Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA N10-009 - CompTIA Network+ Certification Exam

Page: 2 / 11
Total 537 questions

Which of the following does a hash provide?

A.

Non-repudiation

B.

Integrity

C.

Confidentiality

D.

Availability

Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?

A.

RTO

B.

SLA

C.

MTBF

D.

SIEM

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

A network engineer needs to correlate findings and receive alerts if there are brute force attacks, DDoS attacks, or port scanning happening within their network. Which of the following network monitoring technologies should the engineer implement?

A.

Packet capture

B.

SNMPv3

C.

SIEM

D.

Syslog collector

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

A network technician is adding a new switch to increase capacity on the network. The technician connects the two switches using a single cable. Several hosts are moved to the new switch, but none of the hosts can access the network or internet. Which of the following should the technician do to resolve the issue?

A.

Configure the connecting ports as trunk ports

B.

Install STP cables between the switches

C.

Increase the PoE budget for the switches

D.

Set up link aggregation on the uplink ports

A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of the following technologies should be implemented?

A.

ACL

B.

Trunking

C.

Port security

D.

Private VLAN

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Which of the following is the best VPN to use for reducing data bandwidth requirements of the corporate network?

A.

Split-tunnel

B.

Site-to-site

C.

Full-tunnel client

D.

GRE tunnel

A user ' s desk has a workstation and an IP phone. The user is unable to browse the internet on the workstation, but the phone works. Which of the following configurations is required?

A.

Voice VLAN

B.

Native VLAN

C.

Data VLAN

D.

Trunk port

A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of the following is causing the issue?

A.

Throughput capacity

B.

Roaming misconfiguration

C.

Channel overlap

D.

Packet loss

As part of a recovery strategy, a network administrator needs to make sure no more than eight hours of data loss occurs. Which of the following DR metrics describes this requirement?

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF