Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA N10-009 - CompTIA Network+ Certification Exam

Page: 4 / 11
Total 537 questions

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

A network administrator wants an automatic alert to be sent when a switch ' s link status changes, administered through SNMP. Which of the following SNMP technologies will allow for this alert?

A.

Trap

B.

Object identifier

C.

String

D.

MIB

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?

A.

Mesh

B.

Ad hoc

C.

Point-to-point

D.

Infrastructure

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

A.

Physical

B.

Network

C.

Transport

D.

Application

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

A network architect of a stock exchange broker is implementing a disaster recovery (DR), high-availability plan. Which of the following approaches would be the best fit?

A.

Warm site

B.

Active-active

C.

Full mesh

D.

In-band

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

B.

SC

C.

ST

D.

MPO

Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?

A.

Verify full system functionality.

B.

Document the findings and outcomes.

C.

Establish a plan of action.

D.

Identify the problem.

Which of the following allows for interactive, secure remote management of a network infrastructure device?

A.

SSH

B.

VNC

C.

RDP

D.

SNMP

A media company is implementing a global streaming service. Which of the following should the company apply to each regional point of presence in order to comply with local laws?

A.

ACL

B.

Port security

C.

Key management

D.

Content filtering

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

A network administrator has been tasked with configuring a network for a new corporate office. The office consists of two buildings, separated by 50 feet with no physical connectivity. The configuration must meet the following requirements:

. Devices in both buildings should be

able to access the Internet.

. Security insists that all Internet traffic

be inspected before entering the

network.

. Desktops should not see traffic

destined for other devices.

INSTRUCTIONS

Select the appropriate network device for each location. If applicable, click on the magnifying glass next to any device which may require configuration updates and make any necessary changes.

Not all devices will be used, but all locations should be filled.

If at any time you would like to bring back the initial state of the simulation, please

click the Reset All button.

Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?

A.

Jump box

B.

Console server

C.

API interface

D.

In-band management