Ensurepass

 

QUESTION 351

In order to discover the currently unknown IP address of the next-hop router, a network administrator would begin by using which of the following tools?

 

A.

NMAP

B.

ping

C.

nslookup

D.

tracert

 

Correct Answer: D

 

 

QUESTION 352

Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?

 

A.

DoS attack

B.

Man-in-the-middle attack

C.

Smurf attack

D.

Xmas attack

Correct Answer: B

Explanation:

An attack where a user gets between the sender and receiver of information and sniffs any information being sent. In some cases, users may be sending unencrypted data, which means the man-in-the-middle (MITM) can obtain any unencrypted information. In other cases, a user may be able to obtain information from the attack, but have to unencrypt the information before it can be read.

 

 

QUESTION 353

At which of the following layers do IP addresses exist?

 

A.

TCP/IP model Internet layer

B.

OSI model Data Link layer

C.

TCP/IP model Transport layer

D.

OSI model Physical layer

 

Correct Answer: A

 

 

QUESTION 354

Which of the following uses SSL encryption?

 

A.

SMTP

B.

FTP

C.

HTTPS

D.

SNMP

 

Correct Answer: C

Explanation:

HTTPS is the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications.

 

 

QUESTION 355

A strong network firewall would likely support which of the following security features for controlling access? (Select TWO).

 

A.

War driving

B.

War chalking

C.

MAC filtering

D.

FTP bouncing

E.

Port filtering

 

Correct Answer: CE

Explanation:

MAC filtering set the security level at layer 2 and port filtering will set the security level on layer 4 so by filtering the traffic on both layers our network will get secure.

 

 

 

 

 

QUESTION 356

Users are reporting a large decrease in network performance. After further investigation, the network administrator notices large amounts of traffic coming from a specific IP address. The network administrator needs to identify the payload of the network traffic. Which of the following could be used to collect that information?

 

A.

ipconfig

B.

ping

C.

sniffer

D.

route

 

Correct Answer: C

 

 

QUESTION 357

A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?

 

A.

Network sniffer

B.

Syslog

C.

SNMPv3

D.

System logs

 

Correct Answer: A

 

 

QUESTION 358

< p class="MsoNormal" style="cursor: auto; margin: 0cm 0cm 0pt; line-height: normal; text-autospace: ; mso-layout-grid-align: none" align="left">Which of the following is the only standard that can operate at either frequency?

 

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

 

Correct Answer: D

Explanation:

Only 802.11n can operate at 2.4 Ghz and 5Ghz

 

 

QUESTION 359

A technician can increase the bandwidth of an 802.11n cell by:

 

A.

Doubling the channel width

B.

Enabling diversity

C.

Disabling MIMO

D.

Adding a second access point

 

Correct Answer: A

 

 

 

 

 

QUESTION 360

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?

 

A.

The spanning tree protocol is preventing the traffic.

B.

Port Mirroring is set up incorrectly.

C.

The switch needs to be a layer 3 switch.

D.

The traffic is in a classless IP range and not classful IP range.

 

Correct Answer: B

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.