Special Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CompTIA N10-009 CompTIA Network+ Certification Exam Exam Practice Test

Page: 1 / 27
Total 272 questions

CompTIA Network+ Certification Exam Questions and Answers

Question 1

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Question 2

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

Question # 2

Question # 2

Question # 2

Question # 2

Options:

Question 3

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

Options:

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Question 4

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Question 5

A group of users cannot connect to network resources. The technician runs ipconfig from one user's device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

Options:

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Question 6

Which of the following could provide a lightweight and private connection to a remote box?

Options:

A.

Site-to-site VPN

B.

Telnet

C.

Console

D.

Secure Shell

Question 7

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Question 8

A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Question 9

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 9

Question # 9

Options:

Question 10

Which of the following technologies is thebest choicetolisten for requests and distribute user trafficacross web servers?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question 11

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Question 12

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

Options:

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Question 13

A secure communication link needs to beconfigured between data centers via the internet. The data centers are located in different regions. Which of the following is thebest protocolfor the network administrator to use?

Options:

A.

DCI

B.

GRE

C.

VXLAN

D.

IPSec

Question 14

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Question 15

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Question 16

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

Options:

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Question 17

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Question 18

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Question 19

Which of the following fiber connector types is the most likely to be used on a network interface card?

Options:

A.

LC

B.

SC

C.

ST

D.

MPO

Question 20

Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?

Options:

A.

OSPF

B.

EIGRP

C.

FHRP

D.

RIP

Question 21

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

Theweb server Is In adifferent subnet.

B.

Therouter interface isa broadcast address.

C.

TheIP address spaceis a class A network.

D.

Thesubnet is in a private address space.

Question 22

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Question 23

Anetwork technicianis troubleshooting afaulty NICandtests the theory. Which of the following should the techniciando next?

Options:

A.

Develop a theory.

B.

Establish a plan of action.

C.

Implement the solution.

D.

Document the findings.

Question 24

Which of the following should be used toobtain remote accessto anetwork appliance that has failed to start up properly?

Options:

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Question 25

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?

Options:

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Question 26

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 27

Which of the following allows for theinterception of trafficbetween the source and destination?

Options:

A.

Self-signed certificate

B.

VLAN hopping

C.

On-path attack

D.

Phishing

Question 28

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question 29

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Question 30

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host's TCP/IP stack first. Which of the following commands should the network administrator run?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Question 31

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Question 32

Which of the following is used to describe the average duration of an outage for a specific service?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Question 33

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Question 34

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Question 35

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Question 36

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Question 37

A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:

Question # 37

Which of the following should the technician most likely do to resolve the issue?

Options:

A.

Disable automatic negotiation on Switch11.

B.

Modify Switch10 MTU value to 1500.

C.

Configure STP on both switches.

D.

Change the native VLAN on the ports.

Question 38

In an environment with one router, which of the following will allow a network engineer to communicate between VLANs without purchasing additional hardware?

Options:

A.

Subinterfaces

B.

VXLAN

C.

Layer 3 switch

D.

VIR

Question 39

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Question 40

A network administrator is troubleshooting issues with aDHCP serverat a university. More students have recently arrived on campus, and the users areunable to obtain an IP address. Which of the following should the administrator do to address the issue?

Options:

A.

EnableIP helper.

B.

Change thesubnet mask.

C.

Increase thescope size.

D.

Addaddress exclusions.

Question 41

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question 42

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 43

A network administrator is developing a method of device monitoring with the following requirements:

•Allows for explicit, by user, privilege management

•Includes centralized logging of changes

•Offers widely accessible remote management

•Provides support of service accounts

Which of the following will most closely meet these requirements?

Options:

A.

SNMP

B.

API

C.

SIEM

D.

SSO

Question 44

Which of the following allows a remote user to connect to the network?

Options:

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Question 45

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Question 46

Which of the followingconnector typeswould most likely be used to connect to anexternal antenna?

Options:

A.

BNC

B.

ST

C.

LC

D.

MPO

Question 47

A network administrator deployedwireless networkingin the office area. When users visit theoutdoor patioand try todownload emails with large attachments or stream training videos, they noticebuffering issues. Which of the following is themost likely cause?

Options:

A.

Network congestion

B.

Wireless interference

C.

Signal degradation

D.

Client disassociation

Question 48

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 49

Which of the following network cables involves bounding light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Question 50

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Question 51

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

Options:

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Question 52

Which of the followingportscreates asecure connectionto adirectory service?

Options:

A.

22

B.

389

C.

445

D.

636

Question 53

Which of the following facilities is the best example of a warm site in the event of information system disruption?

Options:

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Question 54

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Question 55

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Question 56

A network engineer configures the network settings in a new server as follows:

    IP address = 192.163.1.15

    Subnet mask = 255.255.255.0

    Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

Options:

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Question 57

A company recently converted most of the officelaptops to connect wirelesslyto the corporate network. After ahigh-traffic malware attack, narrowing the event to a specific user wasdifficultbecause of thewireless configuration.

Which of the following actions should the company take?

Options:

A.

Restrict users to the 5GHz frequency.

B.

Upgrade to a mesh network.

C.

Migrate from PSK to Enterprise.

D.

Implement WPA2 encryption.

Question 58

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Question 59

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Question 60

Which of the followingservicesruns onport 636?

Options:

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Question 61

A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

Options:

A.

NS

B.

SOA

C.

PTR

D.

CNAME

Question 62

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Question 63

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

Options:

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Question 64

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Question 65

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

Options:

A.

The switches are not the correct voltage.

B.

The HVAC system was not verified as fully functional after the fire.

C.

The VLAN database was not deleted before the equipment was brought back online.

D.

The RJ45 cables were replaced with unshielded cables.

E.

The wrong transceiver type was used for the new termination.

F.

The new RJ45 cables are a higher category than the old ones.

Question 66

Users usually useRDPto connect to aterminal serverwith hostnameTS19that points to10.0.100.19. However, usersrecently have been unable to connecttoTS19. The technicianpings 10.0.100.19and gets anunreachable error. Which of the following is themost likely cause?

Options:

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Question 67

A user's home mesh wireless network is experiencing latency issues. A technician has:

•Performed a speed test.

•Rebooted the devices.

•Performed a site survey.

•Performed a wireless packet capture.

The technician reviews the following information:

The technician notices in the packet capture that frames were retransmitted. Which of the following is the most likely cause of the user's network issue?

Options:

A.

The SSIDs should not be the same.

B.

The network has too much overlap.

C.

The devices are incompatible with the mesh network.

D.

The nodes are underpowered.

Question 68

A network technician needs to resolve some issues with a customer's SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Question # 68

Question # 68

Question # 68

Question # 68

Question # 68

Question # 68

Question # 68

Question # 68

Question # 68

Question # 68

Options:

Question 69

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Question 70

A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of the following technologies should be implemented?

Options:

A.

ACL

B.

Trunking

C.

Port security

D.

Private VLAN

Question 71

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

Options:

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Question 72

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?

Options:

A.

dig

B.

nmap

C.

tracert

D.

telnet

Question 73

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Question 74

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

Options:

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Question 75

Adata center interconnectusing aVXLANwas recently implemented. A network engineer observesslow performance and fragmentationon the interconnect. Which of the following technologies willresolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Question 76

A company has observedincreased user traffictogambling websitesand wants tolimit this behavioron work computers. Which of the following should the companymost likely implement?

Options:

A.

ACLs

B.

Content filter

C.

Port security

D.

Screened subnet

Question 77

A network administrator installed anew VLANto the network after a company added an additional floor to the office. Users areunable to obtain an IP addresson the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

Options:

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

Question 78

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Question 79

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Question 80

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Question 81

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Page: 1 / 27
Total 272 questions