Comptia: Exam Questions N10-009
Comptia: Exam Questions N10-009
Get the Full N10-009 dumps in VCE and PDF From SurePassExam
https://www.surepassexam.com/N10-009-exam-dumps.html (111 New Questions)
CompTIA
Exam Questions N10-009
CompTIA Network+ Exam
NEW QUESTION 1
- (Exam Topic 1)
A technician wants to deploy a new wireless network that comprises 30 WAPs installed throughout a
three-story office building. All the APs will broadcast the same SSID for client access. Which of the following BEST describes this deployment?
Answer: A
Explanation:
An extended service set (ESS) is a wireless network that consists of multiple access points (APs) that share the same SSID and are connected by a wired
network. An ESS allows wireless clients to roam seamlessly between different APs without losing connectivity. A basic service set (BSS) is a wireless network that
consists of a single AP and its associated clients. An independent basic service set (IBSS) is a wireless network that consists of a group of clients that
communicate directly without an AP. A unified service set is not a standard term for a wireless network. References:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0),
https://en.wikipedia.org/wiki/Service_set_(802.11_network)
NEW QUESTION 2
- (Exam Topic 1)
Which of the following devices would be used to manage a corporate WLAN?
A. A wireless NAS
B. A wireless bridge
C. A wireless router
D. A wireless controller
Answer: D
Explanation:
A wireless controller is used to manage a corporate WLAN, providing centralized management and configuration of access points. References: CompTIA
Network+ Certification Study Guide, Chapter 8: Wireless Networks.
NEW QUESTION 3
- (Exam Topic 1)
An engineer notices some late collisions on a half-duplex link. The engineer verifies that the devices on both ends of the connection are configured for half duplex.
Which of the following is the MOST likely cause of this issue?
Answer: C
Explanation:
In a half-duplex link, devices can only send or receive data at one time, not simultaneously. Late collisions occur when devices transmit data at the same time after
waiting for a clear channel. One of the causes of late collisions is excessive cable length, which increases the propagation delay and makes it harder for devices to
detect collisions. The link termination, device configuration, and device hardware are not likely to cause late collisions on a half-duplex link.
NEW QUESTION 4
- (Exam Topic 1)
Wireless users are reporting intermittent internet connectivity. Connectivity is restored when the users disconnect and reconnect, utilizing the web authentication
process each time. The network administrator can see the devices connected to the APs at all times. Which of the following steps will MOST likely determine the
cause of the issue?
Answer: A
Explanation:
A captive portal is a web page that requires users to authenticate before they can access the internet. If the session time-out configuration is too short, users may
experience intermittent internet connectivity and have to reconnect using the web authentication process each time. The network administrator can verify the
session time-out configuration on the captive portal settings and adjust it if needed. References: CompTIA Network+ Certification Exam Objectives Version 2.0
(Exam Number: N10-006), Domain 1.0 Network Architecture, Objective 1.8 Explain the purposes and use cases for advanced networking devices.
NEW QUESTION 5
- (Exam Topic 1)
At which of the following OSI model layers would a technician find an IP header?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
Answer: C
Explanation:
An IP header can be found at the third layer of the OSI model, also known as the network layer. This layer is responsible for logical addressing, routing, and
forwarding of data packets.
References:
CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 2: Network Models, p. 82
NEW QUESTION 6
- (Exam Topic 1)
An attacker is attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt. Which of the following
attack types BEST describes this action?
A. Pass-the-hash attack
B. Rainbow table attack
C. Brute-force attack
D. Dictionary attack
Answer: D
Explanation:
The attacker attempting to find the password to a network by inputting common words and phrases in plaintext to the password prompt is using a dictionary attack.
References: CompTIA Network+ Certification Study Guide, Chapter 6: Network Attacks and Mitigation.
NEW QUESTION 7
- (Exam Topic 1)
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following
allows the enforcement of this policy?
A. Motion detection
B. Access control vestibules
C. Smart lockers
D. Cameras
Answer: B
Explanation:
The most effective security mechanism against physical intrusions due to stolen credentials would likely be a combination of several of these options. However, of
the options provided, the most effective security mechanism would probably be an access control vestibule. An access control vestibule is a secure area that is
located between the outer perimeter of a facility and the inner secure area. It is designed to provide an additional layer of security by requiring that individuals pass
through a series of security checks before being allowed access to the secure area. This could include biometric authentication, access card readers, and motion
detection cameras.
Access control vestibules allow the enforcement of the policy that access to a datacenter should be individually recorded by a card reader even when multiple
employees enter the facility at the same time. An access control vestibule is a physical security device that consists of two doors with an interlocking mechanism.
Only one door can be opened at a time, and only one person can pass through each door. This prevents tailgating or piggybacking, where unauthorized persons
follow authorized persons into a secure area. An access control vestibule can also be integrated with a card reader or other authentication system to record each
individual’s access. References: https://www.boonedam.us/blog/what-are-access-control-vestibules
NEW QUESTION 8
- (Exam Topic 1)
A technician is installing a new fiber connection to a network device in a datacenter. The connection from the device to the switch also traverses a patch panel
connection. The chain of connections is in the following order:
Device
LC/LC patch cable Patch panel
Cross-connect fiber cable Patch panel
LC/LC patch cable Switch
The connection is not working. The technician has changed both patch cables with known working patch cables. The device had been tested and was working
properly before being installed. Which of the following is the MOST likely cause of the issue?
A. TX/RX is reversed
B. An incorrect cable was used
C. The device failed during installation
D. Attenuation is occurring
Answer: A
Explanation:
The most likely cause of the issue where the fiber connection from a device to a switch is not working is that the TX/RX (transmit/receive) is reversed. When
connecting fiber optic cables, it is important to ensure that the TX of one device is connected to the RX of the other device and vice versa. If the TX/RX is reversed,
data cannot be transmitted successfully.
References:
CompTIA Network+ Certification Study Guide, Exam N10-007, Fourth Edition, Chapter 5: Network Operations, Objective 5.1: Given a scenario, use appropriate
documentation and diagrams to manage the network.
NEW QUESTION 9
- (Exam Topic 1)
A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users
report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue?
Answer: C
Explanation:
Channel overlap is a common cause of wireless connectivity issues, especially in high-density environments where multiple APs are operating on the same or
adjacent frequencies. Channel overlap can cause interference, signal degradation, and performance loss for wireless devices. The AP association time, EIRP, and
RSSI are not likely to cause frequent disconnects and reconnects for wireless users.
NEW QUESTION 10
- (Exam Topic 1)
Several WIFI users are reporting the inability to connect to the network. WLAN users on the guest network are able to access all network resources without any
performance issues. The following table summarizes the findings after a site survey of the area in question:
Which of the following should a wireless technician do NEXT to troubleshoot this issue?
Answer: A
Explanation:
Based on the site survey table, we can see that AP 2, AP 3, and AP 4 are all broadcasting on the same channel, which can cause interference and affect
performance. Therefore, the next step a wireless technician should take to troubleshoot this issue is to reconfigure the channels to reduce overlap. This will help to
improve network performance and eliminate any interference.
References:
Network+ N10-007 Certification Exam Objectives, Objective 2.8: Given a scenario, troubleshoot common wireless problems and perform site surveys.
NEW QUESTION 10
- (Exam Topic 1)
A user tries to ping 192.168.1.100 from the command prompt on the 192.168.2.101 network but gets the following response: U.U.U.U. Which of the following
needs to be configured for these networks to reach each other?
Answer: B
Explanation:
A default gateway is a device that routes traffic from one network to another network, such as the Internet. A default gateway is usually configured on each host
device to specify the IP address of the router that connects the host’s network to other networks. In this case, the user’s device and the destination device are on
different networks (192.168.1.0/24 and 192.168.2.0/24), so the user needs to configure a default gateway on their device to reach the destination device.
References:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0), https://www.techopedia.com/definition/25761/default-
gateway
NEW QUESTION 15
- (Exam Topic 1)
Which of the following can be used to centrally manage credentials for various types of administrative privileges on configured network devices?
A. SSO
B. TACACS+
C. Zero Trust
D. Separation of duties
E. Multifactor authentication
Answer: B
Explanation:
TACACS+ (Terminal Access Controller Access Control System Plus) can be used to centrally manage credentials for various types of administrative privileges on
configured network devices. This protocol separates authentication, authorization, and accounting (AAA) functions, providing more granular control over access to
network resources.
References:
Network+ N10-007 Certification Exam Objectives, Objective 4.2: Given a scenario, implement secure network administration principles.
NEW QUESTION 20
- (Exam Topic 1)
A technician is searching for a device that is connected to the network and has the device’s physical network address. Which of the following should the technician
review on the switch to locate the device’s network port?
A. IP route table
B. VLAN tag
C. MAC table
D. QoS tag
Answer: C
Explanation:
To locate a device's network port on a switch, a technician should review the switch's MAC address table. The MAC address table maintains a list of MAC
addresses of devices connected to each port on the switch. By checking the MAC address of the device in question, the technician can identify the port to which
the device is connected.
References: CompTIA Network+ Certification Study Guide, Sixth Edition by Glen E. Clarke
NEW QUESTION 25
- (Exam Topic 1)
Which of the following ports is commonly used by VoIP phones?
A. 20
B. 143
C. 445
D. 5060
Answer: D
Explanation:
TCP/UDP port 5060 is commonly used by VoIP phones. It is the default port for SIP (Session Initiation Protocol), which is a signaling protocol that establishes,
modifies, and terminates multimedia sessions over IP networks. SIP is widely used for VoIP applications such as voice and video calls. References:
https://www.voip-info.org/session-initiation-protocol/
NEW QUESTION 26
- (Exam Topic 1)
A technician needs to configure a Linux computer for network monitoring. The technician has the following information:
Linux computer details:
After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer?
Answer: A
Explanation:
The ifconfig eth0 promisc command should be run on the Linux computer to enable promiscuous mode, which allows the computer to capture all network traffic
passing through the switch mirror port. References: CompTIA Network+ Certification Study Guide, Chapter 7: Network Devices.
NEW QUESTION 31
- (Exam Topic 1)
A company hired a technician to find all the devices connected within a network. Which of the following software tools would BEST assist the technician in
completing this task?
A. IP scanner
B. Terminal emulator
C. NetFlow analyzer
D. Port scanner
Answer: A
Explanation:
To find all devices connected within a network, a technician can use an IP scanner. An IP scanner sends a ping request to all IP addresses within a specified
range and then identifies the active devices that respond to the request.
NEW QUESTION 36
- (Exam Topic 1)
An engineer is configuring redundant network links between switches. Which of the following should the engineer enable to prevent network stability issues?
A. 802.1Q
B. STP
C. Flow control
D. CSMA/CD
Answer: B
Explanation:
Spanning Tree Protocol (STP) should be enabled when configuring redundant network links between switches. STP ensures that only one active path is used at a
time, preventing network loops and stability issues.
References:
CompTIA Network+ Certification Study Guide
NEW QUESTION 37
- (Exam Topic 1)
Which of the following routing protocols is used to exchange route information between public autonomous systems?
A. OSPF
B. BGP
C. EGRIP
D. RIP
Answer: B
Explanation:
BGP (Border Gateway Protocol) is a routing protocol used to exchange route information between public autonomous systems (AS). OSPF (Open Shortest Path
First), EGRIP (Enhanced Interior Gateway Routing Protocol), and RIP (Routing Information Protocol) are all used for internal routing within a single AS. Therefore,
BGP is the correct option to choose for this question.
References:
Network+ N10-007 Certification Exam Objectives, Objective 3.3: Given a scenario, configure and apply the appropriate routing protocol.
Cisco: Border Gateway Protocol (BGP) Overview
NEW QUESTION 39
- (Exam Topic 1)
A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link?
A. OTDR
B. Tone generator
C. Fusion splicer
D. Cable tester
E. PoE injector
Answer: A
Explanation:
To detect the exact break point of a fiber link, an engineer should use an OTDR (Optical Time Domain Reflectometer). This device sends a series of pulses into
the fiber, measuring the time it takes for the pulses to reflect back, and can pinpoint the exact location of the break.
References:
Network+ N10-007 Certification Exam Objectives, Objective 2.5: Given a scenario, troubleshoot copper cable issues.
FS: OTDR (Optical Time Domain Reflectometer) Testing Principle and Applications
NEW QUESTION 43
- (Exam Topic 1)
An IT organization needs to optimize speeds for global content distribution and wants to reduce latency in high-density user locations. Which of the following
technologies BEST meets the organization’s requirements?
A. Load balancing
B. Geofencing
C. Public cloud
D. Content delivery network
E. Infrastructure as a service
Answer: D
Explanation:
A content delivery network (CDN) is a distributed network of servers that delivers web content to users based on their geographic location. By replicating content
across multiple servers in various locations, a CDN can optimize speed and reduce latency in high-density user locations.
NEW QUESTION 47
- (Exam Topic 1)
A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology,
this is an example of:
Answer: A
Explanation:
Using a bottom-to-top approach means starting from the physical layer and moving up the OSI model to troubleshoot a network problem. Checking for a link light is
a physical layer check that verifies the connectivity of the network cable and device. References:
https://www.professormesser.com/network-plus/n10-007/troubleshooting-methodologies-2/
NEW QUESTION 49
- (Exam Topic 1)
A systems administrator needs to improve WiFi performance in a densely populated office tower and use the latest standard. There is a mix of devices that use 2.4
GHz and 5 GHz. Which of the following should the
systems administrator select to meet this requirement?
A. 802.11ac
B. 802.11ax
C. 802.11g
D. 802.11n
Answer: B
Explanation:
* 802.11 ax is the latest WiFi standard that improves WiFi performance in densely populated environments and supports both 2.4 GHz and 5 GHz bands. 802.11ac
is the previous standard that only supports 5 GHz band. 802.11g and 802.11n are older standards that support 2.4 GHz band only or both bands respectively.
References:
https://partners.comptia.org/docs/default-source/resources/comptia-network-n10-008-exam-objectives-(2-0),
https://www.techtarget.com/searchnetworking/tip/Whats-the-difference-between-80211ax-vs-80211ac
NEW QUESTION 51
- (Exam Topic 1)
Which of the following is MOST likely to generate significant East-West traffic in a datacenter?
Answer: B
Explanation:
East-West traffic refers to data flows between servers or devices within the same datacenter. When a hosted virtual server is duplicated to another physical server
for redundancy, it generates significant East-West traffic as the data is replicated between the two servers. References:
Network+ N10-008 Objectives: 3.3 Given a scenario, implement secure network architecture concepts.
NEW QUESTION 52
- (Exam Topic 1)
Which of the following service models would MOST likely be used to replace on-premises servers with a cloud solution?
A. PaaS
B. IaaS
C. SaaS
D. Disaster recovery as a Service (DRaaS)
Answer: B
Explanation:
IaaS stands for Infrastructure as a Service, which is a cloud service model that provides virtualized computing resources over the Internet, such as servers,
storage, networking, and operating systems. IaaS allows customers to replace their on-premises servers with cloud servers that can be scaled up or down on
demand and pay only for what they use. PaaS stands for Platform as a Service, which provides customers with a cloud-based platform for developing, testing, and
deploying applications without managing the underlying infrastructure. SaaS stands for Software as a Service, which provides customers with access to cloud-
based software applications over the Internet without installing or maintaining them on their devices. Disaster recovery as a Service (DRaaS) is a type of cloud
service that provides customers with backup and recovery solutions for their data and applications in case of a disaster.
NEW QUESTION 54
- (Exam Topic 1)
Which of the following systems would MOST likely be found in a screened subnet?
A. RADIUS
B. FTP
C. SQL
D. LDAP
Answer: B
Explanation:
FTP (File Transfer Protocol) is a system that would most likely be found in a screened subnet. A screened subnet, or triple-homed firewall, is a network
architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network
to
isolate or separate the internal network from the public-facing internet1. A screened subnet typically hosts systems that need to be accessed by both internal and
external users, such as web servers, email servers, or FTP servers. References:
https://www.techtarget.com/searchsecurity/definition/screened-subnet#:~:text=A%20screened%20subnet%2C%
1
NEW QUESTION 56
- (Exam Topic 1)
Which of the following connector types would have the MOST flexibility?
A. SFP
B. BNC
C. LC
D. RJ45
Answer: A
Explanation:
SFP (Small Form-factor Pluggable) is a connector type that has the most flexibility. It is a hot-swappable transceiver that can support different speeds, distances,
and media types depending on the module inserted. It can be used for both copper and fiber connections and supports various protocols such as Ethernet, Fibre
Channel, and SONET. References: https://www.fs.com/what-is-sfp-transceiver-aid-11.html
NEW QUESTION 61
- (Exam Topic 1)
A network engineer configured new firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all
firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?
Answer: C
Explanation:
Updating the firewalls with current firmware and software is an important step to ensure all the firewalls are hardened successfully, as it can fix any known
vulnerabilities or bugs and provide new features or enhancements. Enabling an implicit permit rule is not a good practice for firewall hardening, as it can allow
unwanted traffic to pass through the firewall. Configuring the log settings on the firewalls to the central syslog server is a good practice for monitoring and auditing
purposes, but it does not harden the firewalls themselves. Using the same complex passwords on all firewalls is not a good practice for password security, as it
can increase the risk of compromise if one firewall is breached. References: CompTIA Network+ Certification Exam Objectives Version 2.0 (Exam Number:
N10-006), Domain 3.0 Network Security, Objective 3.3 Given a scenario, implement network hardening techniques.
NEW QUESTION 65
- (Exam Topic 1)
A network administrator needs to query the NSs for a remote application. Which of the following commands would BEST help the administrator accomplish this
task?
A. dig
B. arp
C. show interface
D. hostname
Answer: A
Explanation:
The dig command is used to query the NSs for a remote application. It is a command-line tool that is commonly used to troubleshoot DNS issues. When used with
specific options, dig can be used to obtain information about domain names, IP addresses, and DNS records. References: Network+ Certification Study Guide,
Chapter 3: Network Infrastructure
NEW QUESTION 70
- (Exam Topic 2)
Which of the following uses the destination IP address to forward packets?
A. A bridge
B. A Layer 2 switch
C. A router
D. A repeater
Answer: C
Explanation:
A router is a device that uses the destination IP address to forward packets between different networks. A bridge and a Layer 2 switch operate at the data link layer
and use MAC addresses to forward frames within the same network. A repeater is a device that amplifies or regenerates signals at the physical layer.
NEW QUESTION 71
- (Exam Topic 2)
A business is using the local cable company to provide Internet access. Which of the following types of cabling will the cable company MOST likely use from the
demarcation point back to the central office?
A. Multimode
B. Cat 5e
C. RG-6
D. Cat 6
E. 100BASE-T
Answer: C
Explanation:
RG-6 is a type of coaxial cable that is commonly used by cable companies to provide Internet access from the demarcation point back to the central office. It has a
thicker conductor and better shielding than RG-59, which is another type of coaxial cable. Multimode and Cat 5e are types of fiber optic and twisted pair cables
respectively, which are not typically used by cable companies. Cat 6 and 100BASE-T are standards for twisted pair cables, not types of cabling.
NEW QUESTION 72
- (Exam Topic 2)
A network technician was troubleshooting an issue for a user who was being directed to cloned websites that were stealing credentials. The URLs were correct for
the websites but an incorrect IP address was revealed when the technician used ping on the user's PC After checking the is setting, the technician found the DNS
server address was incorrect Which of the following describes the issue?
Answer: C
Explanation:
DNS poisoning is a type of attack that modifies the DNS records of a domain name to point to a malicious IP address instead of the legitimate one. This can result
in users being directed to cloned websites that are stealing credentials, even if they enter the correct URL for the website. The incorrect DNS server address on
the user’s PC could be a sign of DNS poisoning, as the attacker could have compromised the DNS server or spoofed its response to redirect the user’s queries.
References: https://www.comptia.org/blog/what-is-dns-poisoning
NEW QUESTION 74
- (Exam Topic 2)
A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to
resolve the issue?
Answer: D
Explanation:
Change management documentation is a record of the changes that have been made to a system or process, including the reason, date, time, and impact of each
change. A technician can reference this documentation to find what solution was implemented to resolve a previously encountered issue, as well as any potential
side effects or dependencies of the change. References: https://www.comptia.org/blog/what-is-change-management
NEW QUESTION 76
- (Exam Topic 2)
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are
password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?
Answer: E
Explanation:
Using an out-of-band access method is the best way to prevent unauthorized access to the legacy switches that do not support cryptographic functions. Out-of-
band access is a method of accessing a network device through a dedicated channel that is separate from the main network traffic. Out-of-band access can use
physical connections such as serial console ports or dial-up modems, or logical connections such as VPNs or firewalls. Out-of-band access provides more security
and reliability than in-band access, which uses the same network as the data traffic and may be vulnerable to attacks or failures. References:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/fundamentals/configuration/15mt/fundamentals-15-mt-book/
NEW QUESTION 81
- (Exam Topic 2)
A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary
DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following
does the technician need to verify?
A. VLAN mismatch
B. Transceiver mismatch
C. Latency
D. DHCP exhaustion
Answer: A
Explanation:
A VLAN mismatch is the most likely reason why an IP phone does not receive the necessary DHCP options for registration. A VLAN mismatch occurs when a
device is connected to a switch port that belongs to a different VLAN than the device’s intended VLAN. This can cause communication problems or prevent
access to network resources. For example, if an IP phone is connected to a switch port that belongs to the data VLAN instead of the voice VLAN, it may not
receive the DHCP options that contain information such as the TFTP server address, the NTP server address, or the default gateway address for the voice VLAN.
These DHCP options are essential for the IP phone to register with the VoIP system and function properly. References:
https://www.cisco.com/c/en/us/support/docs/voice-unified-communications/unified-communications-manager-c
NEW QUESTION 83
- (Exam Topic 2)
A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect
the network switch to the existing fiber?
A. 10GBaseT
B. 1000BaseT
C. 1000BaseSX
D. 1000BaseLX
Answer: C
Explanation:
1000BaseSX is an Ethernet standard that should be used to connect the network switch to the existing multimode fiber optic cable. 1000BaseSX is a Gigabit
Ethernet standard that uses short-wavelength laser (850 nm) over multimode fiber optic cable. It can support distances up to 550 meters depending on the cable
type and quality. It is suitable for short-range network segments such as campus or building backbone networks. References:
https://www.cisco.com/c/en/us/products/collateral/interfaces-modules/gigabit-ethernet-gbic-sfp-modules/produc
NEW QUESTION 84
- (Exam Topic 2)
A network administrator is talking to different vendors about acquiring technology to support a new project for a large company. Which of the following documents
will MOST likely need to be signed before information about the project is shared?
A. BYOD policy
B. NDA
C. SLA
D. MOU
Answer: B
Explanation:
NDA stands for Non-Disclosure Agreement, which is a legal contract between two or more parties that outlines confidential material, knowledge, or information that
the parties wish to share with one another for certain purposes, but wish to restrict access to by others. A network administrator may need to sign an NDA before
sharing information about a new project with different vendors, as the project may involve sensitive or proprietary data that the company wants to protect from
competitors or unauthorized use. References: https://www.adobe.com/sign/esignature-resources/sign-nda.html
NEW QUESTION 89
- (Exam Topic 2)
A user reports a weak signal when walking 20ft (61 m) away from the WAP in one direction, but a strong signal when walking 20ft in the opposite direction The
technician has reviewed the configuration and confirmed the channel type is correct There is no jitter or latency on the connection Which of the following would be
the MOST likely cause of the issue?
A. Antenna type
B. Power levels
C. Frequency
D. Encryption type
Answer: A
Explanation:
The antenna type affects the signal strength and coverage of a WAP. Different types of antennas have different radiation patterns and gain, which determine how
far and wide the signal can reach. If the user experiences a weak signal in one direction but a strong signal in the opposite direction, it could mean that the antenna
type is not suitable for the desired coverage area. The technician should consider changing the antenna type to one that has a more balanced or directional
radiation pattern. References:
https://community.cisco.com/t5/wireless-small-business/wap200-poor-signal-strength/td-p/1565796
NEW QUESTION 91
- (Exam Topic 2)
Which of the following security devices would be BEST to use to provide mechanical access control to the MDF/IDF?
A. A smart card
B. A key fob
C. An employee badge
D. A door lock
Answer: D
Explanation:
A door lock would be the best security device to use to provide mechanical access control to the MDF/IDF. A door lock is a device that prevents unauthorized
access to a physical area by requiring a key, a code, a card, a biometric scan, or a combination of these factors to open it. A door lock can provide mechanical
access control to the MDF/IDF, which are rooms that house network equipment such as switches, routers, servers, or patch panels. A door lock can prevent
unauthorized persons from tampering with or stealing the network equipment or data. References:
https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_6.html
NEW QUESTION 94
- (Exam Topic 2)
A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via
publicly accessible IPs through the firm's firewall Which of the following would be the MOST appropriate way to enable secure remote printing?
A. SSH
B. VPN
C. Telnet
D. SSL
Answer: B
Explanation:
VPN (Virtual Private Network) is the most appropriate way to enable secure remote printing. VPN is a technology that creates a secure and encrypted tunnel over
a public network such as the Internet. It allows remote users or sites to access a private network as if they were directly connected to it. VPN can be used for
various purposes such as accessing corporate resources, bypassing geo-restrictions, or enhancing privacy and security. VPN can also be used for remote printing
by allowing users to connect to a printer on the private network and send print jobs securely over the VPN tunnel. References:
https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/14106-how-vpn-work
NEW QUESTION 98
- (Exam Topic 2)
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would
MOST likely be created as a result of the site survey?
A. Physical diagram
B. Heat map
C. Asset list
D. Device map
Answer: B
Explanation:
A heat map would most likely be created as a result of the site survey. A heat map is a graphical representation of the wireless signal strength and coverage in a
given area. It can show the location of APs, antennas, walls, obstacles, interference sources, and dead zones. It can help with planning, optimizing, and
troubleshooting wireless networks. References: https://www.netspotapp.com/what-is-a-wifi-heatmap.html
NEW QUESTION 99
- (Exam Topic 2)
A technician is troubleshooting a workstation's network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using Which of
the following concepts would BEST help the technician?
A. Consistent labeling
B. Change management
C. Standard work instructions
D. Inventory management
E. Network baseline
Answer: A
Explanation:
Consistent labeling would be the concept that would best help the technician to confirm which switchport corresponds to the wall jack the PC is using. Consistent
labeling is a practice of using standardized and descriptive labels for network devices, ports, cables, jacks, and other components. It can help with identifying,
locating, and troubleshooting network issues. For example, a technician can use consistent labeling to trace a cable from a PC to a wall jack, and then from a
patch panel to a switchport. References: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DC_Infra2_5/DCInfra_6.html
A. ARP poisoning
B. VLAN hopping
C. Rogue access point
D. Amplified DoS
Answer: A
Explanation:
The output is most likely an example of an ARP poisoning attack. ARP poisoning, also known as ARP spoofing, is a type of attack that exploits the ARP protocol to
associate a malicious device’s MAC address with a legitimate IP address on a local area network. This allows the attacker to intercept, modify, or redirect network
traffic between two devices without their knowledge. The output shows that there are multiple entries for the same IP address (192.168.1.1) with different MAC
addresses in the ARP cache of the device. This indicates that an attacker has sent fake ARP replies to trick the device into believing that its MAC address is
associated with the IP address of another device (such as the default gateway). References: https://www.cisco.com/c/en/us/about/security-center/arp-
spoofing.html
Answer: A
Explanation:
SLAAC (Stateless Address Autoconfiguration) is a method for IPv6 devices to automatically configure their IP addresses based on the network prefix advertised by
a router. The router sends periodic router advertisements (RAs) that contain the network prefix and other parameters for the devices to use. If the network gateway
is not configured to send RAs, then SLAAC will not work. A DHCP server is not needed for SLAAC, as the devices generate their own addresses without relying on
a server. Dual stack and anycast routing are not related to SLAAC.
A. 5
B. 7
C. 10
D. 15
Answer: C
Explanation:
10 additional network connections are needed to transition from a star to a full-mesh topology. A star topology is a network topology where each device is
connected to a central device, such as a switch or a hub. A full-mesh topology is a network topology where each device is directly connected to every other device.
The number of connections needed for a full-mesh topology can be calculated by the formula n(n-1)/2, where n is the number of devices. In this case, there are six
devices (one core and five distribution switches), so the number of connections needed for a full-mesh topology is 6(6-1)/2 = 15. Since there are already five
connections in the star topology (one from each distribution switch to the core switch), the number of additional connections needed is 15 - 5 = 10. References:
https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html
A. Port security
B. Local authentication
C. TACACS+
D. Access control list
Answer: C
Explanation:
TACACS+ is a protocol that provides centralized authentication, authorization, and accounting (AAA) for network devices and users. TACACS+ can help improve
the security of the management console on the company’s switches by verifying the identity and credentials of the administrators, enforcing granular access
policies and permissions, and logging the configuration changes made by each administrator. This way, the network administrator can ensure only authorized and
authenticated users can access and modify the switch settings, and also track and correlate the changes made by each user. References:
https://www.comptia.org/blog/what-is-tacacs
A. NAT
B. PAT
C. STP
D. SNAT
E. ARP
Answer: B
Explanation:
The firewall administrator is implementing a PAT (Port Address Translation) rule that directs HTTP traffic to an internal server listening on a non-standard socket.
PAT is a type of NAT (Network Address Translation) that allows multiple devices to share a single public IP address by using different port numbers. PAT can also
be used to redirect traffic from one port to another port on the same or different IP address. This can be useful for security or load balancing purposes. For
example, a firewall administrator can configure a PAT rule that redirects HTTP traffic (port 80) from the public IP address of the firewall to an internal server that
listens on a non-standard port (such as 8080) on its private IP address. References: https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-
nat/13772-12.html
A. Secure SNMP
B. Port security
C. Implicit deny
D. DHCP snooping
Answer: C
Explanation:
Implicit deny is a firewall rule that blocks all traffic that is not explicitly allowed by other rules. Implicit deny is usually applied as the last rule in the firewall to ensure
that only the necessary access requirements are allowed through the firewall and that any unwanted or malicious traffic is rejected. Implicit deny can also provide a
default security policy and a baseline for auditing and logging purposes.
Secure SNMP is a protocol that allows network devices to send event messages to a centralized server or console for logging and analysis. Secure SNMP can be
used to monitor and manage the status, performance, and configuration of network devices. Secure SNMP can also help to detect and respond to potential
problems or faults on the network. However, secure SNMP is not a firewall rule; it is a network management protocol.
Port security is a feature that allows a switch to restrict the devices that can connect to a specific port based on their MAC addresses. Port security can help to
prevent unauthorized access, spoofing, or MAC flooding attacks on the switch. However, port security is not a firewall rule; it is a switch feature.
DHCP snooping is a feature that allows a switch to filter DHCP messages and prevent rogue DHCP servers from assigning IP addresses to devices on the
network. DHCP snooping can help to prevent IP address conflicts, spoofing, or denial-of-service attacks on the network. However, DHCP snooping is not a firewall
rule; it is a switch feature.
A. Fault tolerance
B. Quality of service
C. Load balancing
D. Port aggregation
Answer: C
Explanation:
Load balancing is a technology that allows traffic to be sent through two different ISPs to increase performance. Load balancing is a process of distributing network
traffic across multiple servers or links to optimize resource utilization, throughput, latency, and reliability. Load balancing can be implemented at different layers of
the OSI model, such as layer 4 (transport) or layer 7 (application). Load balancing can also be used for outbound traffic by using multiple ISPs and routing
protocols such as BGP (Border Gateway Protocol) to select the best path for each packet. References:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/border-gateway-protocol-bgp/prod_white_
Answer: B
Explanation:
Role separation is a security principle that involves dividing the tasks and privileges for a specific business process among multiple users. This reduces the risk of
fraud and errors, as no one user has complete control over the process. In the scenario, there are three employees who perform very distinct functions on the
server, which is an example of role separation. References: https://hyperproof.io/resource/segregation-of-duties/
A. Attenuation
B. Latency
C. VLAN mismatch
D. Jitter
Answer: D
Explanation:
Jitter is most likely causing the issue of intermittent one-way audio and dropped conversations for the company that uses VoIP telephones. Jitter is a variation in
delay of packets arriving at the destination. It can
cause choppy or distorted audio quality for VoIP applications, especially over WAN links that have limited bandwidth and high latency. The recommended jitter for
VoIP is less than 10m1s. The company has recorded ping times that exceed 50ms, which indicates high jitter and latency on their network. References:
https://www.voip-info.org/voip-jitter/ 1
A. Identify the switching loops between the modem and the workstation.
B. Check for asymmetrical routing on the modem.
C. Look for a rogue DHCP server on the network.
D. Replace the cable connecting the modem and the workstation.
Answer: D
Explanation:
If the link LEDs on the workstation and modem do not light up when connecting to a workstation, it could indicate a problem with the cable connecting them. The
cable could be damaged, defective, or incompatible with the devices. A technician should replace the cable with a known good one and check if the link LEDs light
up. If not, the problem could be with the network interface cards (NICs) on the workstation or modem. References: https://www.comptia.org/blog/what-is-link-light
A. Vulnerability assessment
B. Factory reset
C. Firmware update
D. Screened subnet
Answer: C
Explanation:
Firmware is a type of software that controls the low-level functions of a hardware device, such as a router, switch, printer, or camera. Firmware updates are
patches or upgrades that fix bugs, improve performance, add features, or address security vulnerabilities in firmware. Firmware updates are commonly used to
address CVEs (Common Vulnerabilities and Exposures) on network equipment and operating systems, as CVEs are publicly known flaws that can be exploited by
attackers. References:
https://www.comptia.org/blog/what-is-firmware
A. Seamless roaming
B. Basic service set
C. WPA
D. MU-MIMO
Answer: A
A. A bridge ID
B. A bridge protocol data unit
C. Interface port priority
D. A switch's root port
Answer: B
Explanation:
"Using special STP frames known as bridge protocol data units (BPDUs), switches communicate with other switches to prevent loops from happening in the first
place. Configuration BPDUs establish the topology,
where one switch is elected root bridge and acts as the center of the STP universe. Each switch then uses the root bridge as a reference point to maintain a loop-
free topology."
- (Exam Topic 3)
A company is reviewing ways to cut the overall cost of Its IT budget. A network technician suggests removing various computer programs from the IT budget and
only providing these programs on an as-needed basis. Which of the following models would meet this requirement?
A. Multitinency
B. laaS
C. SaaS
D. VPN
Answer: C
Explanation:
SaaS stands for Software as a Service and is a cloud computing model where software applications are hosted and delivered over the internet by a service
provider. SaaS can help the company cut the overall cost of its IT budget by eliminating the need to purchase, install, update, and maintain various computer
programs on its own devices. The company can access the programs on an as-needed basis and pay only for what it uses. Multitenancy is a feature of cloud
computing where multiple customers share the same physical or virtual resources. IaaS stands for Infrastructure as a Service and is a cloud computing model
where computing resources such as servers, storage, and networking are provided over the internet by a service provider. VPN stands for Virtual Private Network
and is a technology that creates a secure and encrypted connection over a public network.
References: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.9: Compare and contrast common network service types.
A. SNMP
B. Traps
C. Syslog
D. NetFlow
Answer: D
Explanation:
To identify the source and destination addresses of the traffic causing network saturation, the network administrator should use a network protocol analyzer that
supports the NetFlow protocol. NetFlow is a network protocol that collects IP traffic information as it enters or exits an interface and sends it to a NetFlow collector
for analysis. This data includes the source and destination addresses of the traffic, the ports used, and the number of bytes and packets transferred.
Therefore, the correct answer is option D, NetFlow.
Reference: CompTIA Network+ Study Guide, Exam N10-007, Fourth Edition, by Todd Lammle (Chapter 6: Network Devices)
A. Default gateway
B. Broadcast address
C. Unicast address
D. Link local address
Answer: B
Explanation:
The DHCP client sends broadcast request packets to the network; the DHCP servers respond with broadcast packets that offer IP parameters, such as an IP
address for the client. After the client chooses the IP parameters, communication between the client and server is by unicast packets.
"When a DHCP client boots up, it automatically sends out a DHCP Discover UDP datagram to the broadcast address, 255.255.255.255. This DHCP Discover
message asks “Are there any DHCP servers out there?” The client can’t send unicast traffic yet, as it doesn’t have a valid IP address that can be used."
A. Wi-Fi analyzer
B. Protocol analyzer
C. Nmap
D. IP scanner
Answer: B
Explanation:
A protocol analyzer is a tool that can capture and analyze network traffic and identify security issues such as unauthorized devices, malicious packets, or
misconfigured settings.
A Wi-Fi analyzer is a tool that can measure the signal strength, interference, and channel usage of wireless networks, but it cannot provide detailed information
about network security.
Nmap and IP scanner are tools that can scan network hosts and ports for open services, vulnerabilities, or operating systems, but they cannot monitor network
traffic in real time.
A. Dynamic assignment
B. Exclusion range
C. Address reservation
D. IP helper
Answer: B
Explanation:
To prevent IP address conflicts when allocating a portion of a DHCP scope's subnet for statically assigned devices, it is recommended to use the concept of DHCP
exclusion ranges. DHCP exclusion ranges allow a DHCP administrator to specify a range of IP addresses within the scope that should not be assigned to DHCP
clients. This can be useful in situations where some devices on the network need to be assigned static IP addresses, as it ensures that the statically assigned
addresses do not overlap with addresses assigned by the DHCP server. To set up a DHCP exclusion range, the administrator needs to specify the start and end
IP addresses of the range, as well as the subnet mask. The DHCP server will then exclude the specified range of addresses from its pool of available addresses,
and will not assign them to DHCP clients. By using DHCP exclusion ranges, the technician can ensure that the statically assigned addresses do not conflict with
addresses assigned by the DHCP server, and can prevent IP address conflicts on the network.
Anthony Sequeira
"Another frequent configuration you might make in a DHCP implementation is to configure an exclusion range. This is a portion of the address pool that you never
want leased out to clients in the network. Perhaps you have numbered your servers 192.168.1.1–192.168.1.10. Because the servers are statically configured with
these addresses, you exclude these addresses from the 192.168.1.0/24 pool of addresses."
Mike Meyers
"Exclusion ranges represent an IP address or range of IP addresses from the pool of addresses that are not to be given out by the DHCP server. Exclusions
should be made for the static addresses manually configured on servers and router interfaces, so these IP addresses won’t be offered to DHCP clients."
A. Split tunnel
B. Full tunnel
C. Site-to-site tunnel
D. Virtual desktop
Answer: A
Explanation:
Split tunnel is a configuration that allows a remote user to access both the local network and the Internet at the same time. In a split tunnel configuration, only
traffic destined for the corporate network is sent through the VPN tunnel, while all other traffic is sent directly to the Internet. This allows the remote user to access
the Internet without the company's VPN server being able to monitor or intercept their traffic. Using a split tunnel configuration can help the company to mitigate
employee concerns about internet activity being monitored and reassure employees that their private internet activity is not being monitored.
Answer: C
Explanation:
According to the CompTIA Network+ troubleshooting model123, this is the first step in troubleshooting a
network problem. The technician should gather information about the current state of the network, such as error messages, device status, network topology, and
user feedback. This can help narrow down the scope of the problem and eliminate possible causes.
Answer: C
Explanation:
* 802.11 g is an older wireless standard that operates in the 2.4 GHz frequency band and has a maximum data rate of 54 Mbps. 802.11a is a newer wireless
standard that operates in the 5 GHz frequency band and has a maximum data rate of 54 Mbps. By configuring the APS to be compatible with 802.11a, the network
engineer can reduce interference and congestion in the 2.4 GHz band and improve wireless performance.
References: Network+ Study Guide Objective 2.5: Implement network troubleshooting methodologies
Answer: C
Explanation:
A directional antenna is a type of antenna that radiates or receives radio waves in a specific direction. This can help limit wireless access outside the building by
focusing the signal towards the intended area and reducing the signal strength in other directions. A private VLAN is a feature that isolates network devices within
a VLAN. Disabling roaming on the WAP prevents wireless clients from switching to another WAP when the signal is weak. Stopping broadcasting of the SSID
hides the network name from wireless clients, but does not prevent them from connecting if they know the SSID.
References: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.1: Given a scenario, install and configure wireless LAN
infrastructure and implement the appropriate technologies in support of wireless capable devices.
A. A security camera
B. A biometric reader
C. OTP key fob
D. Employee training
Answer: B
Explanation:
A biometric reader is a device that scans a person’s physical characteristics, such as fingerprints, iris, or face, and compares them to a database of authorized
users. A biometric reader can be used to restrict access to a server room and prevent unauthorized entry. A biometric reader provides a high level of security and
cannot be easily bypassed or duplicated.
References: Network+ Study Guide Objective 5.1: Summarize the importance of physical security controls.
A. A repeater
B. A media converter
C. A router
D. A switch
Answer: A
Explanation:
A repeater is a device used to extend the range of a wireless network by receiving, amplifying, and retransmitting wireless signals. It is typically used to extend the
range of a wireless network in a large area, such as an office building or a campus. Repeaters can also be used to connect multiple wireless networks together,
allowing users to move seamlessly between networks. As stated in the CompTIA Network+ Study Manual, "a wireless repeater is used to extend the range of a
wireless network by repeating the signal from one access point to another."
A. A camera
B. A printer
C. A hub
D. A modem
Answer: A
Explanation:
A camera is most likely to utilize PoE (Power over Ethernet). PoE is a technology that allows electrical power to be delivered over Ethernet cables. It is used to
power a variety of devices, such as cameras, phones, access points, and other networking equipment.Cameras are particularly well-suited for PoE because they
are often installed in locations where it is difficult or impossible to run electrical power. By using PoE, cameras can be powered directly over the Ethernet cable,
eliminating the need for separate power cables and outlets.Other devices, such as printers, hubs, and modems, are less likely to utilize PoE because they typically
do not need to be powered over Ethernet. These devices are usually powered by AC (alternating current) power and are typically connected to a power outlet
rather than an Ethernet cable.
A. TXT
B. AAAA
C. CNAME
D. SRV
Answer: A
Explanation:
TXT stands for Text and is a type of DNS record that can store arbitrary text data associated with a domain name. TXT records can be used for various purposes,
such as verifying the ownership of a domain, providing information about a domain, or implementing security mechanisms such as SPF (Sender Policy Framework)
or DKIM (DomainKeys Identified Mail). In this scenario, the security company most likely asked the company to configure a TXT record with a specific value that
can prove the ownership of the domain. AAAA stands for IPv6 Address and is a type of DNS record that maps a domain name to an IPv6 address. CNAME stands
for Canonical Name and is a type of DNS record that maps an alias name to another name. SRV stands for Service and is a type of DNS record that specifies the
location of a service on a network.
References: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.8: Explain the purposes and use cases for advanced networking
devices.
A. DaaS
B. IaaS
C. PaaS
D. SaaS
Answer: B
A. ipconfig
B. netstat
C. tracert
D. ping
Answer: C
A. Packet capture
B. IPerf
C. SIEM log review
D. Internet speed test
Answer: B
Explanation:
An engineer will most likely use IPerf to get detailed measurement data about the user's slow file transfers. IPerf is a tool used for measuring network performance
and bandwidth, and it can be used to measure the speed and throughput of file transfers from the remote office. It can also provide detailed information about the
latency and jitter of the connection, which can be used to troubleshoot the slow file transfers. Reference: CompTIA Network+ Study Manual (Chapter 10, Page
214).
Answer: C
A. netstat -a
B. ifconfig
C. ip addr
D. ipconfig /all
Answer: D
Explanation:
The ipconfig command is a utility that allows you to view and modify the network configuration of a Windows computer. By running the command "ipconfig /all", you
can view detailed information about the network configuration of your computer, including the IP address, subnet mask, default gateway, and DNS server
addresses.
Option A (netstat -a) is a command that displays active network connections and their status, but it does not display IP address or other network configuration
information. Option B (ifconfig) is a command used on Linux and Unix systems to view and modify network configuration, but it is not available on Windows. Option
C (ip addr) is a command used on Linux and Unix systems to view and modify network configuration, but it is not available on Windows.
Answer: D
Explanation:
VLAN (virtual LAN) tags are used to identify packets as belonging to a particular VLAN. VLANs are used to segment a network into logical sub-networks, and each
VLAN is assigned a unique VLAN tag. If the VLAN tag is not configured correctly, the computer may not be able to access network resources.
A. LACP
B. Flow control
C. Port mirroring
D. NetFlow exporter
Answer: C
Explanation:
Port mirroring is a feature that can be used to enable monitoring of all packets arriving at an interface. This feature is used to direct a copy of all traffic passing
through the switch to a monitoring device, such as a network analyzer. This allows the switch to be monitored with the network analyzer in order to identify any
malicious or suspicious activity. Additionally, port mirroring can be used to troubleshoot network issues, such as latency or poor performance.
A. NTP
B. SNMP
C. SIP
D. DNS
Answer: A
Explanation:
Network Time Protocol (NTP) is a protocol used to maintain a highly accurate and reliable clock time on all devices within a network. NTP works by synchronizing
the time of all the devices within a network to a single, highly accurate time source. This allows for the time of all the devices to be kept in sync with each other,
ensuring a consistent and reliable time source for all devices within the network.
Answer: B
Explanation:
Fiber-optic cables are cables that use light signals to transmit data over long distances at high speeds.
Fiber-optic cables are sensitive to dirt, dust, moisture, or other contaminants that can interfere with the light signals and cause link loss or signal degradation. To
troubleshoot link loss issues with fiber-optic cables, one of the steps that should be completed next is to clean the fiber-optic cable ends with a lint-free cloth or a
specialized cleaning tool. Cleaning the fiber-optic cable ends can remove any dirt or debris that may be blocking or reflecting the light signals and restore the link
quality.
Answer: A
Answer: A
Explanation:
To prevent incorrect IP addresses from being assigned to clients on the network and allow the network to continue to operate, the security administrator should
consider configuring DHCP (Dynamic Host Configuration Protocol) snooping on the switch. DHCP snooping is a security feature that is used to prevent
unauthorized DHCP servers from operating on a network. It works by allowing the switch to monitor and validate DHCP traffic on the network, ensuring that only
legitimate DHCP messages are forwarded to clients. This can help to prevent incorrect IP addresses from being assigned to clients, as it ensures that only
authorized DHCP servers are able to provide IP addresses to clients on the network.
A. Cloud site
B. Hot site
C. Cold site
D. Warm site
Answer: A
A. Brute-force
B. On-path
C. Deauthentication
D. Phishing
Answer: A
A. Speed
B. Duplex
C. Errors
D. VLAN
Answer: A
A. Traffic shaping
B. Flow control
C. NetFIow
D. Link aggregation
Answer: A
Explanation:
Traffic shaping is a congestion management method that regulates network data transfer by delaying the flow of less important or less desired packets1. Traffic
shaping can help to improve the performance of a videoconferencing application by prioritizing its packets over other types of traffic and smoothing out traffic
bursts. Traffic shaping can also help to avoid packet loss and ensure fair allocation of bandwidth among different applications or users.
Flow control is a mechanism that prevents a sender from overwhelming a receiver with more data than it can handle. Flow control can help to avoid buffer overflow
and data loss, but it does not prioritize different types of traffic or smooth out traffic bursts. Flow control operates at the data link layer or the transport layer, while
traffic shaping operates at the network layer or above.
NetFlow is a protocol that collects and analyzes network traffic data for monitoring and troubleshooting purposes2. NetFlow can help to identify the sources,
destinations, volumes, and types of traffic on a network, but it does not regulate or shape the traffic flow. NetFlow operates at the network layer or above.
Link aggregation is a technique that combines multiple physical links into one logical link for increased bandwidth, redundancy, and load balancing. Link
aggregation can help to improve the performance of a videoconferencing application by providing more available bandwidth at the WAN connection, but it does not
prioritize different types of traffic or smooth out traffic bursts. Link aggregation operates at the data link layer.
A. B
B. AC
C. AX
D. N
E. G
Answer: B
Explanation:
Wireless AC is a wireless standard that supports up to 1.3Gbps data rate and operates in the 5GHz frequency band only. Wireless AC is also backward compatible
with wireless A and N devices that use the 5GHz band. Wireless AC is suitable for high-performance applications such as HD video streaming and online gaming.
References: Network+ Study Guide Objective 2.2: Explain the purposes and properties of routing and switching. Subobjective: Wireless standards and their
characteristics.
Answer: C
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic prioritization
Answer: D
A. 5G
B. LTE
C. Wi-Fi 4
D. Wi-Fi 5
E. Wi-Fi 6
Answer: B
A. Server upgrade
B. Duplicate IP address
C. Scope exhaustion
D. Rogue server
Answer: D
Explanation:
A rogue server is a DHCP server on a network that is not under the administrative control of the network staff 1. It may provide incorrect IP addresses or other
network configuration information to devices on the network, causing them to lose connectivity or be vulnerable to attacks2. The physical address of the DHCP
server may change if a rogue server takes over the role of assigning IP addresses to devices on the network. This can be detected by monitoring DHCP traffic or
using tools such as RogueChecker2.
A. OSPF
B. RIP
C. EIGRP
D. BGP
Answer: C
Explanation:
EIGRP is an advanced distance vector routing protocol that is able to automatically update routing tables and also uses features of link-state routing protocols,
such as the ability to send updates about the current topology of the network. EIGRP also has the ability to use a variety of algorithms to determine the best route
for a packet to take, allowing for more efficient routing across the network.
A. Cameras
B. Biometric readers
C. Access control vestibules
D. Locking racks
Answer: A
A. iPerf
B. Ping
C. NetFlow
D. Netstat
Answer: A
A. VRRP
B. DNS
C. UPS
D. RPO
Answer: A
Explanation:
VRRP is an open standard protocol, which is used to provide redundancy in a network. It is a network layer protocol (protocol number-112). The number of routers
(group members) in a group acts as a virtual logical router which will be the default gateway of all the local hosts. If one router goes down, one of the other group
members can take place for the responsibilities for forwarding the traffic.
A network engineer needs to create a subnet that has the capacity for five VLANs. with the following number of clients lo be allowed on each:
Which of the following is the SMALLEST subnet capable of this setup that also has the capacity to double the number of clients in the future?
A. 10.0.0.0/21
B. 10.0.0.0/22
C. 10.0.0.0/23
D. 10.0.0.0/24
Answer: B
A. Implement client roaming using an extended service deployment employing a wireless controller.
B. Remove omnidirectional antennas and adopt a directional bridge.
C. Ensure all APs of the warehouse support MIMO and Wi-Fi 4.
D. Verify that the level of EIRP power settings is set to the maximum permitted by regulations.
Answer: A
Explanation:
Client roaming refers to the ability of a wireless device to seamlessly connect to a different access point (AP) as the user moves around the facility. This can help
to improve network stability and reduce interruptions in mobile applications. An extended service deployment is a type of wireless network configuration that uses
multiple APs to cover a large area, such as a warehouse facility. By using a wireless controller to manage the APs, the network can be better optimized for client
roaming, which can improve network stability.
"Roaming With multiple WAPs in an ESS, clients will connect to whichever WAP has the strongest signal. As clients move through the space covered by the
broadcast area, they will change WAP connections seamlessly, a process called roaming."
A. Tailgating
B. Pipgybacking
C. Shoulder surfing
D. Phisning
Answer: A
Explanation:
The difference between piggybacking and tailgaiting is that with piggybacking, the person is willfully and intentionally letting you in. In this particular case, the
person caught the door before it closed, so it is tailgating.
Tailgating is a physical security attack that occurs when an unauthorized person follows an authorized person through a secured door or gate without their
knowledge or consent. Tailgating can allow an attacker to bypass access control mechanisms and gain entry to restricted areas or resources. Tailgating can also
pose a safety risk for the authorized person and other occupants of the facility.
Piggybacking is a physical security attack that occurs when an unauthorized person follows an authorized person through a secured door or gate with their
knowledge or consent. Piggybacking can also allow an attacker to bypass access control mechanisms and gain entry to restricted areas or resources.
Piggybacking can also violate security policies and compromise the accountability of the authorized person.
Shoulder surfing is a physical security attack that occurs when an unauthorized person observes or records an authorized person’s confidential information, such
as passwords, PINs, or credit card numbers. Shoulder surfing can allow an attacker to steal credentials and access sensitive data or systems. Shoulder surfing
can also violate privacy and confidentiality rights of the authorized person.
Phishing is a cyber security attack that occurs when an unauthorized person sends fraudulent emails or messages that appear to come from legitimate sources,
such as banks, companies, or government agencies. Phishing can trick recipients into clicking on malicious links, opening malicious attachments, or providing
personal or financial information. Phishing can allow an attacker to install malware, steal credentials, or perform identity theft. Phishing does not involve physical
access to secured doors or gates.
A. Private VLANs
B. Access control lists
C. Firewalls
D. Control plane policing
Answer: A
Explanation:
"Use private VLANs: Also known as port isolation, creating a private VLAN is a method of restricting switch ports (now called private ports) so that they can
communicate only with a particular uplink. The private VLAN usually has numerous private ports and only one uplink, which is usually connected to a router, or
firewall."
A. allocation.
B. an on-premises data center.
C. a branch office.
D. a cloud provider.
Answer: D
A. Reservation
B. Dynamic assignment
C. Helper address
D. DHCP offer
Answer: C
Explanation:
A helper address is an IP address that is configured on a router interface to forward DHCP broadcast messages to a DHCP server on another LAN. A DHCP
broadcast message is a message that a workstation sends when it needs to obtain an IP address from a DHCP server. Since broadcast messages are not routed
across different networks, a helper address is needed to relay the DHCP broadcast message to the DHCP server on another network. References:
https://www.comptia.org/training/books/network-n10-008-study-guide (page 199)
A. Hub
B. Layer 3 switch
C. Bridge
D. Load balancer
Answer: B
A. LACP
B. Port security
C. 802.11ax
D. Duplex settings
Answer: B
Explanation:
Port security is a feature that allows a network device to limit the number and type of MAC addresses that can access a port. Port security can prevent
unauthorized devices from connecting to the network through an available network jack. Therefore, port security is the most likely cause of the connectivity issues
for some mobile users in the new lobby.
Answer: C
Explanation:
In a split-tunnel VPN, the client can access both the local network and the remote network simultaneously, with some network traffic sent through the VPN tunnel
and other traffic sent to the local gateway. This approach allows for more efficient use of bandwidth and reduces the load on the VPN server. It also allows the
client to continue accessing local resources while connected to the remote network.
A. 11Mbps
B. 54Mbps
C. 128Mbps
D. 144Mbps
Answer: B
Explanation:
802.11b (Wi-Fi 1)
11 Mbps
100 meter maximum effective range 802.11a (Wi-Fi 2)
54 Mbps
50 meter maximum effective range
A. Site survey
B. EIRP
C. AP placement
D. Captive portal
E. SSID assignment
F. AP association time
Answer: AC
Explanation:
This is a coverage issue. WAP placement and power need to be checked. Site survey should be done NEXT because it takes a while.
A. Speed
B. Flow control
C. 802.1Q
D. Duplex
Answer: B
Explanation:
Flow control is a mechanism that allows a network device to regulate the amount of traffic it can receive or send. Flow control can help prevent congestion and
buffer overflow by sending pause frames or signals to the sender when the receiver’s buffer is full or nearly full. Flow control can cause traffic to pause, allowing
the switches to drain buffers and resume normal operation. Speed is a parameter that determines the data transfer rate of a network link. 802.1Q is a standard for
VLAN (Virtual Local Area Network) tagging, which allows multiple logical networks to share the same physical infrastructure. Duplex is a mode of communication
that determines how data is transmitted and received on a link. Full duplex allows simultaneous transmission and reception, while half duplex allows only one
direction at a time.
References: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 1.5: Compare and contrast network cabling types, standards and
speeds.
Answer: A
A. Relay
B. Lease
C. Scope
D. Range
Answer: A
A. Upgrade the equipment to an AP that supports manual configuration of the ElRP power settings.
B. Switch to 802.11
C. disable channel auto-selection, and enforce channel bonding on the configuration.
D. Set up the AP to perform a dynamic selection of the frequency according to regulatory requirements.
E. Deactivate the band 5GHz to avoid Interference with the government radio
Answer: C
Answer: A
Explanation:
Biometrics is a type of authentication that uses a person’s physical characteristics, such as fingerprints, iris, or face, to verify their identity. An access control
vestibule is a small room or area that separates two spaces and allows only one person to enter or exit at a time. Biometrics in an access control vestibule is the
most effective physical security method to prevent tailgating, which is the unauthorized entry of a person behind another person who has legitimate access.
References: Network+ Study Guide Objective 5.1: Summarize the importance of physical security controls.
Which of the following is the MOST likely cause for the failure?
Answer: D
A. MAC table
B. Neighbor Discovery Protocol
C. ARP table
D. IPConfig
E. ACL table
Answer: C
Explanation:
The ARP table is a database that is used by a device to map MAC addresses to their corresponding IP addresses. When a device sends a packet to another
device on the same network, it uses the MAC address of the destination device to deliver the packet. The ARP table allows the device to determine the IP address
of the destination device based on its MAC address.
Answer: B
Explanation:
Role-based access is a security technique that assigns permissions and privileges to users or groups based on their roles or functions within an organization. Role-
based access can help secure the physical networking equipment by limiting who can access, modify, or manage the devices in the shared IT closet. Only
authorized personnel with a valid role and credentials should be able to access the networking equipment. Disabling unneeded switchports is a security technique
that prevents unauthorized devices from connecting to the network by turning off unused ports on a switch. Changing the default passwords is a security technique
that prevents unauthorized access to network devices by replacing the factory-set passwords with strong and unique ones. Configuring an access control list is a
security technique that filters network traffic by allowing or denying packets based on criteria such as source and destination IP addresses, ports, or protocols.
References: CompTIA Network+ Certification Exam Objectives Version 7.0 (N10-007), Objective 3.2: Given a scenario, use appropriate network hardening
techniques.
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server.
C. Install a network access control agent on the server.
D. Deploy a new server to host the application.
Answer: A
Explanation:
The appropriate next step in this situation would be to check for the existence of a known exploit in order to assess the risk. This is important because it will help
the network administrator determine the severity of the vulnerability and the potential impact it could have on the organization. Once the network administrator has
assessed the risk, they can then take appropriate action to address the vulnerability. This might include patching the application, deploying a new server to host
the application, or implementing other security measures to mitigate the risk. It is generally not advisable to immediately shut down the vulnerable application
server, as this could disrupt business operations and cause significant downtime. Similarly, installing a network access control agent on the server may not be the
most effective solution, as it would not address the underlying vulnerability.
Answer: C
Explanation:
A firewall is a device or software that filters and controls the incoming and outgoing network traffic based on predefined rules. A firewall can block ICMP packets,
which are used for ping and other diagnostic tools. If the workstation has a firewall enabled, it may not respond to the ICMP sweep and appear as offline. The
engineer should check the firewall settings on the workstation and allow ICMP traffic if needed.
References: Network+ Study Guide Objective 4.1: Given a scenario, use the appropriate tool.
Answer: B
Explanation:
A slow download speed can be caused by a faulty patch cable, which is the cable used to connect the user's PC to the network server. If the patch cable is
damaged, the connection will be slower than expected, resulting in slow download speeds. Replacing the patch cable is the most likely solution to this issue, as it
will provide a new, reliable connection that should allow for faster download speeds.
Answer: A
A. Scope options
B. Reservation
C. Exclusion
D. Relay
E. Pool
Answer: A
A. DNS poisoning
B. On-path
C. IP spoofing
D. Rogue DHCP
Answer: A
A. RIP
B. OSPF
C. BGP
D. EIGRP
Answer: B
Explanation:
OSPF stands for Open Shortest Path First and is a link-state routing protocol that uses Dijkstra’s algorithm to calculate the lowest cost between routers. OSPF
assigns a cost value to each link based on factors such as bandwidth, delay, or reliability, and builds a map of the network topology. OSPF then uses Dijkstra’s
algorithm to find the shortest path from each router to every other router in the network1. RIP stands for Routing Information Protocol and is a distance-vector
routing protocol that uses hop count as the metric to find the best path. BGP stands for Border Gateway Protocol and is a path-vector routing protocol that uses
attributes such as AS path, local preference, or origin to select the best route. EIGRP stands for Enhanced Interior Gateway Routing Protocol and is a hybrid
routing protocol that uses a composite metric based on bandwidth, delay, load, and reliability.
References: 1 Dijkstra’s algorithm - Wikipedia (https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm)
A. Detection
B. Recovery
C. Identification
D. Prevention
Answer: A
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification
Answer: B
Explanation:
Traffic policing is a mechanism that monitors the traffic in any network and enforces a bandwidth limit by discarding packets that exceed a certain rate1. This can
reduce congestion and ensure fair allocation of bandwidth among different applications or users. However, discarding packets can also affect the performance and
quality of some applications, especially those that are sensitive to packet loss, such as voice or video.
Traffic shaping is a congestion control mechanism that delays packets that exceed a certain rate instead of discarding them1. This can smooth out traffic bursts
and avoid packet loss, but it also introduces latency and jitter. Traffic shaping can be beneficial for applications that can tolerate some delay but not packet loss,
such as file transfers or streaming.
Traffic marking is a mechanism that assigns different priority levels to packets based on their type, source, destination, or other criteria2. This can help to
differentiate between different classes of service and apply different policies or treatments to them. However, traffic marking does not enforce bandwidth limits by
Answer: A
Answer: A
A. Penetration test
B. Posture assessment
C. Risk assessment
D. Vulnerability scan
Answer: D
Answer: A
Answer: A
Explanation:
a network tap is a way of connecting an IDS out of band, which means it does not interfere with the normal network traffic. A network tap allows you to view a copy
of the network traffic transmitted over the media being tapped.
Answer: B
Explanation:
A captive portal is a web page that is presented to a user before they are allowed to access a network. It is used to authenticate users and to ensure that all users
have accepted the terms of use for the network. By deploying a captive portal, the cafeteria can require users to enter their phone number as the passphrase,
while still providing an additional layer of security. Reference: CompTIA Network+ Study Guide, 8th Edition, page 182.
Answer: A
A. Cloud site
B. Cold site
C. Warm site
D. Hot site
Answer: A
Explanation:
A cloud site is a type of disaster recovery site that uses cloud computing services to provide backup and recovery of data and applications in the event of a
disaster1. A cloud site does not require a facility agreement or idle hardware, as the cloud provider manages the infrastructure and resources on demand. A cloud
site can also offer scalability, flexibility, and cost-effectiveness compared to other types of disaster recovery sites.
A. 22
B. 53
C. 110
D. 389
E. 995
F. 3389
Answer: BE
Explanation:
Port 53 is used for DNS, which is a service that translates domain names into IP addresses. Port 995 is used for POP3S, which is a protocol for receiving email
messages securely. POP3S supports large file transfers and encryption. Therefore, these two ports should be opened for the mail server and the DNS server
project
A. 80.87.78 0 - 80.87.78.14
B. 80.87.78 0 - 80.87.78.110
C. 80.87.78 1 - 80.87.78.62
D. 80.87.78.1 - 80.87.78.158
Answer: C
Explanation:
The network 80.87.78.0/26 is a Class A network with a subnet mask of /26, which means that it contains 26 bits of network information and 6 bits of host
information. The range of valid host addresses for this network is 80.87.78.1 to 80.87.78.62. Any addresses outside of this range are reserved for special purposes
or are not used.
the cause?
Answer: B
Explanation:
Interference from other devices can cause wireless connection drops or slow performance. This can happen when devices use the same or overlapping frequency
channels as the wireless network, such as cordless phones, microwaves, Bluetooth devices, etc. To avoid interference, it is recommended to use non-overlapping
channels and avoid placing wireless access points near potential sources of interference. References: Network+ Study Guide Objective 2.1: Explain the purposes
and use cases for advanced network devices. Subobjective: Wireless controllers.
A. SOA
B. SRV
C. PTR
D. NS
Answer: A
Explanation:
The DNS ‘start of authority’ (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain
was last updated, and how long the server should wait between refreshes. All DNS zones need an SOA record in order to conform to IETF standards. SOA
records are also important for zone transfers.
Answer: C
Explanation:
The best option for the administrator to take would be to attempt to connect to the site via IP address. This will help to determine if the issue is related to the
website's DNS address or if the site itself is not accessible. Checking for certificate issues may be necessary, but this should be done after the administrator has
attempted to connect to the site via IP address. Contacting the ISP is unnecessary since the issue is related to the website inside of the company network, and
checking the NTP configuration is not relevant to this issue.
When a customer is having issues connecting to a website using a URL, one of the first troubleshooting steps a network administrator should take is attempting to
connect to the site using the IP address of the website. This will help to determine if the issue is related to a DNS resolution problem or a connectivity problem. If
the administrator is able to connect to the website using the IP address, then the issue may be related to a DNS problem. However, if the administrator is still
unable to connect, then the issue may be related to a connectivity problem. In either case, further troubleshooting steps will be necessary. Checking for certificate
issues or NTP configuration, and contacting the ISP would not be the BEST initial steps in this scenario.
A. EIGRP
B. BGP
C. IPv6
D. MPLS
Answer: B
Explanation:
BGP is a routing protocol that is used to exchange routing information between different autonomous systems (ASes) on the internet. An autonomous system is a
network or group of networks that is under the same administrative control and uses a common routing protocol. By acquiring its own public IP prefixes and
autonomous system number, a company can use BGP to advertise these prefixes to other ASes and establish its own internet connection. This would enable the
company to have more control over its internet connection and potentially improve its connectivity.EIGRP (Enhanced Interior Gateway Routing Protocol) is a
routing protocol used within a single autonomous system, so it would not be used to establish a connection to the internet. IPv6 is a version of the Internet Protocol
(IP) used to identify devices on a network. It is not a routing protocol and would not be used to establish an internet connection.MPLS (Multi-Protocol Label
Switching) is a networking technology that is used to route packets between different networks. It is not a routing protocol and would not be used to establish an
internet connection.
A network administrator is investigating a network event that is causing all communication to stop. The network administrator is unable to use SSH to connect to
the switch but is able to gain access using the serial console port. While monitoring port statistics, the administrator sees the following:
A. Duplicate IP address
B. High collisions
C. Asynchronous route
D. Switch loop
Answer: B
A. Port security
B. Port tagging
C. Port mirroring
D. Media access control
Answer: C
Explanation:
Port mirroring is a feature that allows a network technician to monitor traffic on a specific port on a switch by copying all the traffic from that port to another port
where a monitoring device is connected. Port mirroring can be used for troubleshooting, analysis, or security purposes, such as detecting network anomalies,
performance issues, or malicious activities. References:
https://www.comptia.org/training/books/network-n10-008-study-guide (page 156)
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog
Answer: BD
A. 802. lla
B. 802.11b
C. 802. 11g
D. 802.11 n
Answer: D
Explanation:
* 802.11 n is a wireless standard that supports up to 600 Mbps data rate and operates in both the 2.4 GHz and 5 GHz frequency bands. 802.11n uses multiple-
input multiple-output (MIMO) technology to increase the number of spatial streams and improve the wireless performance and range. 802.11n meets the
requirements of the wireless network design.
References: Network+ Study Guide Objective 1.6: Explain the functions of network services.
* N10-009 Most Realistic Questions that Guarantee you a Pass on Your FirstTry
* N10-009 Practice Test Questions in Multiple Choice Formats and Updatesfor 1 Year