N10-008試験無料問題集「CompTIA Network+ Certification 認定」

A technician needs to configure a Linux computer for network monitoring. The technician has the following information:
Linux computer details:

Switch mirror port details:

After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?

解説: (GoShiken メンバーにのみ表示されます)
A company is utilizing multifactor authentication for data center access. Which of the following is the MOST effective security mechanism against physical intrusions due to stolen credentials?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following DNS records maps an alias to a true name?

A technician is configuring a bandwidth-monitoring tool that supports payloads of 1,600 bytes.
Which of the following should the technician configure for this tool?

A false camera is installed outside a building to assist with physical security.
Which of the following is the device assisting?

解説: (GoShiken メンバーにのみ表示されます)
A PC user who is on a local network reports very slow speeds when accessing files on the network server. The user's PC is connecting, but file downloads are very slow when compared to other users' download speeds. The PC's NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?

Which of the following types of attacks can be used to gain credentials by setting up rogue APs with identical corporate SSIDs?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following would be used to adjust resources dynamically for a virtual web server under variable loads?

解説: (GoShiken メンバーにのみ表示されます)
Which of the following attack vectors represents a large number of devices sending access requests to a website, making it unavailable to respond?

A network is secured and is only accessible via TLS and IPSec VPNs. Which of the following would need to be present to allow a user to access network resources on a laptop without logging in to the VPN application?

解説: (GoShiken メンバーにのみ表示されます)
An older web server on a screened subnet is serving unencrypted web traffic. The server is not capable of serving HTTPS traffic directly, but the firewall is capable of doing so. Which of the following should be done to encrypt all traffic coming into the web server from outside the network? (Choose two.)

A network technician is having issues connecting an IoT sensor to the internet. The WLAN settings were entered via a custom command line, and a proper IP address assignment was received on the wireless interface. However, when trying to connect to the internet, only HTTP redirections are being received when data is requested. Which of the following will point to the root cause of the issue?

A network technician is troubleshooting a connection to a web server. The technician is unable to ping the server but is able to verify connectivity to the web service using Telnet. Which of the following protocols is being blocked by the firewall?

A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort?

In which of the following scenarios should a technician use a cross-over cable to provide connectivity?

A company is considering shifting its business to the cloud. The management team is concerned about the availability of the third-party cloud service. Which of the following should the management team consult to determine the promised availability of the cloud provider?

A network technician wants to find the shortest path from one node to every other node in the network. Which of the following algorithms will provide the FASTEST convergence time?

A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?

Which of the following services can provide data storage, hardware options, and scalability to a third-party company that cannot afford new devices?

解説: (GoShiken メンバーにのみ表示されます)
Users report they cannot reach any websites on the internet. An on-site network engineer is able to duplicate the issue on a different PC. The network engineer then tries to ping a website and receives the following message:
Ping request could not find host www.google.com. Please check the name
and try again.
Which of the following is the next step the engineer should take?