A network technician is concerned that an attacker is attempting to penetrate the network, and wants to set a rule on the firewall to prevent the attacker from learning which IP addresses are valid on the network. Which of the following protocols needs to be denied?
A. TCP
B. SMTP
C. ICMP
D. ARP
A small office has created an annex in an adjacent office space just 20 feet (6 meters) away. A network administrator is assigned to provide connectivity between the existing office and the new office. Which of the following solutions provides the MOST security from third party tampering?
A. CAT5e connection between offices via the patch panel located in building's communication closet.
B. CAT5e cable run through ceiling in the public space between offices.
C. VPN between routers located in each office space.
D. A WEP encrypted wireless bridge with directional antennae between offices.
A strong network firewall would likely support which of the following security features for controlling access? (Select TWO).
A. War driving
B. War chalking
C. MAC filtering
D. FTP bouncing
E. Port filtering
A network administrator is looking to implement a solution allowing users to utilize a common password to access most network resources for an organization. Which of the following would BEST provide this functionality?
A. RADIUS
B. Single sign on
C. Multifactor authentication
D. Two-factor authentication
A network administrator is responding to a statement of direction made by senior management to implement network protection that will inspect packets as they enter the network. Which of the following technologies would be used?
A. Packet sniffer
B. Stateless firewall
C. Packet filter
D. Stateful firewall
Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?
A. MAC filtering
B. RAS
C. SSL VPN
D. L2TP
Which of the following appliances creates and manages a large number of secure remote-access sessions, and also provides a high availability solution?
A. Media converter
B. Proxy server
C. VPN concentrator
D. Load balancer
The security measure used to reduce vulnerabilities for MOST network devices that require regular application and monitoring is:
A. patch management
B. security limitations
C. documentation
D. social engineering
A customer wants to increase firewall security.
Which of the following are common reasons for implementing port security on the firewall? (Select TWO).
A. Preventing dictionary attacks on user passwords
B. Reducing spam from outside email sources
C. Shielding servers from attacks on internal services
D. Blocking external probes for vulnerabilities
E. Directing DNS queries to the primary server
A company wants to secure its WAPs from unauthorized access.
Which of the following is the MOST secure wireless encryption method?
A. SSID disable
B. SNMPv3
C. WEP
D. WPA2
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.