Network+ N10-008 – 4.0 Network Security

Network+ N10-008 – 4.0 Network Security

1 / 125

Which type of DoS attack employs multiple compromised servers or hosts that are controlled by a cybercriminal?

2 / 125

According to the text, which of the following best describes brute-force attack methods in password attacks?

3 / 125

What is the purpose of separation of duties in network security?

4 / 125

What does the term ’Zero-Day’ in the context of network vulnerabilities refer to?

5 / 125

What are the two primary methods of VLAN hopping?

6 / 125

What is a distinctive characteristic of a distributed denial-of-service (DDoS) as compared to other types of DoS attacks?

7 / 125

What purpose can a deauthentication attack serve in terms of wireless security protocols?

8 / 125

What does an On-Path Attack allow an attacker to do?

9 / 125

What is the purpose of Phase 0 in EAP-FAST?

10 / 125

Why should the firmware of a new network device be upgraded before it is configured and put into service?

11 / 125

What is the default action if a specific condition in an Access Control List (ACL) is not met?

12 / 125

What is the main difference between a split tunnel and a full tunnel in a VPN configuration?

13 / 125

What is the key goal of a security assessment?

14 / 125

What are the responsibilities of a Security Information and Event Management (SIEM) system?

15 / 125

Which of the following best defines an ’exploit’ in the context of network security?

16 / 125

What happens when a mobile device steps outside a geofencing-permitted area?

17 / 125

What is the primary use of Terminal Access Controller Access Control System+ (TACACS+) protocol?

18 / 125

Which of the following is NOT a characteristic of MAC filtering?

19 / 125

What is one of the primary purposes behind the implementation of port security?

20 / 125

What is the purpose of single sign-on (SSO)?

21 / 125

What is the primary purpose of a Virtual Private Network (VPN)?

22 / 125

Which of the following best describes the difference between in-band and out-of-band management in relation to network device access?

23 / 125

What does the ’Availability’ in the CIA triad for information security refers to?

24 / 125

Why is it recommended to lock network racks even if they are located in secure areas?

25 / 125

What is the function of an explicit deny in a firewall?

26 / 125

What is the main concern in doing a factory reset with a piece of equipment?

27 / 125

Which of the following measures can be used to enhance the confidentiality of information according to the CIA triad?

28 / 125

What is a rogue access point in the context of a network security threat?

29 / 125

What is the purpose of DHCP snooping in a network?

30 / 125

What is a common feature of biometric access control systems?

31 / 125

Which of the following best describes an internal threat to an organization’s network?

32 / 125

What is the main purpose of a risk assessment in an organization?

33 / 125

What advantage does role-based access have over individual file-based permissions?

34 / 125

Why is changing both the default username and password crucial during the initial setup of a network device?

35 / 125

What role does Transport Layer Security (TLS) play in Protected Extensible Authentication Protocol (PEAP)?

36 / 125

What should be kept in mind when evaluating hardening techniques for network security?

37 / 125

What are the two main types of cameras used in video surveillance and their general uses?

38 / 125

Which of the following is not a type of tamper detection?

39 / 125

What is a key distinguishing feature of a virus compared to other types of malware?

40 / 125

What is the purpose of Dynamic ARP Inspection (DAI) in relation to the DHCP snooping binding table?

41 / 125

What differentiates the Zero Trust model from the traditional trust model in terms of network security:

42 / 125

What server does the 802.1X typically use for authentication?

43 / 125

What is the primary function of private VLANs?

44 / 125

What is a dictionary attack and how can it be mitigated?

45 / 125

Why is it recommended to change the native VLAN from its default setting on a switch?

46 / 125

What is the function of a captive portal in a network?

47 / 125

Which of the following statements accurately describes IP Spoofing based on the provided text?

48 / 125

What is the principle of Least Privilege?

49 / 125

Which of the following best describes a brute-force attack?

50 / 125

What is the purpose of a penetration test in a ‘security assessment’?

51 / 125

What is the purpose of ARP spoofing in an on-path attack?

52 / 125

How is data sanitization performed on hybrid drives?

53 / 125

Which concept ensures a user is given no more privileges than what is required for his/her role in the context of remote access?

54 / 125

What port does the Remote Desktop Protocol (RDP) communicate over?

55 / 125

What do Access Control Lists (ACLs) in a screened subnet (DMZ) typically restrict or control?

56 / 125

What is the role of a Network Access Control (NAC) system in conjunction with the 802.1X protocol?

57 / 125

What is the main purpose of identification badges in organizations with physical and electronic-based security?

58 / 125

Which protocol uses Transmit Power Control (TPC) and Dynamic Frequency Selection (DFS) to adjust for optimal power and frequency of the network client?

59 / 125

What differentiates passive and active RFID asset tracking tags?

60 / 125

What is the primary purpose of the wireless client isolation feature?

61 / 125

Which of the following best describes a vulnerability in the context of network security?

62 / 125

According to the text, why is employee training important in prevention methods for unauthorized physical access?

63 / 125

What is an Evil Twin attack as described in the topic ’Evil twin’?

64 / 125

What is one of the key benefits of good employee training on security in an organization?

65 / 125

What is a reflective DoS attack?

66 / 125

What technique is used by both the Microsoft Server and Linux/Unix operating systems to reduce the surface area of attack?

67 / 125

What best describes the concept of ’Defense in Depth’ as it relates to network security?

68 / 125

What does the term ’Tailgating’ refer to in the context of social engineering attacks?

69 / 125

What is the maximal speed a modem can provide on a plain old telephone service (POTS) line?

70 / 125

What is the correct method to sanitize a solid-state drive (SSD) for disposal?

71 / 125

Why is it important to keep network racks and cabinets locked in an organization?

72 / 125

What is the main purpose of an Access Control Vestibule (Previously Known as a Mantrap) in network security?

73 / 125

What does a phishing attack typically attempt to collect?

74 / 125

Which EAP method was jointly developed by Cisco, Microsoft, and RSA Security?

75 / 125

Which of the following is NOT a commonly used factor of authentication?

76 / 125

Why is it necessary to disable unneeded switchports on a network device?

77 / 125

What is Ransomware in the context of network security?

78 / 125

What is the characteristic of an amplified DoS attack?

79 / 125

Which of the following is NOT a method for ensuring the confidentiality of information as described in the CIA triad?

80 / 125

Which of the following best describes the purpose of the Common Vulnerabilities and Exposures (CVE) system?

81 / 125

What happens when a client computer establishes a VPN connection according to the description provided?

82 / 125

Which version of Simple Network Management Protocol (SNMP) addresses security concerns by incorporating features such as encryption and robust authentication?

83 / 125

What is DNS Poisoning?

84 / 125

According to the given text, what does multifactor authentication entail?

85 / 125

What information can be obtained through the use of detection methods in network security?

86 / 125

According to the text, what considerations should be made when disposing of assets?

87 / 125

What is social engineering in the context of network security?

88 / 125

Which of the following statements accurately describes the characteristics of different motion detection sensors?

89 / 125

What is local authentication typically used for?

90 / 125

What is the role of power levels in wireless antenna placement and which protocol can help control it?

91 / 125

What is the main purpose of control plane policing (CoPP) in a network?

92 / 125

How does an employee access an electronic device from a smart locker in a tech-driven organization?

93 / 125

Which of the following best describes a clientless VPN solution based on the information provided in the text?

94 / 125

Which of the following options best describe how data integrity in transit is ensured?

95 / 125

What is the role of a VPN concentrator in a site-to-site VPN?

96 / 125

Which of the following is an accurate statement about sanitizing a Solid-State Drive (SSD)?

97 / 125

Why does implementing role-based access harden security?

98 / 125

What is the purpose of a honeypot in network security?

99 / 125

What is MAC spoofing used for in network attacks?

100 / 125

What characteristic distinguishes an amplified DoS attack from a Reflective DoS attack?

101 / 125

What is a suggested best practice when creating passwords based on the text?

102 / 125

What is the primary role of the Remote Desktop Gateway?

103 / 125

What does the Kerberos protocol do?

104 / 125

How does MAC filtering enhance wireless security?

105 / 125

Which of the following is NOT a common metric used in Biometrics for physical access control?

106 / 125

Which of the following correctly describes the function of EAP-TLS?

107 / 125

What protocol and port does LDAP use by default?

108 / 125

What is a significant security consideration when implementing IoT devices in an organization?

109 / 125

Which of the following considerations are NOT typically considered when creating a guest network within an organization?

110 / 125

What is the primary purpose of a rogue DHCP server in a network?

111 / 125

Which of the following best describes the purpose of patching an operating system immediately after installation?

112 / 125

Which of the following is NOT true about Virtual Network Computing (VNC)?

113 / 125

Which of the following methods is the easiest to implement for network segmentation according to the text?

114 / 125

What accurately describes a preshared key (PSK)?

115 / 125

What is the purpose of a console router in a network?

116 / 125

What is the first tactic done in a vulnerability assessment?

117 / 125

What type of encryption does SSH use to provide authentication between the SSH client and server?

118 / 125

What is the best defense against shoulder surfing attacks?

119 / 125

What method of sanitization is typically used for magnetic drives?

120 / 125

What is the Extensible Authentication Protocol (EAP)?

121 / 125

What is the primary reason organizations have embraced VDI according to the passage?

122 / 125

What is the primary function of the Router Advertisement (RA) Guard feature?

123 / 125

What are the steps described in the NIST Cyber Security Framework (CSF) for handling a threat and maintaining network security?

124 / 125

In the context of social engineering, what is the method of ’tailgating’ used by attackers?

125 / 125

In the context of CompTIA Network+, which of the following best describes ’Piggybacking’?

Your score is


🔒 Hands-On IT Course (Start a New Career in 8-12 Weeks!) 🔒

Visit IT Course 

 

Boost Your Skills with Free Anki Flashcards

Click the download button to get the Network+ N10-008 Anki deck.

Anki deck images

Boost your IT skills with our free CompTIA Network+ practice test focusing on 4.0 Network Security. Whether you’re entering the IT industry or advancing in cyber security, our resources are here to help you succeed in the CompTIA Exam.

Why Choose Our CompTIA Network+ Practice Test?

  • Skill Enhancement: Covers essential network security concepts crucial for the CompTIA Exam and vulnerability management.
  • Career Advancement: Passing the CompTIA Network+ exam can open doors to new job opportunities and significant career changes in the IT industry.
  • Vulnerability Management: Master the art of managing network vulnerabilities, a key skill in the field of cyber security.

Free Anki Deck Download

Download our free Anki Deck, reviewed by industry expert Josh Madakor, who has extensive experience in IT and cyber security, including work with Microsoft and government sectors. Learn more about Anki on the official site.

Get Started with Your IT Career Change Today!

Visit the CompTIA Network+ official site to learn more. Prepare, practice, and succeed with our comprehensive resources, supporting your IT career change in the IT industry and cyber security.

 

Explore our other free mock exams:

Share the Post:

Related Posts

RSS  
  • Discover How to Work Remotely and Travel!
    Have you ever dreamed about working from beautiful places like Thailand or Japan, but weren’t sure if it’s possible? I’m here to share my adventures and some tips on how to make working remotely while exploring the world a reality.  Who Am I? My name is Josh, and I’m all about creating helpful content on […]
  • Why Contract Work in IT Can Be a Good Start for Your Career
    Hey buddies! Are you curious about what it’s like to work in IT and cyber security? Well, you’re in luck because today we’re diving into the world of contract work and how it might just be the jumpstart your career needed! Getting Into the World of Contract Work in IT Josh, an expert in IT […]
  • Is Cyber Security a Career That Will Last Forever?
    Hey everyone! Have you ever wondered if choosing a career in cyber security is a good idea for the long haul? Well, let’s dive into this topic with the help of Josh Maor’s insights, and find out why cyber security might just be one of the smartest career choices out there. What Is Cyber Security? […]
IT Course

The Affordable, Hands-On Josh Madakor IT Course that gets Results!

Ready to get started your journey?
Cyber Course

The Affordable, Hands-On Cyber Security that gets Results!

Ready to get started your journey?

JOIN OUR

NEWSLETTER

Sign up for our free newsletters.

by joining 8000+ others in my weekly newsletter 

where you’ll get a dose of my thoughts on self-improvement, career,

and life!