Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 41

An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?

A.

Hot

B.

Cold

C.

Cluster

D.

Warm

Full Access
Question # 42

A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?

A.

Evil twin

B.

Honeytrap

C.

Wardriving

D.

Tailgating

Full Access
Question # 43

A network administrator is developing a method of device monitoring with the following requirements:

•Allows for explicit, by user, privilege management

•Includes centralized logging of changes

•Offers widely accessible remote management

•Provides support of service accounts

Which of the following will most closely meet these requirements?

A.

SNMP

B.

API

C.

SIEM

D.

SSO

Full Access
Question # 44

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Full Access
Question # 45

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Full Access
Question # 46

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Full Access
Question # 47

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Full Access
Question # 48

Which of the following is the next step to take after successfully testing a root cause theory?

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Full Access
Go to page: