Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

Options:

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Buy Now
Questions 5

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

Options:

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Buy Now
Questions 6

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

Options:

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

Buy Now
Questions 7

Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?

Options:

A.

Fire suppression

B.

Power budget

C.

Temperature

D.

Humidity

Buy Now
Questions 8

A company implements a new network utilizing only IPv6 addressing and needs to connect to the internet. Which of the following must be enabled in order for the internal network to contact servers on the internet?

Options:

A.

MPLS

B.

NAT64

C.

GRE

D.

Static routing

Buy Now
Questions 9

A technician is deploying new networking hardware for company branch offices. The bridge priority must be properly set. Which of the following should the technician configure?

Options:

A.

Spanning tree protocol

B.

Jumbo frames

C.

Perimeter network

D.

Port security

Buy Now
Questions 10

Which of the following routing technologies uses an attribute list for path selection?

Options:

A.

BGP

B.

RIP

C.

EIGRP

D.

OSPF

Buy Now
Questions 11

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 12

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Buy Now
Questions 13

An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that allows for continuous connectivity anywhere in the facility. Which of the following should the network administrator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

Changing the current frequency of the Wi-Fi

Buy Now
Questions 14

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

Options:

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Buy Now
Questions 15

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

Options:

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Buy Now
Questions 16

A company is implementing a new internal network in which all devices use IPv6 addresses. Which of the following routing protocols will be best for this setup?

Options:

A.

EIGRP

B.

OSPFv3

C.

BGP4

D.

iBGP

Buy Now
Questions 17

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

Options:

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Buy Now
Questions 18

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 19

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Buy Now
Questions 20

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

Options:

A.

Dig

B.

Nmap

C.

Tracert

D.

nslookup

Buy Now
Questions 21

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

Options:

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

Buy Now
Questions 22

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

Options:

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Buy Now
Questions 23

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

Options:

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Buy Now
Questions 24

A network technician installs a new 19.7ft (6m), Cat 6, UTP cable for the connection between a server and a switch. Communication to the server is degraded, and the NIC statistics show dropped packets and CRC errors. Which of the following cables would the technician most likely use instead to reduce the errors?

Options:

A.

Coaxial cable

B.

9.8ft (3m) cable

C.

Plenum cable

D.

STP cable

Buy Now
Questions 25

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

Options:

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Buy Now
Questions 26

A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?

Options:

A.

802.1Q tagging

B.

Jumbo frames

C.

Half duplex

D.

Link aggregation

Buy Now
Questions 27

Which of the following objectives does an evil twin achieve?

Options:

A.

DNS poisoning

B.

Login credentials

C.

ARP spoofing

D.

Denial of service

Buy Now
Questions 28

A major natural disaster strikes a company ' s headquarters, causing significant destruction and data loss. The company needs to quickly recover and resume operations. Which of the following will a network administrator need to do first?

Options:

A.

Conduct a damage assessment

B.

Migrate to the cold site

C.

Notify customers of the disaster

D.

Establish a communication plan

Buy Now
Questions 29

A small business is choosing between static and dynamic routing for its network. Which of the following is the best reason to use dynamic routing in a growing network?

Options:

A.

Easier to configure compared to using manually entered routes

B.

Does not require additional network security controls

C.

Features enhanced network monitoring and visibility

D.

Includes automatic changes and updates in network topology

Buy Now
Questions 30

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

Options:

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Buy Now
Questions 31

A network administrator needs a solution to isolate and potentially identify any threat actors that are attempting to breach the network. Which of the following should the administrator implement to determine the type of attack used?

Options:

A.

MFA

B.

Screened subnet

C.

Captive portal

D.

Honeypot

Buy Now
Questions 32

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Buy Now
Questions 33

Which of the following services runs on port 636?

Options:

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Buy Now
Questions 34

A network technician is installing a new switch that does not support STP at the access layer of a network. The technician wants a redundant connection to the distribution switch. Which of the following should the technician use?

Options:

A.

Link aggregation

B.

Subinterfaces

C.

Switch virtual interfaces

D.

Half-duplex connections

Buy Now
Questions 35

Which of the following offers the ability to manage access at the cloud VM instance?

Options:

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Buy Now
Questions 36

A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of the following is causing the issue?

Options:

A.

Throughput capacity

B.

Roaming misconfiguration

C.

Channel overlap

D.

Packet loss

Buy Now
Questions 37

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

Options:

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Buy Now
Questions 38

A network administrator is responding to a request to configure a new IP phone. Which of the following should the network administrator do to allow data and voice traffic to be properly prioritized?

Options:

A.

Configure full duplex.

B.

Modify QoS.

C.

Enable 802.1Q tagging.

D.

Change the native VLAN.

Buy Now
Questions 39

A user tries to visit a website, but instead of the intended site, the page displays vmw.cba.com. Which of the following should be done to reach the correct website?

Options:

A.

Modify the CNAME record

B.

Update the PTR record

C.

Change the NTP settings

D.

Delete the TXT record

Buy Now
Questions 40

A network administrator is trying to troubleshoot an issue with a newly installed switch that is not connecting to the network. The administrator logs on to the switch and observes collisions on the interface. Which of the following is most likely the issue?

Options:

A.

Wrong speed

B.

Jumbo frames enabled

C.

Incorrect VLAN

D.

Duplex mismatch

Buy Now
Questions 41

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 42

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

N10-009 Question 42

Which of the following ports should be disabled?

Options:

A.

22

B.

80

C.

443

D.

587

Buy Now
Questions 43

Which of the following attacks forces a switch to send all traffic out of all ports?

Options:

A.

ARP poisoning

B.

Evil twin

C.

MAC flooding

D.

DNS spoofing

Buy Now
Questions 44

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Buy Now
Questions 45

A new staff member is unable to connect to the network. An IT support staff member finds the following:

The IP configuration is correct.

The TCP/IP stack is working on the workstation.

The gateway is unreachable.

Which of the following would the IT support staff member most likely check next?

Options:

A.

The DHCP configuration on the workstation

B.

The port ' s VLAN assignment on the switch

C.

The DHCP configuration on the router

D.

The default gateway on the switch

Buy Now
Questions 46

Which of the following allows a user to authenticate to multiple resources without requiring additional passwords?

Options:

A.

SSO

B.

MFA

C.

SAML

D.

RADIUS

Buy Now
Questions 47

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Buy Now
Questions 48

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

Options:

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Buy Now
Questions 49

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

Options:

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Buy Now
Questions 50

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

Options:

A.

The switches are not the correct voltage.

B.

The HVAC system was not verified as fully functional after the fire.

C.

The VLAN database was not deleted before the equipment was brought back online.

D.

The RJ45 cables were replaced with unshielded cables.

E.

The wrong transceiver type was used for the new termination.

F.

The new RJ45 cables are a higher category than the old ones.

Buy Now
Questions 51

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

Options:

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Buy Now
Questions 52

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Buy Now
Questions 53

After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in this example?

Options:

A.

SSO

B.

LDAP

C.

MFA

D.

SAML

Buy Now
Questions 54

A new SQL server is identified as allowing FTP access to all users. Which of the following would a systems administrator most likely do to ensure only the required services are allowed?

Options:

A.

Disable unused ports on the server.

B.

Change default passwords on all servers.

C.

Delete the NGFW rules that allow all FTP traffic.

D.

Configure server ACLs on the switches that the SQL traffic traverses.

Buy Now
Questions 55

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP ' s connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Buy Now
Questions 56

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Buy Now
Questions 57

A network administrator needs to connect a multimode fiber cable from the MDF to the server room. The administrator connects the cable to Switch 2, but there is no link light. The administrator tests the fiber and finds it does not have any issues. Swapping the connection to Switch 1 in a working port is successful, but the swapped connection does not work on Switch 2. Which of the following should the administrator verify next?

Options:

A.

Fiber length

B.

Transceiver model

C.

Connector type

D.

Port speed

Buy Now
Questions 58

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

Options:

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

Buy Now
Questions 59

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Buy Now
Questions 60

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

Options:

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Buy Now
Questions 61

Which of the following must be implemented to securely connect a company ' s headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Buy Now
Questions 62

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

Options:

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Buy Now
Questions 63

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Buy Now
Questions 64

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

Options:

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Buy Now
Questions 65

A secure communication link needs to be configured between data centers via the internet. The data centers are located in different regions. Which of the following is the best protocol for the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Buy Now
Questions 66

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Buy Now
Questions 67

A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department’s shared drives but can access the internet. Which of the following is the most likely cause of this issue?

Options:

A.

Mismatched switchport duplex

B.

Misconfigured gateway settings

C.

Incorrect VLAN assignment

D.

SVI is assigned to the wrong IP address

Buy Now
Questions 68

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Buy Now
Questions 69

Which of the following devices functions mainly at the data link layer of the OSI model and is used to connect a fiber-optic cable to a network interface?

Options:

A.

SC

B.

DAC

C.

SFP transceiver

D.

Twinaxial cable

Buy Now
Questions 70

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Buy Now
Questions 71

Which of the following is the most likely benefit of installing server equipment in a rack?

Options:

A.

Simplified troubleshooting process

B.

Decreased power consumption

C.

Improved network performance

D.

Increased compute density

Buy Now
Questions 72

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Buy Now
Questions 73

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

Options:

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Buy Now
Questions 74

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 75

A firewall receives traffic on port 80 and forwards it to an internal server on port 88. Which of the following technologies is being leveraged?

Options:

A.

TLS

B.

FHRP

C.

SSL

D.

PAT

Buy Now
Questions 76

Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?

Options:

A.

Jump box

B.

Console server

C.

API interface

D.

In-band management

Buy Now
Questions 77

Several users in an organization report connectivity issues and lag during a video meeting. The network administrator performs a tcpdump and observes increased retransmissions for other non-video applications on the network. Which of the following symptoms describes the users ' reported issues?

Options:

A.

Latency

B.

Packet loss

C.

Bottlenecking

D.

Jitter

Buy Now
Questions 78

Which of the following protocols is used to route traffic on the public internet?

Options:

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Buy Now
Questions 79

A network technician is designing a LAN for a new facility. The company is expecting more than 300 devices to connect to the network. Which of the following masks will provide the most efficient subnet?

Options:

A.

255.255.0.0

B.

255.255.192.0

C.

255.255.254.0

D.

255.255.255.254

Buy Now
Questions 80

Which of the following, in addition to a password, can be asked of a user for MFA?

Options:

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Buy Now
Questions 81

Which of the following is the most cost-effective way to safely expand outlet capacity in an IDF?

Options:

A.

PDU

B.

Surge protector

C.

UPS

D.

Power strip

Buy Now
Questions 82

A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the reason to add a second PDU?

Options:

A.

Power redundancy

B.

Failed PSU monitoring

C.

Surge protection

D.

Electricity conservation

Buy Now
Questions 83

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Buy Now
Questions 84

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

Options:

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Buy Now
Questions 85

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

Options:

A.

Private

B.

Community

C.

Public

D.

Hybrid

Buy Now
Questions 86

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

Options:

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Buy Now
Questions 87

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Buy Now
Questions 88

A technician is troubleshooting a user ' s laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Buy Now
Questions 89

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

Options:

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Buy Now
Questions 90

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

Options:

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Buy Now
Questions 91

Which of the following most likely determines the size of a rack for installation? (Select two).

Options:

A.

KVM size

B.

Switch depth

C.

Hard drive size

D.

Cooling fan speed

E.

Outlet amperage

F.

Server height

Buy Now
Questions 92

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Buy Now
Questions 93

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Buy Now
Questions 94

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

Options:

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Buy Now
Questions 95

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

Options:

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Buy Now
Questions 96

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user ' s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Buy Now
Questions 97

A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations:

Core-SW01

vlan 100

name

interface Ethernet 1/1

channel-group 1 mode active

interface Ethernet 1/2

channel-group 1 mode active

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Core-SW02

vlan 100

name

interface Ethernet 1/1

switchport mode trunk

switchport trunk allow vlan 100

interface Ethernet 1/2

switchport mode trunk

switchport trunk allow vlan 100

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Which of the following is the state of the Core-SW01 port-channel interfaces?

Options:

A.

Incrementing CRC errors

B.

Error disabled

C.

Administratively down

D.

Suspended

Buy Now
Questions 98

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 < 1 ms 2. * < 1 ms < 1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

Options:

A.

Review the router ' s ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Buy Now
Questions 99

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

Options:

A.

Band steering

B.

Wireless LAN controller

C.

Directional antenna

D.

Autonomous access point

Buy Now
Questions 100

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

Options:

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Buy Now
Questions 101

Which of the following is the next step to take after successfully testing a root cause theory?

Options:

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Buy Now
Questions 102

A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?

Options:

A.

Mesh

B.

Infrastructure

C.

Ad hoc

D.

Point-to-point

Buy Now
Questions 103

Which of the following network access methods is used to securely access resources, such as a corporate cloud or network, as if they were directly connected?

Options:

A.

Jump box/host

B.

Secure Shell

C.

Client-to-site VPN

D.

GRE tunnel

Buy Now
Questions 104

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

Options:

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Buy Now
Questions 105

Which of the following ports is used to transfer data between mail exchange servers?

Options:

A.

21

B.

25

C.

53

D.

69

Buy Now
Questions 106

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

Options:

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Buy Now
Questions 107

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Buy Now
Questions 108

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 Question 108

N10-009 Question 108

Options:

Buy Now
Questions 109

Users are reporting latency on the network. The network engineer notes the following:

Confirms the only change was a new network switch

Confirms all users are experiencing latency

Thinks the issue is a network loop caused by the lower bridge ID of the new switch

Which of the following describes the next step in the troubleshooting methodology?

Options:

A.

Identify the problem.

B.

Test the theory.

C.

Implement the solution.

D.

Verify full system functionality.

Buy Now
Questions 110

A network engineer queries a hostname using dig, and a valid IP address is returned. However, when the engineer queries that same IP address using dig, no hostname is returned. Which of the following DNS records is missing?

Options:

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Buy Now
Questions 111

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

Options:

A.

arp

B.

tracert

C.

nmap

D.

ipconfig

Buy Now
Questions 112

A Chief Information Officer wants a DR solution that runs only after a failure of the primary site and can be brought online quickly once recent backups are imported. Which of the following DR site solutions meets these requirements?

Options:

A.

Cold

B.

Warm

C.

Active

D.

Hot

Buy Now
Questions 113

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Buy Now
Questions 114

An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB. Which of the following describes the function of a MIB?

Options:

A.

DHCP relay device

B.

Policy enforcement point

C.

Definition file for event translation

D.

Network access controller

Buy Now
Questions 115

Which of the following is a difference between EOL and EOS?

Options:

A.

EOL discontinues the product but may offer support.

B.

EOS replaces free support with a subscription model.

C.

EOS only applies to physical products.

D.

EOL still guarantees warranty service.

Buy Now
Questions 116

Which of the following uses the longest prefix match to determine an exit interface?

Options:

A.

ARP table

B.

MAC address table

C.

Routing table

D.

Netstat table

Buy Now
Questions 117

A customer calls the help desk to report that resources are no longer reachable. The resources were available before network changes were made. The technician verifies the report, investigates, and discovers that a new logical layout is segmenting the network using tagging. Which of the following appliances most likely needs to be reviewed to restore the connections?

Options:

A.

Access point

B.

Firewall

C.

Switch

D.

Load balancer

Buy Now
Questions 118

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department ' s shared folders?

Options:

A.

General Data Protection Regulation

B.

Least privilege network access

C.

Acceptable use policy

D.

End user license agreement

Buy Now
Questions 119

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

GUI

D.

API

Buy Now
Questions 120

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

Options:

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Buy Now
Questions 121

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

Options:

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Buy Now
Questions 122

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Buy Now
Questions 123

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

Options:

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Buy Now
Questions 124

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers ' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Buy Now
Questions 125

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Buy Now
Questions 126

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

Options:

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Buy Now
Questions 127

An attack on an internal server is traced to an isolated guest network. Which of the following best describes the attack?

Options:

A.

On-path

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Buy Now
Questions 128

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Buy Now
Questions 129

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

Options:

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Buy Now
Questions 130

Which of the following protocols is commonly associated with TCP port 443?

Options:

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Buy Now
Questions 131

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

Options:

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Buy Now
Questions 132

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

Options:

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Buy Now
Questions 133

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Buy Now
Questions 134

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

Options:

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Buy Now
Questions 135

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 136

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 137

Which of the following OSI model layers manages the exchange of HTTP information?

Options:

A.

Session

B.

Data link

C.

Network

D.

Application

Buy Now
Questions 138

A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?

Options:

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

Buy Now
Questions 139

Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

Phishing

Buy Now
Questions 140

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

Options:

A.

ACLs

B.

Port security

C.

Content filtering

D.

NAC

Buy Now
Questions 141

Which of the following connector types would most likely be used to connect to an external antenna?

Options:

A.

BNC

B.

ST

C.

LC

D.

MPO

Buy Now
Questions 142

Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?

Options:

A.

Server hardware specifications

B.

Data-at-rest encryption settings

C.

Network bandwidth and utilization

D.

Virtual machine configurations

Buy Now
Questions 143

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

Options:

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Buy Now
Questions 144

A user calls the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

Options:

A.

Identify the problem.

B.

Establish a theory.

C.

Document findings.

D.

Create a plan of action.

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Mar 9, 2026
Questions: 511

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now N10-009 testing engine

PDF (Q&A)

$43.57  $124.49
buy now N10-009 pdf