Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CompTIA N10-009 - CompTIA Network+ Certification Exam

Page: 1 / 11
Total 537 questions

Which of the following is the best example of a networking appliance that connects different network segments and directs allowed traffic between specific segments?

A.

Firewall

B.

IDS

C.

Unmanaged switch

D.

(Not provided)

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

A technician is deploying new networking hardware for company branch offices. The bridge priority must be properly set. Which of the following should the technician configure?

A.

Spanning tree protocol

B.

Jumbo frames

C.

Perimeter network

D.

Port security

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Which of the following describes the best reason for using BGP?

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Which of the following routing technologies allows all users to access the internet using only two public IPs?

A.

EIGRP

B.

PAT

C.

BGP

D.

VIP

A network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the new router to?

A.

Access

B.

Core

C.

Leaf

D.

Spine

Which of the following ports creates a secure connection to a directory service?

A.

22

B.

389

C.

445

D.

636

Which of the following would an adversary do while conducting an evil twin attack?

A.

Trick users into using an AP with an SSID that is identical to a legitimate network

B.

Manipulate address resolution to point devices to a malicious endpoint

C.

Present an identical MAC to gain unauthorized access to network resources

D.

Capture data in transit between two legitimate endpoints to steal data

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

A.

Identify the problem.

B.

Develop a theory of probable cause.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

A network technician is configuring the company’s network of 100 Mbps Layer 2 switches. The technician wants increased throughput for the uplinks between switches. The technician connects multiple redundant links between the switches. Which of the following should the technician configure?

A.

Spanning Tree Protocol

B.

Switch Virtual Interfaces

C.

Native VLAN

D.

First Hop Redundancy Protocol

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Which of the following requires network devices to be managed using a different set of IP addresses?

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.