Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

N10-008 Exam Dumps - CompTIA Network+ Exam

Go to page:
Question # 121

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 122

A technician is installing a high-density wireless network and wants to use an available frequency that supports the maximum number of channels to reduce interference. Which of the following standard 802.11 frequency ranges should the technician look for while reviewing WAP specifications?

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

900MHz

Full Access
Question # 123

A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?

A.

Extended service set

B.

Basic service set

C.

Unified service set

D.

Independent basic service set

Full Access
Question # 124

A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue?

A.

Audit logs

B.

CPU utilization

C.

CRC errors

D.

Jitter

Full Access
Question # 125

The network administrator is informed that a user’s email password is frequently hacked by brute-force programs. Which of the following policies should the network administrator implements to BEST mitigate this issue? (Choose two.)

A.

Captive portal

B.

Two-factor authentication

C.

Complex passwords

D.

Geofencing

E.

Role-based access

F.

Explicit deny

Full Access
Question # 126

A technician is configuring a network switch to be used in a publicly accessible location. Which of the following should the technician configure on the switch to prevent unintended connections?

A.

DHCP snooping

B.

Geofencing

C.

Port security

D.

Secure SNMP

Full Access
Question # 127

Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?

A.

Motion detection

B.

Access control vestibules

C.

Smart lockers

D.

Cameras

Full Access
Question # 128

Which of the following would need to be configured to ensure a device with a specific MAC address is always assigned the same IP address from DHCP?

A.

Scope options

B.

Reservation

C.

Dynamic assignment

D.

Exclusion

E.

Static assignment

Full Access
Go to page: