[Free] February 2017(Feb) Ensurepass Pass4sure CompTIA N10-006 Practice Test 241-250

Ensurepass

CompTIA Network+ Certification Exam

 

QUESTION 241

The Chief Information Officer (CIO) wants to improve the security of the company’s data. Which of the following is a management control that should be implemented to ensure employees are using encryption to transmit sensitive information?

 

A.

Policies

B.

VPN

C.

HTTPS

D.

Standards

 

Correct Answer: A

 

 

QUESTION 242

An administrator would like to test out an open source based phone system prior to making an investment in hardware and phones. Which of the following should the administrator do to BEST test the software?

 

A.

Create virtual IP phones in a lab that utilize the STP protocol

B.

Deploy an open source VDI solution to create a testing lab

C.

Deploy new SIP appliances and connect to it with the open source phone applications

D.

Create a virtual PBX and connect to it with SIP phone applications

 

Correct Answer: D

 

 

QUESTION 243

A technician is concerned about security and is asked to set up a network management protocol. Which of the following is the best option?

 

A.

SLIP

B.

SNMPv3

C.

TKIP

D.

SNMPv2

 

Correct Answer: B

 

 

QUESTION 244

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are configurable. You can only change the adapter configurations to each PC.

 

clip_image002

clip_image004

 

 

Correct Answer:

Here is the solution below

 

On PC3, change the subnet mask to 255.255.255.0. When it is set to 255.255.255.128, then the PC with a .129 address will not be on the same subnet as the default gateway which is .1

On PC4, change the default gateway to 10.0.2.1. It has been incorrectly set as 10.1.2.1.

On this simulation, you will be asked to test connectivity after fixing the issues. You MUST ping the other three computers on EACH computer (i.e. from PC1, ping PC2, PC3, PC4, and from PC2, ping PC1, PC3 and PC4, etc)

 

QUESTION 245

A network technician needs to protect IP based servers in the network DMZ from being discovered by an intruder utilizing a ping sweep. Which of the following should the technician do to protect the network from ping sweeps?

 

A.

Block echo replies inbound to the DMZ

B.

Disable UDP on the servers

C.

Block ICMP at the firewall

D.

Disable TCP/IP on the server

 

Correct Answer: C

 

 

QUESTION 246

A network administrator is following best practices to implement firewalls, patch management and policies on the network. Which of the following should be performed to verify the security controls in place?

 

A.

Penetration testing

B.

AAA authentication testing

C.

Disaster recovery testing

D.

Single point of failure testing

 

Correct Answer: A

 

 

QUESTION 247

A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of:

 

A.

session hijacking

B.

vulnerability scanning

C.

social engineering

D.

penetration testing

E.

friendly DoS

 

Correct Answer: D

 

 

QUESTION 248

Joe, a system administrator, is troubleshooting an issue with remotely accessing a new server on the LAN. He is using an LMHOST file and the file contains the hostname and IP address of the new server. The server that he cannot remote to is located on the same LAN as another server that he can successfully remote to. Which of the following output from the command line would BEST resolve the problem?

 

A.

C:\windows\system32>ipconfig /flushdnsWindows IP configurationSuccessfully flushed DNS resolver cache

B.

C:\windows\system32>ipconfig /registerdnsWindows IP configurationRegistration of the DNS resource records for all adapters has been initiated. Any errors will be reported in the event viewer in 15 minutes.

C.

C:\windows\system32>nslookupDefault server: unknownAddress: 1.1.1.1

D.

C:\windows\system32>nbtstat -RSuccessful purge and reload of the NBT remote cache table

 

Correct Answer: B

 

 

QUESTION 249

There has been an increased amount of successful social engineering attacks at a corporate office. Which of the following will reduce this attack in the near future?

 

A.

Helpdesk training

B.

Appropriate use policy

C.

< /td>

User awareness training

D.

Personal Identifiable Information

 

Correct Answer: C

 

 

QUESTION 250

Which of the following communication technologies is used by video conferencing systems to synchronize video streams, and reduce bandwidth, sent by a central location to subscribed devices?

 

A.

Anycast

B.

Unicast

C.

CoS

D.

QoS

E.

Multicast

 

Correct Answer: E

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …