Download New Updated (July) CompTIA N10-005 Actual Test 231-240

Ensurepass

 

QUESTION 231

A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?

 

A.

RADIUS

B.

Single sign on

C.

Multifactor authentication

D.

Two-factor authentication

 

Correct Answer: B

Explanation:

Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications duri
ng a particular session.

QUESTION 232

Which of the following is MOST commonly implemented for remote access to UNIX systems?

 

A.

SSL

B.

RSH

C.

SSH

D.

RDP

 

Correct Answer: C

 

 

QUESTION 233

Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

 

A.

Kerberos

B.

RADIUS

C.

Multi-factor authentication

D.

TACACS+

 

Correct Answer: A

 

 

QUESTION 234

An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)

 

A.

20

B.

21

C.

22

D.

23

E.

25

F.

53

 

Correct Answer: AB

Explanation:

FTP use both port 21 and 20 (port 21 for the command por
t and port 20 for the data).

 

 

QUESTION 235

An administrator determines there are an excessive number of packets being sent to a web server repeatedly by a small number of external IP addresses. This is an example of which of the following attacks?

 

A.

DDoS

B.

Viruses

C.

Worms

D.

Man-in-the-middle

 

Correct Answer: A

Explanation:

DDoS attack,
a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols

 

 

QUESTION 236

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

 

A.

IPS logs

B.

Application logs

C.

IDS logs

D.

History logs

 

Correct Answer: A

 

 

QUESTION 237

Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?

 

A.

MAC filtering

B.

RAS

C.

SSL VPN

D.

L2TP

 

Correct Answer: C

Explanation:

SSL VPN consists of one or more VPN devices to which the user connects by using his Web browser. The traffic between the Web browser and the SSL VPN device is encrypted with the SSL protocol or its successor, the Transport Layer Security (TLS) protocol.

 

 

QUESTION 238

A company has one public IP address, and only one device needs to be able to connect to the Internet at a time. Which of the following is the BEST option for connectivity?

 

A.

VLSM

B.

CIDR

C.

NAT

D.

PAT

 

Correct Answer: C

 

 

QUESTION 239

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?

 

A.

Load balancer

B.

VPN concentrator

C.

Proxy server

D.

DNS server

 

Correct Answer: C

QUESTION 240

Users report that they are unable to access any external websites. The local intranet is not affected. A network technician has isolated the problem to a Linux-based server. Which of the following commands will enable the technician to view DNS information on the Linux- based server?

 

A.

nbtstat

B.

ipconfig

C.

dig

D.

netstat

 

Correct Answer: C

Explanation:

By dig command technician will come to know wheather name resolution is happening in correc way or not.

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in N10-005 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.