[Free] 2018(June) Dumps4cert CompTIA N10-006 Dumps with VCE and PDF Download 41-50

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released N10-006
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Certification

Question No: 41 – (Topic 2)

A network technician must create a wireless link between two buildings in an office park utilizing the 802.11ac standard. The antenna chosen must have a small physical footprint and minimal weight as it will be mounted on the outside of the building. Which of the following antenna types is BEST suited for this solution?

  1. Yagi

  2. Omni-directional

  3. Parabolic

  4. Patch

Answer: D Explanation:

A patch antenna is a type of radio antenna with a low profile, which can be mounted on a flat surface. A patch antenna is typically mounted to a wall or a mast and provides coverage in a limited angle pattern.

Question No: 42 – (Topic 2)

After a recent breach, the security technician decides the company needs to analyze and aggregate its security logs. Which of the following systems should be used?

  1. Event log

  2. Syslog

  3. SIEM

  4. SNMP

Answer: C Explanation:

Using a Security information and event management (SIEM) product, the security logs can be analyzed andaggregated.

SIEM is a term for software products and services combining security information management (SIM) and security event management (SEM). SIEM technology provides real-time analysis of security alerts generated by network hardware and applications. SIEM

is sold as software, appliances or managed services, and are also used to log security data and generate reports for compliance purposes.

SIEM capabilities include Data aggregation; Log management aggregates data from many sources, including network, security, servers, databases, applications, providing the ability

to consolidate monitored data to help avoid missing crucial events.

Question No: 43 – (Topic 2)

The RAID controller on a server failed and was replaced with a different brand. Which of the following will be needed after the server has been rebuilt and joined to the domain?

  1. Vendor documentation

  2. Recent backups

  3. Physical IP address

  4. Physical network diagram

Answer: B Explanation:

If the RAID controller fails and is replaced with a RAID controller with a different brand the RAID will break. We would have to rebuild a new RAID disk, access and restore the most recent backup to the new RAID disk.

Note: RAID controlleris a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in a computer or storage array so they work as a logical unit. In hardware-based RAID, a physical controller is used to manage the RAID array.

Question No: 44 – (Topic 2)

Multiple students within a networking lab are required to simultaneously access a single switch remotely. The administrator checks and confirms that the switch can be accessed using the console, but currently only one student can log in at a time. Which of the following should be done to correct this issue?

  1. Increase installed memory and install a larger flash module.

  2. Increase the number of VLANs configured on the switch.

  3. Decrease the number of VLANs configured on the switch.

  4. Increase the number of virtual terminals available.

Answer: D Explanation:

You can set a limit of how many virtual terminals that can simultaneously be connected to a switch. Here the limit is set to one, and we should increase it.

For a Cisco network device:

You can use virtual terminal lines to connect to your Cisco NX-OS device, for example a switch. Secure Shell (SSH) and Telnet create virtual terminal sessions. You can configure an inactive session timeout and a maximum sessions limit for virtual terminals.

session-limit sessions Example:

switch(config-line)# session-limit 10

Configures the maximum number of virtual sessions for the Cisco NX-OS device. The range is from 1 to 64.

Question No: 45 – (Topic 2)

A technician is setting up a new network and wants to create redundant paths through the network. Which of the following should be implemented to prevent performance degradation?

  1. Port mirroring

  2. Spanning tree

  3. ARP inspection

  4. VLAN

Answer: B Explanation:

The Spanning Tree Protocol (STP) is a network protocol that ensures a loop-free topology for any bridged Ethernet local area network. The basic function of STP is to prevent bridge loops and the broadcast radiation that results from them. Spanning tree also allows a network design to include spare (redundant) links to provide automatic backup paths if an active link fails, without the danger of bridge loops, or the need for manual enabling/disabling of these backup links.

Question No: 46 – (Topic 2)

A network technician is diligent about maintaining all system servers#39; at the most current service pack level available. After performing upgrades, users experience issues with server-based applications. Which of the following should be used to prevent issues in the future?

  1. Configure an automated patching server

  2. Virtualize the servers and take daily snapshots

  3. Configure a honeypot for application testing

  4. Configure a test lab for updates

Answer: D Explanation:

To prevent the service pack issues make sure, before going ahead and applying a new Service Pack in your production environment, to validate them in a test/lab environment first.

Question No: 47 – (Topic 2)

A company is experiencing very slow network speeds of 54Mbps. A technician has been hired to perform an assessment on the existing wireless network. The technician has recommended an 802.11n network infrastructure. Which of the following allows 802.11n to reach higher speeds?

  1. MU-MIMO

  2. LWAPP

  3. PoE

  4. MIMO

Answer: D Explanation:

One way 802.11n achieves superior throughput is through the use of a technology called multiple input, multiple output (MIMO). MIMO uses multiple antennas for transmission andreception.

Question No: 48 – (Topic 2)

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item?

  1. Ensure patches are deployed

  2. Install an IDS on the network

  3. Configure the firewall to block traffic on port 443

  4. Implement a VPN for employees

Answer: A Explanation:

As vulnerabilities are discovered, the vendors of the operating systems or applications

often respond by releasing a patch.A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be able to read SSL traffic, in a piece of software.

A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

Question No: 49 – (Topic 2)

After a company rolls out software updates, Ann, a lab researcher, is no longer able to use lab equipment connected to her PC. The technician contacts the vendor and determines there is an incompatibility with the latest IO drivers. Which of the following should the technician perform so that Ann can get back to work as quickly as possible?

  1. Reformat and install the compatible drivers.

  2. Reset Ann#39;s equipment configuration from a backup.

  3. Downgrade the PC to a working patch level.

  4. Restore Ann#39;s PC to the last known good configuration.

  5. Roll back the drivers to the previous version.

Answer: E Explanation:

By rolling back the drivers Ann would be able touse her lab equipment again.

To roll back a driver in Windows means to return the driver to the version that was last installed for the device. Rolling back a driver is an easy way to return a driver to a working version when a driver update fails to fix aproblem or maybe even causes a new problem. Think of rolling back a driver as a quick and easy way to uninstall the latest driver and then

reinstall the previous one, all automatically.

Question No: 50 – (Topic 2)

Company policies require that all network infrastructure devices send system level information to a centralized server. Which of the following should be implemented to ensure the network administrator can review device error information from one central location?

  1. TACACS server

  2. Single sign-on

  3. SYSLOG server

  4. Wi-Fi analyzer

Answer: C Explanation:

Syslog is a protocol designed to send log entries generated by a device or process called a facility across an IP network to a message collector, called a syslog server. A syslog message consists of anerror code and the severity of the error. A syslog server would enable the network administrator to view device error information from a central location.

100% Dumps4cert Free Download!
Download Free Demo:N10-006 Demo PDF
100% Dumps4cert Pass Guaranteed!
Download 2018 Dumps4cert N10-006 Full Exam PDF and VCE

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.