Comptia (N10-007) Exam Questions And Answers page 75
A utility company has installed a wireless device at a residence that allows the company to view power consumption online. The resident reports the 802.11ac home wireless intermittently loses connectivity for about 15 minutes twice a day.
Which of the following is the MOST likely cause?
Which of the following is the MOST likely cause?
There is additional data being transferred over the wireless network.
There is interference with the smart reader.
An IoT device is causing a DoS attack on the wireless network.
Network Operations
Network Troubleshooting and Tools
Which of the following storage types allows for the connection of storage devices that are located several miles apart?
SFTP
InfiniBand
eSATA
iSCSI
Network Operations
Network Security
A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using the following IP addressing scheme on each interface:
Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?
Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?
Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the web server
Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server
Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the web server
Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the web server
Network Operations
Network Security
A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?
Loopback adapter
Cable tester
Tone generator
Multimeter
Network Operations
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
SSH in tunnel mode
RDP set to console connection
EAP-PEAP
SFTP
Network Security
A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?
Port security
MAC filtering
Network access control
Captive portal
Network Security
A technician is troubleshooting a client's report about poor wireless performance. Using a client monitor, the technician notes the following information:
Which of the following is MOST likely the cause of the issue?
Which of the following is MOST likely the cause of the issue?
Channel overlap
Poor signal
Incorrect power settings
Wrong antenna type
Network Troubleshooting and Tools
A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?
Partial mesh
Ad hoc
Ring
Bus
Network Troubleshooting and Tools
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
DLP
AUP
NDA
SLA
Network Security
A network device compares a computed value of its major software components against a stored value. While the network device is loading, the device halts and alerts the administrator that the values are different. Which of the following is the name of the value in use, and what does this process provide? (Choose two.)
A snapshot
A hash
A password service
A key
Provides authentication
Provides integrity
Provides confidentiality
Provides availability
Network Operations
Network Security
Comments