Downloadable of n10 006 study guide pdf test preparation materials and keys for CompTIA certification for IT candidates, Real Success Guaranteed with Updated n10 006 exam pdf dumps vce Materials. 100% PASS CompTIA Network+ exam Today!

Q21. After connecting a workstation directly to a small business firewall, a network administrator is trying to manage it via HTTPS without losing its stored configuration. The only two pieces of information that the network administrator knows about the firewall are the management interface MAC address, which is 01:4a:d1:fa:b1:0e, and the administrator's password. Which of the following will allow the administrator to log onto the firewall via HTTPS if the management's IP address is unknown and the administrator's workstation IP address is 192.168.0.10/23? 

A. Use the reset button on the back of the firewall to restore it to its factory default, and then log onto 

B. Run the following command on the administrator's workstation: arp –s 192.168.1.200 01:4a:d1:fa:b1:0e 

C. Use an SNMP tool to query the firewall properties and determine the correct management IP address 

D. Use a crossover cable to connect to the console port and reconfigure the firewall management IP to 192.168.0.1 

Answer:


Q22. A company has a new offering to provide access to their product from a central location rather than clients internally hosting the product on the client network. The product contains sensitive corporate information that should not be accessible from one client to another. This is an example of which of the following? 

A. Public SaaS 

B. Private SaaS 

C. Hybrid IaaS 

D. Community IaaS 

Answer:


Q23. A company has had several virus infections over the past few months. The infections were caused by vulnerabilities in the application versions that are being used. Which of the following should an administrator implement to prevent future outbreaks? 

A. Host-based intrusion detection systems 

B. Acceptable use policies 

C. Incident response team 

D. Patch management 

Answer:


Q24. Which of the following network devices use ACLs to prevent unauthorized access into company systems? 

A. IDS 

B. Firewall 

C. Content filter 

D. Load balancer 

Answer:


Q25. A network technician receives the following alert from a network device: 

"High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54" 

Which of the following is being monitored to trigger the alarm? 

A. Speed and duplex mismatch 

B. Wireless channel utilization 

C. Network device CPU 

D. Network device memory 

E. Interface link status 

Answer:


Q26. Which of the following protocols must be implemented in order for two switches to share VLAN information? 

A. VTP 

B. MPLS 

C. STP 

D. PPTP 

Answer:


Q27. Which of the following PDUs is used by a connectionless protocol? 

A. Frames 

B. Segments 

C. Streams 

D. Datagram 

Answer:


Q28. A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit? 

A. Utilize a FTP service 

B. Install recommended updates 

C. Send all log files through SMTP 

D. Configure the firewall to block port 22 

Answer:


Q29. In an engineering office, all plotters are configured via static IP. Which of the following best practices will alleviate many issues if equipment moves are required? (Select TWO). 

A. Rack monitoring 

B. Device placement 

C. Wall plate labeling 

D. Room numbering 

E. Patch panel labeling 

Answer: CE 


Q30. A network technician is utilizing a network protocol analyzer to troubleshoot issues that a user has been experiencing when uploading work to the internal FTP server. Which of the following default port numbers should the technician set the analyzer to highlight when creating a report? (Select TWO). 

A. 20 

B. 21 

C. 22 

D. 23 

E. 67 

F. 68 

G. 69 

Answer: AB