A network technician has recently discovered rogue devices on their network and wishes to implement a security feature that will prevent this from occurring. Which of the following will prevent unauthorized devices from connecting to a network switch?
A. Implement 802.11i on all switches in the network.
B. Implement port security on all computers in the company.
C. Implement port security on all switches in the network.
D. Implement rules on the firewall to block unknown devices.
A company has a total of two public IP addresses and must allow 150 devices to connect to the Internet at the same time. Which of the following is the BEST option for connectivity?
A. VLSM
B. NAT
C. CIDR
D. PAT
Which of the following would a network administrator MOST likely use to actively discover unsecure services running on a company's network?
A. IDS
B. Nessus
C. NMAP
D. Firewall
If a wireless key gets compromised, which of the following would MOST likely prevent an unauthorized device from getting onto the network?
A. Device placement
B. Wireless standard
C. Encryption type
D. MAC filtering
A user reports sporadic network outages. The user tells the administrator it happens after approximately 20 minutes of work on an application. The administrator should begin troubleshooting by checking which of the following?
A. The IDS server logs
B. The DNS resolution time
C. The firewall's blocked logs
D. The patch cable
A company wants to have a security zone to isolate traffic within the firewall. Which of the following could be used?
A. VPN
B. ACL
C. DMZ
D. VLAN
An organization only has a single public IP address and needs to host a website for its customers. Which of the following services is required on the network firewall to ensure connectivity?
A. Forwarding proxy
B. Port address translation
C. DMZ port security
D. Application inspection
A technician is troubleshooting a network issue and needs to view network traffic on a switch in real-time. Which of the following would allow the technician to view network traffic on a switch?
A. ISAKMP
B. Port forwarding
C. Port security
D. Port mirroring
A technician needs to make a web server with a private IP address reachable from the Internet. Which of the following should the technician implement on the company firewall?
A. DOCSIS
B. NAT
C. CIDR
D. VPN
A user is unable to connect to a remote computer using RDP. The technician checks the firewall rules and notes that there is no rule that blocks RDP. Which of the following features of the firewall is responsible for blocking RDP?
A. Stateful inspection
B. NAT/PAT
C. Port security
D. Implicit deny
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.