A user at a hotel sees two SSIDs; both are called "HotelWireless". After the PC connects to one of the APs, the user notices their browser homepage has been changed. Which of the following BEST describes this AP?
A. Man-in-the-middle
B. DDoS
C. Evil twin
D. War driving
A technician enters a username and password once and can access multiple databases without being prompted to reenter their password. This is an example of which of the following?
A. Two-factor authentication
B. Network access control
C. Multifactor authentication
D. Single sign-on
Which of the following protocols would the network administrator use to protect login credentials when accessing a router terminal session?
A. SCP
B. SNMPv3
C. SSL
D. SSH
A technician needs to enter a username and password and have their fingerprint scanned to access a server. Which of following types of authentication is this an example of?
A. Single sign-on
B. Network access control
C. PKI authentication
D. Two-factor authentication
Which of the following provides the STRONGEST security for a tunneled connection over the Internet?
A. RDP
B. SMTP
C. RAS
D. IPSec
A network administrator has decided to tighten company security after a recent data breach. The new scheme calls for a strong 10 character password, a special 4 digit pin code, and a one-time use dynamic token that is accessed via a smartphone application.
Which of the following is being implemented?
A. Two-factor authentication
B. Biometric security
C. Multi-factor authentication
D. Single factor authentication
An administrator configuring remote access opens ports 500/UDP and 10000/UDP on the firewall. Which of the following services are MOST likely being allowed? (Select TWO).
A. SSL
B. IPSec
C. Kerberos
D. RDP
E. L2TP
F. PPTP
An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?
A. An IP filtering ACL
B. A MAC filtering ACL
C. A port filtering ACL
D. A class matching ACL
A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?
A. Kerberos
B. TACACS+
C. RADIUS
D. 802.1x
Which of the following tools could attempt to detect operating system vulnerabilities?
A. nslookup
B. honeynet
C. netstat
D. nessus
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-005 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.