Winter Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA N10-009 CompTIA Network+ Certification Exam Exam Practice Test

Page: 1 / 17
Total 170 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?

Options:

A.

MTTR

B.

MTBF

C.

RPO

D.

RTO

Question 2

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Question 3

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Question 4

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Question 5

A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Question 6

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 7

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Question 8

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Question 9

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

Options:

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Question 10

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Question 11

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 12

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Question 13

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Question 14

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 15

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

Theweb server Is In adifferent subnet.

B.

Therouter interface isa broadcast address.

C.

TheIP address spaceis a class A network.

D.

Thesubnet is in a private address space.

Question 16

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port

B.

DNS

C.

MAC

D.

Content

Question 17

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Question 18

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Options:

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Question 19

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Question 20

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Question 21

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Question 22

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question 23

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

Options:

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Question 24

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

Options:

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Question 25

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Options:

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Question 26

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Question 27

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Question # 27

Question # 27

Question # 27

Question # 27

Question # 27

Options:

Question 28

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Question 29

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Question 30

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

Options:

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Question 31

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

Options:

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Question 32

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

Options:

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Question 33

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Question 34

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Question 35

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question 36

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Question 37

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Question 38

Which of the following most likely requires the use of subinterfaces?

Options:

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Question 39

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 40

A network technician needs to resolve some issues with a customer's SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

Question # 40

Question # 40

Cable Test Results:

Cable 1:

Question # 40

Cable 2:

Cable 3:

Cable 4:

Options:

Question 41

A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

Options:

A.

NS

B.

SOA

C.

PTR

D.

CNAME

Question 42

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Question 43

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Question # 43

Question # 43

Question # 43

Options:

Question 44

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

Options:

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Question 45

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

Options:

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Question 46

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question 47

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Page: 1 / 17
Total 170 questions