[Free] 2018(June) Dumps4cert CompTIA CN0-201 Dumps with VCE and PDF Download 181-190

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released CN0-201
100% Free Download! 100% Pass Guaranteed!

CompTIA CTP Certification Exam

Question No: 181 – (Topic 2)

John works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. The network has ten Windows 2000 servers and 300 Windows 2000 Professional client computers. The network uses a T3 line to connect to the Internet. The company also has 1,000 external employees who need to connect to the company from remote locations. John wants to implement a remote access policy for external users, which will make access highly available and most secure.

He wants to accomplish the following goals:

l No data traffic should be carried as clear text.

l At least 200 remote users should be able to access the network simultaneously all the time.

What will he do to accomplish these tasks?

Each correct answer represents a part of the solution. Choose three.

  1. Configure each VPN server to support 150 PPTP connections.

  2. Configure the client computers to use MS-CHAP.

  3. Configure the client computers to use Password Authentication Protocol (PAP).

  4. Install two virtual private networking (VPN) servers at the main office.

Answer: A,B,D

Question No: 182 – (Topic 2)

Which of the following is a set of networking protocols that permits networked devices to seamlessly discover each others presence on the network?

  1. XPnP

  2. STUN

  3. UPnP

  4. CoS

Answer: C

Question No: 183 – (Topic 2)

Which of the following network configuration utilities is used to display information about current TCP/IP connections?

  1. ping

  2. netstat

  3. nbtstat

  4. nslookup

Answer: B

Question No: 184 – (Topic 2)

Which of the following codecs is often considered as the default codec for H.323?

A. G.724 B. G.722 C. G.711 D. G.726

Answer: C

Question No: 185 – (Topic 2)

Session Border Controllers (SBCs) commonly maintain full session state. Which of the following functions are offered by a Session Border Controller?

Each correct answer represents a complete solution. Choose all that apply.

  1. Connectivity

  2. Statistics

  3. Quality of service

  4. Regulatory

  5. Availability

  6. Security

Answer: A,B,C,D,F

Question No: 186 – (Topic 2)

Which of the following statements are true about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.

  1. Session hijacking is an attack in which an attacker takes over the session, and the valid user#39;s session is disconnected.

  2. Session hijacking is an attack in which an attacker takes over the session, and the valid user#39;s session is not disconnected.

  3. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.

  4. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.

Answer: B,C

Question No: 187 – (Topic 2)

Which of the following commands are valid only under the POTS dial peers? Each correct answer represents a complete solution. Choose all that apply.

  1. Num-exp

  2. Forward digits

  3. No digit-strip

  4. Prefix

  5. Preference

Answer: B,C,D

Question No: 188 – (Topic 2)

Which of the following gateway interfaces connects to the standard station port of a PBX?

  1. MCU

  2. FXS

  3. FXO

  4. Eamp;M

Answer: C

Question No: 189 – (Topic 2)

Which of the following provide an quot;always onquot; Internet access service when connecting to an ISP?

Each correct answer represents a complete solution. Choose two.

  1. Analog modem

  2. DSL

  3. Cable modem

  4. Digital modem

Answer: B,C

Question No: 190 – (Topic 2)

Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?

Each correct answer represents a complete solution. Choose all that apply.

  1. E-mail spoofing

  2. Shoulder surfing

  3. Port scan attack

  4. Denial-of-Service (DoS) attack

Answer: A,B

100% Dumps4cert Free Download!
Download Free Demo:CN0-201 Demo PDF
100% Dumps4cert Pass Guaranteed!
CN0-201 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.