Pre-Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

N10-009 Sample Questions Answers

Questions 4

A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company most likely implement?

Options:

A.

ACLs

B.

Content filter

C.

Port security

D.

Screened subnet

Buy Now
Questions 5

A user tries to visit www.abc.com, but the website that displays is www.cba.com. Which of the following should be done in order to reach the correct website?

Options:

A.

Modify the CNAME record.

B.

Update the PTR record.

C.

Change the NTP settings.

D.

Delete the TXT record.

Buy Now
Questions 6

A network administrator needs to deploy a subnet using an IP address range that can support at least 260 devices with the fewest wasted addresses. Which of the following subnets should the administrator use?

Options:

A.

172.16.0.0/24

B.

172.25.2.0/23

C.

172.30.1.0/22

D.

172.33.0.0/21

Buy Now
Questions 7

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

Options:

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Buy Now
Questions 8

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Buy Now
Questions 9

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Buy Now
Questions 10

Which of the following tools uses ICMP to help determine whether a network host is reachable?

Options:

A.

tcpdump

B.

netstat

C.

nslookup

D.

ping

Buy Now
Questions 11

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Buy Now
Questions 12

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

GUI

D.

API

Buy Now
Questions 13

Which of the following is the most cost-efficient way to host email services?

Options:

A.

PaaS

B.

IaaS

C.

VPC

D.

SaaS

Buy Now
Questions 14

A network engineer is setting up a new VoIP network for a customer. The current network is segmented only for computers and servers. No additional switch ports can be used in the new network. Which of the following does the engineer need to do to configure the network correctly? (Select TWO).

Options:

A.

Change network translation definitions

B.

Enable 802.1Q

C.

Implement a routing protocol

D.

Set up voice VLANs

E.

Reconfigure the DNS

F.

Place devices in the perimeter network

Buy Now
Questions 15

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

Options:

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Buy Now
Questions 16

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Buy Now
Questions 17

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Buy Now
Questions 18

Which of the following troubleshooting steps provides a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem

B.

Develop a theory of probable cause

C.

Test the theory to determine cause

D.

Establish a plan of action

Buy Now
Questions 19

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Buy Now
Questions 20

A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?

Options:

A.

Evil twin

B.

Honeytrap

C.

Wardriving

D.

Tailgating

Buy Now
Questions 21

Which of the following Layer 1 devices is responsible for the termination of fiber-optic connections on an SFP-capable switch?

Options:

A.

Transceiver

B.

Modem

C.

Ethernet NIC

D.

Repeater

Buy Now
Questions 22

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

Options:

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Buy Now
Questions 23

A company ' s network is experiencing high levels of suspicious network traffic. The security team finds that the traffic is coming from an unknown, foreign IP address. Which of the following is the most cost-efficient way to mitigate this threat?

Options:

A.

ACL

B.

IDS

C.

NAT

D.

DoS prevention

Buy Now
Questions 24

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Buy Now
Questions 25

Employees report that the network is slow. The network engineer thinks the performance issue is with an upstream router. Which of the following tools should the engineer use to determine the location of the issue?

Options:

A.

nslookup and dig

B.

Nmap and speed tester

C.

tracert and ping

D.

tcpdump and protocol analyzer

Buy Now
Questions 26

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

Options:

A.

Infrastructure as a service

B.

Software as a service

C.

Platform as a service

D.

Network as a service

Buy Now
Questions 27

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Buy Now
Questions 28

Which of the following is the best networking appliance for interconnecting multiple logical networks and forwarding data packets between them while minimizing latency?

Options:

A.

Firewall

B.

Router

C.

Layer 2 switch

D.

Load balancer

Buy Now
Questions 29

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Buy Now
Questions 30

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Buy Now
Questions 31

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Buy Now
Questions 32

Which of the following is the step that a troubleshooter should take immediately after implementing a solution?

Options:

A.

Review lessons learned during the process.

B.

Establish a plan of action.

C.

Verify full system functionality.

D.

Document actions and outcomes.

Buy Now
Questions 33

A network administrator recently configured an autonomous wireless AP and performed a throughput test via comptiaspeedtester.com. The result was 75 Mbps. When connected to other APs, the results reached 500 Mbps. Which of the following is most likely the reason for this difference?

Options:

A.

Channel width configuration

B.

DNS server issues

C.

Authentication failure

D.

Incorrect DHCP settings

Buy Now
Questions 34

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

Options:

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Buy Now
Questions 35

An organization wants better network visibility. The organization ' s requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

Options:

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Buy Now
Questions 36

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Buy Now
Questions 37

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

Options:

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Buy Now
Questions 38

A network administrator deploys new network hardware. While configuring the network monitoring server, the server could authenticate but could not determine the specific status of the hardware. Which of the following would the administrator most likely do to resolve the issue?

Options:

A.

Use the public community string

B.

Import the appropriate MIB

C.

Set up a switchport analyzer and forward traffic

D.

Configure SNMPv3 privacy

Buy Now
Questions 39

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Buy Now
Questions 40

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

Options:

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

Buy Now
Questions 41

After extremely high temperatures cause a power outage, the servers automatically shut down, even though the UPSs for the servers still have hours of battery life. Which of the following should a technician recommend?

Options:

A.

Include backup power for air-conditioning units

B.

Configure door locks to automatically lock during power outages

C.

Increase UPS battery size

D.

Add an IoT-enabled thermostat

Buy Now
Questions 42

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

Options:

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Buy Now
Questions 43

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

Options:

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Buy Now
Questions 44

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

Options:

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Buy Now
Questions 45

A network architect of a stock exchange broker is implementing a disaster recovery (DR), high-availability plan. Which of the following approaches would be the best fit?

Options:

A.

Warm site

B.

Active-active

C.

Full mesh

D.

In-band

Buy Now
Questions 46

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Buy Now
Questions 47

A company recently rearranged some users ' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the MOST likely reason?

Options:

A.

Ports are error-disabled.

B.

Ports have an incorrect native VLAN.

C.

Ports are having an MDIX issue.

D.

Ports are trunk ports.

Buy Now
Questions 48

A network administrator needs to ensure that users accept internet usage rules. Which of the following will help the administrator accomplish this task?

Options:

A.

Captive portal

B.

Acceptable use policy

C.

Network access control

D.

DNS filtering

Buy Now
Questions 49

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 50

A company is concerned that the public can use network wall jacks in publicly available conference rooms to access company servers. Which of the following is the best way to mitigate the vulnerability?

Options:

A.

Create a trusted zone.

B.

Disable unused services.

C.

Use MAC filtering.

D.

Implement 802.1X.

Buy Now
Questions 51

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

Options:

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Buy Now
Questions 52

A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

Options:

A.

Identify the problem

B.

Establish a theory

C.

Document findings

D.

Create a plan of action

Buy Now
Questions 53

A user reports issues accessing a file server on a LAN with the IP address 192.168.50.140 at a large facility with incomplete infrastructure documentation. The following are the results of the ping command:

ping -c 10 192.168.50.140

Packets: Sent = 10, Received = 5, Lost = 5 (50% loss)

Round-trip times: Minimum = 3ms, Maximum = 144ms, Average = 42ms

Which of the following should a technician do next to continue troubleshooting the issue at the switch with minimal impact ?

Options:

A.

Perform toning and probe.

B.

Replace the cable.

C.

Visually locate the fault.

D.

Restart the switch.

Buy Now
Questions 54

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

Options:

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Buy Now
Questions 55

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Buy Now
Questions 56

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

Options:

A.

RJ45

B.

ST

C.

LC

D.

MPO

Buy Now
Questions 57

A company security policy requires all network traffic from remote employees ' corporate laptops to use the company’s VPN. Which of the following network access methods best describes this scenario?

Options:

A.

Clientless VPN

B.

Full-tunnel

C.

Site-to-site tunnel

D.

Split-tunnel

Buy Now
Questions 58

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Buy Now
Questions 59

A network technician implements a switch with multiple VLANs. Which of the following items should the technician configure to ensure that clients can communicate with clients in other VLANs?

Options:

A.

VPC

B.

VXLAN

C.

ACL

D.

SVI

Buy Now
Questions 60

A company recently converted most of the office laptops to connect wirelessly to the corporate network. After a high-traffic malware attack, narrowing the event to a specific user was difficult because of the wireless configuration.

Which of the following actions should the company take?

Options:

A.

Restrict users to the 5GHz frequency.

B.

Upgrade to a mesh network.

C.

Migrate from PSK to Enterprise.

D.

Implement WPA2 encryption.

Buy Now
Questions 61

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

Options:

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Buy Now
Questions 62

Which of the following best describes a characteristic of a DNS poisoning attack?

Options:

A.

DNS address records are edited and changed on a DNS server.

B.

An attacker sets up a malicious DNS server in place of a legitimate server.

C.

DNS client requests are intercepted and false responses are returned.

D.

False DNS records are injected into cache on a DNS server.

Buy Now
Questions 63

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Buy Now
Questions 64

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

Options:

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Buy Now
Questions 65

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 66

A security administrator is creating a new firewall object for a device with IP address 192.168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields. Which of the following is the correct subnet mask to use?

Options:

A.

255.255.254.0

B.

255.255.255.1

C.

255.255.255.128

D.

255.255.255.192

Buy Now
Questions 67

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

Options:

A.

Private

B.

Community

C.

Public

D.

Hybrid

Buy Now
Questions 68

A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine the issue? (Select two).

Options:

A.

nslookup

B.

tcpdump

C.

arp

D.

dig

E.

tracert

F.

route print

Buy Now
Questions 69

Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?

Options:

A.

Server hardware specifications

B.

Data-at-rest encryption settings

C.

Network bandwidth and utilization

D.

Virtual machine configurations

Buy Now
Questions 70

A network administrator is managing network traffic so that classified services and applications are prioritized. Which of the following technologies should the network administrator use?

Options:

A.

Load balancing

B.

Time to live

C.

Quality of service

D.

Content delivery network

Buy Now
Questions 71

Which of the following does a hash provide?

Options:

A.

Non-repudiation

B.

Integrity

C.

Confidentiality

D.

Availability

Buy Now
Questions 72

A company ' s Chief Information Security Officer requires that servers and firewalls have accurate time stamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

NTP

D.

SNMP

Buy Now
Questions 73

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Buy Now
Questions 74

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Buy Now
Questions 75

A network administrator installs wireless access points (APs) inside an industrial warehouse. A wireless survey shows a large amount of electromagnetic interference. Which of the following cable types should the administrator use to connect the APs to the switch?

Options:

A.

UTP

B.

STP

C.

Multimode

D.

Single-mode

Buy Now
Questions 76

A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers. Which of the following wireless encryption types is the most secure and compatible?

Options:

A.

WPA3

B.

WPA2

C.

WPA2/WPA3 mixed mode

D.

WPA/WPA2 mixed mode

Buy Now
Questions 77

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

Options:

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Buy Now
Questions 78

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Buy Now
Questions 79

Which of the following must be implemented to securely connect a company ' s headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Buy Now
Questions 80

A support engineer is troubleshooting a network outage that is affecting 3,000 users. The engineer has isolated the issue to the internet firewall. Packet captures confirm that the firewall is blocking the traffic. Which of the following is the next step in troubleshooting?

Options:

A.

Implement the solution or escalate as necessary

B.

Create a plan of action to resolve the issue and identify potential effects

C.

Establish a theory of probable cause

D.

Document findings, actions, outcomes, and lessons learned throughout the process

Buy Now
Questions 81

Which of the following most directly secures sensitive information on a network?

Options:

A.

Data-in-transit encryption

B.

Principle of least privilege

C.

Role-based access controls

D.

Multifactor authentication

Buy Now
Questions 82

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Buy Now
Questions 83

Which of the following protocols is commonly associated with TCP port 443?

Options:

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Buy Now
Questions 84

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company ' s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company ' s network.

Buy Now
Questions 85

Which of the following should an installer orient a port-side exhaust to when installing equipment?

Options:

A.

The patch panel

B.

The front of the IDF

C.

The warm aisle

D.

The administrator console

Buy Now
Questions 86

Which of the following attacks forces a switch to send all traffic out of all ports?

Options:

A.

ARP poisoning

B.

Evil twin

C.

MAC flooding

D.

DNS spoofing

Buy Now
Questions 87

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

Options:

A.

Dig

B.

Ifconfig

C.

Ping

D.

nmap

Buy Now
Questions 88

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Buy Now
Questions 89

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Buy Now
Questions 90

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

Options:

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Buy Now
Questions 91

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Buy Now
Questions 92

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:

A.

Sides

B.

Top

C.

Front

D.

Rear

Buy Now
Questions 93

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

Options:

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Buy Now
Questions 94

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

Options:

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Buy Now
Questions 95

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 96

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

Options:

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Buy Now
Questions 97

Which of the following types of routes takes precedence when building a routing table for a given subnet?

Options:

A.

Static

B.

BGP

C.

OSPF

D.

Default

Buy Now
Questions 98

Which of the following provides an opportunity for an on-path attack?

Options:

A.

Phishing

B.

Dumpster diving

C.

Evil twin

D.

Tailgating

Buy Now
Questions 99

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Buy Now
Questions 100

Which of the following connector types is most commonly associated with Wi-Fi antennas?

Options:

A.

BNC

B.

SFP

C.

MPO

D.

RJ45

Buy Now
Questions 101

Which of the following is enforced through legislation?

Options:

A.

AUP

B.

GDPR

C.

Code of conduct

D.

EULA

Buy Now
Questions 102

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Buy Now
Questions 103

A network administrator is creating a subnet that will include 45 separate hosts on a small private network within a large network architecture. Which of the following options is the most efficient use of network addresses when assigning this network?

Options:

A.

10.0.50.128/25

B.

10.7.142.128/27

C.

10.152.4.192/26

D.

10.192.1.64/28

Buy Now
Questions 104

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

Options:

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Buy Now
Questions 105

A network engineer wants to implement an 802.1X architecture in which BYOD devices must access a trusted wireless network securely. Which of the following should the engineer implement?

Options:

A.

ACL

B.

MAC filtering

C.

Port security

D.

NAC

Buy Now
Questions 106

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Buy Now
Questions 107

Which of the following standards enables the use of an enterprise authentication for network access control?

Options:

A.

802.1Q

B.

802.1X

C.

802.3bt

D.

802.11h

Buy Now
Questions 108

A network administrator needs to locate a specific AP using a spectrum analyzer to complete an 802.11ax device migration. Which of the following should display on the analyzer to locate the AP?

Options:

A.

SSID

B.

RSSI

C.

Channel number

D.

BSSID

Buy Now
Questions 109

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Buy Now
Questions 110

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

Which of the following is the most likely cause of the user ' s connection issues?

Options:

A.

A port with incorrect VLAN assigned

B.

A switch with spanning tree conflict

C.

Another PC with manually configured IP

D.

A router with overlapping route tables

Buy Now
Questions 111

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

Options:

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Buy Now
Questions 112

An organization is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that allows for continuous connectivity anywhere in the facility. Which of the following should the network administrator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

Changing the current frequency of the Wi-Fi

Buy Now
Questions 113

Which of the following is a documented set of requirements, such as quality, availability, and responsibilities delivered by a vendor?

Options:

A.

MOU

B.

EOL

C.

EOS

D.

SLA

Buy Now
Questions 114

A network administrator is conducting an assessment and finds network devices that do not meet standards. Which of the following configurations is considered a set of rules that devices should adhere to?

Options:

A.

Production

B.

Backup

C.

Candidate

D.

Golden

Buy Now
Questions 115

A network administrator needs to ensure all network ports use a security method that only permits authenticated devices. The solution must meet the following requirements:

• Reduced chance of spoofing

• Centrally managed solution

• Auditable logs

Which of the following technologies provides this functionality?

Options:

A.

MAC filtering

B.

Port security

C.

ACLs

D.

802.1X

Buy Now
Questions 116

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

Options:

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Buy Now
Questions 117

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Buy Now
Questions 118

A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?

Options:

A.

NAT

B.

VIP

C.

PAT

D.

BGP

Buy Now
Questions 119

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Buy Now
Questions 120

A technician is deploying new networking hardware for company branch offices. The bridge priority must be properly set. Which of the following should the technician configure?

Options:

A.

Spanning tree protocol

B.

Jumbo frames

C.

Perimeter network

D.

Port security

Buy Now
Questions 121

A network engineer configures a NIC that has an IP address of 192.168.123.232. Which of the following classes is this address an example of?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Buy Now
Questions 122

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

Options:

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Buy Now
Questions 123

Which of the following is used most often when implementing a secure VPN?

Options:

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Buy Now
Questions 124

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization ' s website. Which of the following DNS entries should be updated?

Options:

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Buy Now
Questions 125

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Buy Now
Questions 126

A small business is choosing between static and dynamic routing for its network. Which of the following is the best reason to use dynamic routing in a growing network?

Options:

A.

Easier to configure compared to using manually entered routes

B.

Does not require additional network security controls

C.

Features enhanced network monitoring and visibility

D.

Includes automatic changes and updates in network topology

Buy Now
Questions 127

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

Options:

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Buy Now
Questions 128

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

Options:

A.

QoS

B.

STP

Buy Now
Questions 129

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

Options:

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Buy Now
Questions 130

A firewall receives traffic on port 80 and forwards it to an internal server on port 88. Which of the following technologies is being leveraged?

Options:

A.

TLS

B.

FHRP

C.

SSL

D.

PAT

Buy Now
Questions 131

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

Options:

A.

11MHz

B.

20MHz

C.

40MHz

D.

80MHz

E.

160MHz

Buy Now
Questions 132

A network administrator has been monitoring the company ' s servers to ensure that they are available. Which of the following should the administrator use for this task?

Options:

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Buy Now
Questions 133

A company’s VoIP phone connection is cutting in and out. A senior network engineer is recommending the implementation of a voice VLAN. Which of the following should be configured?

Options:

A.

802.1Q tagging

B.

Jumbo frames

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 134

A network technician needs to resolve some issues with a customer ' s SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Options:

Buy Now
Questions 135

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Buy Now
Questions 136

A customer wants to separate the finance department from the marketing department. The network administrator suggests segmenting the existing Class C network into two sections and readdressing all devices appropriately. Which of the following subnet masks should the network administrator use?

Options:

A.

/24

B.

/25

C.

/26

D.

/27

Buy Now
Questions 137

A group of users cannot connect to network resources. The technician runs ipconfig from one user ' s device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

Options:

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Buy Now
Questions 138

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

Options:

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Buy Now
Questions 139

A company upgrades its network and PCs to gigabit speeds. After the upgrade, users are not getting the expected performance. Technicians discover that the speeds of the endpoint NICs are inconsistent. Which of the following should be checked first to troubleshoot the issue?

Options:

A.

Speed mismatches

B.

Load balancer settings

C.

Flow control settings

D.

Infrastructure cabling grade

Buy Now
Questions 140

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

Options:

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Buy Now
Questions 141

After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform new alerting requirements?

Options:

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

Buy Now
Questions 142

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Buy Now
Questions 143

Which of the following is most closely associated with having a leased line to a public cloud provider?

Options:

A.

VPN

B.

Direct Connect

C.

Internet gateway

D.

Private cloud

Buy Now
Questions 144

An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?

Options:

A.

DNS spoofing

B.

Phishing

C.

VLAN hopping

D.

ARP poisoning

Buy Now
Questions 145

Which of the following would describe a data recovery goal?

Options:

A.

MTBF

B.

RPO

C.

BCP

D.

MTTR

Buy Now
Questions 146

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Buy Now
Questions 147

Which of the following helps a network administrator understand security risk from external malicious actors and offers insights on which threats to mitigate?

Options:

A.

Compliance benchmarks

B.

CIA triad

C.

SAML

D.

Honeypot

Buy Now
Questions 148

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the following commands should the network administrator run?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Buy Now
Questions 149

A network engineer connects a business to a new ISP. A simple ping test to 8.8.8.8 is successful. However, users complain of extreme slowness to any website and periods of no connectivity. Which of the following is the most likely cause?

Options:

A.

Incorrect default gateway

B.

VLAN mismatch

C.

Subnet mask configuration

D.

Duplicate ISP IP address

Buy Now
Questions 150

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 151

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

Options:

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Buy Now
Questions 152

A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator thinks the issue is related to the NTP. Which of the following should the administrator do next?

Options:

A.

Create a plan of action

B.

Implement a solution

C.

Identify the problem

D.

Test the theory

Buy Now
Questions 153

A network administrator is developing a method of device monitoring with the following requirements:

•Allows for explicit, by user, privilege management

•Includes centralized logging of changes

•Offers widely accessible remote management

•Provides support of service accounts

Which of the following will most closely meet these requirements?

Options:

A.

SNMP

B.

API

C.

SIEM

D.

SSO

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Apr 11, 2026
Questions: 529
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now N10-009