Exam Details

  • Exam Code
    :N10-005
  • Exam Name
    :CompTIA Network+ Certification Exam
  • Certification
    :CompTIA Mobility+
  • Vendor
    :CompTIA
  • Total Questions
    :828 Q&As
  • Last Updated
    :Mar 29, 2025

CompTIA CompTIA Mobility+ N10-005 Questions & Answers

  • Question 51:

    Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?

    A. PKI

    B. Kerberos

    C. TACACS+

    D. RADIUS

  • Question 52:

    A technician notices that guests have plugged their laptops into a network wall jack located in the conference room.

    Which of the following could the technician implement in order to ensure that ONLY employees are able to access network resources?

    A. Port mirroring

    B. VTP configuration

    C. MAC address filtering

    D. Traffic filtering

  • Question 53:

    A small company is looking to install a wireless network to enable its relatively old fleet of laptops to have limited internet access internally. The technician on the project knows that the units do not support modern encryption standards. If backwards compatibility is the greatest concern, which of the following is the MOST appropriate wireless security type to choose?

    A. WEP

    B. WPS

    C. WPA

    D. WPA2

  • Question 54:

    A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

    A. HIDS

    B. NIDS

    C. NIPS

    D. HIPS

  • Question 55:

    A company would like to use the enterprise RADIUS server to authenticate and identify their secure wireless users. Which of the following standards should the company use to facilitate this?

    A. Stateful inspection

    B. WEP

    C. WPA

    D. Open with EAP

  • Question 56:

    Which of the following is being described when symbols are displayed on the side of the building and/or walking path, to identify open hotspots?

    A. Social engineering

    B. War chalking

    C. WPA cracking

    D. Packet sniffing

  • Question 57:

    A user receives a phone call at home from someone claiming to be from their company's IT help desk. The help desk person wants to verify their username and password to ensure that the user's account has not been compromised. Which of the following attacks has just occurred?

    A. Evil twin

    B. Phishing

    C. Man-in-the-middle

    D. Social engineering

  • Question 58:

    A user enters a password into a logon box on a PC. The server and the PC then compare one-way hashes to validate the password. Which of the following methods uses this process?

    A. PKI

    B. Kerberos

    C. Single sign-on

    D. CHAP

  • Question 59:

    A technician is asked to filter inbound and outbound traffic of a specific service on the network. Which of the following would BEST allow the technician to comply with the request?

    A. MAC filtering

    B. IP filtering

    C. Port filtering

    D. Content filtering

  • Question 60:

    Which of the following security protocols would BEST protect a connection to a remote email server and ensure full integrity of all transmitted email communication?

    A. TLS 1.2

    B. SNMPv3

    C. WPA2

    D. SMTP

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.