[Free] 2018(June) Dumps4cert CompTIA RC0-N06 Dumps with VCE and PDF Download 81-90

By | July 10, 2018

Dumps4cert.com : Latest Dumps with PDF and VCE Files
2018 May CompTIA Official New Released RC0-N06
100% Free Download! 100% Pass Guaranteed!

CompTIA Network Recertification Exam for Continuing Education

Question No: 81 – (Topic 3)

Ann, a network technician, was asked to remove a virus. Issues were found several levels deep within the directory structure. To ensure the virus has not infected the .mp4 files in the directory, she views one of the files and believes it contains illegal material. Which of the following forensics actions should Ann perform?

  1. Erase the files created by the virus

  2. Stop and escalate to the proper authorities

  3. Check the remaining directories for more .mp4 files

  4. Copy the information to a network drive to preserve the evidence

Answer: B Explanation:

Computer forensics is about legal evidence found in computers and digital storage. A plan should includefirst responders securing the area and then escalating to senior management and authorities when required by policy or law.

Question No: 82 – (Topic 3)

The ability to make access decisions based on an examination of Windows registry settings, antivirus software, and AD membership status is an example of which of the following NAC features?

  1. Quarantine network

  2. Persistent agents

  3. Posture assessment

  4. Non-persistent agents

Answer: C Explanation:

Network Admission Control (NAC) can permit or deny access to anetwork based on characteristics of the device seeking admission, rather than just checking user credentials. For example, a client’s OS, Windows Registry settings, AD membership status, and version of antivirus software could be checked against a set of requirements before allowing the client to access a network.

This process of checking a client’s characteristics is called posture assessment.

Question No: 83 – (Topic 3)

A technician wants to securely manage several remote network devices. Which of the following should be implemented to securely manage the devices?

  1. WPA2

  2. IPv6

  3. SNMPv3

  4. RIPv2

Answer: C Explanation:

To manage the remote network devices we need to use a network management protocol. SNMP has become the de facto standard of network management protocols. The security weaknesses of SNMPv1 and SNMPv2c are addressed inSNMPv3.

Question No: 84 – (Topic 3)

A technician needs to secure web traffic for a new e-commerce website. Which of the following will secure traffic between a web browser and a website?

  1. SSL


  3. WPA2

  4. MTU

Answer: A Explanation:

Secure SocketsLayer (SSL) provides cryptography and reliability for upper layers (Layers 5-7) of the OSI model. SSL (and TLS) provide secure web browsing (web traffic) via Hypertext Transfer Protocol Secure (HTTPS).

Question No: 85 – (Topic 3)

A network technician was tasked to respond to a compromised workstation. The technician

documented the scene, took the machine offline, and left the PC under a cubicle overnight. Which of the following steps of incident handling has been incorrectly performed?

  1. Document the scene

  2. Forensics report

  3. Evidence collection

  4. Chain of custody

Answer: D Explanation:

To verify the integrity of data since a security incident occurred, you need to be able to show a chain of custody.

A chain of custody documents who has been in possession of the data (evidence) since a security breach occurred. A well-prepared organization will have process and procedures that are used when an incident occurs.

A plan should include first responders securing the area and then escalating to senior management and authorities when required by policy or law. The chain of custody alsoincludes documentation of the scene, collection of evidence, and maintenance, e- discovery (which is theelectronic aspect of identifying, collecting, and producing electronically stored information), transportation of data, forensics reporting, and a process to preserve all forms of evidence and data when litigation is expected. The preservation of the evidence, data, and details is referred to as legal hold.

Question No: 86 – (Topic 3)

Which of the following technologies is designed to keep systems uptime running in the

event of a disaster?

  1. High availability

  2. Load balancing

  3. Quality of service

  4. Caching engines

Answer: A Explanation:

If a network switch or router stops operating correctly (meaning that a network fault occurs), communication through the network could be disrupted, resulting in a network becoming unavailable to its users. Therefore, network availability, called uptime, is a major design consideration.

Question No: 87 – (Topic 3)

Which of the following physical security controls prevents an attacker from gaining access to a network closet?

  1. CCTVs

  2. Proximity readers

  3. Motion sensors

  4. IP cameras

Answer: B Explanation:

A proximity card is a physical card which used to get access to a physical area such as a network closet.

It is a quot;contactlessquot; smart card which can beread without inserting it into a reader device, as required by earlier magnetic stripe cards such as credit cards and quot;contactquot; type smart cards. The proximity cards are part of the Contactless card technologies. Held near an electronic reader for a momentthey enable the identification of an encoded number.

Note: Physical security is the protection of personnel, hardware, programs, networks, and data from physical circumstances and events that could cause serious losses or damage to an enterprise, agency,or institution. This includes protection from fire, natural disasters, burglary, theft, vandalism, and terrorism.

Question No: 88 – (Topic 3)

Which of the following would be the result of a user physically unplugging a VoIP phone and connecting it into another interface with switch port security enabled as the default setting?

  1. The VoIP phone would request a new phone number from the unified communications server.

  2. The VoIP phone would cause the switch interface, that the user plugged into, to shutdown.

  3. The VoIP phone would be able to receive incoming calls but will not be able to make outgoing calls.

  4. The VoIP phone would request a different configuration from the unified communications server.

Answer: B Explanation:

Without configuring any other specific parameters, the switchport security feature will only permit one MAC address to be learned per switchport (dynamically) and use the shutdown violation mode; this means that if a second MAC address is seen on the switchport the port will be shutdown and put into the err-disabled state.

Question No: 89 – (Topic 3)

A firewall ACL is configured as follows:

  1. Deny Any Trust to Any DMZ eq to TCP port 22

  2. Allow to Any DMZ eq to Any

  3. Allow to Any DMZ eq to TCP ports 80, 443

  4. Deny Any Trust to Any DMZ eq to Any

A technician notices that users in the network are unable to SSH into servers in the DMZ. The company wants to be able to use any protocol, but restrict the rest of the subnet to web browsing only. Reordering the ACL in which of the following manners would meet the company#39;s objectives?

A. 11, 10, 12, 13

B. 12, 10, 11, 13

C. 13, 10, 12, 11

D. 13, 12, 11, 10

Answer: A Explanation:

ACL are processed in TOP DOWN process in routers or switches. This means that when a condition in the ACL is met, all processing is stopped.

We start by allowing any protocol on the subnet:11. Allow to AnyDMZ eq to Any

We then deny any traffic on TCP port 22:10. Deny Any Trust to Any DMZ eq to TCP port 22 We allow browsing (port 80 and 443) on the subnet:Allow to Any DMZ eq to TCP ports 80, 443

Finally we deny all other traffic:13. Deny Any Trust to Any DMZ eq to Any

Question No: 90 – (Topic 3)

A network technician has set up an FTP server for the company to distribute software updates for their products. Each vendor is provided with a unique username and password for security. Several vendors have discovered a virus in one of the security updates. The company tested all files before uploading them but retested the file and found the virus.

Which of the following could the technician do for vendors to validate the proper security patch?

  1. Use TFTP for tested and secure downloads

  2. Require biometric authentication for patch updates

  3. Provide an MD5 hashfor each file

  4. Implement a RADIUS authentication

Answer: C Explanation:

If we put an MD5 has for each file we can see if the file has been changed or not.

MD5 is an algorithm that is used to verify data integrity through the creation of a 128-bit message digest from data input (which may be a message of any length) that is claimed to be as unique to that specific data as a fingerprint is to the specific individual.

100% Dumps4cert Free Download!
Download Free Demo:RC0-N06 Demo PDF
100% Dumps4cert Pass Guaranteed!
RC0-N06 Dumps

Dumps4cert ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.