2018 Jan CompTIA Official New Released RC0-N06
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Recertification Exam for Continuing Education

Question No: 151 – (Topic 5)

Which of the following is true about the main difference between a web session that uses port 80 and one that uses port 443?

  1. Port 80 web sessions often use application-level encryption, while port 443 sessions often use transport-level encryption.

  2. Port 80 web session cannot use encryption, while port 443 sessions are encrypted using web certificates.

  3. Port 80 web sessions can use web application proxies, while port 443 sessions cannot traverse web application proxies.

  4. Port 80 web sessions are prone to man-in-the-middle attacks, while port 443 sessions are immune from man-in-the-middle attacks.

Answer: D Explanation:

HTTPS stands for HTTP over SSL or HTTP Secure. It is used for secure access to websites. Port 80 web sessions are HTTP (HyperText Transfer Protocol) sessions which offers no security. Port 443 web sessions use HTTPS. HTTPS uses SSL or TLS to encrypt

the HTTP traffic.

HTTPS provides authentication of the website and associated web server that you are communicating with, which protects against man-in-the-middle attacks. Additionally, it provides bidirectional encryption of communications between a client and server, which protects against eavesdropping and tampering with and/or forging the contents of the communication.

Question No: 152 – (Topic 5)

Which of the following does a network technician need to implement if a change is unsuccessful within the approved maintenance window?

  1. Configuration procedures

  2. Stakeholder notification

  3. Impact analysis

  4. Rollback procedure

Answer: D Explanation:

A rollback procedure is something that should bedocumented in a change management document. In this question, the network technician has made a change during a maintenance window. The change has not worked so the technician needs to ‘undo’ the change he made to revert the system back to its previous state. The network technician can then investigate why the change has not worked as expected.

The rollback procedure is the list of steps required to undo the changes made to the system.

Question No: 153 – (Topic 5)

Which of the following will negotiate standoff timers to allow multiple devices to communicate on congested network segments?

  1. CSMA/CD

  2. OSPF


  4. BGP

Answer: A Explanation:

Carrier Sense Multiple Access/Collision Detect (CSMA/CD) is used by devices in an Ethernet network for transmittingdata on the network.

Any device on an Ethernet network can send data at any time. The network devices sense when the line is idle and therefore available for the transmission of data. The network device then transmits a data frame onto the network. If another device sends a frame at exactly the same time, a collision occurs and the frames are discarded. The network devices will then wait for a random period of time before attempting to send the frame again.

Question No: 154 – (Topic 5)

An organization is moving to a new datacenter. During the move, several technicians raise concerns about a system that could potentially remove oxygen from the server room and result in suffocation. Which of the following systems are they MOST likely discussing?

  1. Fire suppression

  2. Mantraps at the entry

  3. HVAC

  4. UPS and battery backups

Answer: A Explanation:

Firesuppression systems are often deployed in server rooms to prevent a fire destroying all the I.T. equipment. Different fire suppression systems work in different ways. Obviously a fire suppression system that sprays water onto the fire is no good for a server room as the water would do as much damage as the fire. A common fire suppression system used in server rooms is one that suppresses the fire by starving it of oxygen. One way the oxygen can be removed from the server room is to fill the server room withan inert gas such as carbon dioxide.

Topic 6, Mix questions

Question No: 155 – (Topic 6)

Joe, a user, has a computer that has a link light on his network interface card (NIC); however, Joe is unable to access the Internet. Which of the following is the cause of this issue?

  1. Faulty GBIC

  2. Faulty SFP

  3. Cable is a crossover

  4. VLAN mismatch

Answer: D Explanation:

As user has link light on NIC that means he has connectivity with switch so he need to check his vlan assignment.

Question No: 156 – (Topic 6)

The Chief Information Officer (CIO) of an organization is concerned that the current locally- hosted, software threat solution is not agile enough. The CIO points to specific examples of zero-day threats that have recently taken a day or more to receive patches. The IT team is tasked with finding a solution that has a better chance of stopping emerging threats and stopping zero-day threats more quickly. Which of the following solutions would have the BEST chance of meeting these goals?

  1. Stateful firewall

  2. Premise-based IDS

  3. Host-based IDS

  4. Cloud-based anti-malware

Answer: A

Question No: 157 – (Topic 6)

In a network that requires multilayer switches to use authentication via RADIUS/TACACS , which of the following access control models will the switches need to utilize?

A. 802.1q

B. 802.3af


D. 802.1x

Answer: D Explanation:


Question No: 158 – (Topic 6)

A technician needs to add new features to existing hardware devices. Which of the following should be performed to add the new features?

  1. Firmware updates

  2. Changing to IPv6

  3. Cloning

  4. Vulnerability patching

Answer: A

Question No: 159 – (Topic 6)

A user’s laptop is unable to keep a stable network connection. Which of the following measures would MOST likely need to be configured?

  1. SSID name

  2. WAP encryption strength

  3. WAP radio power

  4. Channel overlay

Answer: C

Explanation: WAP radio power is the signal strength through which you can specify the range from which you can stay connected to the network and access internet. Here, when the user is not able to maintain a stable connection then it is a problem with the signal strength for sure so you can try to increase the signal strength by increasing the radio power.

Question No: 160 – (Topic 6)

A company owns four kiosks that are in close proximity within a shopping center. The owner is concerned about someone accessing the internet via the kiosk#39;s wireless network. Which of the following should be implemented to provide wireless access only to the employees working at the kiosk?

  1. Firewall

  2. Web filtering

  3. MAC filtering

  4. Host-based antivirus

Answer: C

100% Free Download!
Download Free Demo:RC0-N06 Demo PDF
100% Pass Guaranteed!
Download 2018 EnsurePass RC0-N06 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2018 EnsurePass IT Certification PDF and VCE

Comments are closed.