Which of the following remote access types requires a certificate for connectivity?
A. SSH
B. PPP
C. HTTPS
D. WEP
Which of the following will BEST block a host from accessing the LAN on a network using static IP addresses?
A. IP filtering
B. Port filtering
C. MAC address filtering
D. DHCP lease
A corporate office recently had a security audit and the IT manager has decided to implement very strict security standards. The following requirements are now in place for each employee logging into the network:
Biometric fingerprint scan Complex 12 character password 5 digit pin code authorization Randomized security question prompt upon login
Which of the following security setups does this company employ?
A. Single factor authentication
B. Three factor authentication
C. Two factor authentication
D. Single sign-on
Honeypots and honeynets are different in which of the following ways?
A. Honeynets are managed collections of honeypots.
B. Honeypots only test software security, not hardware.
C. Honeynets require specialized hardware to implement.
D. Honeypots are usually servers and honeynets are routers and switches.
A network administrator has been tasked to deploy a new WAP in the lobby where there is no power outlet. Which of the following options would allow the network administrator to ensure the WAP is deployed correctly?
A. QoS
B. Install 802.11n WAP
C. PoE
D. Parabolic antenna
The network administrator has been tasked to create a network segment where resources can be placed for public web access. Which of the following should be implemented?
A. DMZ
B. Honeynet
C. PAT
D. Port security
An administrator needs to open ports in the firewall to support both major FTP transfer modes. Which of the following default ports was MOST likely opened? (Select TWO)
A. 20
B. 21
C. 22
D. 23
E. 25
F. 53
Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?
A. Network based IDS
B. Firewall
C. Network based IPS
D. Honeynet
Which of the following does Kerberos use to authenticate?
A. Tickets
B. Servers
C. Users
D. Clients
Which of the following does Kerberos provide?
A. Non-repudiation
B. Accounting
C. Exchange
D. Authentication
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.