A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?
A. Social engineering
B. Packet sniffing
C. Rogue access point
D. Man-in-the-middle
A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?
A. Signature based IDS
B. Behavior based IPS
C. Host based IPS
D. Network based IDS
A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following?
A. Strong RC4 encryption
B. Shared secret keys
C. AES encryption
D. Key rotation
An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?
A. Baseline analyzer
B. Ping
C. Protocol analyzer
D. Nessus
A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?
A. AP isolation
B. DDoS
C. Evil twin
D. Rogue AP
A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).
A. 802.1q
B. MAC address filtering
C. WPA2 Personal
D. WPA Enterprise
E. 802.1x
A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?
A. Network sniffer
B. Syslog
C. SNMPv3
D. System logs
Which of the following should be mitigated by employing proper coding techniques when developing software?
A. Distributed denial of service attacks
B. Buffer overflows
C. War driving
D. Packet sniffing
A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?
A. Allow ANY to 192.168.0.15 port 21
B. Allow ANY to 192.168.0.15 port 22
C. Allow ANY to 192.168.0.15 port 80
D. Allow ANY to ANY port ANY
A security appliance is blocking a DDoS attack on the network.
Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?
A. IPS logs
B. Application logs
C. IDS logs
D. History logs
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.