Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium CompTIA N10-009 Dumps Questions Answers

Page: 1 / 11
Total 153 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Question 2

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Options:

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Question 3

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Question 4

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

Options:

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Question 5

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 6

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Options:

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Question 7

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

Options:

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Question 8

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Question 9

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Question 10

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

Options:

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Question 11

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Question 12

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

Options:

Question 13

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Question 14

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Question 15

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Question 16

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Question 17

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

Options:

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Question 18

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 19

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

Options:

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Question 20

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Question 21

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Options:

Question 22

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

Options:

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Question 23

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Question 24

Which of the following network traffic type is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Question 25

Which of the following most likely requires the use of subinterfaces?

Options:

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Question 26

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

Options:

A.

4096

B.

8192

C.

32768

D.

36684

Question 27

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Question 28

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 29

A network technician needs to resolve some issues with a customer's SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Options:

Question 30

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Options:

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Question 31

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Question 32

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

Options:

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Question 33

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TC

P

Question 34

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Question 35

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

Options:

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Question 36

Which of the following is used to describe the average duration of an outage for a specific service?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Question 37

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Question 38

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

Options:

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Question 39

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Question 40

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Question 41

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Question 42

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Question 43

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Question 44

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 45

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Page: 1 / 11
Total 153 questions