N10-005試験無料問題集「CompTIA Network + Certification 認定」

Users are reporting that external web pages load slowly. The network administrator determines that the Internet connection is saturated. Which of the following is BEST used to decrease the impact of web surfing?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following uses a 128-bit addressing scheme?

Which of the following network devices is meant to actively protect against network treats and can disable connections to stop malicious traffic if necessary?

Which of the following are valid hosts for the Private IP Address range 172.16.0.x /23? (Select TWO).

Which of the following are standard fiber cable connector types? (Select TWO).

Which of the following security appliances are used to only identify traffic on individual systems?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is MOST commonly used with a fiber-optic network backbone?

A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following supports faster wireless broadband speeds?

解説: (GoShiken メンバーにのみ表示されます)
An 802.11b wireless network has a maximum data rate of:

A company is experiencing a denial of service attack and wants to identify the source IP
address of the attacker in real time. Which method is the BEST way to accomplish this?

A company has installed a wireless network for visitors to use. They wish to give the visitors easy access to that network. Based on the configurations below, which of the following should the administrator change?
Access Point 1Access Point 2 802.11g802.11b Encryption: WPA2Encryption: WEP Channel: 1Channel: 7 SSID. CompanyWiFiSSID. Visitor

An administrator edits the network firewall configuration. After editing the configuration, the administrator logs the date and time of the edit and why it was performed in the firewall documentation. Which of the following BEST describes these actions?

A customer wants to increase firewall security. Which of the following are common reasons for implementing port security on the firewall? (Select TWO).

解説: (GoShiken メンバーにのみ表示されます)
Which of the following is used to describe trunking VLANs on a network?

A user receives a phone call at home from someone claiming to be from their company's IT help desk. The help desk person wants to verify their username and password to ensure that the user's account has not been compromised. Which of the following attacks has just occurred?

A technician needs to make a web server with a private IP address reachable from the Internet. Which of the following should the technician implement on the company firewall?

A public website using round robin DNS is an example of:

An administrator would like to block all HTTP traffic and allow all HTTPS traffic on the firewall. Using the default port numbers, which of the following should the administrator configure? (Select TWO).

A new SOHO wireless network is set up using two access points with separate SSIDs on the same frequency. However, the users are experiencing intermittent connectivity on both SSIDs. Which of the following is the problem?