Which of the following is the MOST secure way to prevent malicious changes to a firewall?
A. SNMPv2 access only
B. TELNET access only
C. SSH access only
D. Console access only
An application server is placed on the network and the intended application is not working correctly. Which of the following could be used to make sure sessions are being opened properly?
A. Antivirus scanner
B. IDS
C. Packet sniffer
D. Toner probe
A user is connecting to the Internet at an airport through an ad-hoc connection. Which of the following is the MOST likely security threat?
A. Man-in-the-middle
B. Social engineering
C. Phishing
D. DoS
Which of the following can be described as a DoS attack?
A. Disabling a specific system and making it unavailable to users
B. Implementing a keylogger
C. Intercepting a packet and decrypting the contents
D. Communicating with employees to get company information
A vendor releases an emergency patch that fixes an exploit on their network devices. The network administrator needs to quickly identify the scope of the impact to the network. Which of the following should have been implemented?
A. Change management
B. Asset management
C. Network sniffer
D. System logs
A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?
A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
D. Honeypot
Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?
A. Evil twin
B. War chalking
C. Buffer overflow
D. Virus
A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?
A. DoS
B. Buffer overflow
C. Dictionary file
D. SQL injection
Which of the following wireless standards uses a block encryption cipher rather than a stream cipher?
A. WPA2-CCMP
B. WPA
C. WEP
D. WPA2-TKIP
A technician is troubleshooting authentication issues on a server. It turns out the clock on the server was 72 minutes behind. Setting the clock to the correct time fixed the issue. Given the scenario, which of the following authentication methods was being used?
A. Kerberos
B. CHAP
C. TACACS+
D. RADIUS
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.