Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA N10-009 - CompTIA Network+ Certification Exam

Page: 8 / 11
Total 537 questions

A network engineer wants to implement an 802.1X architecture in which BYOD devices must access a trusted wireless network securely. Which of the following should the engineer implement?

A.

ACL

B.

MAC filtering

C.

Port security

D.

NAC

An imaging workstation at a hospital is experiencing intermittent connectivity loss. Which of the following would most likely be used to resolve the issue at the least expense?

A.

Single-mode fiber

B.

Twinaxial cable

C.

Spanning tree

D.

Shielded twisted pair

Which of the following is a major difference between an IPS and IDS?

A.

An IPS needs to be installed in line with traffic and an IDS does not.

B.

An IPS is signature-based and an IDS is not.

C.

An IPS is less susceptible to false positives than an IDS.

D.

An IPS requires less administrative overhead than an IDS.

A network engineer is deploying switches at a new remote office. The switches have been preconfigured with hostnames and STP priority values. Based on the following table:

Switch Name

Priority

core-sw01

24576

access-sw01

28672

distribution-sw01

32768

access-sw02

36864

Which of the following switches will become the root bridge?

A.

core-sw01

B.

access-sw01

C.

distribution-sw01

D.

access-sw02

A company implements a new network utilizing only IPv6 addressing and needs to connect to the internet. Which of the following must be enabled in order for the internal network to contact servers on the internet?

A.

MPLS

B.

NAT64

C.

GRE

D.

Static routing

Which of the following does a router prioritize first in the route selection process?

A.

Prefix length

B.

Metric

C.

Administrative distance

D.

Default route

A network administrator needs to ensure all network ports use a security method that only permits authenticated devices. The solution must meet the following requirements:

• Reduced chance of spoofing

• Centrally managed solution

• Auditable logs

Which of the following technologies provides this functionality?

A.

MAC filtering

B.

Port security

C.

ACLs

D.

802.1X

A customer wants to separate the finance department from the marketing department. The network administrator suggests segmenting the existing Class C network into two sections and readdressing all devices appropriately. Which of the following subnet masks should the network administrator use?

A.

/24

B.

/25

C.

/26

D.

/27

Which of the following attacks utilizes a network packet that contains multiple network tags?

A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

A network engineer is implementing a new connection between core switches. The engineer deploys the following configurations:

Core-SW01

vlan 100

name

interface Ethernet 1/1

channel-group 1 mode active

interface Ethernet 1/2

channel-group 1 mode active

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Core-SW02

vlan 100

name

interface Ethernet 1/1

switchport mode trunk

switchport trunk allow vlan 100

interface Ethernet 1/2

switchport mode trunk

switchport trunk allow vlan 100

interface port-channel 1

switchport mode trunk

switchport trunk allow vlan 100

Which of the following is the state of the Core-SW01 port-channel interfaces?

A.

Incrementing CRC errors

B.

Error disabled

C.

Administratively down

D.

Suspended

A junior network technician at a large company needs to create networks from a Class C address with 14 hosts per subnet. Which of the following numbers of host bits is required?

A.

One

B.

Two

C.

Three

D.

Four

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Newly crimped 26ft (8m) STP Cat 6 patch cables were recently installed in one room to replace cables that were damaged by a vacuum cleaner. Now, users in that room are unable to connect to the network. A network technician tests the existing cables first. The 177ft (54m) cable that runs from the core switch to the access switch on the floor is working, as is the 115ft (35m) cable run from the access switch to the wall jack in the office. Which of the following is the most likely reason the users cannot connect to the network?

A.

Mixed UTP and STP cables are being used.

B.

The patch cables are not plenum rated.

C.

The cable distance is exceeded.

D.

An incorrect pinout on the patch cable is being used.

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization ' s website. Which of the following DNS entries should be updated?

A.

AAAA

B.

CNAME

C.

MX

D.

NS