Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CompTIA > CompTIA Network+ > N10-009

N10-009 CompTIA Network+ Certification Exam Question and Answers

Question # 4

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Full Access
Question # 5

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Full Access
Question # 6

Which of the following provides an opportunity for an on-path attack?

A.

Phishing

B.

Dumpster diving

C.

Evil twin

D.

Tailgating

Full Access
Question # 7

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Full Access
Question # 8

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Full Access
Question # 9

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Full Access
Question # 10

A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company most likely implement?

A.

ACLs

B.

Content filter

C.

Port security

D.

Screened subnet

Full Access
Question # 11

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Full Access
Question # 12

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Full Access
Question # 13

Which of the following best explains the role of confidentiality with regard to data at rest?

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Full Access
Question # 14

Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?

A.

RTO

B.

SLA

C.

MTBF

D.

SIEM

Full Access
Question # 15

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Full Access
Question # 16

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

A.

RJ45

B.

ST

C.

LC

D.

MPO

Full Access
Question # 17

Which of the following explains what happens if a packet is lost in transit when using UDP?

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Full Access
Question # 18

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Full Access
Question # 19

Which of the following most likely determines the size of a rack for installation? (Select two).

A.

KVM size

B.

Switch depth

C.

Hard drive size

D.

Cooling fan speed

E.

Outlet amperage

F.

Server height

Full Access
Question # 20

A network technician needs to resolve some issues with a customer's SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Full Access
Question # 21

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Full Access
Question # 22

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

A.

110

B.

143

C.

587

D.

636

Full Access
Question # 23

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Full Access
Question # 24

Which of the following will allow secure, remote access to internal applications?

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Full Access
Question # 25

Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?

A.

Jump box

B.

Console server

C.

API interface

D.

In-band management

Full Access
Question # 26

Which of the following network cables involves bounding light off of protective cladding?

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Full Access
Question # 27

A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine the issue? (Select two).

A.

nslookup

B.

tcpdump

C.

arp

D.

dig

E.

tracert

F.

route print

Full Access
Question # 28

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Full Access
Question # 29

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Full Access
Question # 30

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

A.

4096

B.

8192

C.

32768

D.

36684

Full Access
Question # 31

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Full Access
Question # 32

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Full Access
Question # 33

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

A.

724

B.

/26

C.

/28

D.

/30

Full Access
Question # 34

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Full Access
Question # 35

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

Full Access
Question # 36

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Full Access
Question # 37

Which of the following allows a remote user to connect to the network?

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Full Access
Question # 38

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Full Access
Question # 39

Which of the following attacks would most likely cause duplicate IP addresses in a network?

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Full Access
Question # 40

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Full Access
Question # 41

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user's issue?

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Full Access
Question # 42

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Full Access
Question # 43

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 44

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 45

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements>?

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Full Access
Question # 46

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Full Access
Question # 47

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Full Access
Question # 48

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

A.

Band steering

B.

Wireless LAN controller

C.

Directional antenna

D.

Autonomous access point

Full Access
Question # 49

Which of the following VPN types provides secure remote access to the network resources through a web portal?

A.

Proxy

B.

Clientless

C.

Site-to-site

D.

Direct connect

Full Access
Question # 50

Which of the following ports creates a secure connection to a directory service?

A.

22

B.

389

C.

445

D.

636

Full Access
Question # 51

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Full Access
Question # 52

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Full Access
Question # 53

An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company's firewall require to access the internet? (Select TWO).

A.

NTP server

B.

Default gateway

C.

The modem's IP address

D.

One static IP address

E.

DNS servers

F.

DHCP server

Full Access
Question # 54

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Full Access
Question # 55

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Full Access
Question # 56

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

A.

22

B.

80

C.

443

D.

587

Full Access
Question # 57

Which of the following IP transmission types encrypts all of the transmitted data?

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Full Access
Question # 58

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Full Access
Question # 59

A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?

A.

Incorrect default gateway

B.

Faulty Ethernet cable

C.

Wrong duplex settings

D.

VLAN mismatch

Full Access
Question # 60

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Full Access
Question # 61

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Full Access
Question # 62

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

B.

SC

C.

ST

D.

MPO

Full Access
Question # 63

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

Full Access
Question # 64

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Full Access
Question # 65

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Full Access
Question # 66

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Full Access
Question # 67

Which of the following is most likely responsible for the security and handling of personal data in Europe?

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Full Access
Question # 68

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Full Access
Question # 69

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

A.

v1

B.

v2c

C.

v2u

D.

v3

Full Access
Question # 70

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Full Access
Question # 71

Which of the following ports is used for secure email?

A.

25

B.

110

C.

143

D.

587

Full Access
Question # 72

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Full Access
Question # 73

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Full Access
Question # 74

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Full Access
Question # 75

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A.

Port

B.

DNS

C.

MAC

D.

Content

Full Access
Question # 76

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Full Access
Question # 77

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Full Access
Question # 78

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Full Access
Question # 79

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Full Access
Question # 80

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Full Access
Question # 81

Which of the following is the most secure way to provide site-to-site connectivity?

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Full Access
Question # 82

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Full Access
Question # 83

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Full Access