2014 Latest CompTIA SG0-001 Exam Demo Free Download!

An administrator is attempting to recover corrupted data from a four disk RAID group. However, the administrator does not know which RAID level was used. When investigating the volumes, the administrator notes that there is a duplicate of all data on two of the disks. Which of the following RAID levels was in use?

A.    RAID 0
B.    RAID 5
C.    RAID 6
D.    RAID 10

Answer: D

Given an array with sixteen 300GB drives, a storage administrator needs to know how much raw usable space can be made available while still maintaining a highly available RAID configuration with two hot spares. Which of the following is the MAXIMUM capacity that can be allocated and at which RAID level?

A.    2.1TB, RAID 1
B.    3.6TB, RAID 6
C.    3.9TB, RAID 5
D.    4.8TB, RAID 0

Answer: C

When gathering simple baseline statistics for a storage array, a storage administrator should gather which of the following? (Select TWO).

A.    Read/Write errors
B.    Number of switches connected
C.    Reads/Writes performed
D.    Read/Write throughput
E.    Port loss of signal counts

Answer: CD

A server has dual power supplies, dual mirrored hard drives, multi-pathed multiple NICs, and a dual port HBA for access into a SAN. Which of the following components is a single point of failure?

A.    Power supplies
B.    HBA
C.    NICs
D.    System hard drives

Answer: B

A new storage array is being cabled into a rack. The array has dual controllers, each disk tray has dual power supplies, and there are two in-rack PDUs (C and D). Which of the following is the BEST method for hooking up power?

A.    Connect controller A’s PSUs to PDU C, controller B’s PSUs to D, alternate drive trays between PDUs C and D.
B.    Connect all drive tray PSUs to C and all controller PDUs to D.
C.    Connect both controller’s PSUs to C and all drive tray PSUs to D.
D.    Split all PSU connections between C and D equally.

Answer: D

An administrator needs to assign LUN IDs for two new LUNs from the same storage array. The
first LUN is being presented as LUN 0 to multiple hosts. The second LUN is being dedicated to a single server which is also included in the group of hosts LUN 0 is presented to. Which of the following is the LOWEST LUN ID that can be assigned to the second LUN?

A.    0
B.    1
C.    2
D.    16

Answer: B

In a direct current only datacenter, which of the following is the MOST important rack installation concern?

A.    Sufficient power capacity
B.    Adequate division of circuits
C.    Adequate humidity control
D.    Grounding of all components

Answer: D

Which of the following are the MOST important properties to remember when replacing a faulty SFP? (Select TWO).

A.    SFP TX power
B.    Distance rating
C.    Port speed
D.    SFP RX power
E.    Driver version

Answer: BC

Which of the following is the MOST important item a storage administrator should check FIRST for a successful fabric merge?

A.    Faulty SFPs in the switch
B.    Number of aliases in the zoning database
C.    Domain IDs
D.    Total number of ports in the combined fabric

Answer: C

Which of the following protocols transmits a password in clear text on the network during the login process?

A.    SFTP
B.    SSH
C.    Telnet

Answer: C

A switch with 8Gb ports has been connected with five hosts running at 4Gb speed and two at 2Gb speed. If the switch is communicating through an ISL with another 8Gb switch where the storage array is connected, which of the following will be the oversubscription ratio of this configuration?

A.    1:1
B.    2:1
C.    3:1
D.    5:1

Answer: C

An administrator is tasked to programmatically create twenty 64GB LUNs and one 1GB LUN to be assigned to a four node cluster. Which of the following tools should be used to satisfy the request?

A.    CLI
B.    SMI-S
C.    GUI
D.    SNMP

Answer: A

A senior administrator configuring a firewall would like to know the IP address of a frequently accessed website to verify that site was not accidentally blocked in the content filter by the junior administrator’s recently-added range of blocked IP addresses. Which of the following tools would be used to find the IP address of the website?

A.    ipconfig/ifconfig
B.    nslookup
C.    netstat
D.    tracert/traceroute

Answer: B

A user reports lack of network connectivity on a laptop. No hardware changes have recently occurred on the laptop. Which of the following should the technician check FIRST?

A.    Port
B.    Cable
C.    Firewall
D.    NIC configuration

Answer: B

A small business would like to install their new storage equipment in a closet off of their pool deck. Which of the following environmental concerns should a technician consider FIRST?

A.    Fire suppression
B.    Humidity control
C.    Sufficient power
D.    Rack loading

Answer: B

Which of the following RAID levels provides the BEST guarantee that data will be retained in the event of drive failure without requiring a rebuild?

A.    RAID 0
B.    RAID 1
C.    RAID 3
D.    RAID 5

Answer: B
Passing your CompTIA SG0-001 Exam by using the latest CompTIA SG0-001 Exam Demo Full Version: http://www.braindump2go.com/sg0-001.html

2014 Latest CompTIA 220-802 Exam Demo Free Download!

A user has a perimeter firewall and up-to-date antivirus software. The user is asking what else they can do to improve their security. Which of the following will have the MOST impact on network security? (Select TWO).

A.    Install additional antivirus software
B.    Disable screen savers
C.    Conduct a daily security audit
D.    Assign security rights based on job roles
E.    Use strong passwords

Answer: DE
To improve security, assign security rights based on job roles. You need to give least amount of privilege to users so that they can do their jobs without having access to resources that have nothing to do with their job roles.

Drag and Drop Questions

A technician is trying to prevent a local application from reaching the web due to security concerns. Which of the following solutions could BEST prevent the application from reaching the web? (Select TWO).

A.    Configure the workstation for a static IP
B.    Disable all wireless network connections
C.    Remove shortcuts to the application
D.    Block the application in Windows Firewall
E.    Change network location to Work
F.    Reroute the web address in HOSTS file

Answer: DF
Use Windows firewall to restrict an application from reaching the web. Alternatively you can also reroute the web address in the HOST file.

A user has downloaded and installed a browser add-on that causes the browser to hang. The PC has very slow system response when rebooted. Which of the following should a technician do to troubleshoot this problem?

A.    Run System Restore, update antivirus program, and run an antivirus scan.
B.    Remove all Internet temporary files, run an antivirus scan, and reboot using Last Known Good Configuration.
C.    Remove all temporary files, turn off System Restore, update and run an antivirus scan.
D.    Run an antivirus scan, Run Disk Cleanup, and reboot into Safe Mode.

Answer: C
This might be the sign of a virus infecting the system. First, remove all temporary Internet files on your computer. Viruses are downloaded through software or a webpage. And normally it resides in Temporary Internet Files folder. Now turn off system restore because you don’t want to load a previous state on the computer with the virus still lingering the digital wild. Run an antivirus program to clean infected files.

– Email address [email protected] com
– Password [email protected]
– Pop techies com Port 110 Security. None
– IMAP techies com Port 993 Security SSL
– smtp.techies.com Port 465 Security: TLS
– Company SSID Techies
– Security WPA2
– Passphrase [email protected]
– SSID is not broadcasted
Instructions: You are not authorized to use the Company’s WLAN The outgoing server does not require login credentials When you have completed the simulation, please select the done button to submit your answer.
Answer: See Answer from Full Version
Which of the following steps would allow display output from a laptop to an external display? (Select TWO).

A.    Press the appropriate Function Key combination
B.    A second video card in the Express card slot
C.    Disconnect the integrated display
D.    Enabling second monitor in the Windows Display Settings
E.    Loading external monitor drivers on the laptop

Answer: AD
First enable second monitor in Windows Display settings. After that press the function key along with the assigned key to display the output on an external monitor.

When setting up a new wireless router, which of the following actions should the technician take FIRST in order to secure the network? (Select TWO).

A.    Disable unused ports
B.    Change the SSID
C.    Position the antennas to prevent outside access
D.    Enable MAC filtering
E.    Change the default user name

Answer: BE
The basic tasks to secure a network is to change SSID and the default user name. This is the basic security a user can employ to secure the network immediately.

For which of the following instances is System Restore MOST likely to be used?

A.    Deleting temporary files that are not needed.
B.    Replacing a failed hard drive with a new drive.
C.    Placing the system configuration into a prior state.
D.    Downgrading an operating system to another version.

Answer: C

Administrative share names are MOST commonly designated by which of the following symbols?

A.    !
B.    $
C.    :
D.    *

Answer: B

After loading a new operating system, which of the following accounts is MOST often changed for security purposes?

A.    Standard User
B.    Power User
C.    Guest
D.    System

Answer: C

Virtual machines help users developing cloud applications in which of the following ways?

A.    Provides an environment where the host cannot be connected to the network.
B.    Provides a platform where operating system requirements are lessened.
C.    Provides a safe, secure environment in which to test patches or application updates.
D.    Provides an environment that is never accessible from the Internet.

Answer: C

Which of the following installation types uses an answer file as part of the installation process?

A.    Unattended installation
B.    Clean installation
C.    Virtual desktop image deployment
D.    Remote network installation

Answer: A

An administrator sets up a wireless device that they will need to manage across the Internet. Which of the following security measures would BEST prevent unauthorized access to the device from the Internet?

A.    Set the channels to wireless 802.11n only
B.    Change the default username and password
C.    Enable the wireless AP’s MAC filtering
D.    Enable the wireless AP’s WPA2 security

Answer: B

Passing your CompTIA 220-802 Exam by using the latest CompTIA 220-802 Exam Demo Full Version: http://www.braindump2go.com/220-802.html

2014 Latest CompTIA Network+ N10-005 Exam Demo Free Download!

New Simulation: Crimp out a T568B.
White/Orange, Orange, White/Green, Blue, White/Blue, Green, White/Brown, Brown.
A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?

A.    Signature based IDS
B.    Behavior based IPS
C.    Host based IPS
D.    Network based IDS

Answer: B

Which of the following technologies prevents network collisions to maximize safe delivery of network data?

B.    DWDM

Answer: A

Which of the following are authentication methods that can use AAA authentication? (Select TWO).

A.    Kerberos
B.    PKI

Answer: EF

Drag and Drop Question
Drag and drop the fiber cable connection types to the appropriate image.
A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?

A.    Premise router
B.    ISP router
C.    Smart jack

Answer: C

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on
this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?

A.    Toner probe
B.    Loopback plug
C.    Protocol analyzer
D.    Multimeter

Answer: D

A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?

B.    Port forwarding
C.    Port security
D.    Port mirroring

Answer: D

A technician finds that the network card is no longer functioning. At which of the following OSI layers is the problem occurring?

A.    Layer 1
B.    Layer 3
C.    Layer 5
D.    Layer 7

Answer: A

The address 6FFE:FFFF:0000:2F3B:04AC:00FF:FEBE:5C4A is an example of which of the following?

B.    MAC
C.    IPv4
D.    IPv6

Answer: D

Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope?

A.    Reservations
B.    Lease times
C.    Removing IPs from the active leases
D.    Configuring the DNS options

Answer: A
Reservationsare permanent lease assignments that are used to ensure that a specified client on a subnet can always use the same IP address. You can use DHCP reservations for hosts that require a consistent IP address, but do not need to be statically configured.

A network technician needs to configure a port on a switch to provide connectivity and electrical support to a WAP being installed in a warehouse. Which of the following features needs to be configured on the switch?

A.    STP
B.    PoE
C.    VTP trunking
D.    Port forwarding

Answer: B
Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras.

Which of the following reasons would MOST likely be used to implement QoS and traffic shaping solutions?

A.    Redundancy
B.    Fault tolerance
C.    Unified communications
D.    Uptime requirements

Answer: C
In unified communication video,voice,data have only one end gateway so to give priority to avoid delay in voice and video we use Qos.

Which of the following uses SSL encryption?

A.    SMTP
B.    FTP
D.    SNMP

Answer: C
HTTPSis the result of simply layering the Hypertext Transfer Protocol (HTTP) on top of the SSL/TLS protocol, thus adding the security capabilities of SSL/TLS to standard HTTP communications.

A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?

A.    NIC bonding
B.    Proxy server
C.    Firewall ACLs
D.    VLANs

Answer: A
Passing your CompTIA Network+ N10-005 Exam by using the latest CompTIA Network+ N10-005 Exam Demo Full Version:  http://www.braindump2go.com/n10-005.html

2014 Latest CompTIA Security+ SY0-301 Exam Demo Free Download!

An administrator has a network subnet dedicated to a group of users. Due to concerns regarding data and network security, the administrator desires to provide network access for this group only. Which of the following would BEST address this desire?

A.    Install a proxy server between the users’ computers and the switch to filter inbound network traffic.
B.    Block commonly used ports and forward them to higher and unused port numbers.
C.    Configure the switch to allow only traffic from computers based upon their physical address.
D.    Install host-based intrusion detection software to monitor incoming DHCP Discover requests.

Answer: C

Read More

Official 2014 Latest CompTIA SY0-401 Demo Free Download!

Which of the following protocols operates at the HIGHEST level of the OSI model?

A.    ICMP
B.    IPSec
C.    SCP
D.    TCP

Answer: C

Which of the following should an administrator implement to research current attack methodologies?

A.    Design reviews
B.    Honeypot
C.    Vulnerability scanner
D.    Code reviews

Answer: B

Drag and Drop Question
Task: Determine the types of attacks below by selecting an option from the dropdown list.

Which of the following can be implemented in hardware or software to protect a web server from cross-site scripting attacks?

A.    Intrusion Detection System
B.    Flood Guard Protection
C.    Web Application Firewall
D.    URL Content Filter

Answer: C

Which of the following means of wireless authentication is easily vulnerable to spoofing?

A.    MAC Filtering
B.    WPA – LEAP
C.    WPA – PEAP
D.    Enabled SSID

Answer: A

Lab Sim – Configure the Firewall
Task: Configure the firewall (fill out the table) to allow these four rules:
– Only allow the Accounting computer to have HTTPS access to the Administrative server.
– Only allow the HR computer to be able to communicate with the Server 2 System over SCP.
– Allow the IT computer to have access to both the Administrative Server 1 and Administrative Server 2
Use the following answer for this simulation task. Below table has all the answers required for this question.

Jane, a security administrator, needs to implement a secure wireless authentication method that uses a remote RADIUS server for authentication.
Which of the following is an authentication method Jane should use?

A.    WPA2-PSK
C.    CCMP
D.    LEAP

Answer: D

Computer evidence at a crime scene is documented with a tag stating who had possession of the evidence at a given time.
Which of the following does this illustrate?

A.    System image capture
B.    Record time offset
C.    Order of volatility
D.    Chain of custody

Answer: D

A network administrator is configuring access control for the sales department which has high employee turnover. Which of the following is BEST suited when assigning user rights to individuals in the sales department?

A.    Time of day restrictions
B.    Group based privileges
C.    User assigned privileges
D.    Domain admin restrictions

Answer: B

Which of the following is being tested when a company’s payroll server is powered off for eight hours?

A.    Succession plan
B.    Business impact document
C.    Continuity of operations plan
D.    Risk assessment plan

Answer: C

A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has been created for a frequently used application. She notifies the software vendor and asks them for remediation steps, but is alarmed to find that no patches are available to mitigate this vulnerability.
Which of the following BEST describes this exploit?

A.    Malicious insider threat
B.    Zero-day
C.    Client-side attack
D.    Malicious add-on

Answer: B

A security administrator has concerns about new types of media which allow for the mass distribution of personal comments to a select group of people. To mitigate the risks involved with this media, employees should receive training on which of the following?

A.    Peer to Peer
B.    Mobile devices
C.    Social networking
D.    Personally owned devices

Answer: C

A network administrator is responsible for securing applications against external attacks. Every month, the underlying operating system is updated. There is no process in place for other software updates.
Which of the following processes could MOST effectively mitigate these risks?

A.    Application hardening
B.    Application change management
C.    Application patch management
D.    Application firewall review

Answer: C

If you want to pass the CompTIA SY0-401 Exam sucessfully, recommend to read latest CompTIA SY0-401 Demo full version.