Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CompTIA N10-009 CompTIA Network+ Certification Exam Exam Practice Test

Page: 1 / 19
Total 194 questions

CompTIA Network+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question 2

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

Options:

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Question 3

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 4

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 5

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Question 6

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO's phone need?

Options:

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Question 7

A network administrator is developing a method of device monitoring with the following requirements:

•Allows for explicit, by user, privilege management

•Includes centralized logging of changes

•Offers widely accessible remote management

•Provides support of service accounts

Which of the following will most closely meet these requirements?

Options:

A.

SNMP

B.

API

C.

SIEM

D.

SSO

Question 8

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Question 9

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

Options:

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Question 10

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Options:

Question 11

Which of the following would be violated if an employee accidentally deleted a customer's data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question 12

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Question 13

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

Options:

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Question 14

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

Options:

A.

The port cost should not be equal.

B.

The ports should use link aggregation.

C.

A root bridge needs to be identified.

D.

The switch should be configured for RSTP.

Question 15

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

Options:

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Question 16

Which of the following is the next step to take after successfully testing a root cause theory?

Options:

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Question 17

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Question 18

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Question 19

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Question 20

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

Options:

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Question 21

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Question 22

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Question 23

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Question 24

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Question 25

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

Options:

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Question 26

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

Options:

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Question 27

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Question 28

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Question 29

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22

B.

69

C.

80

D.

3389

Question 30

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Question 31

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

Options:

A.

110

B.

143

C.

587

D.

636

Question 32

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

Options:

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Question 33

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question 34

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Question 35

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Question 36

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Question 37

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

Options:

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

Question 38

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group

B.

laaS

C.

VPC

D.

Hybrid cloud

Question 39

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

Options:

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Question 40

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

Options:

A.

Pre-shared key

B.

Autonomous access point

C.

Captive portal

D.

WPA2 encryption

Question 41

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Question 42

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Question 43

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provies authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM

B.

Syslog

C.

NetFlow

D.

SNMPv3

Question 44

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Question 45

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company’s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company’s network.

Question 46

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

Options:

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Question 47

A company implements a video streaming solution that will play on all computers that have joined a particular group, but router ACLs are blocking the traffic. Which of the following is the most appropriate IP address that will be allowed in the ACL?

Options:

A.

127.0.0.1

B.

172.17.1.1

C.

224.0.0.1

D.

240.0.0.1

Question 48

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Question 49

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Question 50

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Question 51

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

Options:

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Question 52

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

Options:

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Question 53

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Question 54

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Question 55

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 56

Which of the following must be implemented to securely connect a company's headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Question 57

An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?

Options:

A.

Hot

B.

Cold

C.

Cluster

D.

Warm

Question 58

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Page: 1 / 19
Total 194 questions