Pre-Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Buy Now
Questions 5

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Buy Now
Questions 6

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Buy Now
Questions 7

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 8

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Buy Now
Questions 9

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Buy Now
Questions 10

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?

Options:

A.

MTTR

B.

MTBF

C.

RPO

D.

RTO

Buy Now
Questions 11

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Buy Now
Questions 12

Which of the following can also provide a security feature when implemented?

Options:

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Buy Now
Questions 13

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Buy Now
Questions 14

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Buy Now
Questions 15

Which of the following describes the best reason for using BGP?

Options:

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Buy Now
Questions 16

Which of the following network topologies contains a direct connection between every node in the network?

Options:

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Buy Now
Questions 17

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

Options:

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Buy Now
Questions 18

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?

Options:

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Buy Now
Questions 19

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Options:

Buy Now
Questions 20

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Buy Now
Questions 21

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Buy Now
Questions 22

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Buy Now
Questions 23

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

OB. It checks independently for packet loss.

B.

It encrypts data in transit.

C.

It performs address translation.

Buy Now
Questions 24

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Buy Now
Questions 25

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Buy Now
Questions 26

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Buy Now
Questions 27

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Buy Now
Questions 28

Which of the following protocols provides remote access utilizing port 22?

Options:

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Buy Now
Questions 29

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Buy Now
Questions 30

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

Options:

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Buy Now
Questions 31

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Buy Now
Questions 32

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 33

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Buy Now
Questions 34

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

Options:

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Buy Now
Questions 35

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Buy Now
Questions 36

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Buy Now
Questions 37

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Buy Now
Questions 38

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

Options:

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Buy Now
Questions 39

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

Options:

A.

22

B.

80

C.

443

D.

587

Buy Now
Questions 40

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Buy Now
Questions 41

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Buy Now
Questions 42

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Buy Now
Questions 43

Which of the following is used to describe the average duration of an outage for a specific service?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Oct 17, 2024
Questions: 146
N10-009 pdf

N10-009 PDF

$28  $80
N10-009 Engine

N10-009 Testing Engine

$33.25  $95
N10-009 PDF + Engine

N10-009 PDF + Testing Engine

$45.5  $130