Ensurepass

 

QUESTION 361

Which of the following can operate on BOTH the 2.4GHz and 5.8GHz frequencies?

 

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

 

Correct Answer: D

 

 

QUESTION 362

Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?

 

A.

Caching

B.

Load balancing

C.

Port filtering

D.

Traffic analyzer

 

Correct Answer: A

Explanation:

In computer science, a cache is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere. If requested data is contained in the cache (cache hit), this request can be served by simply reading the cache, which is comparatively faster.

 

 

QUESTION 363

Which of the following remote access types requires a certificate for connectivity?

 

A.

SSH

B.

PPP

C.

HTTPS

D.

WEP

 

Correct Answer: A

Explanation:

Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively).

 

 

QUESTION 364

Which of the following is the MOST secure way to prevent malicious changes to a firewall?

 

A.

SNMPv2 access only

B.

TELNET access only

C.

SSH access only

D.

Console access only

 

Correct Answer: D

Explanation:

Console access requires physical access to the device, so this is the most secure method.

 

 

QUESTION 365

Which of the following does Kerberos provide?

 

A.

Non-repudiation

B.

Accounting

C.

Exchange

D.

Authentication

 

Correct Answer: D

Explanation:

Kerberos is a trusted third-party authentication service based on the model presented by Needham and Schroeder. It is trusted in the sense that each of its clients believes Kerberos’ judgment as to the identity of each of its other clients to be accurate.

 

 

QUESTION 366

An organization finds that most of the outgoing traffic on the network is directed at several Internet sites viewed by multiple computers simultaneously. Which of the following performance optimization methods would BEST alleviate network traffic?

 

A.

Load balancing internal web servers

B.

Redundant network resources

C.

Implement fault tolerance on the WAN

D.

Implement caching engines

 

Correct Answer: D

Explanation:

A cache server is a dedicated network server or service acting as a server that saves Web pages or other Internet content locally. By placing previously requested information in temporary storage, or cache, a cache server both speeds up access to data and reduces demand on an enterprise’s bandwidth.

 

 

 

 

QUESTION 367

An administrator would like to inspect all traffic flowing over the SMTP protocol on a given network. Which of the following tools would accomplish this? (Select TWO).

 

A.

Packet sniffer

B.

Honeypot

C.

Port mirroring

D.

IPS

E.

Port scanner

F.

IDS

 

Correct Answer: AC

Explanation:

(IPS), also known as intrusion detection and prevention systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information about this activity, attempt to block/stop it, and report it. And we use packet sniffer to detect the types of packet.

 

 

QUESTION 368

Stateful packet inspection is a security technology used by which of the following devices?

 

A.

Unmanaged switch

B.

Hardware firewall

C.

Bridge

D.

IDS

 

Correct Answer: B

Explanation:

With Stateful Packet Inspection (SPI), every time a packet is sent out of the computer, the firewall keeps track of it. When a packet comes back to the firewall, the firewall can tell whether or not the in-bound packet is a reply to the packet that was sent out.This way, the firewall can handle most network traffic safely without a complex configuration of firewall rules.

 

 

QUESTION 369

A new WAP is configured to only use 802.11g with SSID broadcasts enabled. The encryption is set to WPA and the key is given to the user. A user near the WAP is using a laptop equipped with a 5GHz wireless card and is not able to see the SSID. Which of the following is the problem?

 

A.

Latency

B.

Incorrect encryption type

C.

EUI-64

D.

Incompatible hardware

 

Correct Answer: D

 

 

QUESTION 370

Which of the following protocols is used to provide secure authentication and encryption over non-secure networks?

 

A.

RADIUS

B.

TLS

C.

PPTP

D.

HTTP

 

Correct Answer: B

 

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.