Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

N10-009 Sample Questions Answers

Questions 4

Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?

Options:

A.

Physical

B.

Network

C.

Session

D.

Transport

Buy Now
Questions 5

A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

Options:

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

Buy Now
Questions 6

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

Options:

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Buy Now
Questions 7

A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine the issue? (Select two).

Options:

A.

nslookup

B.

tcpdump

C.

arp

D.

dig

E.

tracert

F.

route print

Buy Now
Questions 8

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Buy Now
Questions 9

Which of the following is enforced through legislation?

Options:

A.

AUP

B.

GDPR

C.

Code of conduct

D.

EULA

Buy Now
Questions 10

A company’s VoIP phone connection is cutting in and out. A senior network engineer is recommending the implementation of a voice VLAN. Which of the following should be configured?

Options:

A.

802.1Q tagging

B.

Jumbo frames

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 11

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Buy Now
Questions 12

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

Options:

A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Buy Now
Questions 13

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

Options:

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Buy Now
Questions 14

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Buy Now
Questions 15

An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?

Options:

A.

DNS spoofing

B.

Phishing

C.

VLAN hopping

D.

ARP poisoning

Buy Now
Questions 16

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

Options:

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Buy Now
Questions 17

Which of the following allows a remote user to connect to the network?

Options:

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Buy Now
Questions 18

A Chief Information Officer wants a DR solution that runs only after a failure of the primary site and can be brought online quickly once recent backups are imported. Which of the following DR site solutions meets these requirements?

Options:

A.

Cold

B.

Warm

C.

Active

D.

Hot

Buy Now
Questions 19

Which of the following should an installer orient a port-side exhaust to when installing equipment?

Options:

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

Buy Now
Questions 20

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Buy Now
Questions 21

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Buy Now
Questions 22

Which of the following allows for interactive, secure remote management of a network infrastructure device?

Options:

A.

SSH

B.

VNC

C.

RDP

D.

SNMP

Buy Now
Questions 23

During a VoIP call, a user notices inconsistent audio and logs an incident ticket. A network administrator notices inconsistent delays in arrival of the RTP packets. Which of the following troubleshooting tools should the network administrator use to determine the issue?

Options:

A.

Toner and probe

B.

Protocol analyzer

C.

Cable tester

D.

Spectrum reader

Buy Now
Questions 24

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Buy Now
Questions 25

Which of the following internal routing protocols is best characterized as having fast convergence and being loop-free?

Options:

A.

BGP

B.

STP

C.

OSPF

D.

RIP

Buy Now
Questions 26

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Buy Now
Questions 27

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Buy Now
Questions 28

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Buy Now
Questions 29

A technician is implementing a new SD-WAN device with a default configuration. The technician receives a URL via email and connects the new device to the internet to complete the installation. Which of the following is this an example of?

Options:

A.

SASE device installation

B.

Zero-touch provisioning

C.

Infrastructure as code

D.

Configuration management

Buy Now
Questions 30

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Buy Now
Questions 31

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

Options:

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Buy Now
Questions 32

Which of the following ports is a secure protocol?

Options:

A.

20

B.

23

C.

443

D.

445

Buy Now
Questions 33

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

Options:

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Buy Now
Questions 34

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 35

Which of the following types of network architecture typically uses leased lines to provide dedicated, private connections between multiple satellite offices and a head office?

Options:

A.

Mesh

B.

Point to point

C.

Hub and spoke

D.

Star

Buy Now
Questions 36

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Buy Now
Questions 37

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

Options:

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Buy Now
Questions 38

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

Options:

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Buy Now
Questions 39

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

Options:

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Buy Now
Questions 40

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Buy Now
Questions 41

A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?

Options:

A.

Signal strength

B.

Duplex mismatch

C.

Power budget

D.

CRC

Buy Now
Questions 42

Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?

Options:

A.

Implement the solution

B.

Verify full system functionality

C.

Document findings

D.

Test the theory

Buy Now
Questions 43

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Buy Now
Questions 44

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Buy Now
Questions 45

Which of the following would an adversary do while conducting an evil twin attack?

Options:

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

Buy Now
Questions 46

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

Options:

A.

Theadministrator didnot provisionenough IP addresses.

B.

Theadministrator configured an incorrect default gateway.

C.

Theadministrator didnot provisionenough routes.

D.

Theadministrator didnot provisionenough MAC addresses.

Buy Now
Questions 47

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Buy Now
Questions 48

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Options:

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Buy Now
Questions 49

A network technician needs to resolve some issues with a customer's SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

Cable Test Results:

Cable 1:

Cable 2:

Cable 3:

Cable 4:

Options:

Buy Now
Questions 50

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

Options:

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Buy Now
Questions 51

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Buy Now
Questions 52

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

Options:

A.

Conduct tests to verify ideas

B.

Handle multiple problems individually

C.

Create a theory about the possible root cause

D.

Use a top-down approach

Buy Now
Questions 53

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

Options:

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Buy Now
Questions 54

Which of the following is the best reason to create a golden configuration?

Options:

A.

To provide configuration consistency

B.

To decrease the size of configuration files

C.

To increase security by encrypting configurations

D.

To set up backup configurations for each device

Buy Now
Questions 55

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

Options:

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Buy Now
Questions 56

A company’s Chief Information Security Officer requires that servers and firewalls have accurate timestamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

SNMP

D.

NTP

Buy Now
Questions 57

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

Options:

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

Buy Now
Questions 58

Which of the following, in addition to a password, can be asked of a user for MFA?

Options:

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Buy Now
Questions 59

A company's Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

NTP

D.

SNMP

Buy Now
Questions 60

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Buy Now
Questions 61

A network administrator deployed wireless networking in the office area. When users visit the outdoor patio and try to download emails with large attachments or stream training videos, they notice buffering issues. Which of the following is the most likely cause?

Options:

A.

Network congestion

B.

Wireless interference

C.

Signal degradation

D.

Client disassociation

Buy Now
Questions 62

Which of the following network ports is used when a client accesses an SFTP server?

Options:

A.

22

B.

80

C.

443

D.

3389

Buy Now
Questions 63

Which of the following would most likely be used to implement encryption in transit when using HTTPS?

Options:

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Buy Now
Questions 64

A network administrator is creating a subnet that will include 45 separate hosts on a small private network within a large network architecture. Which of the following options is the most efficient use of network addresses when assigning this network?

Options:

A.

10.0.50.128/25

B.

10.7.142.128/27

C.

10.152.4.192/26

D.

10.192.1.64/28

Buy Now
Questions 65

A network architect of a stock exchange broker is implementing a disaster recovery (DR) high-availability plan. Which of the following approaches would be the best fit?

Options:

A.

Warm site

B.

Active-active

C.

Full mesh

D.

In-band

Buy Now
Questions 66

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Buy Now
Questions 67

Which of the following would be violated if an employee accidentally deleted a customer's data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Buy Now
Questions 68

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

Options:

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Buy Now
Questions 69

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

Options:

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Buy Now
Questions 70

A security administrator is creating a new firewall object for a device with IP address 192.168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields. Which of the following is the correct subnet mask to use?

Options:

A.

255.255.254.0

B.

255.255.255.1

C.

255.255.255.128

D.

255.255.255.192

Buy Now
Questions 71

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

Options:

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Buy Now
Questions 72

After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?

Options:

A.

VLAN hopping

B.

Evil twin

C.

DNS poisoning

D.

ARP spoofing

Buy Now
Questions 73

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 74

A network engineer is designing an internal network that needs to support both IPv4 and IPv6 routing. Which of the following routing protocols is capable of supporting both IPv4 and IPv6?

Options:

A.

OSPFv3

B.

RIPv2

C.

BGP

D.

EIGRP

Buy Now
Questions 75

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Buy Now
Questions 76

Which of the following is the best networking appliance for interconnecting multiple logical networks and forwarding data packets between them while minimizing latency?

Options:

A.

Firewall

B.

Router

C.

Layer 2 switch

D.

Load balancer

Buy Now
Questions 77

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

Options:

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Buy Now
Questions 78

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

Options:

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Buy Now
Questions 79

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

Options:

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

Buy Now
Questions 80

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Buy Now
Questions 81

Which of the following VPN types provides secure remote access to the network resources through a web portal?

Options:

A.

Proxy

B.

Clientless

C.

Site-to-site

D.

Direct connect

Buy Now
Questions 82

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

Options:

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Buy Now
Questions 83

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

Options:

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Buy Now
Questions 84

A network engineer needs to change, update, and control APs remotely, with real-time visibility over HTTPS. Which of the following will best allow these actions?

Options:

A.

Web interface

B.

Command line

C.

SNMP console

D.

API gateway

Buy Now
Questions 85

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

Options:

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Buy Now
Questions 86

A customer wants to cache commonly used content to reduce the number of full page downloads from the internet. Which of the following should the network administrator recommend?

Options:

A.

Proxy server

B.

Load balancer

C.

Open relay

D.

Code repository

Buy Now
Questions 87

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Buy Now
Questions 88

Which of the following is used most often when implementing a secure VPN?

Options:

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Buy Now
Questions 89

A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known-good NIC, the host is still unable to connect to the network. Which of the following is causing the connection issue?

Options:

A.

MAC address of the new card

B.

BPDU guard settings

C.

Link aggregation settings

D.

PoE power budget

Buy Now
Questions 90

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

Options:

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Buy Now
Questions 91

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Buy Now
Questions 92

Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?

Options:

A.

WPS configuration

B.

Signal strength

C.

Channel frequency

D.

Power budget

Buy Now
Questions 93

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Buy Now
Questions 94

Which of the following is the most likely benefit of installing server equipment in a rack?

Options:

A.

Simplified troubleshooting process

B.

Decreased power consumption

C.

Improved network performance

D.

Increased compute density

Buy Now
Questions 95

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

Options:

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Buy Now
Questions 96

An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company's firewall require to access the internet? (Select TWO).

Options:

A.

NTP server

B.

Default gateway

C.

The modem's IP address

D.

One static IP address

E.

DNS servers

F.

DHCP server

Buy Now
Questions 97

A network administrator needs to connect a department to a new network segment. They need to use a DHCP server located on another network. Which of the following can the administrator use to complete this task?

Options:

A.

IP Helper

B.

Reservation

C.

Exclusion

D.

Scope

Buy Now
Questions 98

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Buy Now
Questions 99

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

Options:

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Buy Now
Questions 100

Which of the following protocols provides remote access utilizing port 22?

Options:

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Buy Now
Questions 101

Users are experiencing significant lag while connecting to a cloud-based application during peak hours. An examination of the network reveals that the bandwidth is being heavily utilized. Further analysis shows that only a few users are using the application at any given time. Which of the following is the most cost-effective solution for this issue?

Options:

A.

Limit the number of users who can access the application.

B.

Lease a Direct Connect connection to the cloud service provider.

C.

Implement QoS to prioritize application traffic.

D.

Use a CDN to service the application.

Buy Now
Questions 102

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Buy Now
Questions 103

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22

B.

69

C.

80

D.

3389

Buy Now
Questions 104

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

Options:

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Buy Now
Questions 105

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Buy Now
Questions 106

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Buy Now
Questions 107

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Buy Now
Questions 108

Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?

Options:

A.

MAC flooding

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Buy Now
Questions 109

An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?

Options:

A.

Hot

B.

Cold

C.

Cluster

D.

Warm

Buy Now
Questions 110

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

Options:

A.

ACLs

B.

Port security

C.

Content filtering

D.

NAC

Buy Now
Questions 111

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Buy Now
Questions 112

Which of the following is the best way to keep devices on during a loss of power?

Options:

A.

UPS

B.

Power load

C.

PDU

D.

Voltage

Buy Now
Questions 113

Which of the following connectors provides console access to a switch?

Options:

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Buy Now
Questions 114

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

Options:

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Buy Now
Questions 115

A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

Options:

A.

NS

B.

SOA

C.

PTR

D.

CNAME

Buy Now
Questions 116

A network technician is adding a new switch to increase capacity on the network. The technician connects the two switches using a single cable. Several hosts are moved to the new switch, but none of the hosts can access the network or internet. Which of the following should the technician do to resolve the issue?

Options:

A.

Configure the connecting ports as trunk ports

B.

Install STP cables between the switches

C.

Increase the PoE budget for the switches

D.

Set up link aggregation on the uplink ports

Buy Now
Questions 117

Which of the following network cables involves bounding light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Buy Now
Questions 118

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 119

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Buy Now
Questions 120

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Buy Now
Questions 121

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 122

Which of the following provides an opportunity for an on-path attack?

Options:

A.

Phishing

B.

Dumpster diving

C.

Evil twin

D.

Tailgating

Buy Now
Questions 123

A network administrator has been monitoring the company's servers to ensure that they are available. Which of the following should the administrator use for this task?

Options:

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Buy Now
Questions 124

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

Options:

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Buy Now
Questions 125

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 126

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port

B.

DNS

C.

MAC

D.

Content

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Oct 15, 2025
Questions: 422
$66  $164.99
$50  $124.99
$42  $104.99
buy now N10-009