Exam Details

  • Exam Code
    :N10-005
  • Exam Name
    :CompTIA Network+ Certification Exam
  • Certification
    :CompTIA Mobility+
  • Vendor
    :CompTIA
  • Total Questions
    :828 Q&As
  • Last Updated
    :Mar 20, 2025

CompTIA CompTIA Mobility+ N10-005 Questions & Answers

  • Question 21:

    A network administrator wants to perform a test to see if any systems are passing clear text through the network. Which of the following would be used?

    A. Social engineering

    B. Packet sniffing

    C. Rogue access point

    D. Man-in-the-middle

  • Question 22:

    A firewall that detects and prevents attacks from outside the network based on learned data patterns can BEST be described as which of the following?

    A. Signature based IDS

    B. Behavior based IPS

    C. Host based IPS

    D. Network based IDS

  • Question 23:

    A technician needs to install a new wireless encryption system. They are evaluating the feasibility of implementing WPA. WPA increases protection over WEP by implementing which of the following?

    A. Strong RC4 encryption

    B. Shared secret keys

    C. AES encryption

    D. Key rotation

  • Question 24:

    An administrator would like to search for network vulnerabilities on servers, routers, and embedded appliances. Which of the following tools would MOST likely accomplish this?

    A. Baseline analyzer

    B. Ping

    C. Protocol analyzer

    D. Nessus

  • Question 25:

    A network technician is doing a wireless audit and finds an SSID that does not match the company's SSID. The company uses the SSID of ABC123, and the SSID the technician found is Default. Which of the following threats did the network technician find?

    A. AP isolation

    B. DDoS

    C. Evil twin

    D. Rogue AP

  • Question 26:

    A company needs to implement a secure wireless system that would require employees to authenticate to the wireless network with their domain username and password. Which of the following would a network administrator deploy to implement these requirements? (Select TWO).

    A. 802.1q

    B. MAC address filtering

    C. WPA2 Personal

    D. WPA Enterprise

    E. 802.1x

  • Question 27:

    A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?

    A. Network sniffer

    B. Syslog

    C. SNMPv3

    D. System logs

  • Question 28:

    Which of the following should be mitigated by employing proper coding techniques when developing software?

    A. Distributed denial of service attacks

    B. Buffer overflows

    C. War driving

    D. Packet sniffing

  • Question 29:

    A network administrator wants to add the firewall rule to allow SSH traffic to the FTP server with the assigned IP 192.168.0.15 from the Internet. Which of the following is the correct firewall rule?

    A. Allow ANY to 192.168.0.15 port 21

    B. Allow ANY to 192.168.0.15 port 22

    C. Allow ANY to 192.168.0.15 port 80

    D. Allow ANY to ANY port ANY

  • Question 30:

    A security appliance is blocking a DDoS attack on the network.

    Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

    A. IPS logs

    B. Application logs

    C. IDS logs

    D. History logs

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.