Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Free and Premium CompTIA N10-009 Dumps Questions Answers

Page: 1 / 23
Total 332 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?

Options:

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Buy Now
Question 2

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Question 3

A company's network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the following should a network technician implement to reduce the network congestion and improve performance?

Options:

A.

Load balancing

B.

Port mirroring

C.

Quality of Service

D.

Spanning Tree Protocol

Question 4

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Question 5

A network technician needs to resolve some issues with a customer's SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Options:

Question 6

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

Options:

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Question 7

A technician is deploying new networking hardware for company branch offices. The bridge priority must be properly set. Which of the following should the technician configure?

Options:

A.

Spanning tree protocol

B.

Jumbo frames

C.

Perimeter network

D.

Port security

Question 8

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Options:

Question 9

Users are unable to access files on their department share located on file server 2.

The network administrator has been tasked with validating routing between networks

hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 10

An organization wants better network visibility. The organization's requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

Options:

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Question 11

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

Options:

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Question 12

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

Options:

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Question 13

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Question 14

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Question 15

Which of the following is used to stage copies of a website closer to geographically dispersed users?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

SDN

Question 16

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Question 17

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Question 18

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

Options:

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Question 19

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Question 20

Which of the following is the next step to take after successfully testing a root cause theory?

Options:

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Question 21

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question 22

Which of the following fiber connector types is the most likely to be used on a network interface card?

Options:

A.

LC

B.

SC

C.

ST

D.

MPO

Question 23

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Question 24

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

Options:

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Question 25

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Question 26

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Question 27

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Question 28

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

Options:

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Question 29

Which of the following routing technologies uses an attribute list for path selection?

Options:

A.

BGP

B.

RIP

C.

EIGRP

D.

OSPF

Question 30

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

Options:

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Question 31

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 32

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

Options:

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Question 33

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

Options:

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Question 34

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Question 35

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

Options:

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Question 36

Which of the following offers the ability to manage access at the cloud VM instance?

Options:

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Question 37

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Question 38

Which of the following services runs on port 636?

Options:

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Question 39

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port

B.

DNS

C.

MAC

D.

Content

Question 40

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

Options:

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Question 41

Which of the following allows a standard user to log in to multiple resources with one account?

Options:

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Question 42

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

Options:

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Question 43

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Question 44

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Question 45

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Question 46

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 47

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Question 48

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

Options:

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Question 49

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Question 50

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Question 51

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

Options:

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Question 52

A network technician is troubleshooting a faulty NIC and tests the theory. Which of the following should the technician do next?

Options:

A.

Develop a theory.

B.

Establish a plan of action.

C.

Implement the solution.

D.

Document the findings.

Question 53

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

Options:

A.

Enable MAC security.

B.

Generate a PSK for each user.

C.

Implement WPS.

D.

Set up WPA3 protocol.

Question 54

Which of the following allows a remote user to connect to the network?

Options:

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Question 55

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements>?

Options:

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Question 56

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

Options:

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Question 57

Which of the following can also provide a security feature when implemented?

Options:

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Question 58

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Question 59

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

Options:

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Question 60

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Question 61

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Question 62

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Question 63

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

Theweb server Is In adifferent subnet.

B.

Therouter interface isa broadcast address.

C.

TheIP address spaceis a class A network.

D.

Thesubnet is in a private address space.

Question 64

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 65

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

Options:

A.

RJ45

B.

ST

C.

LC

D.

MPO

Question 66

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

Options:

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

Question 67

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question 68

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

Options:

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Question 69

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

Options:

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Question 70

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Question 71

Which of the following network traffic type is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Question 72

An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:

98469 packets input, 1681937 bytes, 0 no buffer

Received 1548 broadcasts (25285 multicasts)

65335 runts, 0 giants, 0 throttles

11546 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored

0 input packets with dribble condition detected

22781 packets output, 858040 bytes, 0 underruns

0 output errors, 89920 collisions, 0 interface resets

0 babbles, 0 late collision, 0 deferred

0 lost carrier, 0 no carrier

0 output buffer failures, 0 output buffers swapped out

Which of the following is most likely the cause of the issue?

Options:

A.

The patch cord from the wall jack is faulty.

B.

The switchport bandwidth needs to be increased.

C.

Multicast is not configured correctly on the switch.

D.

The NIC is set to half duplex.

Question 73

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 74

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

Options:

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Question 75

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 76

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 77

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

Options:

A.

Changing the default password

B.

Blocking inbound SSH connections

C.

Removing the gateway from the network configuration

D.

Restricting physical access to the switch

Question 78

Which of the following is the best way to keep devices on during a loss of power?

Options:

A.

UPS

B.

Power load

C.

PDU

D.

Voltage

Question 79

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 80

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Question 81

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Question 82

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

Options:

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Question 83

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

Options:

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Question 84

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Question 85

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

Options:

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Question 86

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

Options:

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Question 87

After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in this example?

Options:

A.

SSO

B.

LDAP

C.

MFA

D.

SAML

Question 88

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

Options:

A.

4096

B.

8192

C.

32768

D.

36684

Question 89

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Question 90

Users at an organization report that the wireless network is not working in some areas of the building. Users report that other wireless network SSIDs are visible when searching for the network, but the organization's network is not displayed. Which of the following is the most likely cause?

Options:

A.

Interference or channel overlap

B.

Insufficient wireless coverage

C.

Roaming misconfiguration

D.

Client disassociation issues

Question 91

Which of the following allows for the interception of traffic between the source and destination?

Options:

A.

Self-signed certificate

B.

VLAN hopping

C.

On-path attack

D.

Phishing

Page: 1 / 23
Total 332 questions