New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CompTIA N10-009 Dumps Questions Answers

Page: 1 / 12
Total 158 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Options:

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Buy Now
Question 2

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Question 3

Which of the following facilities is the best example of a warm site in the event of information system disruption?

Options:

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Question 4

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?

Options:

A.

MTTR

B.

MTBF

C.

RPO

D.

RTO

Question 5

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Question 6

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Question 7

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Question 8

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

Options:

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Question 9

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

Options:

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Question 10

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Question 11

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 12

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

Options:

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Question 13

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

Options:

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Question 14

Which of the following describes the best reason for using BGP?

Options:

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Question 15

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question 16

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Question 17

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question 18

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Question 19

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Question 20

A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?

Options:

A.

Neighbor adjacency

B.

Link state flooding

C.

Administrative distance

D.

Hop count

Question 21

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Question 22

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

Options:

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Question 23

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

Options:

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Question 24

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Question 25

Which of the following fiber connector types is the most likely to be used on a network interface card?

Options:

A.

LC

B.

SC

C.

ST

D.

MPO

Question 26

Which of the following connectors provides console access to a switch?

Options:

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Question 27

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Question 28

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 29

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 30

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

Options:

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

Question 31

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

Options:

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Question 32

Which of the following network topologies contains a direct connection between every node in the network?

Options:

A.

Mesh

B.

Hub-and-spoke

C.

Star

D.

Point-to-point

Question 33

Which of the following would be violated if an employee accidentally deleted a customer's data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question 34

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

OB. It checks independently for packet loss.

B.

It encrypts data in transit.

C.

It performs address translation.

Question 35

Which of the following can also provide a security feature when implemented?

Options:

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Question 36

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Question 37

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Question 38

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provies authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Question 39

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

Which of the following ports should be disabled?

Options:

A.

22

B.

80

C.

443

D.

587

Question 40

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 41

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Question 42

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Question 43

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Question 44

A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Question 45

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question 46

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Question 47

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helper

ANS

Page: 1 / 12
Total 158 questions