a result, both the user#39;s data and privacy are compromised.

Question No: 77 – (Topic 3)

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?

  1. Disable the network based firewall

  2. Implicit deny all traffic on network

  3. Configure a VLAN on Layer 2 switch

  4. Add the system to the DMZ

Answer: D Explanation:

By putting the system in the DMZ (demilitarized zone) we increasethe security, as the system should be opened for remote access.

A DMZ is a computer host or small network inserted as a quot;neutral zonequot; between a company#39;s private network and the outside public network. It prevents outside users from getting direct accessto a server that has company data. A DMZ often contains servers that should be accessible from the public Internet.

Question No: 78 – (Topic 3)

A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?

  1. A cloud-based antivirus system with a heuristic and signature based engine

  2. A network based firewall which blocks all inbound communication

  3. A host-based firewall which allows all outbound communication

  4. A HIDS to inspect both inbound and outbound network communication

Answer: C Explanation:

A host-based firewall is a computer running firewall software that can protect the computer itself. For example, it can prevent incoming connections to the computer and allow outbound communication only.

Question No: 79 – (Topic 3)

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?

  1. The VoIP phone would request a new phone number from the unified communications server.

  2. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

  3. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.

  4. The VoIP phone would request a different configuration from the unified communications server.

Answer: B


Without configuring any other specific parameters, the switchport security feature will only permit one MAC address to be learned per switchport (dynamically) and use the shutdown violation mode; this means that if a second MAC address is seen on the switchport the port will be shutdown and put into the err-disabled state.

Question No: 80 – (Topic 3)

The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?

  1. Quarantine network

  2. Persistent agents

  3. Posture assessment

  4. Non-persistent agents

Answer: C Explanation:

Network Admission Control (NAC) can permit or deny access to anetwork based on

characteristics of the device seeking admission, rather than just checking user credentials. For example, a client’s OS, Windows Registry settings, AD membership status, and version of antivirus software could be checked against a set of requirements before allowing the client to access a network.

This process of checking a client’s characteristics is called posture assessment.

100% Free Download!
Download Free Demo:N10-006 Demo PDF
100% Pass Guaranteed!
Download 2017 Dumps4cert N10-006 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 Dumps4cert IT Certification PDF and VCE

Leave a Reply

Your email address will not be published. Required fields are marked *