Pre-Summer Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Practice Free N10-009 CompTIA Network+ Certification Exam Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA N10-009 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Network+ Certification Exam exam materials available for free to everyone. You can take the Free N10-009 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

A technician is troubleshooting a computer issue for a user who works in a new annex of an office building. The user is reporting slow speeds and intermittent connectivity. The computer is connected via a Cat 6 cable to a distribution switch that is 492ft (150m) away. Which of the following should the technician implement to correct the issue?

A.

Increase the bandwidth allocation to the computer.

B.

Install an access switch in the annex and run fiber to the distribution switch.

C.

Run a Cat 7 cable from the computer to the distribution switch.

D.

Enable the computer to support jumbo frames.

Question # 7

Which of the following protocols provides remote access utilizing port 22?

A.

SSH

B.

Telnet

C.

TLS

D.

RDP

Question # 8

Which of the following is enforced through legislation?

A.

AUP

B.

GDPR

C.

Code of conduct

D.

EULA

Question # 9

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

A.

Changing the default password

B.

Blocking inbound SSH connections

C.

Removing the gateway from the network configuration

D.

Restricting physical access to the switch

Question # 10

A government entity wants to implement technology that can block websites based on country code. Which of the following will best enable this requirement?

A.

URL filtering

B.

Content filtering

C.

DNS poisoning

D.

MAC filtering

Question # 11

Which of the following ports creates a secure connection to a directory service?

A.

22

B.

389

C.

445

D.

636

Question # 12

A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and converage?

A.

802.11ac

B.

802.11ax

C.

802.11g

D.

802.11n

Question # 13

A network engineer added more APs to improve wireless coverage. However, users now report that the connectivity disconnects and reconnects repeatedly. Which of the following is causing the issue?

A.

Throughput capacity

B.

Roaming misconfiguration

C.

Channel overlap

D.

Packet loss

Question # 14

Which of the following routing technologies allows all users to access the internet using only two public IPs?

A.

EIGRP

B.

PAT

C.

BGP

D.

VIP

Question # 15

Which of the following is most closely associated with having a leased line to a public cloud provider?

A.

VPN

B.

Direct Connect

C.

Internet gateway

D.

Private cloud

Question # 16

A customer calls the help desk to report that resources are no longer reachable. The resources were available before network changes were made. The technician verifies the report, investigates, and discovers that a new logical layout is segmenting the network using tagging. Which of the following appliances most likely needs to be reviewed to restore the connections?

A.

Access point

B.

Firewall

C.

Switch

D.

Load balancer

Question # 17

Which of the following is the best way to securely access a network appliance from an external location?

A.

RDP

B.

Telnet

C.

FTPS

D.

SSH

Question # 18

A network administrator needs to connect a multimode fiber cable from the MDF to the server room. The administrator connects the cable to Switch 2, but there is no link light. The administrator tests the fiber and finds it does not have any issues. Swapping the connection to Switch 1 in a working port is successful, but the swapped connection does not work on Switch 2. Which of the following should the administrator verify next?

A.

Fiber length

B.

Transceiver model

C.

Connector type

D.

Port speed

Question # 19

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Question # 20

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

A.

Screened subnet

B.

802.1X

C.

MAC filtering

D.

Port security

Question # 21

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Question # 22

Which of the following best explains the role of confidentiality with regard to data at rest?

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Question # 23

A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?

A.

Scalability

B.

Software as a Service

C.

Hybrid cloud

D.

Elasticity

Question # 24

A network administrator has been monitoring the company ' s servers to ensure that they are available. Which of the following should the administrator use for this task?

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Question # 25

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Question # 26

A network administrator receives complaints of intermittent network connectivity issues. The administrator investigates and finds that the network design contains potential loop scenarios. Which of the following should the administrator do?

A.

Enable spanning tree

B.

Configure port security

C.

Change switchport speed limits

D.

Enforce 802.1Q tagging

Question # 27

Which of the following connection methods allows a network engineer to automate configuration deployment for network devices across the environment?

A.

RDP

B.

Telnet

C.

SSH

D.

GUI

Question # 28

Which of the following routing protocols uses an autonomous system number?

A.

IS-IS

B.

EIGRP

C.

OSPF

D.

BGP

Question # 29

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Question # 30

A user ' s VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question # 31

A company reports that their facsimile machine no longer has a dial tone when trying to send a fax. The phone cable is damaged on one end. Which of the following types of connectors should a technician replace?

A.

F-type

B.

RJ45

C.

SC

D.

RJ11

Question # 32

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

A.

The users are on the wrong subnet.

B.

The DHCP server renewed the lease.

C.

The IP address was not reserved.

D.

The hostname was changed.

Question # 33

A customer wants to separate the finance department from the marketing department. The network administrator suggests segmenting the existing Class C network into two sections and readdressing all devices appropriately. Which of the following subnet masks should the network administrator use?

A.

/24

B.

/25

C.

/26

D.

/27

Question # 34

A network administrator installs a node that requires a media converter to connect Ethernet to fiber but sees no link light on the node. The administrator notices the following:

    Both terminating points are properly seated.

    Both the fiber and Ethernet cables have been successfully tested.

    The media converter is turned on.

    The switchport is configured as half duplex.

Which of the following is the reason the link light is not on?

A.

The TX/RX connection is transposed.

B.

The switchport is misconfigured.

C.

One of the cables has a short.

D.

The switchport interface has errors.

Question # 35

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?

A.

Patch

B.

UPS

C.

MDF

D.

Rack

Question # 36

A critical infrastructure switch is identified as end-of-support. Which of the following is the best next step to ensure security?

A.

Apply the latest patches and bug fixes.

B.

Decommission and replace the switch.

C.

Ensure the current firmware has no issues.

D.

Isolate the switch from the network.

Question # 37

Which of the following connection methods allows a network engineer to automate the configuration deployment for network devices across the environment?

A.

RDP

B.

Telnet

C.

GUI

D.

API

Question # 38

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

Question # 39

Which of the following technologies is most appropriate for a business that requires high-speed access to frequently used web content, such as images and videos?

A.

CDN

B.

SAN

C.

Firewall

D.

Switch

Question # 40

A laptop user gets an error when trying to access the company’s intranet site. A technician runs ipconfig /all with the following results:

Autoconfiguration IPv4 Address: 169.254.0.5 (Preferred)

Subnet Mask: 255.255.0.0

Default Gateway:

DHCP Server:

Which of the following is most likely causing the issue?

A.

Short DHCP lease duration

B.

IIS server malfunction

C.

Address pool exhaustion

D.

IDS misconfiguration

Question # 41

SIMULATION

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

The SSIDs need to be configured as CorpNet with a key of S3cr3t!

The wireless signals should not interfere with each other

The subnet the Access Points and switch are on should only support 30 devices maximum

The Access Points should be configured to only support TKIP clients at a maximum speed

INSTRUCTONS

Click on the wireless devices and review their information and adjust the settings of the access points to meet the given requirements.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 question answer

N10-009 question answer

Question # 42

Which of the following layers of the OSI model is responsible for end-to-end encryption?

A.

Presentation

B.

Application

C.

Session

D.

Transport

Question # 43

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers ' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Question # 44

Which of the following ports is used for secure email?

A.

25

B.

110

C.

143

D.

587

Question # 45

A junior network administrator is auditing the company network and notices incrementing input errors on a long-range microwave interface. Which of the following is the most likely reason for the errors?

A.

The parabolic signal is misaligned.

B.

The omnidirectional signal is being jammed.

C.

The omnidirectional signal is not strong enough to receive properly.

D.

The parabolic signal uses improper routing protocols.

Question # 46

Which of the following is the best VPN to use for reducing data bandwidth requirements of the corporate network?

A.

Split-tunnel

B.

Site-to-site

C.

Full-tunnel client

D.

GRE tunnel

Question # 47

A network technician installs a new 19.7ft (6m), Cat 6, UTP cable for the connection between a server and a switch. Communication to the server is degraded, and the NIC statistics show dropped packets and CRC errors. Which of the following cables would the technician most likely use instead to reduce the errors?

A.

Coaxial cable

B.

9.8ft (3m) cable

C.

Plenum cable

D.

STP cable

Question # 48

A network administrator wants to update a geofencing policy to limit remote access to the corporate network based on country location. Which of the following would the administrator most likely leverage?

A.

MAC filtering

B.

Administrative distance

C.

Bluetooth beacon signals

D.

IP address blocks

Question # 49

To reduce costs and increase mobility, a Chief Technology Officer (CTO) wants to adopt cloud services for the organization and its affiliates. To reduce the impact for users, the CTO wants key services to run from the on-site data center and enterprise services to run in the cloud. Which of the following deployment models is the best choice for the organization?

A.

Public

B.

Hybrid

C.

SaaS

D.

Private

Question # 50

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Question # 51

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A.

Toner and probe

B.

Cable tester

C.

Visual fault locator

D.

Network tap

Question # 52

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Question # 53

A new staff member is unable to connect to the network. An IT support staff member finds the following:

The IP configuration is correct.

The TCP/IP stack is working on the workstation.

The gateway is unreachable.

Which of the following would the IT support staff member most likely check next?

A.

The DHCP configuration on the workstation

B.

The port ' s VLAN assignment on the switch

C.

The DHCP configuration on the router

D.

The default gateway on the switch

Question # 54

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Question # 55

Which of the following cloud platform technology characteristics would a quantum computing host most likely prioritize?

A.

Scalability

B.

Elasticity

C.

Multitenancy

D.

Cost

Question # 56

A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?

A.

Port security

B.

802.1X

C.

MAC filtering

D.

Access control list

Question # 57

Which of the following are environmental factors that should be considered when installing equipment in a building? (Select two).

A.

Fire suppression system

B.

UPS location

C.

Humidity control

D.

Power load

E.

Floor construction type

F.

Proximity to nearest MDF

Question # 58

Which of the following allows a remote user to connect to the network?

A.

Command-line interface

B.

API gateway

C.

Client-to-site VPN

D.

Jump box

Question # 59

A systems administrator is configuring a new device to be added to the network. The administrator is planning to perform device hardening prior to connecting the device. Which of the following should the administrator do first?

A.

Update the network ACLs.

B.

Place the device in a screened subnet.

C.

Enable content filtering.

D.

Change the default admin passwords.

Question # 60

After installing a new 6E wireless router in a small office, a technician notices that some wireless devices are not able to achieve the rated speeds.

Which of the following should the technician check to troubleshoot the issue? (Select two)

A.

Client device compatibility

B.

Back-end cabling

C.

Weather phenomena

D.

Voltage source requirements

E.

Interference levels

F.

Processing power

Question # 61

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A.

Port

B.

DNS

C.

MAC

D.

Content

Question # 62

An administrator wants to find the top destination for traffic across the infrastructure on a specific day. Which of the following should the administrator use?

A.

SNMP

B.

Packet capture

C.

NetFlow

D.

traceroute

Question # 63

A company is hosting a secure that requires all connections to the server to be encrypted. A junior administrator needs to harded the web server. The following ports on the web server. The following ports on the web server are open:

N10-009 question answer

Which of the following ports should be disabled?

A.

22

B.

80

C.

443

D.

587

Question # 64

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

A.

ACLs

B.

Port security

C.

Content filtering

D.

NAC

Question # 65

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Question # 66

A group of users cannot connect to network resources. The technician runs ipconfig from one user ' s device and is able to ping the gateway shown from the command. Which of the following is most likely preventing the users from accessing network resources?

A.

VLAN hopping

B.

Rogue DHCP

C.

Distributed DoS

D.

Evil twin

Question # 67

A network administrator installs new cabling to connect new computers and access points. After deploying the equipment, the administrator notices a few of the devices are not connecting properly. The administrator moves the devices to a different port, but it does not resolve the issue. Which of the following should the administrator verify next?

A.

Power budget

B.

Device requirements

C.

Port status

D.

Cable termination

Question # 68

While troubleshooting connectivity issues, a junior network administrator is given explicit instructions to test the host ' s TCP/IP stack first. Which of the following commands should the network administrator run?

A.

ping 127.0.0.1

B.

ping 169.254.1.1

C.

ping 172.16.1.1

D.

ping 192.168.1.1

Question # 69

A network administrator is troubleshooting a connection issue and needs to determine the path that a packet will take. Which of the following commands accomplishes this task?

A.

netstat

B.

traceroute

C.

ping

D.

nslookup

E.

ipconfig

Question # 70

After installing a new wireless access point, an engineer tests the device and sees that it is not performing at the rated speeds. Which of the following should the engineer do to troubleshoot the issue? (Select two.)

A.

Ensure a bottleneck is not coming from other devices on the network.

B.

Install the latest firmware for the device.

C.

Create a new VLAN for the access point.

D.

Make sure the SSID is not longer than 16 characters.

E.

Configure the AP in autonomous mode.

F.

Install a wireless LAN controller.

Question # 71

Which of the following attacks would most likely cause duplicate IP addresses in a network?

A.

Rogue DHCP server

B.

DNS poisoning

C.

Social engineering

D.

Denial-of-service

Question # 72

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

A.

Incorrect DNS

B.

Unreachable gateway

C.

Failed root bridge

D.

Poor upstream routing

Question # 73

Which of the following allows the fastest recovery during a catastrophe event?

A.

Warm site

B.

Asynchronous replication

C.

Cold site

D.

Hot site

Question # 74

A media company is implementing a global streaming service. Which of the following should the company apply to each regional point of presence in order to comply with local laws?

A.

ACL

B.

Port security

C.

Key management

D.

Content filtering

Question # 75

An ISP provided a company with a pre-configured modem and five public static IP addresses. Which of the following does the company ' s firewall require to access the internet? (Select TWO).

A.

NTP server

B.

Default gateway

C.

The modem ' s IP address

D.

One static IP address

E.

DNS servers

F.

DHCP server

Question # 76

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?

A.

110

B.

143

C.

587

D.

636

Question # 77

Users are reporting latency on the network. The network engineer notes the following:

Confirms the only change was a new network switch

Confirms all users are experiencing latency

Thinks the issue is a network loop caused by the lower bridge ID of the new switch

Which of the following describes the next step in the troubleshooting methodology?

A.

Identify the problem.

B.

Test the theory.

C.

Implement the solution.

D.

Verify full system functionality.

Question # 78

A network administrator needs to locate a specific AP using a spectrum analyzer to complete an 802.11ax device migration. Which of the following should display on the analyzer to locate the AP?

A.

SSID

B.

RSSI

C.

Channel number

D.

BSSID

Question # 79

Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated, significant network issues occur. Which of the following is the most likely cause for the WAN instability?

A.

A changed CDP neighbor

B.

Asymmetrical routing

C.

A switching loop

D.

An incorrect IP address

Question # 80

A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of the following technologies should be implemented?

A.

ACL

B.

Trunking

C.

Port security

D.

Private VLAN

Question # 81

A technician needs to quickly set up a network with five wireless devices. Which of the following network types should the technician configure to accomplish this task?

A.

Ad hoc

B.

Spine and leaf

C.

Point to point

D.

Mesh

Question # 82

A user cannot access an external server for a client after connecting to a VPN. Which of the following commands would a support agent most likely use to examine the issue? (Select two).

A.

nslookup

B.

tcpdump

C.

arp

D.

dig

E.

tracert

F.

route print

Question # 83

Which of the following would be violated if an employee accidentally deleted a customer ' s data?

A.

Integrity

B.

Confidentiality

C.

Vulnerability

D.

Availability

Question # 84

Which of the following is a use case for a PaaS environment?

A.

Mobile access

B.

E-commerce site

C.

Application development

D.

Cloud-native software

Question # 85

A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility. Which of the following will accomplish this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question # 86

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

A.

Update the firmware.

B.

Replace the system board.

C.

Patch the OS.

D.

Isolate the system.

Question # 87

After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch. Which of the following best describes the attack that occurred?

A.

VLAN hopping

B.

Evil twin

C.

DNS poisoning

D.

ARP spoofing

Question # 88

A network administrator upgrades the wireless access points and wants to implement a configuration that gives users higher speed and less channel overlap based on device compatibility. Which of the following accomplishes this goal?

A.

802.1X

B.

MIMO

C.

ESSID

D.

Band steering

Question # 89

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

N10-009 question answer

N10-009 question answer

Question # 90

A network rack has four servers and four switches with dual power supplies. Only one intelligent PDU is installed in the rack. Which of the following is the reason to add a second PDU?

A.

Power redundancy

B.

Failed PSU monitoring

C.

Surge protection

D.

Electricity conservation

Question # 91

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Question # 92

Which of the following connector types would most likely be used to connect to an external antenna?

A.

BNC

B.

ST

C.

LC

D.

MPO

Question # 93

A network engineer is designing an internal network that needs to support both IPv4 and IPv6 routing. Which of the following routing protocols is capable of supporting both IPv4 and IPv6?

A.

OSPFv3

B.

RIPv2

C.

BGP

D.

EIGRP

Question # 94

Which of the following cable types allows the use of QSFP ports without requiring transceivers?

A.

Multimode

B.

Twinaxial

C.

RG11

D.

Category 6

Question # 95

A network engineer is completing a wireless installation in a new building. A requirement is that all clients be able to automatically connect to the fastest supported network. Which of the following best supports this requirement?

A.

Enabling band steering

B.

Disabling the 5GHz SSID

C.

Adding a captive portal

D.

Configuring MAC filtering

Question # 96

A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity. Which of the following is the MOST likely reason?

A.

The new switch has unused ports disabled

B.

The new switch does not have a default gateway

C.

The new switch is connected to an access port

D.

The new switch is in a spanning tree loop

Question # 97

Which of the following steps in the troubleshooting methodology comes after using a top-to-top buttom examination of the OSI model to determine cause?

A.

Test in the theory

B.

Establish a plan of action

C.

Verify full system functionality

D.

Identify the problem

Question # 98

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?

A.

Extranet

B.

Trusted

C.

VPN

D.

Public

Question # 99

Which of the following recovery strategies should a company implement to ensure data center services are quickly restored and accessible after a disaster occurs?

A.

Backup and replication software

B.

Active-passive approach

C.

Cloud computing

D.

Remote manual failover

Question # 100

Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Question # 101

Which of the following does a full-tunnel VPN provide?

A.

Lower bandwidth requirements

B.

The ability to reset local computer passwords

C.

Corporate Inspection of all networktraffic

D.

Access to blocked sites

Question # 102

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Question # 103

A company is concerned that the public can use network wall jacks in publicly available conference rooms to access company servers. Which of the following is the best way to mitigate the vulnerability?

A.

Create a trusted zone.

B.

Disable unused services.

C.

Use MAC filtering.

D.

Implement 802.1X.

Question # 104

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.

Question # 105

A newtwork administrator needs to create an SVI on a Layer 3-capable device to separate voice and data traffic. Which of the following best explains this use case?

A.

A physical interface used for trunking logical ports

B.

A physical interface used for management access

C.

A logical interface used for the routing of VLANs

D.

A logical interface used when the number of physical ports is insufficent.

Question # 106

Which of the following is used to estimate the average life span of a device?

A.

RTO

B.

RPO

C.

MTBF

D.

MTTR

Question # 107

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company ' s internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company ' s network.

Question # 108

Which of the following offers the ability to manage access at the cloud VM instance?

A.

Security group

B.

Internet gateway

C.

Direct Connect

D.

Network ACL

Question # 109

Which of the following terms describes the capability in a public cloud to add or remove compute resources based on need?

A.

Scalability

B.

Availability

C.

Elasticity

D.

Multitenancy

Question # 110

A network administrator needs to implement a solution to filter access to the internet. Which of the following should the administrator most likely implement?

A.

Router

B.

Cloud gateway

C.

Proxy

D.

Intrusion detection system

Question # 111

Which of the following protocol ports should be used to securely transfer a file?

A.

22

B.

69

C.

80

D.

3389

Question # 112

Which of the following can also provide a security feature when implemented?

A.

NAT

B.

BGP

C.

FHRP

D.

EIGRP

Question # 113

Which of the following is a type of NAC that uses a set of policies to allow or deny access to the network based on the user’s identity?

A.

Standard ACL

B.

MAC filtering

C.

802.1X

D.

SSO

Question # 114

A network engineer queries a hostname using dig, and a valid IP address is returned. However, when the engineer queries that same IP address using dig, no hostname is returned. Which of the following DNS records is missing?

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Question # 115

A network administrator is notified that a user cannot access resources on the network. The network administrator checks the physical connections to the workstation labeled User 3 and sees the Ethernet is properly connected. However, the network interface’s indicator lights are not blinking on either the computer or the switch. Which of the following Is the most likely cause?

A.

Theswitch failed.

B.

Thedefault gateway is wrong.

C.

Theport Is shut down.

D.

TheVLAN assignment is incorrect.

Question # 116

A user tries to visit a website, but instead of the intended site, the page displays vmw.cba.com. Which of the following should be done to reach the correct website?

A.

Modify the CNAME record

B.

Update the PTR record

C.

Change the NTP settings

D.

Delete the TXT record

Question # 117

A network manager connects two switches together and uses two connecting links. Which of the following configurations will prevent Layer 2 loops?

A.

802.1Q tagging

B.

Full duplex

C.

Link aggregation

D.

QoS

Question # 118

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 < 1 ms 2. * < 1 ms < 1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

A.

Review the router ' s ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Question # 119

Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?

A.

Logical diagram

B.

Layer 3 network diagram

C.

Service-level agreement

D.

Heat map

Question # 120

Which of the following is used to redistribute traffic between one source and multiple servers that run the same service?

A.

Router

B.

Switch

C.

Firewall

D.

Load balancer

Question # 121

Which of the following VPN configurations forces a remote user to access internet resources through the corporate network?

A.

Clientless

B.

Site-to-site

C.

SSE

D.

Full-tunnel

Question # 122

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Question # 123

Which of the following network access methods is used to securely access resources, such as a corporate cloud or network, as if they were directly connected?

A.

Jump box/host

B.

Secure Shell

C.

Client-to-site VPN

D.

GRE tunnel

Question # 124

A network administrator deploys several new desk phones and workstation cubicles. Each cubicle has one assigned switchport. The administrator runs the following commands:

nginx

CopyEdit

switchport mode access

switchport voice vlan 69

With which of the following VLANs will the workstation traffic be tagged?

A.

Private VLAN

B.

Voice VLAN

C.

Native VLAN

D.

Data VLAN

Question # 125

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 question answer

Question # 126

A network administrator needs to limit devices that can connect to a small wireless network. The network consists of less than ten unique laptops, and no network changes are anticipated. Which of the following is the simplest way to accomplish this task?

A.

ACLs

B.

MAC filtering

C.

NAC

D.

Trusted zones

Question # 127

A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files. Which of the following DHCP features would help the phone reach the TFTP server?

A.

Exclusions

B.

Lease time

C.

Options

D.

Scope

Question # 128

A network engineer needs to virtualize network services, including a router at a remote branch location. Which of the following solutions meets the requirements?

A.

NFV

B.

VRF

C.

VLAN

D.

VPC

Question # 129

A network architect of a stock exchange broker is implementing a disaster recovery (DR), high-availability plan. Which of the following approaches would be the best fit?

A.

Warm site

B.

Active-active

C.

Full mesh

D.

In-band

Question # 130

Which of the following steps of the troubleshooting methodology would most likely involve comparing current throughput tests to a baseline?

A.

Implement the solution

B.

Verify full system functionality

C.

Document findings

D.

Test the theory

Question # 131

Which of the following source control features allows an administrator to test a new configuration without changing the primary configuration?

A.

Central repository

B.

Conflict identification

C.

Branching

D.

Version control

Question # 132

A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved. Which of the following is the most likely reason for these issues?

A.

The network uses a non-overlapping channel.

B.

The signal is reflecting too much.

C.

The network has excessive noise.

D.

A microwave is in the office.

Question # 133

A network engineer performed a migration to a new mail server. The engineer changed the MX record, verified the change was accurate, and confirmed the new mail server was reachable via the IP address in the A record. However, users are not receiving email. Which of the following should the engineer have done to prevent the issue from occurring?

A.

Change the email client configuration to match the MX record.

B.

Reduce the TTL record prior to the MX record change.

C.

Perform a DNS zone transfer prior to the MX record change.

D.

Update the NS record to reflect the IP address change.

Question # 134

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).

A.

Mesh network

B.

5GHz frequency

C.

Omnidirectional antenna

D.

Non-overlapping channel

E.

Captive portal

F.

Ad hoc network

Question # 135

Which of the following network ports is used when a client accesses an SFTP server?

A.

22

B.

80

C.

443

D.

3389

Question # 136

Which of the following allows a user to authenticate to multiple resources without requiring additional passwords?

A.

SSO

B.

MFA

C.

SAML

D.

RADIUS

Question # 137

A network technician needs to configure IP addressing in a Class C network with eight subnets total:

Three subnets for 60 hosts

Three subnets for 15 hosts

Two subnets for seven hosts

Which of the following solutions should the technician use to accomplish this task?

A.

CIDR

B.

APIPA

C.

VLSM

D.

RFC 1918

Question # 138

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?

A.

Honeynet

B.

Data-at-rest encryption

C.

Time-based authentication

D.

Network segmentation

Question # 139

The leadership team is updated on the results of an approved change request after a breach. Which of the following troubleshooting methodology steps is described in this example?

A.

Establishing a theory of probable cause

B.

Implementing the solution or escalating as necessary

C.

Documenting findings, actions, outcomes, and lessons learned throughout the process

D.

Establishing a plan of action to resolve the problem and identifying potential effects

Question # 140

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

A.

SNMP trap

B.

Port mirroring

C.

Syslog collection

D.

API integration

Question # 141

A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?

A.

Trusted zones

B.

URL filtering

C.

ACLs

D.

Screened subnet

Question # 142

A network administrator recently upgraded a wireless infrastructure with new APs. Users report that when stationary, the wireless connection drops and reconnects every 20 to 30 seconds. While reviewing logs, the administrator notices the APs are changing channels.

Which of the following is the most likely reason for the service interruptions?

A.

Channel interference

B.

Roaming misconfiguration

C.

Network congestion

D.

Insufficient wireless coverage

Question # 143

Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?

A.

dig

B.

nmap

C.

tracert

D.

telnet

Question # 144

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

A.

724

B.

/26

C.

/28

D.

/30

Question # 145

A company is implementing a new internal network in which all devices use IPv6 addresses. Which of the following routing protocols will be best for this setup?

A.

EIGRP

B.

OSPFv3

C.

BGP4

D.

iBGP

Question # 146

A technician is troubleshooting wireless connectivity near a break room. Whenever a user turns on the microwave, connectivity to the user ' s laptop is lost. Which of the following frequency bands is the laptop most likely using?

A.

2.4GHz

B.

5GHz

C.

6GHz

D.

900MHz

Question # 147

Which of the following must be implemented to securely connect a company ' s headquarters with a branch location?

A.

Split-tunnel VPN

B.

Clientless VPN

C.

Full-tunnel VPN

D.

Site-to-site VPN

Question # 148

Which of the following allows for the interception of traffic between the source and destination?

A.

Self-signed certificate

B.

VLAN hopping

C.

On-path attack

D.

Phishing

Question # 149

A network administrator wants to restrict inbound traffic to allow only HTTPS to the company website, denying all other inbound traffic from the internet. Which of the following would best accomplish this goal?

A.

ACL on the edge firewall

B.

Port security on an access switch

C.

Content filtering on a web gateway

D.

URL filtering on an outbound proxy

Question # 150

A network technician is troubleshooting a faulty NIC and tests the theory. Which of the following should the technician do next?

A.

Develop a theory.

B.

Establish a plan of action.

C.

Implement the solution.

D.

Document the findings.

Question # 151

After providing a username and password, a user must input a passcode from a phone application. Which of the following authentication technologies is used in this example?

A.

SSO

B.

LDAP

C.

MFA

D.

SAML

Question # 152

A company is migrating a data center from on premises to the cloud. Which of the following tools will help maintain consistency, reliability, and efficiency of provisioning and management?

A.

IaC

B.

CDN

C.

SASE

D.

ZTA

Question # 153

A small company has the following IP addressing strategy:

A user is unable to connect to the company fileshare server located at 192.168.10.1. The user’s networking configuration is:

Which of the following will most likely correct the issue?

A.

Changing the IPv4 address to 192.168.10.1

B.

Changing the subnet mask to 255.255.255.0

C.

Changing the DNS servers to internet IPs

D.

Changing the physical address to 7A-01-7A-21-01-50

Question # 154

Which of the following allows a standard user to log in to multiple resources with one account?

A.

RADIUS

B.

MFA

C.

TACACS+

D.

SSO

Question # 155

A company has been added to an unapproved list because of spam. The network administrator confirmed that a workstation was infected by malware. Which of the following processes did the administrator use to identify the root cause?

A.

Traffic analysis

B.

Availability monitoring

C.

Baseline metrics

D.

Network discovery

Question # 156

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Question # 157

A firewall administrator is mapping a server ' s internal IP address to an external IP address for public use. Which of the following is the name of this function?

A.

NAT

B.

VIP

C.

PAT

D.

BGP

Question # 158

A network engineer connects a business to a new ISP. A simple ping test to 8.8.8.8 is successful. However, users complain of extreme slowness to any website and periods of no connectivity. Which of the following is the most likely cause?

A.

Incorrect default gateway

B.

VLAN mismatch

C.

Subnet mask configuration

D.

Duplicate ISP IP address

Question # 159

A network technician receives a new ticket while working on another issue. The new ticket is critical to business operations. Which of the following documents should the technician reference to determine which ticket to complete first?

A.

NDA

B.

AUP

C.

SLA

D.

MOU

Question # 160

Which of the following is the best way to reduce the likelihood of electrostatic discharge?

A.

Uninterruptible power supply

B.

Surge protector

C.

Power distribution units

D.

Temperature and humidity control

Question # 161

Three new employees report that they are unable to access company resources, but they can connect to each other’s devices. Which of the following would most likely need to be modified to resolve the issue?

A.

The routing table on the gateway

B.

The DNS configuration on the router

C.

The pool on the DHCP server

D.

The firewall on the workstation

Question # 162

Which of the following connectors provides console access to a switch?

A.

ST

B.

RJ45

C.

BNC

D.

SFP

Question # 163

Which of the following is used to store and deliver content to clients in a geographically distributed manner using edge servers?

A.

Load balancer

B.

CDN

C.

DNS server

D.

SAN

Question # 164

A network administrator is looking for a solution to extend Layer 2 capabilities and replicate backups between sites. Which of the following is the best solution?

A.

Security Service Edge

B.

Data center interconnect

C.

Infrastructure as code

D.

Zero Trust architecture

Question # 165

A network administrator changed an external DNS to point customers to a new server. Which of the following tools should the administrator use to test the new server ' s configuration?

A.

ping

B.

tracert

C.

tcpdump

D.

nslookup

N10-009 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

N10-009 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: CompTIA Network+ Certification Exam
  • Last Update: May 16, 2026
  • Questions and Answers: 550
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

N10-009 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included