Ensurepass

 

QUESTION 71

A network technician was tasked to respond to a compromised workstation. The technician documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?

 

A.

Document the scene

B.

Forensics report

C.

Evidence collection

D.

Chain of custody

 

Correct Answer: D

 

 

QUESTION 72

During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).

 

A.

RSA

B.

Passwords

C.

Man traps

D.

Biometrics

E.

Cipher locks

F.

VLANs

G.

3DES

 

Correct Answer: CDE

 

QUESTION 73

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?

 

A.

Disable the network based firewall

B.

Implicit deny all traffic on network

C.

Configure a VLAN on Layer 2 switch

D.

Add the system to the DMZ

 

Correct Answer: D

 

 

QUESTION 74

A firewall ACL is configured as follows:

 

10. Deny Any Trust to Any DMZ eq to TCP port 22

 

11. Allow 10.200.0.0/16 to Any DMZ eq to Any

 

12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443

 

13. Deny Any Trust to Any DMZ eq to Any

 

A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company’s objectives?

 

A.

11, 10, 12, 13

B.

12, 10, 11, 13

C.

13, 10, 12, 11

D.

13, 12, 11, 10

 

Correct Answer: A

 

 

QUESTION 75

A malicious user floods a switch with frames hoping to redirect traffic to the user’s server. Which of the following attacks is the user MOST likely using?

 

A.

DNS poisoning

B.

ARP poisoning

C.

Reflection

D.

SYN attack

 

Correct Answer: B

 

 

QUESTION 76

Which of the following is a security benefit gained from setting up a guest wireless network?

 

A.

Optimized device bandwidth

B.

Isolated corporate resources

C.

Smaller ACL changes

D.

Reduced password resets

 

Correct Answer: B

 

 

QUESTION 77

A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?

 

A.

ARP inspection

B.

Intrusion detection system

C.

Web content filtering

D.

Port filtering

 

Correct Answer: C

 

 

QUESTION 78

Before logging into the company network, users are required to sign a document that is to be stored in their personnel file. This standards and policies document is usually called which of the following?

 

A.

SOP

B.

BEP

C.

AUP

D.

SLA

 

Correct Answer: C

 

 

QUESTION 79

A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus. Which of the following could the technician do for vendors to validate the proper security patch?

 

A.

Use TFTP for tested and secure downloads

B.

Require biometric authentication for patch updates

C.

Provide an MD5 hash for each file

D.

Implement a RADIUS authentication

 

Correct Answer: C

 

 

QUESTION 80

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?

 

A.

WPA2

B.

IPv6

C.

SNMPv3

D.

RIPv2

 

Correct Answer: C

 

Free VCE & PDF File for CompTIA N10-006 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

Comments are closed.