ExamGecko
Home Home / CompTIA / N10-009

CompTIA N10-009 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Which of the following technologies are X.509 certificates most commonly associated with?

A.
PKI
A.
PKI
Answers
B.
VLAN tagging
B.
VLAN tagging
Answers
C.
LDAP
C.
LDAP
Answers
D.
MFA
D.
MFA
Answers
Suggested answer: A

Explanation:

X 509 certificates are most commonly associated with Public Key Infrastructure (PKI). These certificates are used for a variety of security functions, including digital signatures, encryption, and authentication. PKI: X.509 certificates are a fundamental component of PKI, used to manage encryption keys and authenticate users and devices. Digital Certificates: They are used to establish secure communications over networks, such as SSL/TLS for websites and secure email communication. Authentication and Encryption: X.509 certificates provide the means to securely exchange keys and verify identities in various applications, ensuring data integrity and confidentiality. Network

Reference: CompTIA Network+ N10-007 Official Certification Guide: Covers PKI and the role of X.509 certificates in network security. Cisco Networking Academy: Provides training on PKI, certificates, and secure communications. Network+ Certification All-in-One Exam Guide: Explains PKI, X.509 certificates, and their applications in securing network communications.


A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

A.
22
A.
22
Answers
B.
80
B.
80
Answers
C.
443
C.
443
Answers
D.
587
D.
587
Answers
Suggested answer: B

Explanation:

For a web server that requires all connections to be encrypted, port 80 (HTTP) should be disabled. Port 80 is used for unencrypted web traffic, whereas port 443 is used for HTTPS, which provides encrypted communication.

Port 80 (HTTP): This port is used for unsecured web traffic. Disabling this port ensures that all web traffic must use HTTPS, which encrypts the data in transit.

Port 443 (HTTPS): This port is used for secure web traffic via SSL/TLS encryption. Keeping this port open ensures that secure connections can be made to the web server.

Other Ports:

Port 22: Used for SSH, providing secure remote access and file transfers.

Port 587: Used for secure email submission (SMTP) with encryption.

Network


A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provies authentication and encryption. Which of the following meets these requirements?

A.
SIEM
A.
SIEM
Answers
B.
Syslog
B.
Syslog
Answers
C.
NetFlow
C.
NetFlow
Answers
D.
SNMPv3
D.
SNMPv3
Answers
Suggested answer: D

Explanation:

SNMPv3 (Simple Network Management Protocol version 3) provides device monitoring with authentication and encryption. This enhances network visibility and security by ensuring that monitoring data is securely transmitted and access to network devices is authenticated.

Authentication: SNMPv3 includes robust mechanisms for authenticating users accessing network devices.

Encryption: It provides encryption to protect the integrity and confidentiality of the data being transmitted.

Network Management: SNMPv3 allows for detailed monitoring and management of network devices, ensuring better control and security.

Network


A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

A.
NS
A.
NS
Answers
B.
SOA
B.
SOA
Answers
C.
PTR
C.
PTR
Answers
D.
CNAME
D.
CNAME
Answers
Suggested answer: A

Explanation:

To change where the outside DNS records are hosted, the network administrator needs to update the NS (Name Server) records at the domain registrar. NS records specify the authoritative name servers for a domain, directing where DNS queries should be sent.

NS (Name Server) Records: These records indicate the servers that are authoritative for a domain. Changing the NS records at the registrar points DNS resolution to the new hosting provider.

SOA (Start of Authority): Contains administrative information about the domain, including the primary name server.

PTR (Pointer) Records: Used for reverse DNS lookups, mapping IP addresses to domain names.

CNAME (Canonical Name) Records: Used to alias one domain name to another, not relevant for changing DNS hosting.

Network


Which of the following ports is used for secure email?

A.
25
A.
25
Answers
B.
110
B.
110
Answers
C.
143
C.
143
Answers
D.
587
D.
587
Answers
Suggested answer: D

Explanation:

Port 587 is used for secure email submission. This port is designated for message submission by mail clients to mail servers using the SMTP protocol, typically with STARTTLS for encryption.

Port 25: Traditionally used for SMTP relay, but not secure and often blocked by ISPs for outgoing mail due to spam concerns.

Port 110: Used for POP3 (Post Office Protocol version 3), not typically secured.

Port 143: Used for IMAP (Internet Message Access Protocol), which can be secured with STARTTLS or SSL/TLS.

Port 587: Specifically used for authenticated email submission (SMTP) with encryption, ensuring secure transmission of email from clients to servers.

Network


A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

A.
802.11ac
A.
802.11ac
Answers
B.
802.11ax
B.
802.11ax
Answers
C.
802.11g
C.
802.11g
Answers
D.
802.11n
D.
802.11n
Answers
Suggested answer: B

Explanation:

802.11ax, also known as Wi-Fi 6, is designed for high-density environments and improves device saturation and coverage compared to previous standards.

802.11ac: While it offers high throughput, it is not optimized for high-density environments as effectively as 802.11ax.

802.11ax (Wi-Fi 6): Introduces features like OFDMA, MU-MIMO, and BSS Coloring, which enhance performance in crowded environments, reduce latency, and increase the number of devices that can be connected simultaneously.

802.11g and 802.11n: Older standards that do not offer the same level of efficiency or support for high device density as 802.11ax.

Network

Reference:

CompTIA Network+ N10-007 Official Certification Guide: Covers the 802.11 standards and their capabilities.

Cisco Networking Academy: Provides training on Wi-Fi technologies and best practices for high-density deployments.

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

A.
Router
A.
Router
Answers
B.
Switch
B.
Switch
Answers
C.
Access point
C.
Access point
Answers
D.
Firewall
D.
Firewall
Answers
Suggested answer: C

Explanation:

An access point (AP) provides users with an extended footprint that allows connections from multiple devices within a designated Wireless Local Area Network (WLAN).

Router: Typically used to connect different networks, not specifically for extending wireless coverage.

Switch: Used to connect devices within a wired network, not for providing wireless access.

Access Point (AP): Extends wireless network coverage, allowing multiple wireless devices to connect to the network.

Firewall: Primarily used for network security, controlling incoming and outgoing traffic based on security rules, not for providing wireless connectivity.

Network


Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

A.
IAM
A.
IAM
Answers
B.
MFA
B.
MFA
Answers
C.
RADIUS
C.
RADIUS
Answers
D.
SAML
D.
SAML
Answers
Suggested answer: D

Explanation:

Security Assertion Markup Language (SAML) is an XML-based standard used for exchanging authentication and authorization data between parties, particularly between an identity provider (IdP) and a service provider (SP). SAML is commonly used in Single Sign-On (SSO) solutions to pass sensitive user information, such as login credentials and attributes, securely between the identity provider and the service provider.

SAML (Security Assertion Markup Language): Facilitates web-based authentication and authorization, allowing users to access multiple services with a single set of credentials.

XML-based: Uses XML to encode the authentication and authorization data, ensuring secure transmission of user information.

Identity Federation: Enables secure sharing of identity information across different security domains, making it ideal for enterprise SSO solutions.

Network


An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

A.
SSE
A.
SSE
Answers
B.
ACL
B.
ACL
Answers
C.
Perimeter network
C.
Perimeter network
Answers
D.
802.1x
D.
802.1x
Answers
Suggested answer: D

Explanation:

802.1x is a network access control protocol that provides an authentication mechanism to devices trying to connect to a LAN or WLAN. This ensures that only authorized devices can access the network, making it ideal for mitigating the risk of unknown devices connecting to the network, especially in accessible areas.

802.1x Authentication: Requires devices to authenticate using credentials (e.g., username and password, certificates) before gaining network access.

Access Control: Prevents unauthorized devices from connecting to the network, enhancing security in public or semi-public areas.

Implementation: Typically used in conjunction with a RADIUS server to manage authentication requests.

Network


Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

A.
To encrypt sensitive data in transit
A.
To encrypt sensitive data in transit
Answers
B.
To secure the endpoint
B.
To secure the endpoint
Answers
C.
To maintain contractual agreements
C.
To maintain contractual agreements
Answers
D.
To comply with data retentin requirements
D.
To comply with data retentin requirements
Answers
Suggested answer: A

Explanation:

The most likely reason an insurance brokerage would enforce VPN usage is to encrypt sensitive data in transit. VPNs (Virtual Private Networks) create a secure tunnel between the user's device and the corporate network, ensuring that data is encrypted and protected from interception.

Encryption: VPNs encrypt data, preventing unauthorized access and ensuring data privacy during transmission over public or unsecured networks.

Data Protection: Essential for industries handling sensitive information, such as insurance brokerages, to protect customer data and comply with regulatory requirements.

Security: Enhances overall network security by providing secure remote access for employees.

Network


Total 153 questions
Go to page: of 16