CompTIA Network+ N10-008 – Question052

An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext
to the password prompt. Which of the following attack types BEST describes this action?


A.
Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack

Correct Answer: D

CompTIA Network+ N10-008 – Question051

A network administrator is designing a new datacenter in a different region that will need to communicate to the
old datacenter with a secure connection. Which of the following access methods would provide the BEST
security for this new datacenter?


A.
Virtual network computing
B. Secure Socket Shell
C. In-band connection
D. Site-to-site VPN

Correct Answer: D

CompTIA Network+ N10-008 – Question050

A network administrator discovers that users in an adjacent building are connecting to the company's guest
wireless network to download inappropriate material. Which of the following can the administrator do to MOST
easily mitigate this issue?


A.
Reduce the wireless power levels
B. Adjust the wireless channels
C. Enable wireless client isolation
D. Enable wireless port security

Correct Answer: A

CompTIA Network+ N10-008 – Question049

A network administrator is implementing OSPF on all of a company's network devices. Which of the following
will MOST likely replace all the company's hubs?


A.
A Layer 3 switch
B. A proxy server
C. A NGFW
D. A WLAN controller

Correct Answer: A

CompTIA Network+ N10-008 – Question048

A network device is configured to send critical events to a syslog server; however, the following alerts are not
being received:
Severity 5 LINK-UPDOWN: Interface 1/1, changed state to down
Severity 5 LINK-UPDOWN: Interface 1/3, changed state to down
Which of the following describes the reason why the events are not being received?


A.
The network device is not configured to log that level to the syslog server
B. The network device was down and could not send the event
C. The syslog server is not compatible with the network device
D. The syslog server did not have the correct MIB loaded to receive the message

Correct Answer: A

CompTIA Network+ N10-008 – Question047

A technician is deploying a new switch model and would like to add it to the existing network monitoring
software. The technician wants to know what metrics can be gathered from a given switch. Which of the
following should the technician utilize for the switch?


A.
MIB
B. Trap
C. Syslog
D. Audit log

Correct Answer: A