Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 41

Which of the following are the best device-hardening techniques for network security? (Select two).

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Full Access
Question # 42

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Full Access
Question # 43

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

A.

110

B.

143

C.

587

D.

636

Full Access
Question # 44

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

A.

ACLs

B.

Port security

C.

Content filtering

D.

NAC

Full Access
Question # 45

Which of the following connectors provides console access to a switch?

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Full Access
Question # 46

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Full Access
Question # 47

A network administrator is developing a method of device monitoring with the following requirements:

•Allows for explicit, by user, privilege management

•Includes centralized logging of changes

•Offers widely accessible remote management

•Provides support of service accounts

Which of the following will most closely meet these requirements?

A.

SNMP

B.

API

C.

SIEM

D.

SSO

Full Access
Question # 48

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Full Access
Go to page: