[Free] 2018(June) Dumps4cert CompTIA RC0-N06 Dumps with VCE and PDF Download 71-80

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released RC0-N06
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Recertification Exam for Continuing Education

Question No: 71 – (Topic 3)

Which of the following is a security benefit gained from setting up a guest wireless network?

  1. Optimized device bandwidth

  2. Isolatedcorporate resources

  3. Smaller ACL changes

  4. Reduced password resets

Answer: B Explanation:

A wireless guest network could be set up so that it has limited access (no access to local resources) but does provide Internet access for guest users. The corporate resources would be inaccessible (isolated) from the guest network.

Question No: 72 – (Topic 3)

A technician needs to install software onto company laptops to protect local running services, from external threats. Which of the following should the technician install and configure on the laptops if the threat is network based?

  1. A cloud-based antivirus system with a heuristic and signature based engine

  2. A network based firewall which blocks all inbound communication

  3. A host-based firewall which allows all outbound communication

  4. A HIDS to inspect both inbound and outbound network communication

Answer: C Explanation:

A host-based firewall is a computer running firewall software that can protect the computer itself. For example, it can prevent incoming connections to the computer and allow outbound communication only.

Question No: 73 – (Topic 3)

Packet analysis reveals multiple GET and POST requests from an internal host to a URL without any response from the server. Which of the following is the BEST explanation that describes this scenario?

  1. Compromised system

  2. Smurf attack

  3. SQL injection attack

  4. Man-in-the-middle

Answer: A Explanation:

As the extra unexplainable traffic comes from an internal host on your network we can assume that this host has been compromised.

If your system has been compromised, somebody is probably using your machine-possibly to scan andfind other machines to compromise

Question No: 74 – (Topic 3)

A technician needs to ensure that new systems are protected from electronic snooping of Radio Frequency emanations. Which of the following standards should be consulted?

  1. DWDM

  2. MIMO

  3. TEMPEST

  4. DOCSIS

Answer: C Explanation:

Tempest was the name of a government project to study the ability to understand the data over a network by listening to the emanations. Tempest rooms are designed to keep emanations contained in that room to increasesecurity of data communications happening there.

Question No: 75 – (Topic 3)

An attacker has connected to an unused VoIP phone port to gain unauthorized access to a network. This is an example of which of the following attacks?

  1. Smurf attack

  2. VLAN hopping

  3. Bluesnarfing

  4. Spear phishing

Answer: B Explanation:

The VoIP phone port can be used to attack a VLAN on the local network.

VLAN hopping is a computer security exploit, a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

Question No: 76 – (Topic 3)

A malicious user floods a switch with frames hoping to redirect traffic to the user#39;s server. Which of the following attacks is the user MOST likely using?

  1. DNS poisoning

  2. ARP poisoning

  3. Reflection

  4. SYN attack

Answer: B Explanation:

Address Resolution Protocol poisoning (ARP poisoning) is a form of attack in which an attacker changes the Media Access Control (MAC) address and attacks an Ethernet LAN by changing the target computer#39;s ARP cache with a forged ARP request and reply packets. This modifies the layer -Ethernet MAC address into the hacker#39;s known MAC address to monitor it. Because the ARP replies are forged, the target computer unintentionally sends the frames to the hacker#39;s computer first instead of sending it to the original destination. As a result, both the user#39;s data and privacy are compromised.

Question No: 77 – (Topic 3)

During a check of the security control measures of the company network assets, a network administrator is explaining the difference between the security controls at the company.

Which of the following would be identified as physical security controls? (Select THREE).

  1. RSA

  2. Passwords

  3. Man traps

  4. Biometrics

  5. Cipher locks

  6. VLANs

  7. 3DES

Answer: C,D,E Explanation:

Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency, or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

C: A mantrap is a mechanical physical security devices for catching poachers and trespassers. They have taken many forms, the most usual being like a large foothold trap, the steel springs being armed with teeth which met in the victim#39;s leg.

D: Biometric authentication is a type of system that relies on the unique biological characteristics of individuals to verify identity for secure accessto electronic systems. Biometric authentication is a physical security device.

E: Cipher locks are used to control access to areas such as airport control towers, computer rooms, corporate offices, embassies, areas within financial institutions, research

and development laboratories, and storage areas holding weapons, controlled substances, etc. Cipher locks are physical security devices.

Question No: 78 – (Topic 3)

A network technician is assisting the company with developing a new business continuity plan. Which of the following would be an appropriate suggestion to add to the plan?

  1. Build redundant links between core devices

  2. Physically secure all network equipment

  3. Maintain up-to-date configuration backups

  4. Perform reoccurring vulnerability scans

Answer: A Explanation:

The business continuity plan focuses on the tasks carried out by an organization to ensure that critical business functions continue to operate during and after a disaster.

By keeping redundant links between core devices critical business services can be kept running if one link is unavailable during a disaster.

Question No: 79 – (Topic 3)

A company has seen an increase in ransomware across the enterprise. Which of the following should be implemented to reduce the occurrences?

  1. ARP inspection

  2. Intrusion detection system

  3. Web content filtering

  4. Port filtering

Answer: C Explanation:

Ransomware is a type ofmalware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.

The best way to avoid ransomware include proactive measures like the following: Don’t click on any URL or open an attachment you are not expecting.

Implement an email content filtering service Install a web content filtering service

Invest in leading end point security software solutions

Question No: 80 – (Topic 3)

A company has decided to update their usage policy to allow employees to surf the web

unrestricted from their work computers. Which of the following actions should the IT security team implement to help protect the network from attack as a result of this new policy?

  1. Install host-based anti-malware software

  2. Implement MAC filtering on all wireless access points

  3. Add an implicit deny to the core router ACL

  4. Block port 80 outboundon the company firewall

  5. Require users to utilize two-factor authentication

Answer: A Explanation:

To protect the computers from employees installing malicious software they download on the internet, antimalware should be run on all systems.

After asingle machine in a company is compromised and is running malicious software (malware), the attacker can then use that single computer to proceed further into the internal network using the compromised host as a pivot point. The malware may have been implemented by an outside attacker or by an inside disgruntled employee.

100% Dumps4cert Free Download!
Download Free Demo:RC0-N06 Demo PDF
100% Dumps4cert Pass Guaranteed!
RC0-N06 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.