Summer Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port

B.

DNS

C.

MAC

D.

Content

Buy Now
Questions 5

Which of the following ports should a network administrator enable for encrypted login to a network switch?

Options:

A.

22

B.

23

C.

80

D.

123

Buy Now
Questions 6

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Buy Now
Questions 7

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Buy Now
Questions 8

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 9

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Buy Now
Questions 10

A network administrator is creating a subnet that will include 45 separate hosts on a small private network within a large network architecture. Which of the following options is the most efficient use of network addresses when assigning this network?

Options:

A.

10.0.50.128/25

B.

10.7.142.128/27

C.

10.152.4.192/26

D.

10.192.1.64/28

Buy Now
Questions 11

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Buy Now
Questions 12

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Buy Now
Questions 13

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Buy Now
Questions 14

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

Options:

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Buy Now
Questions 15

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

Options:

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Buy Now
Questions 16

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Buy Now
Questions 17

Which of the following offers the ability to manage access at the cloud VM instance?

Options:

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Buy Now
Questions 18

Users are unable to access files on their department share located on file server 2.

The network administrator has been tasked with validating routing between networks

hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 Question 18

N10-009 Question 18

N10-009 Question 18

N10-009 Question 18

Options:

Buy Now
Questions 19

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

Options:

A.

Physical

B.

Network

C.

Session

D.

Transport

Buy Now
Questions 20

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Buy Now
Questions 21

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Buy Now
Questions 22

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Buy Now
Questions 23

Options:

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

Buy Now
Questions 24

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

Options:

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Buy Now
Questions 25

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

Options:

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Buy Now
Questions 26

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

Options:

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Buy Now
Questions 27

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Buy Now
Questions 28

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

Options:

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Buy Now
Questions 29

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Buy Now
Questions 30

Options:

A.

ESP

B.

SSH

C.

GRE

D.

IKE

Buy Now
Questions 31

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Buy Now
Questions 32

A network engineer is deploying switches at a new remote office. The switches have been preconfigured with hostnames and STP priority values. Based on the following table:

Switch Name

Priority

core-sw01

24576

access-sw01

28672

distribution-sw01

32768

access-sw02

36864

Which of the following switches will become the root bridge?

Options:

A.

core-sw01

B.

access-sw01

C.

distribution-sw01

D.

access-sw02

Buy Now
Questions 33

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Buy Now
Questions 34

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 35

A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a high-traffic malware attack, narrowing the event to a specific user was difficult because of the wireless configuration.

Which of the following actions should the company take?

Options:

A.

Restrict users to the 5GHz frequency.

B.

Upgrade to a mesh network.

C.

Migrate from PSK to Enterprise.

D.

Implement WPA2 encryption.

Buy Now
Questions 36

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Buy Now
Questions 37

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Buy Now
Questions 38

Options:

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Buy Now
Questions 39

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

Options:

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Buy Now
Questions 40

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Buy Now
Questions 41

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Options:

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Buy Now
Questions 42

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Buy Now
Questions 43

A network technician needs to resolve some issues with a customer's SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

N10-009 Question 43

N10-009 Question 43

N10-009 Question 43

N10-009 Question 43

N10-009 Question 43

N10-009 Question 43

N10-009 Question 43

Options:

Buy Now
Questions 44

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

Options:

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Buy Now
Questions 45

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Buy Now
Questions 46

A network administrator needs to connect a multimode fiber cable from the MDF to the server room. The administrator connects the cable to Switch 2, but there is no link light. The administrator tests the fiber and finds it does not have any issues. Swapping the connection to Switch 1 in a working port is successful, but the swapped connection does not work on Switch 2. Which of the following should the administrator verify next?

Options:

A.

Fiber length

B.

Transceiver model

C.

Connector type

D.

Port speed

Buy Now
Questions 47

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Buy Now
Questions 48

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 49

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Buy Now
Questions 50

Which of the following can also provide a security feature when implemented?

Options:

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Buy Now
Questions 51

Options:

A.

Implement the solution

B.

Verify full system functionality

C.

Document findings

D.

Test the theory

Buy Now
Questions 52

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

Options:

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Buy Now
Questions 53

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Buy Now
Questions 54

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Buy Now
Questions 55

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Buy Now
Questions 56

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

Options:

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Buy Now
Questions 57

Options:

A.

SC

B.

DAC

C.

SFP transceiver

D.

Twinaxial cable

Buy Now
Questions 58

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

Options:

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Buy Now
Questions 59

Which of the following explains what happens if a packet is lost in transit when using UDP?

Options:

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Buy Now
Questions 60

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

Options:

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Buy Now
Questions 61

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?

Options:

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Buy Now
Questions 62

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

Options:

A.

RJ45

B.

ST

C.

LC

D.

MPO

Buy Now
Questions 63

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

Options:

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Buy Now
Questions 64

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Buy Now
Questions 65

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Buy Now
Questions 66

Which of the following describes the best reason for using BGP?

Options:

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Buy Now
Questions 67

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Buy Now
Questions 68

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

Options:

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Buy Now
Questions 69

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

Options:

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Buy Now
Questions 70

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Buy Now
Questions 71

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Buy Now
Questions 72

Options:

A.

NAT

B.

BGP

C.

OSPF

D.

FHRP

Buy Now
Questions 73

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

Options:

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Buy Now
Questions 74

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

Options:

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Buy Now
Questions 75

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Buy Now
Questions 76

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

Options:

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Buy Now
Questions 77

Which of the following allows a standard user to log in to multiple resources with one account?

Options:

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Buy Now
Questions 78

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

Options:

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

Buy Now
Questions 79

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 Question 79

N10-009 Question 79

Options:

Buy Now
Questions 80

Which of the following network ports is used when a client accesses an SFTP server?

Options:

A.

22

B.

80

C.

443

D.

3389

Buy Now
Questions 81

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Buy Now
Questions 82

Options:

A.

Syslog server

B.

SMTP

C.

SNMP

D.

NTP

Buy Now
Questions 83

Options:

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

Buy Now
Questions 84

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Buy Now
Questions 85

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

Options:

A.

Changing the default password

B.

Blocking inbound SSH connections

C.

Removing the gateway from the network configuration

D.

Restricting physical access to the switch

Buy Now
Questions 86

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Buy Now
Questions 87

Options:

A.

Toner and probe

B.

Protocol analyzer

C.

Cable tester

D.

Spectrum reader

Buy Now
Questions 88

Which of the following connector types is most commonly associated with Wi-Fi antennas?

Options:

A.

BNC

B.

SFP

C.

MPO

D.

RJ45

Buy Now
Questions 89

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Buy Now
Questions 90

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Buy Now
Questions 91

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

Options:

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Buy Now
Questions 92

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Buy Now
Questions 93

Options:

A.

On-path

B.

Rogue AP

C.

Evil twin

D.

Tailgating

Buy Now
Questions 94

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 Question 94

Options:

Buy Now
Questions 95

A firewall administrator is mapping a server's internal IP address to an external IP address for public use. Which of the following is the name of this function?

Options:

A.

NAT

B.

VIP

C.

PAT

D.

BGP

Buy Now
Questions 96

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

Options:

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Buy Now
Questions 97

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Buy Now
Questions 98

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

Options:

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Buy Now
Questions 99

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Buy Now
Questions 100

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

Options:

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Buy Now
Questions 101

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?

Options:

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Buy Now
Questions 102

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

Options:

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Buy Now
Questions 103

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Buy Now
Questions 104

Which of the following is a major difference between an IPS and IDS?

Options:

A.

An IPS needs to be installed in line with traffic and an IDS does not.

B.

An IPS is signature-based and an IDS is not.

C.

An IPS is less susceptible to false positives than an IDS.

D.

An IPS requires less administrative overhead than an IDS.

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Sep 17, 2025
Questions: 393

PDF + Testing Engine

$72.6  $181.49

Testing Engine

$57.8  $144.49
buy now N10-009 testing engine

PDF (Q&A)

$49.8  $124.49
buy now N10-009 pdf