PrepAway - Latest Free Exam Questions & Answers

Which of the following is used to authenticate remote workers who connect from offsite?

Which of the following is used to authenticate remote workers who connect from offsite? (Select
TWO).

PrepAway - Latest Free Exam Questions & Answers

A.
OSPF

B.
VTP trunking

C.
Virtual PBX

D.
RADIUS

E.
802.1x

Explanation:

6 Comments on “Which of the following is used to authenticate remote workers who connect from offsite?

  1. cedric mcdonnell says:

    2017 timesaving comprehensive guides for N10-006 exam: Using latest released N10-006 exam questions, quickly pass N10-006 exam 100%! Following questions and answers are all new published by CompTIA Official Exam Center!

    QUESTION 526
    Drag and Drop Question
    Under each network device, drag and drop the associated broadcast and/or collison description.
    Objects may be used multiple times, as needed.

    Answer:

    QUESTION 527
    A network administrator has been assigned the 192.168.2.64/26 network and assigns the following computer’s IP addresses:

    192.168.2.70
    192.168.2.100
    192.168.2.125
    192.168.2.130

    When the administrator tries to ping the other computers from 192.168.2.130, an ECHO REPLY is not received. Which of the following must the network administrator do?

    A. Change the IP of 192.168.2.130 to 192.168.1.128.
    B. Change the IP of 192.168.2.130 to 192.168.2.126.
    C. Change the default gateway of 192.168.2.130 accordingly.
    D. Reconfigure the switch for the right VLAN.

    Answer: B

    QUESTION 528
    Which of the following authentication solutions use tickets that include valid credentials to access additional network resources?

    A. Kerberos
    B. RADIUS
    C. Multi-factor authentication
    D. TACACS+

    Answer: A

    QUESTION 529
    Which of the following protocols is used to provide secure authentication and encryption over non- secure networks?

    A. RADIUS
    B. TLS
    C. PPTP
    D. HTTP

    Answer: B

    QUESTION 530
    Which of the following would be used in a firewall to block incoming TCP packets that are not from established connections?

    A. Access control lists
    B. Port address translation
    C. Blocking unauthorized ports
    D. Stateful inspection

    Answer: D

    QUESTION 531
    Which of the following has the LEAST amount of collisions in a domain?

    A. Bridge
    B. Hub
    C. Repeater
    D. Switch

    Answer: D

    QUESTION 532
    Which of the following is used to embed the MAC address of an Ethernet interface in a corresponding IPv6 address?

    A. Subnet
    B. IANA prefix
    C. EUI-64
    D. Site-local

    Answer: C

    QUESTION 533
    Which of the following would be used to place extranet servers in a separate subnet for security purposes?

    A. VPN
    B. NAT
    C. DMZ
    D. IDS

    Answer: C

    QUESTION 534
    Which of the following WAN technologies has synchronous up/down speeds?

    A. T1
    B. ADSL
    C. Satellite
    D. Cable broadband

    Answer: A

    QUESTION 535
    Which of the following specifications would Sara, an administrator, implement as a network access control?

    A. 802.1q
    B. 802.3
    C. 802.11n
    D. 802.1x

    Answer: D

    QUESTION 536
    Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails?

    A. Whaling
    B. Impersonation
    C. Privilege escalation
    D. Spear phishing

    Answer: A

    QUESTION 537
    Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities?

    A. XSS
    B. SQL injection
    C. Directory traversal
    D. Packet sniffing

    Answer: D

    QUESTION 538
    Which of the following provides the MOST protection against zero day attacks via email attachments?

    A. Anti-spam
    B. Anti-virus
    C. Host-based firewalls
    D. Patch management

    Answer: A

    QUESTION 539
    Which of the following access controls enforces permissions based on data labeling at specific levels?

    A. Mandatory access control
    B. Separation of duties access control
    C. Discretionary access control
    D. Role based access control

    Answer: A

    QUESTION 540
    A username provides which of the following?

    A. Biometrics
    B. Identification
    C. Authorization
    D. Authentication

    Answer: B

    QUESTION 542
    Use of group accounts should be minimized to ensure which of the following?

    A. Password security
    B. Regular auditing
    C. Baseline management
    D. Individual accountability

    Answer: D

    QUESTION 543
    Privilege creep among long-term employees can be mitigated by which of the following procedures?

    A. User permission reviews
    B. Mandatory vacations
    C. Separation of duties
    D. Job function rotation

    Answer: A

    QUESTION 544
    Which of the following wireless standards is capable of ONLY operating on 5.8GHz?

    A. 802.11a
    B. 802.11b
    C. 802.11g
    D. 802.11n

    Answer: A

    QUESTION 545
    Which of the following protocols are used to connect devices in a secure manner? (Select TWO).

    A. TELNET
    B. SSH
    C. RDP
    D. HTTP
    E. DNS
    F. FTP

    Answer: BC

    QUESTION 546
    Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?

    A. RDP
    B. SSL VPN
    C. ISAKMP
    D. TLS 2.0

    Answer: B

    QUESTION 547
    Which of the following is based ENTIRELY on using ICMP packets?

    A. Social engineering
    B. NMAP
    C. Buffer overflow attack
    D. Smurf attack

    Answer: D

    QUESTION 548
    Which of the following could be used to stop unknown threats?

    A. DMZ
    B. Signature based IPS
    C. Behavior based IPS
    D. Honeypots

    Answer: C

    QUESTION 549
    Which of the following describes a DNS server?

    A. Translates an IP address to a name
    B. Caches commonly viewed web pages
    C. Assigns IP addresses to network devices
    D. Provides port security for a network

    Answer: A

    QUESTION 550
    ……

    I have uploaded all the real questions of N10-006 exam to my Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDVzI0bUdJdU1ESkk
    Welcome to download them freely!




    0



    0

Leave a Reply