Latest Certified Success Dumps Download

CISCO, MICROSOFT, COMPTIA, HP, IBM, ORACLE, VMWARE
CN0-201 Latest Exam (Sep 2017)

[Free] 2017(Sep) EnsurePass Testking CompTIA CN0-201 Dumps with VCE and PDF 181-190

September 16, 2017

EnsurePass
2017 Sep CompTIA Official New Released CN0-201
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/CN0-201.html

CompTIA CTP Certification Exam

Question No: 181 – (Topic 2)

John works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. The network has ten Windows 2000 servers and 300 Windows 2000 Professional client computers. The network uses a T3 line to connect to the Internet. The company also has 1,000 external employees who need to connect to the company from remote locations. John wants to implement a remote access policy for external users, which will make access highly available and most secure.

He wants to accomplish the following goals:

l No data traffic should be carried as clear text.

l At least 200 remote users should be able to access the network simultaneously all the time.

What will he do to accomplish these tasks?

Each correct answer represents a part of the solution. Choose three.

  1. Configure each VPN server to support 150 PPTP connections.

  2. Configure the client computers to use MS-CHAP.

  3. Configure the client computers to use Password Authentication Protocol (PAP).

  4. Install two virtual private networking (VPN) servers at the main office.

Answer: A,B,D

Question No: 182 – (Topic 2)

Which of the following is a set of networking protocols that permits networked devices to seamlessly discover each others presence on the network?

  1. XPnP

  2. STUN

  3. UPnP

  4. CoS

Answer: C

Question No: 183 – (Topic 2)

Which of the following network configuration utilities is used to display information about current TCP/IP connections?

  1. ping

  2. netstat

  3. nbtstat

  4. nslookup

Answer: B

Question No: 184 – (Topic 2)

Which of the following codecs is often considered as the default codec for H.323?

A. G.724 B. G.722 C. G.711 D. G.726

Answer: C

Question No: 185 – (Topic 2)

Session Border Controllers (SBCs) commonly maintain full session state. Which of the following functions are offered by a Session Border Controller?

Each correct answer represents a complete solution. Choose all that apply.

  1. Connectivity

  2. Statistics

  3. Quality of service

  4. Regulatory

  5. Availability

  6. Security

Answer: A,B,C,D,F

Question No: 186 – (Topic 2)

Which of the following statements are true about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.

  1. Session hijacking is an attack in which an attacker takes over the session, and the valid user#39;s session is disconnected.

  2. Session hijacking is an attack in which an attacker takes over the session, and the valid user#39;s session is not disconnected.

  3. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.

  4. Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.

Answer: B,C

Question No: 187 – (Topic 2)

Which of the following commands are valid only under the POTS dial peers? Each correct answer represents a complete solution. Choose all that apply.

  1. Num-exp

  2. Forward digits

  3. No digit-strip

  4. Prefix

  5. Preference

Answer: B,C,D

Question No: 188 – (Topic 2)

Which of the following gateway interfaces connects to the standard station port of a PBX?

  1. MCU

  2. FXS

  3. FXO

  4. Eamp;M

Answer: C

Question No: 189 – (Topic 2)

Which of the following provide an quot;always onquot; Internet access service when connecting to an ISP?

Each correct answer represents a complete solution. Choose two.

  1. Analog modem

  2. DSL

  3. Cable modem

  4. Digital modem

Answer: B,C

Question No: 190 – (Topic 2)

Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)?

Each correct answer represents a complete solution. Choose all that apply.

  1. E-mail spoofing

  2. Shoulder surfing

  3. Port scan attack

  4. Denial-of-Service (DoS) attack

Answer: A,B

100% Free Download!
Download Free Demo:CN0-201 Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass CN0-201 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE