Download New Updated (July) CompTIA N10-005 Actual Test 391-400

Ensurepass

 

 

QUESTION 391

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

 

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

 

Correct Answer: C

 

 

QUESTION 392

Which of the following should be mitigated by employing proper coding techniques when developing software?

 

A.

Distributed denial of service attacks

B.

Buffer overflows

C.

War driving

D.

Packet sniffing

 

Correct Answer: B

 

 

QUESTION 393

Which of the following a network technician would use to reverse engineer malware and virus?

 

A.

IDS

B.

VLAN

C.

Virtual Machine

D.

Switch

 

Correct Answer: C

Explanation:

Virtual Machine — even if the VM gets infected, host machine will run as normal.

 

 

QUESTION 394

Using source port numbers as a way to keep track of connections is a characteristic of which of the following protocols?

 

A.

TCP

B.

UDP

C.

NAT

D.

PAT

 

Correct Answer: D

 

 

QUESTION 395

Which of the following does Kerberos use to authenticate?

 

A.

Tickets

B.

Servers

C.

Users

D.

Clients

 

Correct Answer: A

Explanation:

Kerberos keeps a database of its clients and their private keys. The private key is a large number known only to Kerberos and the client it belongs to. In the case that the client is a user, it is an encrypted password. Network services requiring authentication register with Kerberos, as do clients wishing to use those services. The private keys are negotiated at registration.

 

 

QUESTION 396

Which of the following reside at a minimum of Layer 3 of the OSI model? (Select TWO).

 

A.

Hub

B.

Switch

C.

MAC address

D.

IP address

E.

Router

 

Correct Answer: DE

 

 

QUESTION 397

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?

 

A.

A 12 port unmanaged switch.

B.

A wired router with an 8 port switch and a WAN port.

C.

A wireless router with an 8 port switch, and a WAN port.

D.

A 8 port firewall with one console port.

 

Correct Answer: A

 

 

QUESTION 398

Which of the following 802.3 classifications has a MAXIMUM segment distance of 984 feet (300 meters)?

 

A.

1000Base

B.

100BaseFX

C.

1000BaseSX

D.

1000BaseT

 

Correct Answer: C

 

 

QUESTION 399

The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:

 

A.

patch management

B.

security limitations

C.

documentation

D.

social engineering

 

Correct Answer: A

Explanation:

A patch is a piece of software designed to fix security vulnerabilities and other bugs, and improving the usability or performance.

 

 

QUESTION 400

Joe, a technician, suspects a virus has infected the network and is using up bandwidth. He needs to quickly determine which workstation is infected with the virus. Which of the following would BEST help Joe?

 

A.

Web s
erver

B.

Syslog

C.

Network sniffer

D.

SNMP

 

Correct Answer: C

Explanation:

Network sniffer is a tool to analyze packets that are being exchanged between the hosts and using this Joe can understand whether there was traffic encountered to server or not which was infected.

 

Free VCE & PDF File for CompTIA N10-005 Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in Uncategorized and tagged , , , , , , . Bookmark the permalink.