00:00

QUESTION 106

- (Topic 3)
An ISP is providing Internet to a retail store and has terminated its point of connection using a standard Cat 6 pin-out Which of me following terminations should the technician use when running a cable from the ISP's port lo the front desk?

Correct Answer: B
The termination that the technician should use when running a cable from the ISP’s port to the front desk is B. TIA/EIA-568-B. This is a standard pin-out for Cat 6 cables that is used for Ethernet and other network physical layers1. It specifies how to arrange the eight wires in an RJ45 connector, which is a common type of connector for network cables.

QUESTION 107

- (Topic 1)
A network administrator is designing a new datacenter in a different region that will need to communicate to the old datacenter with a secure connection. Which of the following access methods would provide the BEST security for this new datacenter?

Correct Answer: D
Site-to-site VPN provides the best security for connecting a new datacenter to an old one because it creates a secure tunnel between the two locations, protecting data in transit. References: CompTIA Network+ Certification Study Guide, Chapter 5: Network Security.

QUESTION 108

- (Topic 3)
A company needs to virtualize a replica of its internal physical network without changing the logical topology and the way that devices behave and are managed. Which of the following technologies meets this requirement?

Correct Answer: A
Network Function Virtualization (NFV) is a technology that allows for the virtualization of a replica of a network's physical topology and the way it behaves without changing the logical topology and the way that devices are managed. NFV allows for the virtualization of network functions such as routers, firewalls, and switches, resulting in increased flexibility and scalability. This makes NFV an ideal technology for companies looking to virtualize a replica of their internal physical network.

QUESTION 109

- (Topic 3)
A security analyst found the following vulnerability on the company's website:

Which of the following should be implemented to prevent this type of attack in the future?

Correct Answer: A
Input sanitization is the process of validating and filtering the user input to prevent malicious code or commands from being executed on the web server or the web browser. Input sanitization can prevent this type of attack, which is called cross-site scripting (XSS), by removing or escaping any special characters or scripts that are not expected or allowed in the input field. Input sanitization can be implemented on the server-side or the client- side, or both, to enhance the security of the web application.
References
✑ 1: Web Application Attacks – N10-008 CompTIA Network+ : 3.2
✑ 2: CompTIA Network+ N10-008 Certification Study Guide, page 317
✑ 3: CompTIA Network+ N10-008 Exam Subnetting Quiz, question 15
✑ 4: CompTIA Network+ N10-008 Certification Practice Test, question 6

QUESTION 110

- (Topic 3)
A user in a branch office reports that access to all files has been lost after receiving a new PC. All other users in the branch can access fileshares. The IT engineer who is troubleshooting this incident is able to ping the workstation from the branch router, but the machine cannot ping the router. Which of the following is MOST likely the cause of the incident?

Correct Answer: A