CompTIA N10-009 - CompTIA Network+ Certification Exam
A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?
A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?
Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?
A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?
Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?
Which of the following protocols provides remote access utilizing port 22?
Which of the following is the most secure way to provide site-to-site connectivity?
Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?
Which of the following attacks forces a switch to send all traffic out of all ports?
Users report latency with a SaaS application. Which of the following should a technician adjust to fix the issue?
An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?
A few employees report issues with sessions disconnecting frequently, buffering repeatedly, and performing poorly. Given the following information:
• Employees are in a multitenant office building.
• The Wi-Fi uses 2.4GHz.
• Wireless signals from users range between -50 to -65dBm.
• WPA2 is used.
Which of the following is the most likely cause of the issues?
Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?
Which of the following explains what happens if a packet is lost in transit when using UDP?
An attack on an internal server is traced to an isolated guest network. Which of the following best describes the attack?
