Download New Updated (July) CompTIA N10-005 Actual Test 341-350

Ensurepass

QUESTION 341

Which of the following can be used to prioritize network streams to optimize performance for certain traffic types?

 

A.

VLAN

B.

VPN

C.

QoS

D.

PoE

 

Correct Answer: C

 

 

QUESTION 342

A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain userna
me and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

 

A.

802.1q

B.

MAC address filtering

C.

WPA2 Personal

D.

WPA Enterprise

E.

802.1x

 

Correct Answer: DE

 

 

QUESTION 343

Which of the following DHCP options is used to exclude IP addresses from being distributed to other computers?

 

A.

Reservations

B.

Suffixes

C.

Leases

D.

Gateways

 

Correct Answer: A

 

 

QUESTION 344

A network administrator is implementing a wireless honeypot to detect wireless breach attempts. The honeypot must implement weak encryption to lure malicious users into easily breaking into the network. Which of the following should the network administrator implement on the WAP?

 

A.

WPA

B.

WPA2

C.

WEP

D.

VPN

 

Correct Answer: C

Explanation:

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network.WEP, recognizable by the key of 10 or 26 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools

 

 

QUESTION 345

A computer’s DNS has bad cach records.which tools can be used to clear the DNS record.

 

A.

netstat

B.

ipconfig

C.

nslookup

D.

tracert

 

Correct Answer: B

Explanation:

ipconfig/flushdns will flush/clear the old DNS record, which includes good and bad cached records.

 

 

 

 

 

QUESTION 346

A user is having difficulty connecting a laptop to the company’s network via a wireless connection. The user can connect to the network via a wired NIC. The technician suspects the laptop’s wireless NIC has failed. The technician performs hardware diagnostics on the wireless NIC and discovers the hardware is working fine. Which of the following network troubleshooting methodology steps should the technician do NEXT?

 

A.

Establish a plan of action to resolve the problem.

B.

Test the theory to determine a cause.

C.

Re-establish a new theory or escalate.

D.

Implement the solution or escalate as necessary.

 

Correct Answer: C

Explanation:

As first theorey doesn’t work he will e
stablish a new theorey or escalate it to the vendor hardware company to work on it.

 

 

QUESTION 347

Which of the following is the control when observing network bandwidth patterns over time?

 

A.

Network log

B.

Baseline

C.

Flow data

D.

Interface statistics

 

Correct Answer: B

Explanation:

To successfully baseline a network it is important to co
nsider two functions; performance at protocol level and performance at application level. There are many significant metrics to consider at the protocol level, but only a few which are critical. The most important is bandwidth utilization compared with bandwidth availability. The most likely cause of poor network performance is insufficient bandwidth. Trending bandwidth utilization allows you to recognize problem areas, provide enough bandwidth to reach performance objectives, and predict future capacity requirements. Changes in bandwidth utilization patterns also provide a clear indication of network usage alterations, such as a change in end-user behavior, or the unauthorized addition of an application.

 

 

QUESTION 348

A user has network connectivity per the link lights on the NIC, but cannot access any network resources or the Internet. Which of the following commands should the technician run FIRST?

 

A.

arp

B.

ipconfig

C.

tracert

D.

route

 

Correct Answer: B

Explanation:

As from ipconfig command technician will come to know wheather he has assigned right ip address to NIC or not.

 

 

QUESTION 349

Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?

 

A.

Syslog files

B.

Honeypot

C.

Network sniffer

D.

tracert

 

Correct Answer: C< /p>

Explanation:

A network sniffers monitors data flowing over computer network links. It can be a self-contained software program or a hardware device with the appropriate software or firmware programming.

 

 

QUESTION 350

A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?

 

A.

Packet sniffer

B.

Stateless firewall

C.

Packet filter

D.

Stateful firewall

 

Correct Answer: D

Explanation:

Stateful firewall keeps track of the state of network connections (such as TCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected.

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in N10-005 Real Tests (July) and tagged , , , , , , . Bookmark the permalink.