[Free] 2018(June) Dumps4cert CompTIA RC0-N06 Dumps with VCE and PDF Download 61-70

By | July 10, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released RC0-N06
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Recertification Exam for Continuing Education

Question No: 61 – (Topic 2)

An outside organization has completed a penetration test for a company. One of the items on the report is reflecting the ability to read SSL traffic from the web server. Which of the following is the MOST likely mitigation for this reported item?

  1. Ensure patches are deployed

  2. Install an IDS on the network

  3. Configure the firewall to block traffic on port 443

  4. Implement a VPN for employees

Answer: A Explanation:

As vulnerabilities are discovered, the vendors of the operating systems or applications often respond by releasing a patch.A patch is designed to correct a known bug or fix a known vulnerability, such as in this case to be able to read SSL traffic, in a piece of software.

A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

Question No: 62 – (Topic 2)

Which of the following protocols must be implemented in order for two switches to share VLAN information?

  1. VTP

  2. MPLS

  3. STP

  4. PPTP

Answer: A Explanation:

The VLAN Trunking Protocol (VTP) allows a VLAN created on one switch to be propagated to other switches in a group of switches (that is, a VTP domain).

Question No: 63 – (Topic 2)

A technician would like to track the improvement of the network infrastructure after upgrades. Which of the following should the technician implement to have an accurate comparison?

  1. Regression test

  2. Speed test

  3. Baseline

  4. Statement of work

Answer: C Explanation:

In networking, baseline can refer to the standard level of performance ofa certain device or to the normal operating capacity for your whole network. High-quality documentation should include a baseline for network performance, because you and your client need to know what “normal” looks like in order to detect problems beforethey develop into disasters.

A network baseline delimits the amount of available bandwidth available and when. For networks and networked devices, baselines include information about four key components:

Processor Memory

Hard-disk (or other storage) subsystem Network adapter or subsystem

Question No: 64 – (Topic 2)

A network technician receives the following alert from a network device: quot;High utilizations threshold exceeded on gi1/0/24 : current value 9413587.54quot;

Which of the following is being monitored to trigger the alarm?

  1. Speed and duplex mismatch

  2. Wireless channel utilization

  3. Network device CPU

  4. Network device memory

  5. Interface link status

Answer: E Explanation:

This is an error message that indicates that threshold of high utilization of network interface, in this case interfacegi1/0/24, has been exceeded. The message has been triggered on the interface link status.

Note: gi1/0 would be a gigabyte interface.

Question No: 65 – (Topic 2)

A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company#39;s encryption to become unsecure. Which of the following would be required to resolve the exploit?

  1. Utilize a FTP service

  2. Install recommended updates

  3. Send all log files through SMTP

  4. Configure the firewall to block port 22

Answer: B


If the encryption is unsecure then we must look forencryption software updates or patches. If they are available we must install them.

As vulnerabilities are discovered, the vendors of the operating systems or applications often respond by releasing a patch. A patch is designed to correct a known bug or fix a known vulnerability in a piece of software.

A patch differs from an update, which, in addition to fixing a known bug or vulnerability, adds one or more features to the software being updated.

Question No: 66 – (Topic 2)

Network segmentation provides which of the following benefits?

  1. Security through isolation

  2. Link aggregation

  3. Packet flooding through all ports

  4. High availability through redundancy

Answer: A Explanation:

Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment. Advantages of such splitting are primarily for boosting performance and improving security through isolation. Advantages of network segmentation:

Improved security: Broadcasts will be contained to local network. Internal network structure will not be visible from outside

Reduced congestion: Improved performance is achieved because on a segmented network there are fewer hosts per subnetwork, thus minimizing local traffic

Containing network problems: Limiting the effect of local failures on other parts of network

Question No: 67 – (Topic 2)

An administrator reassigns a laptop to a different user in the company. Upon delivering the laptop to the new user, the administrator documents the new location, the user of the device and when the device was reassigned. Which of the following BEST describes these actions?

  1. Network map

  2. Asset management

  3. Change management

  4. Baselines

Answer: B Explanation:

Documenting the location, the user of the device and the date of the reassignment would be part of the asset management.

The best way to keep track of your computers and their configurations is to document them yourself. Large enterprise networks typically assign their own identification numbers to their computers and other hardware purchases as part of an asset management process that controls the entire life cycle of each device, from recognition of a need to retirement or disposal.

Question No: 68 – (Topic 2)

The administrator#39;s network has OSPF for the internal routing protocol. One port going out to the Internet is congested. The data is going out to the Internet, but queues up before sending. Which of the following would resolve this issue?


Fast Ethernet 0 is up, line protocol is up Int ip address is

MTU 1500 bytes, BW10000 kbit, DLY 100 usec Reliability 255/255, Tx load 1/255, Rx load 1/255 Encapsulation ospf, loopback not set

Keep alive 10

Half duplex, 100Mb/s, 100 Base Tx/Fx Received 1052993 broadcasts

0 input errors

983881 packets output, 768588 bytes

0 output errors, 0 collisions, 0 resets

  1. Set the loopback address

  2. Change the IP address

  3. Change the slash notation

  4. Change duplex to full

Answer: D Explanation:

From the output we see that the half-duplex is configured. This would not use the full capacity of ports on the network. By changing to full duplex the throughput would be doubled.

Note: All communications are either half-duplex or full-duplex. During half-duplex communication, a device can either send communication or receive communication, but not both at the same time. In full-duplex communication, both devices can send and receive communication at the same time. This means that the effective throughput is doubled and communication is much more efficient.

Topic 3, Network security

Question No: 69 – (Topic 3)

Which of the following concepts are MOST important for a company#39;s long term health in the event of a disaster? (Select TWO).

  1. Redundancy

  2. Implementing acceptable use policy

  3. Offsite backups

  4. Uninterruptable power supplies

  5. Vulnerability scanning

Answer: A,C Explanation:

In case of disaster you must protect yourdata. Some of the most common strategies for data protection include:

backups made to tape and sent off-site at regular intervals

backups made to disk on-site and automatically copied to off-site disk, or made directly to off-site disk

the use of high availability systems which keep both the data and system replicated off-site (making the main site redundant), enabling continuous access to systems and data, even after a disaster.

Question No: 70 – (Topic 3)

A technician is setting up a computer lab. Computers on the same subnet need to communicate with each other using peer to peer communication. Which of the following would the technician MOST likely configure?

  1. Hardware firewall

  2. Proxy server

  3. Software firewall

  4. GRE tunneling

Answer: C Explanation:

A host-based firewall is a computer running firewall softwarethat can protect the computer itself. A software firewall would be the most cost effective in a lab scenario.

100% Dumps4cert Free Download!
Download Free Demo:RC0-N06 Demo PDF
100% Dumps4cert Pass Guaranteed!
RC0-N06 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.