Which of the following is an example of asymmetric encryption?
A. PKI
B. SHA1
C. AES
D. 3DES
Ann, a user, connects to her company's secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?
A. Rogue access point
B. ARP poisoning
C. Replay attack
D. Evil twin
Which of the following is a common threat that collects Initialization Vectors to help speed up the algorithm for the attack?
A. WEP cracking
B. WPA cracking
C. War driving
D. Rogue access point
A user authenticated to more than one website using their same credentials is an example of:
A. Multifactor authentication
B. User access control
C. Two-factor authentication
D. Single sign-on
Joe, a network technician, is implementing a wireless network and needs to support legacy devices. He has selected to use WPA mixed mode. WPA mixed mode is normally implemented with which of the following encryption factors? (Select TWO).
A. SSH
B. 3DES
C. AES
D. SSL
E. TLS
F. TKIP
A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?
A. Behavior based IPS
B. Signature based IDS
C. Antivirus software
D. Access Control Lists
Which of the following should the last line of an ACL normally contain?
A. Explicit allow
B. Statically routed
C. Random access
D. Implicit deny
Which of the following is the wireless encryption standard associated with WPA2?
A. AES-CCMP
B. EAP
C. WEP
D. 802.1x
Which of the following is the default authentication method for a Windows client using PPP over a dialup connection?
A. TACACS+
B. WINS
C. Kerberos
D. MS-CHAP
A network administrator is considering implementation of network access restrictions based upon layer two addressing information. Which of the following describes this method of network restrictions?
A. MAC filtering
B. Port filtering
C. IP filtering
D. ACL filtering
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.