Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

Options:

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Buy Now
Questions 5

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?

Options:

A.

dig

B.

nmap

C.

tracert

D.

telnet

Buy Now
Questions 6

Which of the following most directly secures sensitive information on a network?

Options:

A.

Data-in-transit encryption

B.

Principle of least privilege

C.

Role-based access controls

D.

Multifactor authentication

Buy Now
Questions 7

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Buy Now
Questions 8

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)

Options:

A.

DNS misconfiguration

B.

Inadequate network security

C.

Malware or a virus

D.

Outdated software

E.

Incorrect QoS settings

F.

Network congestion

Buy Now
Questions 9

An imaging workstation at a hospital is experiencing intermittent connectivity loss. Which of the following would most likely be used to resolve the issue at the least expense?

Options:

A.

Single-mode fiber

B.

Twinaxial cable

C.

Spanning tree

D.

Shielded twisted pair

Buy Now
Questions 10

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

Options:

A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Buy Now
Questions 11

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Buy Now
Questions 12

A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department’s shared drives but can access the internet. Which of the following is the most likely cause of this issue?

Options:

A.

Mismatched switchport duplex

B.

Misconfigured gateway settings

C.

Incorrect VLAN assignment

D.

SVI is assigned to the wrong IP address

Buy Now
Questions 13

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

Options:

A.

Conduct tests to verify ideas

B.

Handle multiple problems individually

C.

Create a theory about the possible root cause

D.

Use a top-down approach

Buy Now
Questions 14

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements>?

Options:

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Buy Now
Questions 15

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 <1 ms 2. * <1 ms <1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

Options:

A.

Review the router's ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Buy Now
Questions 16

A technician is troubleshooting a user's laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?

Options:

A.

tcpdump

B.

dig

C.

tracert

D.

arp

Buy Now
Questions 17

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 18

A company's network is experiencing high levels of suspicious network traffic. The security team finds that the traffic is coming from an unknown, foreign IP address. Which of the following is the most cost-efficient way to mitigate this threat?

Options:

A.

ACL

B.

IDS

C.

NAT

D.

DoS prevention

Buy Now
Questions 19

Which of the following ports is used to transfer data between mail exchange servers?

Options:

A.

21

B.

25

C.

53

D.

69

Buy Now
Questions 20

Which of the following tools uses ICMP to help determine whether a network host is reachable?

Options:

A.

tcpdump

B.

netstat

C.

nslookup

D.

ping

Buy Now
Questions 21

During a security audit, a consulting firm notices inconsistencies between the documentation and the actual environment. Which of the following can keep a record of who made the changes and what the changes are?

Options:

A.

Network access control

B.

Configuration monitoring

C.

Zero Trust

D.

Syslog

Buy Now
Questions 22

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

Options:

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Buy Now
Questions 23

Which of the following is an example of a split-tunnel VPN?

Options:

A.

Only public resources are accessed through the user’s internet connection.

B.

Encrypted resources are accessed through separate tunnels.

C.

All corporate and public resources are accessed through routing to on-site servers.

D.

ACLs are used to balance network traffic through different connections.

Buy Now
Questions 24

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

Options:

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Buy Now
Questions 25

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Buy Now
Questions 26

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Buy Now
Questions 27

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Buy Now
Questions 28

A user tries to visit a website, but instead of the intended site, the page displays vmw.cba.com. Which of the following should be done to reach the correct website?

Options:

A.

Modify the CNAME record

B.

Update the PTR record

C.

Change the NTP settings

D.

Delete the TXT record

Buy Now
Questions 29

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Buy Now
Questions 30

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

Options:

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Buy Now
Questions 31

A network administrator is unable to ping a remote server from a newly connected workstation that has been added to the network. Ping to 127.0.0.1 on the workstation is failing. Which of the following should the administrator perform to diagnose the problem?

Options:

A.

Verify the NIC interface status.

B.

Verify the network is not congested.

C.

Verify the router is not dropping packets.

D.

Verify that DNS is resolving correctly.

Buy Now
Questions 32

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Buy Now
Questions 33

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

Options:

A.

Private

B.

Community

C.

Public

D.

Hybrid

Buy Now
Questions 34

An attacker gained access to the hosts file on an endpoint and modified it. Now, a user is redirected from the company’s home page to a fraudulent website. Which of the following most likely happened?

Options:

A.

DNS spoofing

B.

Phishing

C.

VLAN hopping

D.

ARP poisoning

Buy Now
Questions 35

A user tries to visit www.abc.com, but the website that displays is www.cba.com. Which of the following should be done in order to reach the correct website?

Options:

A.

Modify the CNAME record.

B.

Update the PTR record.

C.

Change the NTP settings.

D.

Delete the TXT record.

Buy Now
Questions 36

A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?

Options:

A.

Signal strength

B.

Duplex mismatch

C.

Power budget

D.

CRC

Buy Now
Questions 37

Which of the following fiber connector types is the most likely to be used on a network interface card?

Options:

A.

LC

B.

SC

C.

ST

D.

MPO

Buy Now
Questions 38

In the troubleshooting methodology, which of the following actions comes after verifying that the initial problem has been resolved?

Options:

A.

If necessary, escalating the issue

B.

Attempting to replicate the problem

C.

Documenting findings

D.

Implementing the plan

Buy Now
Questions 39

A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known-good NIC, the host is still unable to connect to the network. Which of the following is causing the connection issue?

Options:

A.

MAC address of the new card

B.

BPDU guard settings

C.

Link aggregation settings

D.

PoE power budget

Buy Now
Questions 40

Which of the following types of attacks is most likely to occur after an attacker sets up an evil twin?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

Phishing

Buy Now
Questions 41

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

Options:

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Buy Now
Questions 42

A network engineer queries a hostname using dig, and a valid IP address is returned. However, when the engineer queries that same IP address using dig, no hostname is returned. Which of the following DNS records is missing?

Options:

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Buy Now
Questions 43

Which of the following is the greatest advantage of maintaining a cold DR site compared to other DR sites?

Options:

A.

Redundancy

B.

Availability

C.

Security

D.

Cost

Buy Now
Questions 44

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Buy Now
Questions 45

A network technician implements a switch with multiple VLANs. Which of the following items should the technician configure to ensure that clients can communicate with clients in other VLANs?

Options:

A.

VPC

B.

VXLAN

C.

ACL

D.

SVI

Buy Now
Questions 46

Employees report that the network is slow. The network engineer thinks the performance issue is with an upstream router. Which of the following tools should the engineer use to determine the location of the issue?

Options:

A.

nslookup and dig

B.

Nmap and speed tester

C.

tracert and ping

D.

tcpdump and protocol analyzer

Buy Now
Questions 47

Which of the following is the best way to securely access a network appliance from an external location?

Options:

A.

RDP

B.

Telnet

C.

FTPS

D.

SSH

Buy Now
Questions 48

Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?

Options:

A.

MAC flooding

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Buy Now
Questions 49

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

Options:

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Buy Now
Questions 50

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Buy Now
Questions 51

Users report performance issues on the network. A network administrator notices broadcast storms occurring. Which of the following protocols should the administrator configure to mitigate this issue?

Options:

A.

Spanning Tree

B.

Enhanced Interior Gateway Routing Protocol (EIGRP)

C.

Cisco Discovery Protocol (CDP)

D.

Link Layer Discovery Protocol (LLDP)

E.

Border Gateway Protocol (BGP)

Buy Now
Questions 52

Which of the following is a cost-effective advantage of a split-tunnel VPN?

Options:

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Buy Now
Questions 53

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

Options:

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Buy Now
Questions 54

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

Options:

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Buy Now
Questions 55

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

Options:

A.

Incorrect ACLs

B.

Switching loop

C.

Duplicate IP addresses

D.

Wrong default route

Buy Now
Questions 56

Which of the following is the best reason to create a golden configuration?

Options:

A.

To provide configuration consistency

B.

To decrease the size of configuration files

C.

To increase security by encrypting configurations

D.

To set up backup configurations for each device

Buy Now
Questions 57

Users are reporting latency on the network. The network engineer notes the following:

Confirms the only change was a new network switch

Confirms all users are experiencing latency

Thinks the issue is a network loop caused by the lower bridge ID of the new switch

Which of the following describes the next step in the troubleshooting methodology?

Options:

A.

Identify the problem.

B.

Test the theory.

C.

Implement the solution.

D.

Verify full system functionality.

Buy Now
Questions 58

Which of the following is a difference between EOL and EOS?

Options:

A.

EOL discontinues the product but may offer support.

B.

EOS replaces free support with a subscription model.

C.

EOS only applies to physical products.

D.

EOL still guarantees warranty service.

Buy Now
Questions 59

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the following commands should the network administrator run?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Buy Now
Questions 60

A network technician is troubleshooting network latency and has determined the issue to be occuring two network switches( Switch10 and Switch11). Symptoms reported included poor video performance and slow file copying. Given the following informtion:

Which of the following should the technician most likely do to resolve the issue?

Options:

A.

Disable automatic negotiation on Switch11.

B.

Modify Switch10 MTU value to 1500.

C.

Configure STP on both switches.

D.

Change the native VLAN on the ports.

Buy Now
Questions 61

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

Options:

A.

Lightweight

B.

Autonomous

C.

Mesh

D.

Ad hoc

Buy Now
Questions 62

Which of the following standards enables the use of an enterprise authentication for network access control?

Options:

A.

802.1Q

B.

802.1X

C.

802.3bt

D.

802.11h

Buy Now
Questions 63

A university is implementing a new campus wireless network. A network administrator needs to configure the network to support a large number of devices and high-bandwidth demands from students.

Which of the following wireless technologies should the administrator consider for this scenario?

Options:

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Buy Now
Questions 64

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Options:

A.

Port mirroring

B.

Flow data

C.

Syslog entries

D.

SNMP traps

Buy Now
Questions 65

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

Options:

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Buy Now
Questions 66

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Buy Now
Questions 67

Which of the following describes the best reason for using BGP?

Options:

A.

Preventing a loop within a LAN

B.

Improving reconvergence times

C.

Exchanging router updates with a different ISP

D.

Sharing routes with a Layer 3 switch

Buy Now
Questions 68

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

Options:

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Buy Now
Questions 69

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Buy Now
Questions 70

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

Options:

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Buy Now
Questions 71

As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch. Which of the following types of attacks is this scenario an example of?

Options:

A.

ARP spoofing

B.

Evil twin

C.

MAC flooding

D.

DNS poisoning

Buy Now
Questions 72

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 73

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

Options:

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Buy Now
Questions 74

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Buy Now
Questions 75

A network administrator needs to ensure that users accept internet usage rules. Which of the following will help the administrator accomplish this task?

Options:

A.

Captive portal

B.

Acceptable use policy

C.

Network access control

D.

DNS filtering

Buy Now
Questions 76

An investment bank is seeking a DR backup solution. Which of the following provides the most cost-effective backup site?

Options:

A.

Hot

B.

Cold

C.

Cluster

D.

Warm

Buy Now
Questions 77

Which of the following typically uses compromised systems that become part of a bot network?

Options:

A.

Evil twin attack

B.

DDoS attack

C.

XML injection

D.

Brute-force password attack

Buy Now
Questions 78

After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?

Options:

A.

Implement DNS filtering.

B.

Update ACLs to only allow HTTPS.

C.

Configure new IPS hardware.

D.

Deploy 802.1X security features.

Buy Now
Questions 79

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Buy Now
Questions 80

A network engineer is troubleshooting connectivity for a newly installed server on an existing VLAN. The engineer reviews the following output:

C:\> ipconfig

IP Address: 192.168.100.225

Mask: 255.255.255.224

Gateway: 192.168.100.254

Router# show ip route

C 192.168.100.0/24 is directly connected, GigabitEthernet0/0

Which of the following describes the issue?

Options:

A.

The server has an incorrect subnet mask

B.

There is a duplicate IP address on the network

C.

The DHCP address pool is exhausted

D.

The router is missing a default route

Buy Now
Questions 81

Which of the following network traffic types is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Buy Now
Questions 82

A network administrator receives a ticket from a user. The user reports that they cannot access any websites and that they have already checked everything on their computer. Which of the following is the first action the administrator should take?

Options:

A.

Divide and conquer.

B.

Establish a theory of probable cause.

C.

Question the user.

D.

Document the findings.

Buy Now
Questions 83

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

Options:

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Buy Now
Questions 84

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

Options:

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Buy Now
Questions 85

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Buy Now
Questions 86

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

Options:

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Buy Now
Questions 87

A network architect is implementing an off-premises computing facility and needs to ensure that operations will not be impacted by major outages. Which of the following should the architect consider?

Options:

A.

Hot site

B.

DCI

C.

Direct Connect

D.

Active-passive approach

Buy Now
Questions 88

Which of the following would be violated if an employee accidentally deleted a customer's data?

Options:

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Buy Now
Questions 89

Which of the following protocols is used to send networking status messages between clients and servers?

Options:

A.

SSH

B.

DHCP

C.

NTP

D.

SNMP

Buy Now
Questions 90

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

Options:

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Buy Now
Questions 91

A network engineer configures a NIC that has an IP address of 192.168.123.232. Which of the following classes is this address an example of?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Buy Now
Questions 92

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Buy Now
Questions 93

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

Options:

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

Buy Now
Questions 94

A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet. Which of the following is the most likely cause of the connectivity issue?

Options:

A.

Incorrect default gateway

B.

Faulty Ethernet cable

C.

Wrong duplex settings

D.

VLAN mismatch

Buy Now
Questions 95

Which of the following can support a jumbo frame?

Options:

A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Buy Now
Questions 96

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

Options:

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Buy Now
Questions 97

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

GUI

D.

API

Buy Now
Questions 98

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Buy Now
Questions 99

Which of the following routing technologies uses an attribute list for path selection?

Options:

A.

BGP

B.

RIP

C.

EIGRP

D.

OSPF

Buy Now
Questions 100

Which of the following physical installation factors is the most important when a network switch is installed in a sealed enclosure?

Options:

A.

Fire suppression

B.

Power budget

C.

Temperature

D.

Humidity

Buy Now
Questions 101

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

Options:

A.

Duplicate the problem.

B.

Identify the symptoms.

C.

Gather information.

D.

Determine any changes.

Buy Now
Questions 102

Which of the following ports is used for secure email?

Options:

A.

25

B.

110

C.

143

D.

587

Buy Now
Questions 103

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Buy Now
Questions 104

A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR (Disaster Recovery) concepts does this describe?

Options:

A.

Hot site

B.

Warm site

C.

Cold site

D.

Active-active approach

Buy Now
Questions 105

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Buy Now
Questions 106

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

Options:

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Buy Now
Questions 107

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Buy Now
Questions 108

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Buy Now
Questions 109

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Buy Now
Questions 110

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Buy Now
Questions 111

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

Options:

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Buy Now
Questions 112

A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator thinks the issue is related to the NTP. Which of the following should the administrator do next?

Options:

A.

Create a plan of action

B.

Implement a solution

C.

Identify the problem

D.

Test the theory

Buy Now
Questions 113

A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 114

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

The web server Is In a different subnet.

B.

The router interface is a broadcast address.

C.

The IP address space is a class A network.

D.

The subnet is in a private address space.

Buy Now
Questions 115

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

Options:

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Buy Now
Questions 116

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Buy Now
Questions 117

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Buy Now
Questions 118

A network administrator needs a solution to isolate and potentially identify any threat actors that are attempting to breach the network. Which of the following should the administrator implement to determine the type of attack used?

Options:

A.

MFA

B.

Screened subnet

C.

Captive portal

D.

Honeypot

Buy Now
Questions 119

Which of the following network ports is used when a client accesses an SFTP server?

Options:

A.

22

B.

80

C.

443

D.

3389

Buy Now
Questions 120

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

Options:

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Buy Now
Questions 121

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Buy Now
Questions 122

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

Options:

A.

Hot

B.

Cold

C.

Warm

D.

Passive

Buy Now
Questions 123

An organization moved its DNS servers to new IP addresses. After this move, customers are no longer able to access the organization's website. Which of the following DNS entries should be updated?

Options:

A.

AAAA

B.

CNAME

C.

MX

D.

NS

Buy Now
Questions 124

Which of the following is most closely associated with having a leased line to a public cloud provider?

Options:

A.

VPN

B.

Direct Connect

C.

Internet gateway

D.

Private cloud

Buy Now
Questions 125

Which of the following devices can operate in multiple layers of the OSI model?

Options:

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

Buy Now
Questions 126

Which of the following allows a user to connect to an isolated device on a stand-alone network?

Options:

A.

Jump box

B.

API gateway

C.

Secure Shell (SSH)

D.

Clientless VPN

Buy Now
Questions 127

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

Options:

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Buy Now
Questions 128

Which of the following is the best networking appliance for interconnecting multiple logical networks and forwarding data packets between them while minimizing latency?

Options:

A.

Firewall

B.

Router

C.

Layer 2 switch

D.

Load balancer

Buy Now
Questions 129

An organization wants better network visibility. The organization's requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

Options:

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Buy Now
Questions 130

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

Options:

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Buy Now
Questions 131

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

Options:

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

Buy Now
Questions 132

Which of the following ports is a secure protocol?

Options:

A.

20

B.

23

C.

443

D.

445

Buy Now
Questions 133

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

Options:

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Buy Now
Questions 134

A network technician needs to resolve some issues with a customer's SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

Cable Test Results:

Cable 1:

Cable 2:

Cable 3:

Cable 4:

Options:

Buy Now
Questions 135

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Buy Now
Questions 136

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

Options:

A.

Band steering

B.

Wireless LAN controller

C.

Directional antenna

D.

Autonomous access point

Buy Now
Questions 137

Which of the following does a router use to determine the preferred route?

Options:

A.

Shortest prefix match

B.

Routes learned from EIGRP

C.

Longest prefix match

D.

Routes learned from OSPF

Buy Now
Questions 138

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Buy Now
Questions 139

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

Options:

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Buy Now
Questions 140

In an environment with one router, which of the following will allow a network engineer to communicate between VLANs without purchasing additional hardware?

Options:

A.

Subinterfaces

B.

VXLAN

C.

Layer 3 switch

D.

VIR

Buy Now
Questions 141

Which of the following dynamic routing protocols is used on the internet?

Options:

A.

EIGRP

B.

BGP

C.

RIP

D.

OSPF

Buy Now
Questions 142

In the troubleshooting methodology, which of the following actions comes after verifying that the initial problem has been resolved?

Options:

A.

If necessary, escalating the issue

B.

Attempting to replicate the problem

C.

Documenting findings

D.

Implementing the plan

Buy Now
Questions 143

After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform new alerting requirements?

Options:

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

Buy Now
Questions 144

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Buy Now
Questions 145

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

Options:

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Buy Now
Questions 146

A systems administrator is looking for operating system information, running services, and network ports that are available on a server. Which of the following software tools should the administrator use to accomplish this task?

Options:

A.

nslookup

B.

nmap

C.

traceroute

D.

netstat

Buy Now
Questions 147

Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?

Options:

A.

Verify full system functionality.

B.

Document the findings and outcomes.

C.

Establish a plan of action.

D.

Identify the problem.

Buy Now
Questions 148

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Buy Now
Questions 149

A network engineer adds a tunnel for a new branch network. Which of the following ensures that all data is encrypted inside the tunnel?

Options:

A.

ESP

B.

SSH

C.

GRE

D.

IKE

Buy Now
Questions 150

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

Options:

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Buy Now
Questions 151

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

Options:

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: Feb 21, 2026
Questions: 506
N10-009 pdf

N10-009 PDF

$25.5  $84.99
N10-009 Engine

N10-009 Testing Engine

$30  $99.99
N10-009 PDF + Engine

N10-009 PDF + Testing Engine

$40.5  $134.99