PrepAway - Latest Free Exam Questions & Answers

Category: N10-006 (v.6)

Briefing N10-006: Network+ Certification (update January 28th, 2018)

The scope of activity as described in the statement of …

A project lead is reviewing the statement of work for an upcoming project that is focused on identifying potential weaknesses in the organization’s internal and external network infrastructure. As part of the project, a team of external contractors will attempt to employ various attacks against the organization. The statement of work specifically addresses the utilization of an automated tool to probe network resources in an attempt to develop logical diagrams indication weaknesses in the infrastructure.
The scope of activity as described in the statement of work is an example of:

Which of the following should the company do to reduce …

A network technician has received reports of an Internet-based application that has stopped functioning.
Employees reported that after updating the Internet browsers, the application began to fail. Many users rolled back the update, but this did not correct problem.
Which of the following should the company do to reduce this type of action from affecting the network?

Which of the following is the most likely cause of this…

A technician receives a report that a user’s workstation is experiencing no network connectivity. The technician investigates and notices the patch cable running from the back of the user’s VoIP phone is routed directly under the rolling chair and has been smashes flat over time.
Which of the following is the most likely cause of this issue?

which of the following scenarios?

An engineer is reviewing network logs on a management switch and discovers that, compared to previous reports, a large amount of traffic is coming from a particular node. Upon further investigation, the engineer determines traffic coming from the port in question is using points that indicate NAT is occurring somewhere downstream from that point. After conferring with another network manager, the team determines a user has added an unauthorized SOHO WLAN router to the network. Among the vulnerabilities that could result fromsuch an action is the possibility of the user inadvertently connecting the LAN interface of the SOHO router into the LAN port coming from the corporate network.
This configuration would MOST likely result in which of the following scenarios?


Page 36 of 74« First...102030...3435363738...506070...Last »