Free N10-009 Exam Braindumps (page: 6)

Page 6 of 70

Which of the following ports is used for secure email?

  1. 25
  2. 110
  3. 143
  4. 587

Answer(s): D



A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)

  1. Least privilege network access
  2. Dynamic inventories
  3. Central policy management
  4. Zero-touch provisioning
  5. Configuration drift prevention
  6. Subnet range limits

Answer(s): A,C



Which of the following is a cost-effective advantage of a split-tunnel VPN?

  1. Web traffic is filtered through a web filler.
  2. More bandwidth is required on the company's internet connection.
  3. Monitoring detects insecure machines on the company's network.
  4. Cloud-based traffic flows outside of the company's network.

Answer(s): D



A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

  1. netstat
  2. nslookup
  3. ping
  4. tracert

Answer(s): D






Post your Comments and Discuss CompTIA N10-009 exam with other Community members:

N10-009 Exam Discussions & Posts