A technician is trying to install a VolP phone, but the phone is not turning on. The technician checks the cable gong from the phone to the switch, and the cable is good. Which of the following actions IS needed for this phone to work?
A. Add a POE injector
B. Enable MDIX.
C. Use a crossover cable.
D. Reconfigure the port.
Correct Answer: A
Question 32:
An organization has experienced an increase in malicious spear-phishing campaigns and wants to mitigate the risk of hyperlinks from inbound emails.
Which of the following appliances would best enable this capability?
A. Email protection gateway
B. DNS server
C. Proxy server
D. Endpoint email client
E. Sandbox
Correct Answer: A
An email protection gateway is an appliance that can filter and block malicious emails and attachments before they reach the recipients. An email protection gateway can mitigate the risk of hyperlinks from inbound emails by scanning the links for malicious content, rewriting the links to point to a safe domain, or blocking the links altogether. An email protection gateway can also perform other functions such as spam filtering, antivirus scanning, encryption, and data loss prevention. A DNS server, a proxy server, an endpoint email client, and a sandbox are not appliances that can enable this capability, as they have different purposes and functions.
Question 33:
A senior administrator has been directed to incorporate AAA services within a domain environment for regulatory compliance purposes. Which of the following standards will enable the use of an AAA server in a domain environment?
A. 802.1Q
B. 802.1X
C. 802.3bt
D. 802.11h
Correct Answer: B
802.1X is a standard that enables the use of an AAA server in a domain environment by providing port-based network access control. 802.1X authenticates users or devices before granting them access to the network resources, and can also authorize them based on their roles or policies. 802.1X can work with different AAA protocols, such as RADIUS or TACACS+, to communicate with the AAA server.
Question 34:
A network engineer needs to enable device monitoring using authentication and encryption. Which of the following protocols offers this option?
A. ESP
B. SNMPv3
C. NetFIow
D. SSLv3
Correct Answer: B
SNMPv3 is a protocol that offers device monitoring using authentication and encryption. SNMP stands for Simple Network Management Protocol, and it is a standard way of collecting and organizing information about network devices, such as routers, switches, servers, printers, and so on. SNMPv3 is the latest version of SNMP, and it provides enhanced security features, such as data integrity, data origin authentication, data confidentiality, and access control. SNMPv3 can use different algorithms to encrypt and authenticate the communication between the network management system and the network devices12.
Question 35:
Which of the following network cables involves bouncing light off of protective cladding?
A. Twinaxial
B. Coaxial
C. Single-mode
D. Multimode
Correct Answer: D
Multimode fiber optic cables use multiple paths of light that bounce off the cladding, which is a layer of glass or plastic that surrounds the core of the cable. https://www.explainthatstuff.com/fiberoptics.html
Question 36:
A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?
A. Port mirroring
B. Flow data
C. Syslog entries
D. SNMP traps
Correct Answer: A
Port mirroring is a method of monitoring network traffic by copying the data packets from one port to another port on the same switch or router. This allows the network security administrator to analyze the contents of the data sent between different networks without affecting the performance or security of the original traffic. Port mirroring can be configured to capture all traffic or only specific types of traffic, such as VLANs, protocols, or IP addresses.
Question 37:
Which of the following is a major difference between a router and a Layer 3 switch?
A. A router can perform PAT, but a Layer 3 switch cannot.
B. A Layer 3 switch is more efficient than a router.
C. A router uses higher speed interfaces than a Layer 3 switch.
D. A Layer 3 switch can run more routing protocols than a router.
Correct Answer: B
Question 38:
Which of the following routing technologies uses a successor and a feasible successor?
A. IS-IS
B. OSPF
C. BGP
D. EIGRP
Correct Answer: D
EIGRP stands for Enhanced Interior Gateway Routing Protocol, which is a hybrid routing protocol that uses a successor and a feasible successor to determine the best route to a destination. A successor is the next-hop router that has the lowest cost (or metric) to reach the destination, and a feasible successor is a backup router that has a cost that is less than the cost of the successor. EIGRP uses the successor and the feasible successor to achieve fast convergence and load balancing. EIGRP also uses a Diffusing Update Algorithm (DUAL) to maintain the routing table and avoid routing loops. IS-IS, OSPF, and BGP are other routing protocols that do not use a successor and a feasible successor, but rather use different algorithms and criteria to select the best route.
Question 39:
A security analyst found the following vulnerability on the company's website:
Which of the following should be implemented to prevent this type of attack in the future?
A. Input sanitization
B. Output encoding
C. Code obfuscation
D. Prepared statements
Correct Answer: A
Input sanitization is the process of validating and filtering the user input to prevent malicious code or commands from being executed on the web server or the web browser. Input sanitization can prevent this type of attack, which is called cross-site scripting (XSS), by removing or escaping any special characters or scripts that are not expected or allowed in the input field. Input sanitization can be implemented on the server-side or the client- side, or both, to enhance the security of the web application.
Question 40:
A security engineer wants to provide a secure, dedicated, alternate access method into an IT network infrastructure to administer connected devices and IT assets. Which of the following is the engineer most likely to implement?
A. Remote desktop gateway
B. Authentication and authorization controls
C. Out-of-band management
D. Secure Shell
Correct Answer: C
Out-of-band management is a method of accessing network devices and IT assets through a dedicated channel that is separate from the normal data traffic. This provides a secure and alternate way to administer the network infrastructure, especially in case of failures or emergencies. Remote desktop gateway is a service that allows remote access to desktops and applications on a network. Authentication and authorization controls are mechanisms that verify the identity and permissions of users and devices on a network. Secure Shell is a protocol that encrypts the communication between a client and a server on a network.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-009 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.