Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

Which of the following protocols is used to route traffic on the public internet?

Options:

A.

BGP

B.

OSPF

C.

EIGRP

D.

RIP

Buy Now
Questions 5

Which of the following requires network devices to be managed using a different set of IP addresses?

Options:

A.

Console

B.

Split tunnel

C.

Jump box

D.

Out of band

Buy Now
Questions 6

Which of the following, in addition to a password, can be asked of a user for MFA?

Options:

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Buy Now
Questions 7

Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?

Options:

A.

Establish a theory.

B.

Implement the solution.

C.

Create a plan of action.

D.

Verify functionality.

Buy Now
Questions 8

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

Options:

A.

Crash cart

B.

Jump box

C.

Secure Shell (SSH)

D.

Out-of-band management

Buy Now
Questions 9

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?

Options:

A.

SD-WAN

B.

VXLAN

C.

VPN

D.

NFV

Buy Now
Questions 10

A company recently rearranged some users ' workspaces and moved several users to previously used workspaces. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the MOST likely reason?

Options:

A.

Ports are error-disabled.

B.

Ports have an incorrect native VLAN.

C.

Ports are having an MDIX issue.

D.

Ports are trunk ports.

Buy Now
Questions 11

Which of the following is used most often when implementing a secure VPN?

Options:

A.

IPSec

B.

GRE

C.

BGP

D.

SSH

Buy Now
Questions 12

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Buy Now
Questions 13

Which of the following is the most secure way to provide site-to-site connectivity?

Options:

A.

VXLAN

B.

IKE

C.

GRE

D.

IPsec

Buy Now
Questions 14

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

Options:

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Buy Now
Questions 15

Which of the following is most closely associated with having a leased line to a public cloud provider?

Options:

A.

VPN

B.

Direct Connect

C.

Internet gateway

D.

Private cloud

Buy Now
Questions 16

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

Options:

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Buy Now
Questions 17

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

Options:

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Buy Now
Questions 18

Which of the following connector types is most commonly associated with Wi-Fi antennas?

Options:

A.

BNC

B.

SFP

C.

MPO

D.

RJ45

Buy Now
Questions 19

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

Options:

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Buy Now
Questions 20

A network administrator ' s device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

Options:

A.

Too much wireless reflection

B.

Too much wireless absorption

C.

Too many wireless repeaters

D.

Too many client connections

Buy Now
Questions 21

Which of the following helps a network administrator understand security risk from external malicious actors and offers insights on which threats to mitigate?

Options:

A.

Compliance benchmarks

B.

CIA triad

C.

SAML

D.

Honeypot

Buy Now
Questions 22

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Buy Now
Questions 23

Which of the following does a router use to determine the preferred route?

Options:

A.

Shortest prefix match

B.

Routes learned from EIGRP

C.

Longest prefix match

D.

Routes learned from OSPF

Buy Now
Questions 24

Which of the following layers of the OSI model is responsible for end-to-end encryption?

Options:

A.

Presentation

B.

Application

C.

Session

D.

Transport

Buy Now
Questions 25

Company C is acquiring Company A and Company B. Company C needs to merge all

three networks into one Class B network. Additionally, the network capacity of each company needs to grow by 20%. Company C also requires segmentation of Company A and Company B to account for unknown security vulnerabilities within each.

Instructions:

Select the correct subnet range to meet Company C ' s requirements.

N10-009 Question 25

Options:

Buy Now
Questions 26

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

Options:

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Buy Now
Questions 27

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

Options:

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Buy Now
Questions 28

A customer needs six usable IP addresses. Which of the following best meets this requirement?

Options:

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Buy Now
Questions 29

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP ' s connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Buy Now
Questions 30

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22

B.

69

C.

80

D.

3389

Buy Now
Questions 31

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

Options:

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Buy Now
Questions 32

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Buy Now
Questions 33

Which of the following is a major difference between an IPS and IDS?

Options:

A.

An IPS needs to be installed in line with traffic and an IDS does not.

B.

An IPS is signature-based and an IDS is not.

C.

An IPS is less susceptible to false positives than an IDS.

D.

An IPS requires less administrative overhead than an IDS.

Buy Now
Questions 34

A network technician receives a ticket from an employee who is working on PC 1 but is unable to connect to the database server. The technician pings the database server from PC 1, but the request times out. After reviewing the utilization of Switch 1 and Switch 2, the technician finds high CPU utilization and sees that the MAC table is continuously changing.

INSTRUCTIONS

Configure Switch 1 and Switch 2 to remediate the employee ' s issue. Then, validate connectivity between PC 1 and the database server.

Switch 1 and Switch 2 are already in configuration mode. Type help to view a list of available commands.

N10-009 Question 34

N10-009 Question 34

N10-009 Question 34

N10-009 Question 34

N10-009 Question 34

N10-009 Question 34

Options:

Buy Now
Questions 35

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:

A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Buy Now
Questions 36

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Buy Now
Questions 37

Which of the following is the most cost-effective way for a network administrator to establish a persistent, secure connection between two facilities?

Options:

A.

Site-to-site VPN

B.

GRE tunnel

C.

VXLAN

D.

Dedicated line

Buy Now
Questions 38

A network technician sets up a computer on the accounting department floor for a user from the marketing department. The user reports that they cannot access the marketing department’s shared drives but can access the internet. Which of the following is the most likely cause of this issue?

Options:

A.

Mismatched switchport duplex

B.

Misconfigured gateway settings

C.

Incorrect VLAN assignment

D.

SVI is assigned to the wrong IP address

Buy Now
Questions 39

Which of the following is most commonly associated with many systems sharing one IP address in the public IP-addressing space?

Options:

A.

PAT

B.

NAT

C.

VIP

D.

NAT64

Buy Now
Questions 40

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

GUI

D.

API

Buy Now
Questions 41

Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?

Options:

A.

Jump box

B.

Console server

C.

API interface

D.

In-band management

Buy Now
Questions 42

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

Options:

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Buy Now
Questions 43

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

Options:

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Buy Now
Questions 44

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

Options:

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Buy Now
Questions 45

Which of the following cloud deployment models is most commonly associated with multitenancy and is generally offered by a service provider?

Options:

A.

Private

B.

Community

C.

Public

D.

Hybrid

Buy Now
Questions 46

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Buy Now
Questions 47

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

Options:

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Buy Now
Questions 48

A network engineer runs ipconfig and notices that the default gateway is 0.0.0.0. Which of the following address types is in use?

Options:

A.

APIPA

B.

Multicast

C.

Class C

D.

Experimental

Buy Now
Questions 49

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

N10-009 Question 49

N10-009 Question 49

Options:

Buy Now
Questions 50

While deploying a new fleet of computers on a DHCP network, a network administrator notices that new computers cannot connect to the internet. Which of the following is most likely the problem?

Options:

A.

Incorrect default gateway

B.

Address pool exhaustion

C.

Duplicate IP address

D.

Incorrect subnet mask

Buy Now
Questions 51

A user tries to visit www.abc.com, but the website that displays is www.cba.com. Which of the following should be done in order to reach the correct website?

Options:

A.

Modify the CNAME record.

B.

Update the PTR record.

C.

Change the NTP settings.

D.

Delete the TXT record.

Buy Now
Questions 52

A company is concerned that the public can use network wall jacks in publicly available conference rooms to access company servers. Which of the following is the best way to mitigate the vulnerability?

Options:

A.

Create a trusted zone.

B.

Disable unused services.

C.

Use MAC filtering.

D.

Implement 802.1X.

Buy Now
Questions 53

Which of the following types of connectors allows the transmission of network data through a coaxial cable?

Options:

A.

SC

B.

MPO

C.

BNC

D.

RJ11

Buy Now
Questions 54

A network engineer configures a NIC that has an IP address of 192.168.123.232. Which of the following classes is this address an example of?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Buy Now
Questions 55

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Buy Now
Questions 56

Which of the following is a documented set of requirements, such as quality, availability, and responsibilities delivered by a vendor?

Options:

A.

MOU

B.

EOL

C.

EOS

D.

SLA

Buy Now
Questions 57

A security engineer is trying to connect cameras to a 12-port PoE switch, but only eight cameras turn on. Which of the following should the engineer check first?

Options:

A.

Ethernet cable type

B.

Voltage

C.

Transceiver compatibility

D.

DHCP addressing

Buy Now
Questions 58

A network technician needs to resolve some issues with a customer ' s SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

N10-009 Question 58

N10-009 Question 58

N10-009 Question 58

N10-009 Question 58

N10-009 Question 58

N10-009 Question 58

N10-009 Question 58

Options:

Buy Now
Questions 59

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host’s TCP/IP stack first. Which of the following commands should the network administrator run?

Options:

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Buy Now
Questions 60

Which of the following network devices converts wireless signals to electronic signals?

Options:

A.

Router

B.

Firewall

C.

Access point

D.

Load balancer

Buy Now
Questions 61

A user calls the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?

Options:

A.

Identify the problem.

B.

Establish a theory.

C.

Document findings.

D.

Create a plan of action.

Buy Now
Questions 62

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Options:

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Buy Now
Questions 63

Which of the following allows a user to connect to an isolated device on a stand-alone network?

Options:

A.

Jump box

B.

API gateway

C.

Secure Shell (SSH)

D.

Clientless VPN

Buy Now
Questions 64

A network technician needs to resolve some issues with a customer ' s SOHO network.

The customer reports that some of the devices are not connecting to the network, while others appear to work as intended.

INSTRUCTIONS

Troubleshoot all the network components and review the cable test results by Clicking on each device and cable.

Diagnose the appropriate component(s) by identifying any components with a problem and recommend a solution to correct each problem.

N10-009 Question 64

N10-009 Question 64

N10-009 Question 64

Cable Test Results:

Cable 1:

N10-009 Question 64

Cable 2:

Cable 3:

N10-009 Question 64

Cable 4:

N10-009 Question 64

N10-009 Question 64

N10-009 Question 64

N10-009 Question 64

N10-009 Question 64

Options:

Buy Now
Questions 65

Which of the following can be used when a server at a remote site is physically unreachable?

Options:

A.

OOB management

B.

Crash cart

C.

Jump box

D.

Console

Buy Now
Questions 66

Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?

Options:

A.

Verify full system functionality.

B.

Document the findings and outcomes.

C.

Establish a plan of action.

D.

Identify the problem.

Buy Now
Questions 67

An organization recently connected a new computer to the LAN. The user is unable to ping the default gateway. The technician examines the configuration and sees a self-assigned IP address. Which of the following is the most likely cause?

Options:

A.

The DHCP server is not available

B.

An RFC1918 address is being used

C.

The TCP/IP stack is disabled

D.

A static IP is assigned

Buy Now
Questions 68

A network engineer is installing new PoE wireless APs. The first five APs deploy successfully, but the sixth one fails to start. Which of the following should the engineer investigate first?

Options:

A.

Signal strength

B.

Duplex mismatch

C.

Power budget

D.

CRC

Buy Now
Questions 69

A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known-good NIC, the host is still unable to connect to the network. Which of the following is causing the connection issue?

Options:

A.

MAC address of the new card

B.

BPDU guard settings

C.

Link aggregation settings

D.

PoE power budget

Buy Now
Questions 70

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

Options:

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Buy Now
Questions 71

A network administrator installs a node that requires a media converter to connect Ethernet to fiber but sees no link light on the node. The administrator notices the following:

    Both terminating points are properly seated.

    Both the fiber and Ethernet cables have been successfully tested.

    The media converter is turned on.

    The switchport is configured as half duplex.

Which of the following is the reason the link light is not on?

Options:

A.

The TX/RX connection is transposed.

B.

The switchport is misconfigured.

C.

One of the cables has a short.

D.

The switchport interface has errors.

Buy Now
Questions 72

A user reports issues accessing a file server on a LAN with the IP address 192.168.50.140 at a large facility with incomplete infrastructure documentation. The following are the results of the ping command:

ping -c 10 192.168.50.140

Packets: Sent = 10, Received = 5, Lost = 5 (50% loss)

Round-trip times: Minimum = 3ms, Maximum = 144ms, Average = 42ms

Which of the following should a technician do next to continue troubleshooting the issue at the switch with minimal impact?

Options:

A.

Perform toning and probe.

B.

Replace the cable.

C.

Visually locate the fault.

D.

Restart the switch.

Buy Now
Questions 73

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Buy Now
Questions 74

Which of the following is enforced through legislation?

Options:

A.

AUP

B.

GDPR

C.

Code of conduct

D.

EULA

Buy Now
Questions 75

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO ' s phone need?

Options:

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Buy Now
Questions 76

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:

A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Buy Now
Questions 77

A network engineer needs to order cabling to connect two buildings within the same city. Which of the following media types should the network engineer use?

Options:

A.

Coaxial

B.

Twinaxial

C.

Single-mode fiber

D.

Cat 5

Buy Now
Questions 78

After a networking intern plugged in a switch, a significant number of users in a building lost connectivity. Which of the following is the most likely root cause?

Options:

A.

VTP update

B.

Port security issue

C.

LLDP misconfiguration

D.

Native VLAN mismatch

Buy Now
Questions 79

A technician is implementing a new SD-WAN device with a default configuration. The technician receives a URL via email and connects the new device to the internet to complete the installation. Which of the following is this an example of?

Options:

A.

SASE device installation

B.

Zero-touch provisioning

C.

Infrastructure as code

D.

Configuration management

Buy Now
Questions 80

A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?

Options:

A.

v1

B.

v2c

C.

v2u

D.

v3

Buy Now
Questions 81

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Buy Now
Questions 82

Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?

Options:

A.

On-path

B.

DDoS

C.

ARP spoofing

D.

MAC flooding

Buy Now
Questions 83

A network administrator recently configured an autonomous wireless AP and performed a throughput test via comptiaspeedtester.com. The result was 75 Mbps. When connected to other APs, the results reached 500 Mbps. Which of the following is most likely the reason for this difference?

Options:

A.

Channel width configuration

B.

DNS server issues

C.

Authentication failure

D.

Incorrect DHCP settings

Buy Now
Questions 84

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

Options:

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Buy Now
Questions 85

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Buy Now
Questions 86

Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?

Options:

A.

WPS configuration

B.

Signal strength

C.

Channel frequency

D.

Power budget

Buy Now
Questions 87

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 88

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

Options:

A.

Port security

B.

802.1X

C.

MAC filtering

D.

Access control list

Buy Now
Questions 89

After a recent merger, a large number of alerts are coming in regarding extremely high utilization. Which of the following should be generated to help inform new alerting requirements?

Options:

A.

SLA

B.

Network diagram

C.

Baseline

D.

Heat map

Buy Now
Questions 90

Which of the following services runs on port 636?

Options:

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Buy Now
Questions 91

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:

1 3ms 2ms 3ms 192.168.25.234

2 2ms 3ms 1ms 192.168.3.100

3 4ms 5ms 2ms 10.249.3.1

4 *

5 ’

6 *

7 •

Which of the following command-line tools is the network administrator using?

Options:

A.

tracert

B.

netstat

C.

tcpdump

D.

nmap

Buy Now
Questions 92

A network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the new router to?

Options:

A.

Access

B.

Core

C.

Leaf

D.

Spine

Buy Now
Questions 93

After a company installed a new IPS, the network is experiencing speed degradation. A network administrator is troubleshooting the issue and runs a speed test. The results from the different network locations are as follows:

LocationSpeed DownSpeed Up

Wireless laptop4.8 Mbps47.1 Mbps

Wired desktop5.2 Mbps49.3 Mbps

Firewall48.8 Mbps49.5 Mbps

Which of the following is the most likely issue?

Options:

A.

Packet loss

B.

Bottlenecking

C.

Channel overlap

D.

Network congestion

Buy Now
Questions 94

After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?

Options:

A.

VLAN hopping

B.

Evil twin

C.

DNS poisoning

D.

ARP spoofing

Buy Now
Questions 95

Which of the following concepts describes the idea of housing different customers in the same public cloud data center?

Options:

A.

Elasticity

B.

Hybrid cloud

C.

Scalability

D.

Multitenancy

Buy Now
Questions 96

An organization has four departments that each need access to different resources that do not overlap. Which of the following should a technician configure in order to implement and assign an ACL?

Options:

A.

VLAN

B.

DHCP

C.

VPN

D.

STP

Buy Now
Questions 97

Which of the following should a network engineer check to verify that updates are still being released for a device?

Options:

A.

Baseline configuration

B.

EOL documentation

C.

Asset inventory licensing

D.

Software development life cycle

Buy Now
Questions 98

A network administrator has been monitoring the company ' s servers to ensure that they are available. Which of the following should the administrator use for this task?

Options:

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Buy Now
Questions 99

Which of the following must be implemented to securely connect a company ' s headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Buy Now
Questions 100

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Buy Now
Questions 101

A user submits an escalated ticket regarding failed logins on their laptop. The user states that the time displayed on the laptop is incorrect. An administrator thinks the issue is related to the NTP. Which of the following should the administrator do next?

Options:

A.

Create a plan of action

B.

Implement a solution

C.

Identify the problem

D.

Test the theory

Buy Now
Questions 102

A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?

Options:

A.

NAT

B.

VIP

C.

PAT

D.

BGP

Buy Now
Questions 103

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Buy Now
Questions 104

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Buy Now
Questions 105

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

Options:

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Buy Now
Questions 106

A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?

Options:

A.

Evil twin

B.

Honeytrap

C.

Wardriving

D.

Tailgating

Buy Now
Questions 107

A company is opening a new site that needs to be divided into subnets that accommodate 75 hosts each. Which of the following is the most efficient subnet?

Options:

A.

192.168.13.0/25

B.

192.168.13.0/26

C.

192.168.13.0/27

D.

192.168.13.0/28

Buy Now
Questions 108

As part of a recovery strategy, a network administrator needs to make sure no more than eight hours of data loss occurs. Which of the following DR metrics describes this requirement?

Options:

A.

RPO

B.

MTTR

C.

RTO

D.

MTBF

Buy Now
Questions 109

A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?

Options:

A.

The new switch has unused ports disabled

B.

The new switch does not have a default gateway

C.

The new switch is connected to an access port

D.

The new switch is in a spanning tree loop

Buy Now
Questions 110

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

Options:

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Buy Now
Questions 111

Which of the following best describes the purpose of a UPS and PDU in a network installation?

Options:

A.

To support voltage requirements for devices in an IDF

B.

To manage power consumption in the MDF

C.

To connect multiple devices to a single network connection

D.

To regulate temperature in the MDF and IDF

Buy Now
Questions 112

A network administrator needs to change where the outside DNS records are hosted. Which of the following records should the administrator change the registrar to accomplish this task?

Options:

A.

NS

B.

SOA

C.

PTR

D.

CNAME

Buy Now
Questions 113

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

N10-009 Question 113

N10-009 Question 113

Options:

Buy Now
Questions 114

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Buy Now
Questions 115

A network engineer must determine which ports are currently established from a client device. Given the following:

Active Connections

Proto Local Address Foreign Address State

TCP 10.203.10.11:3389 207.141.201.10:65278 ESTABLISHED

TCP 10.203.10.11:49678 168.63.129.16:32526 ESTABLISHED

TCP 10.203.10.11:49688 168.63.129.16:http ESTABLISHED

TCP 10.203.10.11:49701 168.63.129.16:32526 ESTABLISHED

TCP 10.203.10.11:52502 20.190.135.17:https TIME_WAIT

TCP 10.203.10.11:52554 168.63.129.16:http TIME_WAIT

Which of the following commands was used to produce the output?

Options:

A.

nslookup

B.

dig

C.

nmap

D.

netstat

Buy Now
Questions 116

While troubleshooting a VoIP handset connection, a technician ' s laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Buy Now
Questions 117

Users report that they cannot print to a specific IPv4-enabled printer after an extended power outage. Which of the following should a technician configure?

Options:

A.

DoH

B.

SLAAC

C.

APIPA

D.

DHCP reservation

Buy Now
Questions 118

A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?

Options:

A.

East-west

B.

Point-to-point

C.

Horizontal-scaling

D.

Hub-and-spoke

Buy Now
Questions 119

A network administrator needs to monitor data from recently installed firewalls in multiple locations. Which of the following solutions would best meet the administrator ' s needs?

Options:

A.

IDS

B.

IPS

C.

SIEM

D.

SNMPv2

Buy Now
Questions 120

A company’s Chief Information Security Officer requires that servers and firewalls have accurate timestamps when creating log files so that security analysts can correlate events during incident investigations. Which of the following should be implemented?

Options:

A.

Syslog server

B.

SMTP

C.

SNMP

D.

NTP

Buy Now
Questions 121

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

Options:

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Buy Now
Questions 122

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

Options:

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

Buy Now
Questions 123

After running a Cat 8 cable using passthrough plugs, an electrician notices that connected cables are experiencing a lot of cross talk. Which of the following troubleshooting steps should the electrician take first?

Options:

A.

Inspect the connectors for any wires that are touching or exposed.

B.

Restore default settings on the connected devices.

C.

Terminate the connections again.

D.

Check for radio frequency interference in the area.

Buy Now
Questions 124

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 < 1 ms 2. * < 1 ms < 1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

Options:

A.

Review the router ' s ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Buy Now
Questions 125

A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?

Options:

A.

Band steering

B.

Wireless LAN controller

C.

Directional antenna

D.

Autonomous access point

Buy Now
Questions 126

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP

B.

DNS

C.

LDAP

D.

DHCP

Buy Now
Questions 127

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Buy Now
Questions 128

A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer (CIO) is concerned that the network might not be able to handle the traffic if it reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?

Options:

A.

A VLAN with 100Mbps speed limits

B.

An IP helper to direct VoIP traffic

C.

A smaller subnet mask

D.

Full duplex on all user ports

Buy Now
Questions 129

A technician is plugging an Ethernet cable into a switch to bring a new device online, but the device is not showing an active network connection. Previously, another technician turned off unused switchports as part of device hardening. Which of the following describes the port status?

Options:

A.

Error disabled

B.

Idle

C.

Suspended

D.

Administratively down

Buy Now
Questions 130

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Buy Now
Questions 131

Which of the following technologies are X.509 certificates most commonly associated with?

Options:

A.

PKI

B.

VLAN tagging

C.

LDAP

D.

MFA

Buy Now
Questions 132

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

Options:

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Buy Now
Questions 133

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Options:

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Buy Now
Questions 134

A network administrator needs to limit devices that can connect to a small wireless network. The network consists of less than ten unique laptops, and no network changes are anticipated. Which of the following is the simplest way to accomplish this task?

Options:

A.

ACLs

B.

MAC filtering

C.

NAC

D.

Trusted zones

Buy Now
Questions 135

A technician is troubleshooting performance and connectivity issues associated with a web server. The technician wants to examine the packets to and from the server but has the following requirements:

    Capture 100% of packets

    Capture all Layer 1 error packets

    Minimize the impact on infrastructure

Which of the following best meets these requirements and allows for the packet capture?

Options:

A.

Running Nmap from the web server

B.

Installing a network tap in-line with the web server

C.

Installing a protocol analyzer on the web server

D.

Configuring port mirroring on the switch

Buy Now
Questions 136

Which of the following is the best use case of a site-to-site VPN?

Options:

A.

Securing access across an untrusted network

B.

Encrypting data at rest

C.

Filtering traffic between two internal subnets

D.

Hosting public-facing applications that contain company resources

Buy Now
Questions 137

Which of the following routing technologies allows all users to access the internet using only two public IPs?

Options:

A.

EIGRP

B.

PAT

C.

BGP

D.

VIP

Buy Now
Questions 138

Which of the following IP transmission types encrypts all of the transmitted data?

Options:

A.

ESP

B.

AH

C.

GRE

D.

UDP

E.

TCP

Buy Now
Questions 139

Which of the following enables an organization to leverage an identity provider to manage access across SaaS applications?

Options:

A.

PKI

B.

SSO

C.

TACACS+

D.

RADIUS

Buy Now
Questions 140

A network administrator is extending a network beyond the primary equipment location. Which of the following is where the administrator should install additional network switches?

Options:

A.

MDF

B.

VPC

C.

VXLAN

D.

IDF

Buy Now
Questions 141

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

Options:

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Buy Now
Questions 142

An organization wants better network visibility. The organization ' s requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

Options:

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Buy Now
Questions 143

Which of the following is the MOST appropriate solution to extend the network to a building located across the street from the main facility?

Options:

A.

Multimode fiber

B.

802.11ac wireless bridge

C.

Cat 6 copper

D.

Loopback adapter

Buy Now
Questions 144

During a recent security assessment, an assessor attempts to obtain user credentials by pretending to be from the organization ' s help desk. Which of the following attacks is the assessor using?

Options:

A.

Social engineering

B.

Tailgating

C.

Shoulder surfing

D.

Smishing

E.

Evil twin

Buy Now
Questions 145

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 146

An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company ' s firewall require to access the internet? (Select TWO).

Options:

A.

NTP server

B.

Default gateway

C.

The modem ' s IP address

D.

One static IP address

E.

DNS servers

F.

DHCP server

Buy Now
Questions 147

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

Options:

A.

The switches are not the correct voltage.

B.

The HVAC system was not verified as fully functional after the fire.

C.

The VLAN database was not deleted before the equipment was brought back online.

D.

The RJ45 cables were replaced with unshielded cables.

E.

The wrong transceiver type was used for the new termination.

F.

The new RJ45 cables are a higher category than the old ones.

Buy Now
Questions 148

A storage network requires reduced overhead and increased efficiency for the amout of data being sent. Which of the following should an engineer likely configure to meet these requirements > ?

Options:

A.

Link speed

B.

Jumbo frames

C.

QoS

D.

802.1q tagging

Buy Now
Questions 149

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

Options:

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Buy Now
Questions 150

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

Options:

A.

DNS poisoning

B.

Denial-of-service

C.

Social engineering

D.

ARP spoofing

Buy Now
Questions 151

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user ' s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Buy Now
Questions 152

A network architect of a stock exchange broker is implementing a disaster recovery (DR), high-availability plan. Which of the following approaches would be the best fit?

Options:

A.

Warm site

B.

Active-active

C.

Full mesh

D.

In-band

Buy Now
Questions 153

Which of the following connectors allows a singular QSFP transceiver to have several physical connections?

Options:

A.

RJ45

B.

ST

C.

LC

D.

MPO

Buy Now
Questions 154

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Buy Now
Questions 155

Which of the following protocols is commonly associated with TCP port 443?

Options:

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Buy Now
Questions 156

A network administrator wants an automatic alert to be sent when a switch ' s link status changes, administered through SNMP. Which of the following SNMP technologies will allow for this alert?

Options:

A.

Trap

B.

Object identifier

C.

String

D.

MIB

Buy Now
Questions 157

A network engineer adds a tunnel for a new branch network. Which of the following ensures that all data is encrypted inside the tunnel?

Options:

A.

ESP

B.

SSH

C.

GRE

D.

IKE

Buy Now
Questions 158

Which of the following network traffic types is sent to all nodes on the network?

Options:

A.

Unicast

B.

Broadcast

C.

Multicast

D.

Anycast

Buy Now
Questions 159

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

Options:

A.

Identify the problem.

B.

Document the findings and outcomes.

C.

Test the theory to determine cause.

D.

Establish a plan of action.

Buy Now
Questions 160

A network engineer is deploying switches at a new remote office. The switches have been preconfigured with hostnames and STP priority values. Based on the following table:

Switch Name

Priority

core-sw01

24576

access-sw01

28672

distribution-sw01

32768

access-sw02

36864

Which of the following switches will become the root bridge?

Options:

A.

core-sw01

B.

access-sw01

C.

distribution-sw01

D.

access-sw02

Buy Now
Questions 161

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 Question 161

N10-009 Question 161

Options:

Buy Now
Questions 162

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

Options:

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Buy Now
Questions 163

Which of the following most likely determines the size of a rack for installation? (Select two).

Options:

A.

KVM size

B.

Switch depth

C.

Hard drive size

D.

Cooling fan speed

E.

Outlet amperage

F.

Server height

Buy Now
Questions 164

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Buy Now
Questions 165

Which of the following is the best example of a networking appliance that connects different network segments and directs allowed traffic between specific segments?

Options:

A.

Firewall

B.

IDS

C.

Unmanaged switch

D.

(Not provided)

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: May 18, 2026
Questions: 550

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now N10-009 testing engine

PDF (Q&A)

$43.57  $124.49
buy now N10-009 pdf