[2017-New-Dumps]Exam Pass 100%!CompTIA N10-006 Dumps and N10-006 PDF VCE Dumps 1438q Instant Download[31-40]
2017/New N10-006: CompTIA Network+ Certification Exam Questions Updated Today!
1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com: http://www.braindump2go.com/n10-006.html
2.|2017/New N10-006 Exam Questions & Answers: https://1drv.ms/f/s!AvI7wzKf6QBjgWim_TfUZBipTeqP QUESTION 31 A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used? A. Packet sniffer B. Stateless firewall C. Packet filter D. Stateful firewall Answer: D Explanation: Stateful firewall keeps track of the state of network connections (such asTCP streams, UDP communication) traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections. Only packets matching a known active connection will be allowed by the firewall; others will be rejected. QUESTION 32 In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n? A. MIMO, DSSS B. MIMO, OFDM C. CSMA, DSSS D. CSMA, CDMA Answer: B Explanation: 802.11n builds upon previous 802.11 standards by adding multiple-input multiple- output (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level) QUESTION 33 A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality? A. RADIUS B. Single sign on C. Multifactor authentication D. Two-factor authentication Answer: B Explanation: Single sign-on (SSO)is a session/user authentication process that permits a user to enter one name and password in order to access multiple applications. The process authenticates the user for all the applications they have been given rights to and eliminates further prompts when they switch applications during a particular session. QUESTION 34 A strong network firewall would likely support which of the following security features for controlling access? (Select TWO). A. War driving B. War chalking C. MAC filtering D. FTP bouncing E. Port filtering Answer: CE Explanation: MAC filtering set the security level at layer 2 and port filtering will set the security level on layer 4 so by filtering the traffic on both layers our network will get secure. QUESTION 35 A CAT5e network cable run needs to be installed over fluorescent lighting arrays in an office building. Which of the following cable types would be BEST suited for such an installation? A. UTP B. Plenum C. Coaxial D. STP Answer: D Explanation: Shielded twisted pair is a special kind of copper telephone wiring used in some business installations. An outer covering or shield is added to the ordinary twisted pair telephone wires; the shield functions as a ground. Twisted pair is the ordinary copper wire that connects home and many business computers to the telephone company. To reduce crosstalk or electromagnetic induction between pairs of wires, two insulated copper wires are twisted around each other. Each signal on twisted pair requires both wires QUESTION 36 Which of the following wireless standards provide speeds up to 150Mbps? A. 802.11a B. 802.11b C. 802.11g D. 802.11n Answer: D Explanation: 802.11n builds upon previous 802.11 standards by adding multiple-input multiple- output (MIMO). The additional transmitter and receiver antennas allow for increased data throughput through spatial multiplexing and increased range by exploiting the spatial diversity through coding schemes like Alamouti coding. The speed is 150 Mbit/s (even 250 Mbit/s in PHY level) QUESTION 37 Which of the following defines a rack located in an office building between the main rack and other office equipment? A. DSU B. MDF C. CSU D. IDF Answer: D Explanation: An intermediate distribution frame (IDF) is a distribution frame in a central office or customer premises, which cross-connects the user cable media to individual user line circuits and may serve as a distribution point for multipair cables from the main distribution frame (MDF) or combined distribution frame (CDF) to individual cables connected to equipment in areas remote from these frames. IDFs are used for telephone exchange central office, customer-premise equipment, wide area network (WAN), and local area network (LAN) environments, among others. QUESTION 38 Which of the following connectors is usable in SFP modules? A. ST B. LC C. LX D. SX Answer: B Explanation: LC connector is used in SFP modules. QUESTION 39 A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering? A. CAT5e connection between offices via the patch panel located in building's communication closet. B. CAT5e cable run through ceiling in the public space between offices. C. VPN between routers located in each office space. D. A WEP encrypted wireless bridge with directional antennae between offices. Answer: C Explanation: A VPN connection across the Internet is similar to a wide area network (WAN) link between the sites. From a user perspective, the extended network resources are accessed in the same way as resources available from the private network. QUESTION 40 Which of the following would MOST likely be used by a network administrator to test DNS resolution? A. dig B. ipconfig C. netstat D. nbtstat Answer: A Explanation: The commanddigis a tool for querying DNS nameservers for information about host addresses, mail exchanges, nameservers, and related information. This tool can be used from any Linux (Unix) or Macintosh OS X operating system. The most typical use of dig is to simply query a single host.
!!!RECOMMEND!!! 1.|1.|2017/New N10-006 Exam Dumps (PDF & VCE) 1438Q&As Download from Braindump2go.com: http://www.braindump2go.com/n10-006.html
2.|2017/New N10-006 Study Guide:
YouTube Video: YouTube.com/watch?v=wB4oZ7gOluM
|