A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for the websites but an incorrect IP address was revealed when the technician
used ping on the user's PC After checking the is setting, the technician found the DNS server address was incorrect.
Which of the following describes the issue?
A. Rogue DHCP server
B. Misconfigured HSRP
C. DNS poisoning
D. Exhausted IP scope
Correct Answer: C
DNS poisoning is a type of attack that modifies the DNS records of a domain name to point to a malicious IP address instead of the legitimate one. This can result in users being directed to cloned websites that are stealing credentials, even if
they enter the correct URL for the website. The incorrect DNS server address on the user's PC could be a sign of DNS poisoning, as the attacker could have compromised the DNS server or spoofed its response to redirect the user's queries.
An IT officer is installing a new WAP. Which of the following must the officer change to conned users securely to the WAP?
A. AES encryption
B. Channel to the highest frequency within the band
C. TKIP encryption protocol
D. Dynamic selection of the frequency
Correct Answer: A
To connect users securely to the new WAP, the IT officer must change the encryption protocol to AES.
WAP (Wireless Access Point) provides wireless connectivity to devices in a network. Security is essential for wireless networks as wireless signals can be intercepted by unauthorized parties. Therefore, encryption is required to secure wireless communications. There are two encryption protocols used in wireless networks, which are TKIP (Temporal Key Integrity Protocol) and AES (Advanced Encryption Standard). AES is considered more secure than TKIP and is recommended for use.
The frequency channel and selection are essential to ensure the performance of the wireless network. The highest frequency within the band is not always the best choice for a particular location, as other factors like interference and congestion can affect performance. Dynamic frequency selection can help in selecting the optimal frequency to use. However, it is not related to securing the wireless network.
Question 763:
A network technician needs to correlate security events to analyze a suspected intrusion. Which of the following should the technician use?
A. SNMP
B. Log review
C. Vulnerability scanning
D. SIEM
Correct Answer: D
SIEM stands for Security Information and Event Management, which is a tool that collects, analyzes, and correlates data from various network devices and sources to provide alerts and reports on security incidents and events. A network technician can use SIEM to correlate security events to analyze a suspected intrusion, as SIEM can help identify the source, target, method, and impact of an attack, as well as provide recommendations for remediation. References: https://www.comptia.org/blog/what-is-siem
Question 764:
A small, family-run business uses a single SOHO router to provide Internet and WiFi to its employees At the start of a new week, employees come in and find their usual WiFi network is no longer available, and there is a new wireless network to which they cannot connect. Given that information, which of the following should have been done to avoid this situation'
A. The device firmware should have been kept current.
B. Unsecure protocols should have been disabled.
C. Parental controls should have been enabled
D. The default credentials should have been changed
Correct Answer: D
The default credentials are the username and password that come with a device or service when it is first installed or configured. They are often easy to guess or find online, which makes them vulnerable to unauthorized access or attacks.
The default credentials should be changed to something unique and strong as soon as possible to avoid this situation. If the default credentials were not changed, someone could have accessed the SOHO router and changed the WiFi
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?
A. Enable a management access list
B. Disable access to unnecessary services.
C. Configure a stronger password for access
D. Disable access to remote management
E. Use an out-of-band access method.
Correct Answer: A
Using an out-of-band access method is the best way to prevent unauthorized access to the legacy switches that do not support cryptographic functions. Out-of-band access is a method of accessing a network device through a dedicated channel that is separate from the main network traffic. Out-of-band access can use physical connections such as serial console ports or dial-up modems, or logical connections such as VPNs or firewalls. Out-of-band access provides more security and reliability than in-band access, which uses the same network as the data traffic and may be vulnerable to attacks or failures.
Which of the following BEST describes hosting several businesses on the same physical infrastructure?
A. Hybrid
B. Elasticity
C. laaS
D. Multitenancy
Correct Answer: D
Multitenancy, which is when several different cloud customers are accessing the same computing resources, such as when several different companies are storing data on the same physical server. https://www.cloudflare.com/learning/cloud/what-is-multitenancy
Question 767:
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
A. Fault tolerance
B. Quality of service
C. Load balancing
D. Port aggregation
Correct Answer: A
Load balancing is a technology that allows traffic to be sent through two different ISPs to increase performance. Load balancing is a process of distributing network traffic across multiple servers or links to optimize resource utilization, throughput, latency, and reliability. Load balancing can be implemented at different layers of the OSI model, such as layer 4 (transport) or layer 7 (application). Load balancing can also be used for outbound traffic by using multiple ISPs and routing protocols such as BGP (Border Gateway Protocol) to select the best path for each packet. References: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/border-gateway-protocol-bgp/prod_white_paper0900aecd806c4eeb.html
Question 768:
Which of the following protocol types describes secure communication on port 443?
A. ICMP
B. UDP
C. TCP
D. IP
Correct Answer: C
TCP is the protocol type that describes secure communication on port 443. TCP (Transmission Control Protocol) is a connection-oriented protocol that provides reliable and ordered delivery of data packets over an IP network. TCP uses port numbers to identify different applications or services on a device. Port 443 is the default port for HTTPS (Hypertext Transfer Protocol Secure), which is an extension of HTTP that uses SSL (Secure Sockets Layer) or TLS (Transport Layer Security) encryption to protect data in transit between a web server and a web browser.
A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Select TWO.)
A. tcpdump
B. show config
C. hostname
D. show route
E. netstate
F. show ip arp
Correct Answer: BD
Question 770:
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation According to troubleshooting methodology this is an example of:
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-008 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.