Month End Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Options:

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Buy Now
Questions 5

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Buy Now
Questions 6

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Buy Now
Questions 7

Which of the following protocols provides remote access utilizing port 22?

Options:

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Buy Now
Questions 8

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 9

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Buy Now
Questions 10

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Buy Now
Questions 11

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Buy Now
Questions 12

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Options:

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Buy Now
Questions 13

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

Options:

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Buy Now
Questions 14

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

Options:

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Buy Now
Questions 15

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Buy Now
Questions 16

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Buy Now
Questions 17

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

Options:

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Buy Now
Questions 18

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Buy Now
Questions 19

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

Options:

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Buy Now
Questions 20

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Buy Now
Questions 21

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?

Options:

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Buy Now
Questions 22

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

Options:

Buy Now
Questions 23

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?

Options:

A.

dig

B.

runap

C.

tracert

D.

telnet

Buy Now
Questions 24

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

Options:

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Buy Now
Questions 25

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Buy Now
Questions 26

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Buy Now
Questions 27

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 28

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Buy Now
Questions 29

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Options:

Buy Now
Questions 30

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

Options:

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Buy Now
Questions 31

A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the following can the administrator use to complete this task?

Options:

A.

IP Helper

B.

Reservation

C.

Exclusion

D.

Scope

Buy Now
Questions 32

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 33

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Buy Now
Questions 34

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

Options:

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Buy Now
Questions 35

Which of the following network topologies contains a direct connection between every node in the network?

Options:

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Buy Now
Questions 36

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Buy Now
Questions 37

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

Options:

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Buy Now
Questions 38

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Buy Now
Questions 39

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

Options:

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Buy Now
Questions 40

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Buy Now
Questions 41

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

Options:

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Buy Now
Questions 42

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Buy Now
Questions 43

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Buy Now
Questions 44

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Buy Now
Questions 45

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Buy Now
Questions 46

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Buy Now
Questions 47

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22

B.

69

C.

80

D.

3389

Buy Now
Questions 48

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Buy Now
Questions 49

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 50

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Buy Now
Questions 51

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?

Options:

A.

Reverse the fibers.

B.

Reterminate the fibers.

C.

Verify the fiber size.

D.

Examine the cable runs for visual faults.

Buy Now
Questions 52

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Options:

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Buy Now
Questions 53

Which of the following would be violated if an employee accidentally deleted a customer's data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Buy Now
Questions 54

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Buy Now
Questions 55

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?

Options:

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Buy Now
Questions 56

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Buy Now
Questions 57

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Options:

Buy Now
Questions 58

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

Options:

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Feb 28, 2025
Questions: 201
N10-009 pdf

N10-009 PDF

$25.5  $84.99
N10-009 Engine

N10-009 Testing Engine

$30  $99.99
N10-009 PDF + Engine

N10-009 PDF + Testing Engine

$40.5  $134.99