Pre-Summer Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

N10-009 CompTIA Network+ Certification Exam Questions and Answers

Questions 4

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

Options:

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Buy Now
Questions 5

A network administrator installed a new VLAN to the network after a company added an additional floor to the office. Users are unable to obtain an IP address on the new VLAN, but ports on existing VLANs are working properly. Which of the following configurations should the administrator update?

Options:

A.

Scope size

B.

Address reservations

C.

Lease time

D.

IP helper

Buy Now
Questions 6

Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?

Options:

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Buy Now
Questions 7

Which of the following must be implemented to securely connect a company ' s headquarters with a branch location?

Options:

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Buy Now
Questions 8

A network administrator is reviewing a production web server and observes the following output from the netstat command:

Which of the following actions should the network administrator take to harden the security of the web server?

Options:

A.

Disable the unused ports.

B.

Enforce access control lists.

C.

Perform content filtering.

D.

Set up a screened subnet.

Buy Now
Questions 9

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Buy Now
Questions 10

A media company is implementing a global streaming service. Which of the following should the company apply to each regional point of presence in order to comply with local laws?

Options:

A.

ACL

B.

Port security

C.

Key management

D.

Content filtering

Buy Now
Questions 11

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

Options:

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Buy Now
Questions 12

Which of the following facilities is the best example of a warm site in the event of information system disruption?

Options:

A.

A combination of public and private cloud services to restore data

B.

A partial infrastructure, software, and data on site

C.

A full electrical infrastructure in place, but no customer devices on site

D.

A full infrastructure in place, but no current data on site

Buy Now
Questions 13

A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch. Which of the following should the administrator do?

Options:

A.

Configure ACLs.

B.

Implement a captive portal.

C.

Enable port security.

D.

Disable unnecessaryservices.

Buy Now
Questions 14

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

Options:

A.

Port security

B.

802.1X

C.

MAC filtering

D.

Access control list

Buy Now
Questions 15

A laptop user gets an error when trying to access the company’s intranet site. A technician runs ipconfig /all with the following results:

Autoconfiguration IPv4 Address: 169.254.0.5 (Preferred)

Subnet Mask: 255.255.0.0

Default Gateway:

DHCP Server:

Which of the following is most likely causing the issue?

Options:

A.

Short DHCP lease duration

B.

IIS server malfunction

C.

Address pool exhaustion

D.

IDS misconfiguration

Buy Now
Questions 16

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Buy Now
Questions 17

A technician is deploying new networking hardware for company branch offices. The bridge priority must be properly set. Which of the following should the technician configure?

Options:

A.

Spanning tree protocol

B.

Jumbo frames

C.

Perimeter network

D.

Port security

Buy Now
Questions 18

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

Options:

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Buy Now
Questions 19

A company ' s network is experiencing high latency and packet loss during peak hours. Network monitoring tools show increased traffic on a switch. Which of the following should a network technician implement to reduce the network congestion and improve performance?

Options:

A.

Load balancing

B.

Port mirroring

C.

Quality of Service

D.

Spanning Tree Protocol

Buy Now
Questions 20

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user ' s identity?

Options:

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Buy Now
Questions 21

A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?

Options:

A.

Neighbor adjacency

B.

Link state flooding

C.

Administrative distance

D.

Hop count

Buy Now
Questions 22

Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

Options:

A.

Implement the solution.

B.

Verify system functionality.

C.

Establish a plan of action.

D.

Test the theory to determine cause.

Buy Now
Questions 23

Which of the following devices functions mainly at the data link layer of the OSI model and is used to connect a fiber-optic cable to a network interface?

Options:

A.

SC

B.

DAC

C.

SFP transceiver

D.

Twinaxial cable

Buy Now
Questions 24

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

Options:

A.

ACLs

B.

Port security

C.

Content filtering

D.

NAC

Buy Now
Questions 25

Users report performance issues on the network. A network administrator notices broadcast storms occurring. Which of the following protocols should the administrator configure to mitigate this issue?

Options:

A.

Spanning Tree

B.

Enhanced Interior Gateway Routing Protocol (EIGRP)

C.

Cisco Discovery Protocol (CDP)

D.

Link Layer Discovery Protocol (LLDP)

E.

Border Gateway Protocol (BGP)

Buy Now
Questions 26

A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?

Options:

A.

802.1Q tagging

B.

Jumbo frames

C.

Half duplex

D.

Link aggregation

Buy Now
Questions 27

A network engineer is troubleshooting connectivity for a newly installed server on an existing VLAN. The engineer reviews the following output:

C:\ > ipconfig

IP Address: 192.168.100.225

Mask: 255.255.255.224

Gateway: 192.168.100.254

Router# show ip route

C 192.168.100.0/24 is directly connected, GigabitEthernet0/0

Which of the following describes the issue?

Options:

A.

The server has an incorrect subnet mask

B.

There is a duplicate IP address on the network

C.

The DHCP address pool is exhausted

D.

The router is missing a default route

Buy Now
Questions 28

Which of the following services runs on port 636?

Options:

A.

SMTP

B.

Syslog

C.

TFTP

D.

LDAPS

Buy Now
Questions 29

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

Options:

A.

Enable IP helper.

B.

Change the subnet mask.

C.

Increase the scope size.

D.

Add address exclusions.

Buy Now
Questions 30

Which of the following is the most cost-efficient way to host email services?

Options:

A.

PaaS

B.

IaaS

C.

VPC

D.

SaaS

Buy Now
Questions 31

Which of the following is the best way to keep devices on during a loss of power?

Options:

A.

UPS

B.

Power load

C.

PDU

D.

Voltage

Buy Now
Questions 32

In the troubleshooting methodology, which of the following actions comes after verifying that the initial problem has been resolved?

Options:

A.

If necessary, escalating the issue

B.

Attempting to replicate the problem

C.

Documenting findings

D.

Implementing the plan

Buy Now
Questions 33

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

Options:

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Buy Now
Questions 34

A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?

Options:

A.

Anomaly alerts

B.

Port mirroring

C.

Performance monitoring

D.

Packet capture

Buy Now
Questions 35

A network administrator is trying to troubleshoot an issue with a newly installed switch that is not connecting to the network. The administrator logs on to the switch and observes collisions on the interface. Which of the following is most likely the issue?

Options:

A.

Wrong speed

B.

Jumbo frames enabled

C.

Incorrect VLAN

D.

Duplex mismatch

Buy Now
Questions 36

A network administrator configures a new network discovery tool and is concerned that it might disrupt business operations. Which of the following scan types should the administrator configure?

Options:

A.

Authenticated

B.

Ad hoc

C.

Unauthenticated

D.

Scheduled

Buy Now
Questions 37

A network administrator receives a ticket from a user. The user reports that they cannot access any websites and that they have already checked everything on their computer. Which of the following is the first action the administrator should take?

Options:

A.

Divide and conquer.

B.

Establish a theory of probable cause.

C.

Question the user.

D.

Document the findings.

Buy Now
Questions 38

A network technician is troubleshooting a connectivity issue on a server. Which of the following commands is the most effective for checking whether the server is receiving network traffic?

Options:

A.

traceroute

B.

tcpdump

C.

nslookup

D.

arp

Buy Now
Questions 39

An administrator needs to configure an IoT device with a /21 subnet mask, but the device will only accept dotted decimal notation. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.224.0

B.

255.255.240.0

C.

255.255.248.0

D.

255.255.252.0

Buy Now
Questions 40

A server administrator needs to add a record to the company ' s DNS server to verify ownership of a web domain. The administrator has the record ' s name and value. Which of the following record types should the administrator use to add the record to the DNS server?

Options:

A.

TXT

B.

A

C.

PTR

D.

CNAME

Buy Now
Questions 41

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

Options:

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Buy Now
Questions 42

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

Options:

A.

/23

B.

/25

C.

/29

D.

/32

Buy Now
Questions 43

A network administrator must implement a feature that supports redundancy and scaling on the switches at the distribution layer of the network. Which of the following is the best option?

Options:

A.

VLAN assignment

B.

Spanning tree

C.

Port speed

D.

Full duplex

Buy Now
Questions 44

Which of the following is the best use case of a site-to-site VPN?

Options:

A.

Securing access across an untrusted network

B.

Encrypting data at rest

C.

Filtering traffic between two internal subnets

D.

Hosting public-facing applications that contain company resources

Buy Now
Questions 45

A Chief Information Officer wants a DR solution that runs only after a failure of the primary site and can be brought online quickly once recent backups are imported. Which of the following DR site solutions meets these requirements?

Options:

A.

Cold

B.

Warm

C.

Active

D.

Hot

Buy Now
Questions 46

A network architect is implementing an off-premises computing facility and needs to ensure that operations will not be impacted by major outages. Which of the following should the architect consider?

Options:

A.

Hot site

B.

DCI

C.

Direct Connect

D.

Active-passive approach

Buy Now
Questions 47

Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?

Options:

A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Buy Now
Questions 48

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

Options:

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Buy Now
Questions 49

Which of the following is a characteristic of the application layer?

Options:

A.

It relies upon other layers for packet delivery.

B.

It checks independently for packet loss.

C.

It encrypts data in transit.

D.

It performs address translation.

Buy Now
Questions 50

Which of the following, in addition to a password, can be asked of a user for MFA?

Options:

A.

PIN

B.

Favorite color

C.

Hard token

D.

Mother’s maiden name

Buy Now
Questions 51

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Buy Now
Questions 52

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical

B.

Network

C.

Transport

D.

Application

Buy Now
Questions 53

Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?

Options:

A.

Quality of service

B.

Network signal

C.

Time to live

D.

Load balancing

Buy Now
Questions 54

Which of the following protocols has a default administrative distance value of 90?

Options:

A.

RIP

B.

EIGRP

C.

OSPF

D.

BGP

Buy Now
Questions 55

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

Options:

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Buy Now
Questions 56

A technician is troubleshooting performance and connectivity issues associated with a web server. The technician wants to examine the packets to and from the server but has the following requirements:

    Capture 100% of packets

    Capture all Layer 1 error packets

    Minimize the impact on infrastructure

Which of the following best meets these requirements and allows for the packet capture?

Options:

A.

Running Nmap from the web server

B.

Installing a network tap in-line with the web server

C.

Installing a protocol analyzer on the web server

D.

Configuring port mirroring on the switch

Buy Now
Questions 57

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

Options:

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Buy Now
Questions 58

Which of the following does a full-tunnel VPN provide?

Options:

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Buy Now
Questions 59

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

Options:

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Buy Now
Questions 60

Which of the following is the best way to securely access a network appliance from an external location?

Options:

A.

RDP

B.

Telnet

C.

FTPS

D.

SSH

Buy Now
Questions 61

Which of the following is most likely responsible for the security and handling of personal data in Europe?

Options:

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Buy Now
Questions 62

Which of the following ports creates a secure connection to a directory service?

Options:

A.

22

B.

389

C.

445

D.

636

Buy Now
Questions 63

A security administrator is creating a new firewall object for a device with IP address 192.168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields. Which of the following is the correct subnet mask to use?

Options:

A.

255.255.254.0

B.

255.255.255.1

C.

255.255.255.128

D.

255.255.255.192

Buy Now
Questions 64

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

Options:

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

Buy Now
Questions 65

A network technician is working on a PC with a faulty NIC. The host is connected to a switch with secured ports. After testing the connection cables and using a known-good NIC, the host is still unable to connect to the network. Which of the following is causing the connection issue?

Options:

A.

MAC address of the new card

B.

BPDU guard settings

C.

Link aggregation settings

D.

PoE power budget

Buy Now
Questions 66

Which of the following protocols is commonly associated with TCP port 443?

Options:

A.

Telnet

B.

SMTP

C.

HTTPS

D.

SNMP

Buy Now
Questions 67

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

Options:

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Buy Now
Questions 68

A network administrator needs to create a way to redirect a network resource that has been on the local network but is now hosted as a SaaS solution. Which of the following records should be used to accomplish the task?

Options:

A.

TXT

B.

AAA

C.

PTR

D.

CNAME

Buy Now
Questions 69

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

Options:

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Buy Now
Questions 70

A network engineer needs to prioritize traffic over a link with the goal of more effectively utilizing the connection. Which of the following should the engineer implement?

Options:

A.

CDN

B.

VPN

C.

TTL

D.

QoS

Buy Now
Questions 71

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

Options:

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Buy Now
Questions 72

Which of the following involves an attacker traversing from one part of a network to another part that should be inaccessible?

Options:

A.

MAC flooding

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Buy Now
Questions 73

A user tries to visit www.abc.com, but the website that displays is www.cba.com. Which of the following should be done in order to reach the correct website?

Options:

A.

Modify the CNAME record.

B.

Update the PTR record.

C.

Change the NTP settings.

D.

Delete the TXT record.

Buy Now
Questions 74

An imaging workstation at a hospital is experiencing intermittent connectivity loss. Which of the following would most likely be used to resolve the issue at the least expense?

Options:

A.

Single-mode fiber

B.

Twinaxial cable

C.

Spanning tree

D.

Shielded twisted pair

Buy Now
Questions 75

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

Options:

A.

Hosts file

B.

Self-signed certificate

C.

Nameserver record

D.

IP helperANS

Buy Now
Questions 76

A network engineer sees traffic going to 224.7.8.99. Which of the following describes this traffic type?

Options:

A.

Broadcast

B.

Unicast

C.

Multicast

D.

Anycast

Buy Now
Questions 77

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

Options:

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Buy Now
Questions 78

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

Options:

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Buy Now
Questions 79

Which of the following best describes the purpose of a UPS and PDU in a network installation?

Options:

A.

To support voltage requirements for devices in an IDF

B.

To manage power consumption in the MDF

C.

To connect multiple devices to a single network connection

D.

To regulate temperature in the MDF and IDF

Buy Now
Questions 80

Which of the following best describes a characteristic of a DNS poisoning attack?

Options:

A.

DNS address records are edited and changed on a DNS server.

B.

An attacker sets up a malicious DNS server in place of a legitimate server.

C.

DNS client requests are intercepted and false responses are returned.

D.

False DNS records are injected into cache on a DNS server.

Buy Now
Questions 81

A network administrator is managing network traffic so that classified services and applications are prioritized. Which of the following technologies should the network administrator use?

Options:

A.

Load balancing

B.

Time to live

C.

Quality of service

D.

Content delivery network

Buy Now
Questions 82

While deploying a new fleet of computers on a DHCP network, a network administrator notices that new computers cannot connect to the internet. Which of the following is most likely the problem?

Options:

A.

Incorrect default gateway

B.

Address pool exhaustion

C.

Duplicate IP address

D.

Incorrect subnet mask

Buy Now
Questions 83

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

Options:

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Buy Now
Questions 84

Which of the following is the part of a disaster recovery (DR) plan that identifies the critical systems that should be recovered first after an incident?

Options:

A.

RTO

B.

SLA

C.

MTBF

D.

SIEM

Buy Now
Questions 85

A network technician needs to resolve some issues with a customer ' s SOHO network. The

customer reports that some of the PCs are not connecting to the network, while others

appear to be working as intended.

INSTRUCTIONS

Troubleshoot all the network components.

Review the cable test results first, then diagnose by clicking on the appropriate PC,

server, and Layer 2 switch.

Identify any components with a problem and recommend a solution to correct each

problem.

If at any time you would like to bring back

the initial state of the simulation, please

click the Reset All button.

Options:

Buy Now
Questions 86

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

Options:

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Buy Now
Questions 87

Which of the following allows for the interception of traffic between the source and destination?

Options:

A.

Self-signed certificate

B.

VLAN hopping

C.

On-path attack

D.

Phishing

Buy Now
Questions 88

A new backup system takes too long to copy files to the new SAN each night. A network administrator makes a simple change to the network and the devices to decrease backup times. Which of the following does the network administrator change?

Options:

A.

QoS

B.

SDN

C.

MTU

D.

VXLAN

E.

TTL

Buy Now
Questions 89

A network administrator is conducting an assessment and finds network devices that do not meet standards. Which of the following configurations is considered a set of rules that devices should adhere to?

Options:

A.

Production

B.

Backup

C.

Candidate

D.

Golden

Buy Now
Questions 90

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

Options:

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Buy Now
Questions 91

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

Options:

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Buy Now
Questions 92

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:

A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Buy Now
Questions 93

A data center administrator is evaluating the use of jumbo frames within a storage environment. Which of the following describes the best reason to use jumbo frames in the storage environment?

Options:

A.

To reduce device overhead

B.

To report on the current root switch in the STP

C.

To improve routing convergence

D.

To increase drive throughput

Buy Now
Questions 94

A network administrator installs a node that requires a media converter to connect Ethernet to fiber but sees no link light on the node. The administrator notices the following:

    Both terminating points are properly seated.

    Both the fiber and Ethernet cables have been successfully tested.

    The media converter is turned on.

    The switchport is configured as half duplex.

Which of the following is the reason the link light is not on?

Options:

A.

The TX/RX connection is transposed.

B.

The switchport is misconfigured.

C.

One of the cables has a short.

D.

The switchport interface has errors.

Buy Now
Questions 95

An organizatin is struggling to get effective coverage using the wireless network. The organization wants to implement a solution that will allow for continous connectivity anywhere in the facility. Which of the following should the network administ rator suggest to ensure the best coverage?

Options:

A.

Implementing additional ad hoc access points

B.

Providing more Ethernet drops for user connections

C.

Deploying a mesh network in the building

D.

nl Changing the current frequency of the WI-FI

Buy Now
Questions 96

A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?

Options:

A.

Evil twin

B.

Honeytrap

C.

Wardriving

D.

Tailgating

Buy Now
Questions 97

Developers want to create a mobile application that requires a runtime environment, developer tools, and databases. The developers will not be responsible for security patches and updates. Which of the following models meets these requirements?

Options:

A.

Container as a service

B.

Infrastructure as a service

C.

Platform as a service

D.

Software as a service

Buy Now
Questions 98

Which of the following will allow secure, remote access to internal applications?

Options:

A.

VPN

B.

CDN

C.

SAN

D.

IDS

Buy Now
Questions 99

A network administrator needs to locate a specific AP using a spectrum analyzer to complete an 802.11ax device migration. Which of the following should display on the analyzer to locate the AP?

Options:

A.

SSID

B.

RSSI

C.

Channel number

D.

BSSID

Buy Now
Questions 100

Which of the following appliances provides users with an extended footprint that allows connections from multiple devices within a designated WLAN?

Options:

A.

Router

B.

Switch

C.

Access point

D.

Firewall

Buy Now
Questions 101

Which of the following offers the ability to manage access at the cloud VM instance?

Options:

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Buy Now
Questions 102

Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity. Which of the following features should the engineer configure?

Options:

A.

QoS

B.

STP

Buy Now
Questions 103

A network administrator configured a router interface as 10.0.0.95 255.255.255.240. The administrator discovers that the router is not routing packets to a web server with IP 10.0.0.81/28. Which of the following is the best explanation?

Options:

A.

The web server Is In a different subnet.

B.

The router interface is a broadcast address.

C.

The IP address space is a class A network.

D.

The subnet is in a private address space.

Buy Now
Questions 104

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

Options:

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Buy Now
Questions 105

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

Options:

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Buy Now
Questions 106

The leadership team is updated on the results of an approved change request after a breach. Which of the following troubleshooting methodology steps is described in this example?

Options:

A.

Establishing a theory of probable cause

B.

Implementing the solution or escalating as necessary

C.

Documenting findings, actions, outcomes, and lessons learned throughout the process

D.

Establishing a plan of action to resolve the problem and identifying potential effects

Buy Now
Questions 107

Which of the following steps of the troubleshooting methodology comes after testing the theory to determine cause?

Options:

A.

Verify full system functionality.

B.

Document the findings and outcomes.

C.

Establish a plan of action.

D.

Identify the problem.

Buy Now
Questions 108

A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.254.0

C.

255.255.255.0

D.

255.255.255.128

Buy Now
Questions 109

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

Options:

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Buy Now
Questions 110

Which of the following are the best device-hardening techniques for network security? (Select two).

Options:

A.

Disabling unused ports

B.

Performing regular scanning of unauthorized devices

C.

Monitoring system logs for irregularities

D.

Enabling logical security such as SSO

E.

Changing default passwords

F.

Ensuring least privilege concepts are in place

Buy Now
Questions 111

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

Options:

A.

arp

B.

tracert

C.

nmap

D.

ipconfig

Buy Now
Questions 112

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP ' s connection speed?

Options:

A.

802.1Q tagging

B.

Network address translation

C.

Port duplex

D.

Link aggregation

Buy Now
Questions 113

Which of the following types of routes takes precedence when building a routing table for a given subnet?

Options:

A.

Static

B.

BGP

C.

OSPF

D.

Default

Buy Now
Questions 114

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Buy Now
Questions 115

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

Options:

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Buy Now
Questions 116

A company is opening a new site that needs to be divided into subnets that accommodate 75 hosts each. Which of the following is the most efficient subnet?

Options:

A.

192.168.13.0/25

B.

192.168.13.0/26

C.

192.168.13.0/27

D.

192.168.13.0/28

Buy Now
Questions 117

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

Options:

A.

Changing the default password

B.

Blocking inbound SSH connections

C.

Removing the gateway from the network configuration

D.

Restricting physical access to the switch

Buy Now
Questions 118

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

Options:

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Buy Now
Questions 119

Ten new laptops are added to an existing network, and they can only communicate with one another. An administrator reviews documentation and sees the following:

Subnet: 10.8.100.1/24

Scope: 10.8.100.50 – 10.8.100.150

Reservation: 10.8.100.151 – 10.8.100.175

A technician scans the network and receives the following results:

IP addresses used: 10.8.100.45 – 10.8.100.175

Which of the following should be done to ensure connectivity on all laptops?

Options:

A.

Increase the scope to 10.8.100.35 – 10.8.100.150

B.

Increase the scope to 10.8.100.40 – 10.8.100.150

C.

Increase the scope to 10.8.100.40 – 10.8.100.175

D.

Increase the scope to 10.8.100.50 – 10.8.100.175

Buy Now
Questions 120

Which of the following would most likely be used as a replacement for a traditional VPN for remote users?

Options:

A.

SD-WAN

B.

SASE

C.

Site-to-site VPN

D.

Reverse proxy

Buy Now
Questions 121

An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?

Options:

A.

Implementingenterprise authentication

B.

Requiring theuse of PSKs

C.

Configuring acaptive portal for users

D.

Enforcing wired equivalent protection

Buy Now
Questions 122

A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?

Options:

A.

The new switch has unused ports disabled

B.

The new switch does not have a default gateway

C.

The new switch is connected to an access port

D.

The new switch is in a spanning tree loop

Buy Now
Questions 123

A network engineer configures a NIC that has an IP address of 192.168.123.232. Which of the following classes is this address an example of?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Buy Now
Questions 124

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Options:

A.

Port mirroring

B.

Flow data

C.

Syslog entries

D.

SNMP traps

Buy Now
Questions 125

An attack on an internal server is traced to an isolated guest network. Which of the following best describes the attack?

Options:

A.

On-path

B.

DNS poisoning

C.

VLAN hopping

D.

ARP spoofing

Buy Now
Questions 126

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

Options:

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Buy Now
Questions 127

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

Options:

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Buy Now
Questions 128

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

Options:

A.

MTTR

B.

RTO

C.

RPO

D.

MTBF

Buy Now
Questions 129

Which of the following could provide a lightweight and private connection to a remote box?

Options:

A.

Site-to-site VPN

B.

Telnet

C.

Console

D.

Secure Shell

Buy Now
Questions 130

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

Options:

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Buy Now
Questions 131

A network administrator needs to divide a Class B network into four equal subnets, each with a host range of 1,000 hosts. Which of the following subnet masks should the administrator use?

Options:

A.

255.255.0.0

B.

255.255.252.0

C.

255.255.255.0

D.

255.255.255.128

Buy Now
Questions 132

A company ' s marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Buy Now
Questions 133

Which of the following devices can operate in multiple layers of the OSI model?

Options:

A.

Hub

B.

Switch

C.

Transceiver

D.

Modem

Buy Now
Questions 134

Which of the following cloud platform technology characteristics would a quantum computing host most likely prioritize?

Options:

A.

Scalability

B.

Elasticity

C.

Multitenancy

D.

Cost

Buy Now
Questions 135

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

Options:

A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Buy Now
Questions 136

Which of the following most likely requires the use of subinterfaces?

Options:

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Buy Now
Questions 137

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

Options:

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Buy Now
Questions 138

A company is implementing a new internal network in which all devices use IPv6 addresses. Which of the following routing protocols will be best for this setup?

Options:

A.

EIGRP

B.

OSPFv3

C.

BGP4

D.

iBGP

Buy Now
Questions 139

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

Options:

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Buy Now
Questions 140

During a recent security assessment, an assessor attempts to obtain user credentials by pretending to be from the organization ' s help desk. Which of the following attacks is the assessor using?

Options:

A.

Social engineering

B.

Tailgating

C.

Shoulder surfing

D.

Smishing

E.

Evil twin

Buy Now
Questions 141

Which of the following should be configured so users can authenticate to a wireless network using company credentials?

Options:

A.

SSO

B.

SAML

C.

MFA

D.

RADIUS

Buy Now
Questions 142

A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP. Which of the following documents provides the best information to assist the consultant with this decision?

Options:

A.

Site survey results

B.

Physical diagram

C.

Service-level agreement

D.

Logical diagram

Buy Now
Questions 143

A network administrator wants an automatic alert to be sent when a switch ' s link status changes, administered through SNMP. Which of the following SNMP technologies will allow for this alert?

Options:

A.

Trap

B.

Object identifier

C.

String

D.

MIB

Buy Now
Questions 144

A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of the following is causing the issue?

Options:

A.

Throughput capacity

B.

Roaming misconfiguration

C.

Channel overlap

D.

Packet loss

Buy Now
Questions 145

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

Options:

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Buy Now
Questions 146

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

Options:

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Buy Now
Questions 147

Which of the following is most closely associated with a dedicated link to a cloud environment and may not include encryption?

Options:

A.

Direct Connect

B.

Internet gateway

C.

Captive portal

D.

VPN

Buy Now
Questions 148

Which of the following allows the fastest recovery during a catastrophe event?

Options:

A.

Warm site

B.

Asynchronous replication

C.

Cold site

D.

Hot site

Buy Now
Questions 149

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

Options:

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Buy Now
Questions 150

A customer migrates its phone system from analog to a new hosted VoIP/software application solution with integrated video. After installation, some users notice issues with dropped calls, broken video, and slow internet access. The issues start in the mid-morning and continue into the afternoon. However, remote users do not report the same issues. Which of the following is the most likely cause of the issues?

Options:

A.

Roaming misconfiguration

B.

Signal degradation

C.

Insufficient bandwidth

D.

Miswired cable

Buy Now
Questions 151

A support agent receives a report that a remote user’s wired devices are constantly disconnecting and have slow speeds. Upon inspection, the support agent sees that the user’s coaxial modern has a signal power of -97dB.

Options:

A.

Removing any spliters connecte to the line

B.

Switching the devices to wireless

C.

Moving the devices closer to the modern

D.

Lowering the network speed

Buy Now
Questions 152

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

Options:

A.

724

B.

/26

C.

/28

D.

/30

Buy Now
Questions 153

Which of the following is an example of a split-tunnel VPN?

Options:

A.

Only public resources are accessed through the user’s internet connection.

B.

Encrypted resources are accessed through separate tunnels.

C.

All corporate and public resources are accessed through routing to on-site servers.

D.

ACLs are used to balance network traffic through different connections.

Buy Now
Questions 154

A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks. Which of the following would fulfill this requirement?

Options:

A.

Jumbo frames

B.

802.1Q tagging

C.

Native VLAN

D.

Link aggregation

Buy Now
Questions 155

A small business is choosing between static and dynamic routing for its network. Which of the following is the best reason to use dynamic routing in a growing network?

Options:

A.

Easier to configure compared to using manually entered routes

B.

Does not require additional network security controls

C.

Features enhanced network monitoring and visibility

D.

Includes automatic changes and updates in network topology

Buy Now
Questions 156

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

Options:

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Buy Now
Questions 157

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

Options:

A.

10.0.100.0/22

B.

172.16.8.0/23

C.

172.16.15.0/20

D.

192.168.4.0/21

Buy Now
Questions 158

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

Options:

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Buy Now
Questions 159

A network administrator is setting up a firewall to protect the organization’s network from external threats. Which of the following should the administrator consider first when configuring the firewall?

Options:

A.

Required ports, protocols, and services

B.

Inclusion of a deny all rule

C.

VPN access

D.

Outbound access originating from customer-facing servers

Buy Now
Questions 160

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

Options:

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Buy Now
Questions 161

A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have access points and cannot purchase any. Which of the following wireless network types best fulfills this requirement?

Options:

A.

Mesh

B.

Infrastructure

C.

Ad hoc

D.

Point-to-point

Buy Now
Questions 162

After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests. Which of the following steps should the architect take to troubleshoot the issue?

Options:

A.

Check to see if the end connections were wrapped in copper tape before terminating.

B.

Use passthrough modular crimping plugs instead of traditional crimping plugs.

C.

Connect the RX/TX wires to different pins.

D.

Run a speed test on a device that can only achieve 100Mbps speeds.

Buy Now
Questions 163

Which of the following connector types is most commonly associated with Wi-Fi antennas?

Options:

A.

BNC

B.

SFP

C.

MPO

D.

RJ45

Buy Now
Questions 164

An organization wants better network visibility. The organization ' s requirements include:

Multivendor/OS-monitoring capabilities

Real-time collection

Data correlation

Which of the following meets these requirements?

Options:

A.

SNMP

B.

SIEM

C.

Nmap

D.

Syslog

Buy Now
Questions 165

Which of the following provides simple authentication to access network devices while also providing logging capabilities?

Options:

A.

TACACS+

B.

SAML

C.

SSO

D.

MFA

Buy Now
Exam Code: N10-009
Exam Name: CompTIA Network+ Certification Exam
Last Update: May 13, 2026
Questions: 537
N10-009 pdf

N10-009 PDF

$25.5  $84.99
N10-009 Engine

N10-009 Testing Engine

$30  $99.99
N10-009 PDF + Engine

N10-009 PDF + Testing Engine

$40.5  $134.99