NO.1 Packet analysis reveals multiple GET and POST requests from an internal host to a URL without
any response from the server. Which of the following is the BEST explanation that describes this
A. Man-in-the-middle
B. Compromised system
C. SQL injection attack
D. Smurf attack
Answer: B

As the extra unexplainable traffic comes from an internal host on your network we can assume that
this host has been compromised.
If your system has been compromised, somebody is probably using your machine--possibly to scan
and find other machines to compromise

DRAG DROP Build a T-658A Connection
Cat5/6 Cable Pinouts

Wireless network users recently began experiencing speed and performance issues after access point
2 (AP2) was replaced due to faulty hardware. The original network was installed according to a
consultant's specifications and has always worked without a problem.
You, a network technician, have been tasked with evaluating the situation and resolving the issues to
improve both performance and connectivity. Refer to the following diagram and perform any
NECESSARY changes to the wireless and wired infrastructure by adjusting devices.
Note: Adjust the LEAST number of devices needed to fix the issue, all blue icons in the image are
clickable. When you feel the simulation is complete please select the Done button.
Since we know that the network was running perfectly before replacing AP2 we should start by
looking at this new device that was used to replace the old one. Here we see that the other AP's have
hard coded the speed and duplex settings to 100/full, while AP2 is set to auto/auto.
Also, the other AP's have been configured to use 802.11G, while AP2 is using 802.11B.
Finally the channel that AP2 is using overlaps with AP1 which can cause problems. Channels 1, 6, and
11 are spaced far enough apart that they don't overlap. On a non-MIMO setup (i.e. 802.11 a, b, or g)
you should always try to use channel 1, 6, or 11. Since AP1 is using 1, and AP3 is using 11, AP2 should
be using 6.
Dulaney, Emmett and Mike Harwood, CompTIA Network+ Authorized Exam Cram, Fourth Edition,
Pearson, Indianapolis, 2012, p 269.
Lammle, Todd, CompTIA Network+ Deluxe Study Guide, Deluxe Edition, Wiley Publishing, Inc.,
Indianapolis, 2009, pp 676, 677.

NO.4 A network technician has detected a personal computer that has been physically connected to
the corporate network. Which of the following commands would the network technician use to
locate this unauthorized computer and determine the interface it is connected to?
A. nslookup hostname
B. show mac address-table
C. show ip access-list
D. show interface status
E. nbtstat -a
Answer: B

N10-006パッケージ N10-006内容
The show mac address-table command is used to view the ageing timer, and also the unicast and
multicast MAC addresses stored in the MAC address table by the switch. Furthermore, you can view
all of the addresses in the table or only the addresses learned or specified on a particular port or

JapanCertを選ぶかどうか状況があれば、弊社の無料なサンプルをダウンロードしてから、決めても大丈夫です。こうして、弊社の商品はどのくらいあなたの力になるのはよく分かっています。JapanCertはCompTIA SY0-401ソフトウエアを助けって通じての最良の選択で、100%のCompTIA SY0-401ソフトウエアのはJapanCert最高の保証でございます。君が選んだのはJapanCert、成功を選択したのに等しいです。


CompTIAのN10-006問題無料はIT領域で人気がある重要な試験です。我々はIT領域の人々にショートカットを提供するために、最高のスタディガイドと最高のオンラインサービスを用意して差し上げます。JapanCertの CompTIAのN10-006問題無料は全ての試験の内容と答案に含まれています。JapanCertの模擬テストを利用したら、これはあなたがずっと全力を尽くてもらいたいもののことが分かって、しかもそれは正に試験の準備をすることを意識します。

試験科目:「CompTIA Security+ Certification」

>> SY0-401ソフトウエア

試験科目:「CompTIA Network+ certification」

>> N10-006問題無料