It is impossible to pass CompTIA n10 006 pdf exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed CompTIA n10 006 pdf practice questions. You will get a surprising result by our Up to date CompTIA Network+ practice guides.
Q41. A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?
A. A cloud-based antivirus system with a heuristic and signature based engine
B. A network based firewall which blocks all inbound communication
C. A host-based firewall which allows all outbound communication
D. A HIDS to inspect both inbound and outbound network communication
Answer: C
Q42. A network engineer is dispatched to an employee office to troubleshoot an issue with the employee's laptop. The employee is unable to connect to local and remote resources. The network engineer flips the laptop's wireless switch on to resolve the issue. At which of the following layers of the OSI model was the issue resolved?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 7
Answer: A
Q43. A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?
A. ARP inspection
B. Intrusion detection system
C. Web content filtering
D. Port filtering
Answer: C
Q44. A firewall ACL is configured as follows:
10. Deny Any Trust to Any DMZ eq to TCP port 22
11. Allow 10.200.0.0/16 to Any DMZ eq to Any
12. Allow 10.0.0.0/8 to Any DMZ eq to TCP ports 80, 443
13. Deny Any Trust to Any DMZ eq to Any
A technician notices that users in the 10.200.0.0/16 network are unable to SSH into servers in the DMZ. The company wants 10.200.0.0/16 to be able to use any protocol, but restrict the rest of the 10.0.0.0/8 subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company's objectives?
A. 11, 10, 12, 13
B. 12, 10, 11, 13
C. 13, 10, 12, 11
D. 13, 12, 11, 10
Answer: A
Q45. During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company. Which of the following would be identified as physical security controls? (Select THREE).
A. RSA
B. Passwords
C. Man traps
D. Biometrics
E. Cipher locks
F. VLANs
G. 3DES
Answer: CDE
Q46. A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?
A. Does the printer have toner?
B. Are there any errors on the printer display?
C. Is the user able to access any network resources?
D. Is the printer powered up?
Answer: C
Q47. Two weeks after installation, a network technician is now unable to log onto any of the newly installed company switches. The technician suspects that a malicious user may have changed the switches' settings before they were installed in secure areas. Which of the following is the MOST likely way in which the malicious user gained access to the switches?
A. Via SSH using the RADIUS shared secret
B. Via HTTP using the default username and password
C. Via console using the administrator's password
D. Via SNMP using the default RO community
Answer: B
Q48. A network technician is attempting to locate a switch connected to the fourth floor west side of the building. Which of the following will allow quick identification of the switch, when looking at a logical diagram?
A. Building layout
B. Patch panel labeling
C. Packet sniffing
D. Naming conventions
Answer: D
Q49. A technician has verified that a recent loss of network connectivity to multiple workstations is due to a bad CAT5 cable in the server room wall. Which of the following tools can be used to locate its physical location within the wall?
A. Cable certifier
B. Multimeter
C. Cable tester
D. Toner probe
Answer: D
Q50. A user connects to a wireless network at the office and is able to access unfamiliar SMB shares and printers. Which of the following has happened to the user?
A. The user is connected using the wrong channel.
B. The user is connected to the wrong SSID.
C. The user is experiencing an EMI issue.
D. The user is connected to the wrong RADIUS server.
Answer: B