PassLeader released the NEWEST CompTIA N10-006 exam dumps recently! Both N10-006 VCE dumps and N10-006 PDF dumps are available on PassLeader, either N10-006 VCE dumps or N10-006 PDF dumps have the NEWEST N10-006 exam questions in it, they will help you passing CompTIA N10-006 exam easily! You can download the valid N10-006 dumps VCE and PDF from PassLeader here: https://www.passleader.com/n10-006.html (1521 Q&As Dumps –> 1643 Q&As Dumps)
Also, previewing the NEWEST PassLeader N10-006 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpSDB2amRraUV5OVk
QUESTION 1441
Which of the following is used to proxy client requests for IP configurations across different network segments?
A. DHCP relay
B. SOCKS
C. Teredo tunneling
D. Reverse proxy
Answer: A
QUESTION 1442
Which of the following is the BEST way to prevent various types of security threats throughout the network on a routine basis?
A. Disaster recovery planning
B. User training and awareness
C. Penetration testing
D. Business continuity training
Answer: B
QUESTION 1443
A network administrator is assigned an approved change request with a change window of 120 minutes. After 90 minutes, the change is stuck on step five of a five-step change. The network manager decides to initiate a rollback. Which of the following describes what the network administrator will do NEXT?
A. Return the system to step four since this was the last working step.
B. Request additional time since the change is near completion.
C. Leave the change as is and inform users of a workaround.
D. Return the system back to the original state before the change.
Answer: D
QUESTION 1444
A network administrator was told by the Chef Information Officer (CIO) to set up a new office with a network that has redundancy. Which of the following topologies would the network administrator need to administer?
A. Hybrid
B. Bus
C. Mesh
D. Partial mesh
E. Star
Answer: C
QUESTION 1445
An engineer is reviewing network logs on a management switch and discovers that, compared to previous reports, a large amount of traffic is coming from a particular node. Upon further investigation, the engineer determines traffic coming from the port in question is using points that indicate NAT is occurring somewhere downstream from that point. After conferring with another network manager, the team determines a user has added an unauthorized SOHO WLAN router to the network. Among the vulnerabilities that could result from such an action is the possibility of the user inadvertently connecting the LAN interface of the SOHO router into the LAN port coming from the corporate network. This configuration would MOST likely result in which of the following scenarios?
A. Excessive interface on the corporate LAN port
B. DHCP scope exhaustion
C. Evil twin stacks
D. Competing DHCP servers on a single LAN
Answer: C
QUESTION 1446
An organization wants to improve its ability to detect infiltration of servers in a DMZ, IPS/IDS solutions are currently located on the edge between DMZ and Untrust, and DMZ and Trust. Which of the following can increase visibility inside the DMZ?
A. Layer 7 firewall
B. Honeypot
C. NAC server
D. Host-based firewalls in the DMZ
Answer: A
Explanation:
https://en.wikipedia.org/wiki/DMZ_(computing)
QUESTION 1447
A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user’s VoIP phone is routed directly under the rolling chair and has been smashes flat over time. Which of the following is the most likely cause of this issue?
A. Cross-talk
B. Electromagnetic interference
C. Excessive collisions
D. Split pairs
Answer: C
QUESTION 1448
Which of the following tools would a network technician use to troubleshoot a span of single-mode fiber cable?
A. Punchdown tool
B. Spectrum analyzer
C. Ethernet tester
D. OTDR
Answer: B
QUESTION 1449
A network technician has received reports of an Internet-based application that has stopped functioning. Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct problem. Which of the following should the company do to reduce this type of action from affecting the network?
A. Implement a disaster recovery plan with a hot site to allow users to continue working.
B. Segment the network and create a test lab for all updates before deployment.
C. Verify the update hashes match those on the vendor’s website.
D. Coordinate the Internet Server update to coincide with the users’ updates.
Answer: B
QUESTION 1450
A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure. The scope of activity as described in the statement of work is an example of ____.
A. session hijacking
B. vulnerability scanning
C. social engineering
D. penetration testing
E. friendly DoS
Answer: D
QUESTION 1451
A network technician is selection the best way to protect a branch office from as many different threat from the Internet as possible using a single device. Which of the following actions would meet the objective?
A. Configure a network-based firewall.
B. Configure a firewall with UTM.
C. Configure a host-based firewall.
Answer: A
QUESTION 1452
A network technician has been tasked to provide a local office with wireless Internet access. The network technician had determined the users will need a wireless router that provides a maximum of 54 Mbps of bandwidth while operating in the 2.4Ghz band. Which of the following wireless standards will the network technician deploy?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: C
QUESTION 1453
A technician is looking at an issue with a computer connecting to the network. The technician determines wire 3 of a UTP Ethernet cable run has a break in it. This computer was previously connected to the switch at 1 Gbps throughput. This PC is a kiosk and does not need anything more than 50-60 Mbps connection speed. Which of the following can the technician do to resolve the issue quickly?
A. Rewire both ends to have the wire on pin 6 remapped to pin 3.
Force the duplex and speed to 100 Mbps full duplex.
B. Rewire both ends to have the wire on pin 6 remapped to pin 3.
Force the duplex and speed to 1000 Mbps full duplex.
C. Rewire both ends to have the wire on pin 7 remapped to pin 3.
Force the duplex and speed to 100 Mbps full duplex.
D. Rewire both ends to have the wire on pin 7 remapped to pin 3.
Force the duplex and speed to 1000 Mbps full duplex.
Answer: D
Explanation:
http://pinouts.ru/NetworkCables/ethernet_10_100_1000_pinout.shtml
QUESTION 1454
Which of the following physical devices provides the BEST security to a datacenter?
A. Cipher lock
B. Thumbprint reader
C. Video monitoring
D. Mantrap
E. Key pad
Answer: D
QUESTION 1455
A network administrator need to install a border device on the network that will help ensure FTP commands are not being sent in traffic communicating on port 25. Which of the following devices will allow for deep packet inspection?
A. Layer 7 firewall
B. Web proxy
C. Layer 3 switch
D. Protocol analyzer
Answer: B
Explanation:
http://www.infosectoday.com/Articles/Deep_Packet_Inspection_Technologies.htm
QUESTION 1456
An employee of a highly secure company needs to use facial recognition in addition to username/password to successfully establish a VPN. Which of the following describes this methodology?
A. PKI
B. Federated identity
C. Two-factor authentication
D. Biometric authentication
E. AAA
Answer: A
QUESTION 1457
A technician uses a cable tester to verify the pinout in an Ethernet cable. After testing each pin, the technician records the following output:
Based on this information, which of the following identification describes this cable?
A. Crossover cable
B. Rollover cable
C. Patch cable
D. RJ-48 cable
Answer: A
QUESTION 1458
An outside technician notices that a SOHO employee who is logged into the company VPN has an unexpected source IP address. Which of the following is the employee MOST likely using?
A. Proxy server
B. Least-cost routing
C. IPv6
D. VPN concentrator
Answer: A
QUESTION 1459
A system administrator wants to verify external IP addresses are unable to collect software versioning from servers on the network. Which of the following should system administrator do to confirm the network is protected?
A. Analyze packet captures.
B. Utilize netstat to locate active connections.
C. Use nmap to query known ports.
D. Review the ID3 logs on the network.
Answer: A
Explanation:
https://en.wikipedia.org/wiki/Packet_analyzer
QUESTION 1460
A network technician is connecting three temporary office trailers with a point-to-multipoint microwave radio solution in a wooded area. The microwave radios are up and the network technician can ping devices in all office trailers, however, connectivity is sporadic. Which of the following is MOST likely the cause of this issue?
A. Latency
B. Throttling
C. Interference
D. Split horizon
Answer: C
Welcome to choose PassLeader N10-006 dumps for 100% passing CompTIA N10-006 exam: https://www.passleader.com/n10-006.html (1521 Q&As VCE Dumps and PDF Dumps –> 1643 Q&As VCE Dumps and PDF Dumps)
Also, previewing the NEWEST PassLeader N10-006 dumps online for free on Google Drive: https://drive.google.com/open?id=0B-ob6L_QjGLpSDB2amRraUV5OVk