Which of the following ports is used for secure email?
Answer(s): D
A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
Answer(s): A,C
Which of the following is a cost-effective advantage of a split-tunnel VPN?
A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?
Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?
Answer(s): A
As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?
Answer(s): C
A company's office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate network by plugging personal laptops into open network ports. Which of the following should the company implement to prevent this in the future?
A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools would help identify which ports are open on the remote file server?
Answer(s): B
Share your comments for CompTIA N10-009 exam with other users:
Question 129:Correct answer: CNAME
Passed this exam 2 days ago. These questions are in the exam. You are safe to use them.