A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?
A. IDS
B. IPS
C. Layer 7 firewall
D. RADIUS server
An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?
A. Man in the middle
B. A brute-force attack
C. A hash comparison
D. Rainbow tables
A network technician is supporting a library system that wants to streamline the checkout of books and media. Which of the following technologies will the technician MOST likely use to facilitate this initiative?
A. IR
B. Bluetooth
C. PAN
D. RFID
A technician is troubleshooting a host that is having intermittent issues connecting to internal network resources and the company servers. Using a packet sniffer, the technician notices there are several TCP communications that are missing packets in sequence and need to be retransmitted. The technician receives several SYN-ACK packets with incorrect addressing. Which of the following is the MOST likely cause of these issues?
A. DNS poisoning attack
B. Evil twin on the company network
C. ARP poisoning attack
D. Misconfigured VLAN on the local switch
An end user at an Internet cafe tries to visit an online retailer's website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor's page still loads. Which of the following BEST describes what is occurring?
A. Cross-site scripting
B. Session hijacking
C. Man in the middle
D. DNS poisoning
A Chief Information Officer (CIO) wants a third party to verify the security surrounding an enterprise SQL database server. Which of the following services should the CIO implement?
A. PCI compliance
B. Database health check
C. Penetration test
D. Network baseline
A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?
A. RJ11
B. LC
C. BNC
D. F-type
When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST question to ask to determine the scope of the issue?
A. What has been changed on the web server since the previous day?
B. Is the application online for the end user to access?
C. Does the user have access to the application?
D. Is this a system-wide issue or just a certain user's issue?
A company's Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?
A. Additional PIN
B. Security questions
C. RSA token
D. Access control lists
A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?
A. Router
B. Layer 3 switch
C. Proxy server
D. Firewall
E. Intrusion detection system
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-007 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.