Comptia (N10-007) Exam Questions And Answers page 73
A network administrator is unable to identify the root cause of a network incident because insufficient evidence about the threat actor s actions was logged. The administrator notes that the server receiving and storing the events was not compromised by any attack and is properly communicating with all network devices.
Which of the following can the administrator employ to improve network access accountability?
Which of the following can the administrator employ to improve network access accountability?
Configure SNMP on the network server.
Deploy a central SIEM server into the network.
Collect traffic statistics from the servers using NetFlow data.
Network Security
Network Troubleshooting and Tools
Which of the following MUST be installed on an employee s computer if the remote access VPN implements an SSL VPN with PKI authentication?
Shared secret
HTTPS server
Soft token
Private certificate
Network Security
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?
Physical diagram
Heat map
Asset list
Device map
Network Security
An administrator needs to connect to a server to install security patches. The administrator requests that port 3389 be allowed through the firewall. Which of the following access methods is the administrator looking to use?
SSH
Telnet
SFTP
RDP
Network Security
In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?
Shut down unused ports on switches
Upgrade firmware on network devices
Allow only secure protocols on the network
Disable unnecessary services
Network Security
Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?
Remote access
NDA
SLA
BYOD
Incident response
Network Security
A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?
10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.
127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.
172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.
192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.
Networking Concepts
A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the MOST likely explanation?
There is less local congestion on the wireless network
The testing server for the wired network was farther away
The firewall is configured to throttle traffic to specific websites
The wireless access points were misconfigured
Network Operations
Network Troubleshooting and Tools
A new building needs to be joined to an existing network, but management has decided that running fiber is too expensive. Since the buildings are about 1000ft (305m) apart, the IT department has been asked to propose alternatives. Which of the following is the BEST device to add to each building to facilitate the extension of the network while meeting budgetary demands?
Switch
Router
Media converter
PRP wireless
Network Operations
Network Troubleshooting and Tools
What are two methods for implementing network device hardening?
Multiple Choice
Which of the following can be done to implement network device hardening? (Choose two.)
Implement spanning tree
Perform VLAN hopping
Patch and update
Perform backups
Enable port mirroring
Change default admin password
Network Operations
Network Security
Comments