Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA N10-009 - CompTIA Network+ Certification Exam

Page: 6 / 11
Total 537 questions

A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?

A.

NAT

B.

VIP

C.

PAT

D.

BGP

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?

A.

OSPF

B.

EIGRP

C.

FHRP

D.

RIP

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Which of the following protocols provides remote access utilizing port 22?

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Which of the following is the most secure way to provide site-to-site connectivity?

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Which of the following attacks forces a switch to send all traffic out of all ports?

A.

ARP poisoning

B.

Evil twin

C.

MAC flooding

D.

DNS spoofing

Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?

A.

Server hardware specifications

B.

Data-at-rest encryption settings

C.

Network bandwidth and utilization

D.

Virtual machine configurations

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

A.

110

B.

143

C.

587

D.

636

A few employees report issues with sessions disconnecting frequently, buffering repeatedly, and performing poorly. Given the following information:

• Employees are in a multitenant office building.

• The Wi-Fi uses 2.4GHz.

• Wireless signals from users range between -50 to -65dBm.

• WPA2 is used.

Which of the following is the most likely cause of the issues?

A.

Channel overlap

B.

Insufficient wireless coverage

C.

AP antenna type

D.

Outdated encryption usage

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Which of the following explains what happens if a packet is lost in transit when using UDP?

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

An attack on an internal server is traced to an isolated guest network. Which of the following best describes the attack?

A.

On-path

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing