A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card.
Which of the following best describes how the VPN is being used?
A. Clientless
B. Client-to-site
C. Full tunnel
D. Site-to-site
A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?
A. 802.1X
B. Access control list
C. Port security
D. MAC filtering
Which of the following most likely determines the size of a rack for installation? (Select two).
A. KVM size
B. Switch depth
C. Hard drive size
D. Cooling fan speed
E. Outlet amperage
F. Server height
Which of the following is a cost-effective advantage of a split-tunnel VPN?
A. Web traffic is filtered through a web filter.
B. More bandwidth is required on the company's internet connection.
C. Monitoring detects insecure machines on the company's network.
D. Cloud-based traffic flows outside of the company's network.
Which of the following is most likely responsible for the security and handling of personal data in Europe?
A. GDPR
B. SCADA
C. SAML
D. PCI DSS
Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?
A. Infrastructure as a service
B. Software as a service
C. Platform as a service
D. Network as a service
Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?
A. Router
B. Switch
C. Access point
D. Firewall
Which of the following most likely requires the use of subinterfaces?
A. A router with only one available LAN port
B. A firewall performing deep packet inspection
C. A hub utilizing jumbo frames
D. A switch using Spanning Tree Protocol
An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
A. Implementingenterprise authentication
B. Requiring theuse of PSKs
C. Configuring acaptive portal for users
D. Enforcing wired equivalent protection
Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet.
Which of the following tools can help identify the issue?
A. Network tap
B. Cable tester
C. Visual fault locator
D. Toner and probe
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-009 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.