Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CompTIA N10-009 CompTIA Network+ Certification Exam Exam Practice Test

Page: 1 / 15
Total 153 questions

CompTIA Network+ Certification Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$43.75  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$38.5  $109.99
Question 1

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

Options:

A.

With a voice VLAN

B.

With too many VLANs

C.

With a default VLAN

D.

With a native VLAN

Question 2

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Question 3

Which of the following facilities is the best example of a warm site in the event of information system disruption?

Options:

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Question 4

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question 5

Which of the following routing protocols uses an autonomous system number?

Options:

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question 6

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Question 7

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Question 8

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

Options:

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Question 9

A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Question 10

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Question 11

Users are unable to access files on their department share located on file server 2.

The network administrator has been tasked with validating routing between networks

hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identify any issues, and configure the appropriate solution.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Question 12

A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?

Options:

A.

netstat

B.

nslookup

C.

ping

D.

tracert

Question 13

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

Options:

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

Question 14

Which of the following network cables involves bounding light off of protective cladding?

Options:

A.

Twinaxial

B.

Coaxial

C.

Single-mode

D.

Multimode

Question 15

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Question 16

Which of the following protocols provides remote access utilizing port 22?

Options:

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Question 17

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Question 18

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

Options:

A.

ACLs

B.

Port security

C.

Content filtering

D.

NAC

Question 19

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Question 20

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

OB. It checks independently for packet loss.

B.

It encrypts data in transit.

C.

It performs address translation.

Question 21

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Question 22

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Question 23

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helper

ANS

Question 24

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Question 25

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Question 26

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Question 27

A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels. Which of the following would be the best choice?

Options:

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Question 28

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Question 29

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Question 30

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Question 31

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

Options:

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Question 32

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Question 33

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

Options:

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Question 34

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Question 35

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

Options:

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Question 36

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

Theweb server Is In adifferent subnet.

B.

Therouter interface isa broadcast address.

C.

TheIP address spaceis a class A network.

D.

Thesubnet is in a private address space.

Question 37

Which of the following would be violated if an employee accidentally deleted a customer's data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question 38

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

Options:

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Question 39

Which of the following most likely requires the use of subinterfaces?

Options:

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Question 40

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Question 41

Which of the following is used to describe the average duration of an outage for a specific service?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Question 42

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

Options:

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Question 43

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Question 44

Which of the following network traffic type is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Question 45

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

Options:

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Page: 1 / 15
Total 153 questions