ERASED TEST, YOU MAY BE INTERESTED ON Comptia Network + October 2024 v2
COMMENTS | STATISTICS | RECORDS |
---|
TAKE THE TEST
Title of test:
Comptia Network + October 2024 v2 Description: N10-009 CompTIA Network+ Author: Rabelani Other tests from this author Creation Date: 10/10/2024 Category: Computers Number of questions: 105 |
Share the Test:
New Comment
No comments about this test.
Content:
A technician needs to configure a routing protocol for an internet-facing edge router. Which of the following routing protocols will the technician MOST likely use? BGP RIPv2 OSPF EIGRP. A network technician is reviewing an upcoming project's requirements to implement laaS. Which of the following should the technician consider? Software installation processes Type of database to be installed Operating system maintenance Server hardware requirements. Which of the following options represents the participating computers in a network? Nodes CPUs Servers Clients. A customer needs to distribute Ethernet to multiple computers in an office. The customer would like to use non-proprietary standards. Which of the following blocks does the technician need to install? 110 66 Bix Krone. A technician is deploying a new SSID for an industrial control system. The control devices require the network to use encryption that employs TKIP and a symmetrical password to connect. Which of the following should the technician configure to ensure compatibility with the control devices? WPA2-Enterprise WPA-Enterprise WPA-PSK WPA2-PSK. A network administrator is preparing answers for an annual risk assessment that is required for compliance purposes. Which of the following would be an example of an internal threat? An approved vendor with on-site offices An infected client that pulls reports from the firm A malicious attacker from within the same country A malicious attacker attempting to socially engineer access into corporate offices. Within the realm of network security, Zero Trust: prevents attackers from moving laterally through a system. allows a server to communicate with outside networks without a firewall. block malicious software that is too new to be found in virus definitions. stops infected files from being downloaded via websites. At which of the following OSI model layers does a MAC filter list for a wireless infrastructure operate? Physical Network Session Data link. During the troubleshooting of an E1 line, the point-to-point link on the core router was accidentally unplugged and left unconnected for several hours. However, the network management team was not notified. Which of the following could have been configured to allow early detection and possible resolution of the issue? Traps MIB OID Baselines. A company is being acquired by a large corporation. As part of the acquisition process, the company's address should now redirect clients to the corporate organization page. Which of the following DNS records needs to be created? SOA NS CNAME TXT. A large number of PCs are obtaining an APIPA IP address, and a number of new computers were added to the network. Which of the following is MOST likely causing the PCs to obtain an APIPA address? Rogue DHCP server Network collision Incorrect DNS settings DHCP scope exhaustion. A company built a new building at its headquarters location. The new building is connected to the company’s LAN via fiber-optic cable. Multiple users in the new building are unable to access the company’s intranet site via their web browser, but they are able to access internet sites. Which of the following describes how the network administrator can resolve this issue? Correct the DNS server entries in the DHCP scope Correct the external firewall gateway address Correct the NTP server settings on the clients Correct a TFTP Issue on the company’s server. A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line? netstat netstat -a netstat —e netstat —n. A WAN technician reviews activity and identifies newly installed hardware that is causing outages over an eight-hour period. Which of the following should be considered FIRST? Network performance baselines VLAN assignments Routing table Device configuration review. An employee reports to a network administrator that internet access is not working. Which of the following should the administrator do FIRST? Establish a theory of probable cause. Identify symptoms. Determine if anything has changed. Ask the user to restart the computer. Which of the following can be used to decrease latency during periods of high utilization of a firewall? Hot site NIC teaming HA pair VRRP. Which of the following ports should be used to securely receive mail that is synchronized across multiple devices? 25 110 443 993. Which of the following would be BEST to install to find and block any malicious users within a network? IDS IPS SCADA ICS. Which of the following is the MOST appropriate use case for the deployment of a clientless VPN? Secure web access to internal corporate resources. Upgrade security via the use of an NFV technology. Connect two data centers across the internet. Increase VPN availability by using a SDWAN technology. An administrator is attempting to add a new system to monitoring but is unsuccessful. The administrator notices the system is similar to another one on the network; however, the new one has an updated OS version. Which of the following should the administrator consider updating? Management information bases System baseline Network device logs SNMP traps. A network administrator Is looking at switch features and is unsure whether to purchase a model with PoE Which of the following devices that commonly utilize PoE should the administrator consider? (Select TWO) VoIP phones Cameras Printers Cable modems Laptops UPSs. Which of the following is conducted frequently to maintain an updated list of a system's weaknesses? Penetration test Posture assessment Risk assessment Vulnerability scan. A small office has a wireless network with several access points that are used by mobile devices. Users occasionally report that the wireless connection drops or becomes very slow. Reports confirm that this only happens when the devices are connected to the office wireless network. Which of the following is MOST likely the cause? The configuration of the encryption protocol Interference from other devices Insufficient bandwidth capacity Duplicate SSIDs. During a risk assessment which of the following should be considered when planning to mitigate high CPU utilization of a firewall? Recovery time objective Uninterruptible power supply NIC teaming Load balancing. Due to concerns around single points of failure, a company decided to add an additional WAN to the network. The company added a second MPLS vendor to the current MPLS WAN and deployed an additional WAN router at each site. Both MPLS providers use OSPF on the WAN network, and EIGRP is run internally. The first site to go live with the new WAN is successful, but when the second site is activated significant network issues occur. Which of the following is the MOST likely cause for the WAN instability? A routing loop Asymmetrical routing switching loop An incorrect IP address. A website administrator is concerned the company’s static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities? Implement file integrity monitoring. Change the default credentials. Use SSL encryption. Update the web-server software. A systems administrator wants to use the least amount of equipment to segment two departments that nave cables terminating in the same room. Which of the following would allow this to occur? A load balancer A proxy server A Layer 3 switch A hub A Layer 7 firewall The RSSI was not strong enough on the link. A technician is deploying a low-density wireless network and is contending with multiple types of building materials. Which of the following wireless frequencies would allow for the LEAST signal attenuation? 2.4GHz 5GHz 850MHz 900MHZ. A technician is troubleshooting a network switch that seems to stop responding to requests intermittently whenever the logging level is set for debugging. Which of the following metrics should the technician check to begin troubleshooting the issue? Audit logs CPU utilization CRC errors Jitter. Which of the following policies is MOST commonly used for guest captive portals? AUP DLP BYOD NDA. A Fortune 500 firm is deciding On the kind or data center equipment to install given its five-year budget Outlook. The Chief Information comparing equipment based on the life expectancy Of different models. Which Of the following concepts BEST represents this metric? MTBF MTRR RPO RTO. A technician discovered that some information on the local database server was changed during a tile transfer to a remote server. Which of the following should concern the technician the MOST? Confidentiality Integrity DDoS On-path attack. An engineer needs to restrict the database servers that are in the same subnet from communicating with each other. The database servers will still need to communicate with the application servers in a different subnet. In some cases, the database servers will be clustered, and the servers will need to communicate with other cluster members. Which of the following technologies will be BEST to use to implement this filtering without creating rules? Private VLANs Access control lists Firewalls Control plane policing. Which of the following routing protocols is BEST suited for use on a perimeter router? OSPF RIPv2 EIGRP BGP. A systems operator is granted access to a monitoring application, configuration application, and timekeeping application. The operator is denied access to the financial and project management applications by the system's security configuration. Which of the following BEST describes the security principle in use? Network access control Least privilege Multifactor authentication Separation of duties. A technician is troubleshooting reports that a networked printer is unavailable. The printer's IP address is configured with a DHCP reservation, but the address cannot be pinged from the print server in the same subnet. Which of the following is MOST likely the cause of me connectivity failure? Incorrect VLAN DNS failure DHCP scope exhaustion Incorrect gateway. A company is moving to a new building designed with a guest waiting area that has existing network ports. Which of the following practices would BEST secure the network? Ensure all guests sign an NDA. Disable unneeded switchports in the area. Lower the radio strength to reduce Wi-Fi coverage in the waiting area. Enable MAC filtering to block unknown hardware addresses. Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy? Motion detection Access control vestibules Smart lockers Cameras. A company is undergoing expansion but does not have sufficient rack space in its data center. Which of the following would be BEST to allow the company to host its new equipment without a major investment in facilities? Using a colocation service Using available rack space in branch offices Using a flat network topology Reorganizing the network rack and installing top-of-rack switching. A network administrator is required to ensure that auditors have read-only access to the system logs, while systems administrators have read and write access to the system logs, and operators have no access to the system logs. The network administrator has configured security groups for each of these functional categories. Which of the following security capabilities will allow the network administrator to maintain these permissions with the LEAST administrative effort? Mandatory access control User-based permissions Role-based access Least privilege. Which of the following BEST describes a spirt-tunnel client-to-server VPN connection? The client sends an network traffic down the VPN tunnel The client has two different IP addresses that can be connected to a remote site from two different ISPs to ensure availability The client sends some network traffic down the VPN tunnel and other traffic to the local gateway. The client connects to multiple remote sites at the same time. A building was recently remodeled in order to expand the front lobby. Some mobile users have been unable to connect to the available network jacks within the new lobby, while others have had no issues. Which of the following is the MOST likely cause of the connectivity issues? LACP Port security 802.11ax Duplex settings. A coffee shop owner hired a network consultant to provide recommendations for installing a new wireless network. The coffee shop customers expect high speeds even when the network is congested. Which of the following standards should the consultant recommend? 802.11ac 802.11ax 802.11g 802.11n. A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day's upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches? Confirm the patch's MD5 hash prior to the upgrade. Schedule the switches to reboot after an appropriate amount of time. Download each switch's current configuration before the upgrade Utilize FTP rather than TFTP to upload the patch. A technician is trying to install a VolP phone, but the phone is not turning on. The technician checks the cable gong from the phone to the switch, and the cable is good. Which of the following actions IS needed for this phone to work? Add a POE injector. Enable MDIX. Use a crossover cable. Reconfigure the port. A network administrator installed a new data and VoIP network. Users are now experiencing poor call quality when making calls. Which of the following should the administrator do to increase VoIP performance? Configure a voice VLAN. Configure LACP on all VoIP phones. Configure PoE on the network. Configure jumbo frames on the network. Which of the following systems would MOST likely be found in a screened subnet? RADIUS FTP SQL LDAP. Given the following information: Which of the following command-line tools would generate this output? netstat arp dig tracert. A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring? Ethernet collisions A DDoS attack A broadcast storm Routing loops. A technician is assisting a user who cannot connect to a network resource. The technician first checks for a link light. According to troubleshooting methodology, this is an example of: using a bottom-to-top approach. establishing a plan of action. documenting a finding. questioning the obvious. A technician is consolidating a topology with multiple SSlDs into one unique SSID deployment. Which of the following features will be possible after this new configuration? Seamless roaming Basic service set WPA MU-MIMO. A company wants to invest in new hardware for the core network infrastructure. The management team requires that the infrastructure be capable of being repaired in less than 60 minutes if any major part fails. Which of the following metrics is MOST likely associated with this requirement? RPO MTTR FHRP MTBF. A corporate client is experiencing global system outages. The IT team has identified multiple potential underlying causes throughout the enterprise Each team member has been assigned an area to trouble shoot. Which of the following approaches is being used? Divide-and-conquer Top-to-bottom Bottom-to-top Determine if anything changed. A technician is troubleshooting a connectivity issue with an end user. The end user can access local network shares and intranet pages but is unable to access the internet or remote resources. Which of the following needs to be reconfigured? The IP address The subnet mask The gateway address The DNS servers. An employee working in a warehouse facility is experiencing interruptions in mobile applications while walking around the facility. According to a recent site survey, the WLAN comprises autonomous APs that are directly connected to the internet, providing adequate signal coverage. Which of the following is the BEST solution to improve network stability? Implement client roaming using an extended service deployment employing a wireless controller. Remove omnidirectional antennas and adopt a directional bridge. Ensure all APs of the warehouse support MIMO and Wi-Fi 4. Verify that the level of EIRP power settings is set to the maximum permitted by regulations. An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report. The tool was configured to scan using the following information: Network address: 172.28.16.0 CIDR: /22 The engineer collected the following information from the client workstation: IP address: 172.28.17.206 Subnet mask: 255.255.252.0 Which of the following MOST likely explains why the tool is failing to detect some workstations? The scanned network range is incorrect. The subnet mask on the client is misconfigured. The workstation has a firewall enabled. The tool is unable to scan remote networks. Which of the following would MOST likely utilize PoE? A camera A printer A hub A modem. A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement? Full backups Load balancing Hot site Snapshots. Which of me following security controls indicates unauthorized hardware modifications? Biometric authentication Media device sanitization Change management policy Tamper-evident seals. A network requirement calls for segmenting departments into different networks. The campus network is set up with users of each department in multiple buildings. Which of the following should be configured to keep the design simple and efficient? MDIX Jumbo frames Port tagging Flow control. A workstation is configured with the following network details: Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query? 10.1.2.0 10.1.2.1 10.1.2.255 10.1.2.31 10.1.2.23 . Which of the following devices would be used to manage a corporate WLAN? A wireless NAS A wireless bridge A wireless router A wireless controller. A network administrator is adding a new switch to the network. Which of the following network hardening techniques would be BEST to use once the switch is in production? Disable unneeded ports Disable SSH service Disable MAC filtering Disable port security . A new student is given credentials to log on to the campus Wi-Fi. The student stores the password in a laptop and is able to connect; however, the student is not able to connect with a phone when only a short distance from the laptop. Given the following information: Which of the following is MOST likely causing this connection failure? Transmission speed Incorrect passphrase Channel overlap Antenna cable attenuation/signal loss. A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket Which of the following types of rules is the administrator implementing? NAT PAT STP SNAT ARP. A fiber link connecting two campus networks is broken. Which of the following tools should an engineer use to detect the exact break point of the fiber link? OTDR Tone generator Fusion splicer Cable tester PoE injector. Which of the following topologies is designed to fully support applications hosted in on-premises data centers, public or private clouds, and SaaS services? SDWAN MAN PAN MPLS. A network administrator needs to monitor traffic on a specific port on a switch. Which of the following should the administrator configure to accomplish the task? Port security Port tagging Port mirroring Media access control. An engineer is gathering data to determine the effectiveness of UPSs in use at remote retail locations. Which of the following statistics can the engineer use to determine the availability of the remote network equipment? Uptime NetFlow baseline SNMP traps Interface statistics. A network technician 13 troubleshooting a specific port on a switch. Which of the following commands should the technician use to see the port configuration? show route show Interface show arp show port. An ISP is unable to provide services to a user in a remote area through cable and DSL. Which of the following is the NEXT best solution to provide services without adding external infrastructure? Fiber Leased line Satellite Metro optical. Which of the following technologies provides a failover mechanism for the default gateway? FHRP LACP OSPF STP. A technician was cleaning a storage closet and found a box of transceivers labeled 8Gbps. Which of the following protocols uses those transceivers? Coaxial over Ethernet Internet Small Computer Systems Interface Fibre Channel Gigabit interface converter. A network administrator is configuring a load balancer for two systems. Which of the following must the administrator configure to ensure connectivity during a failover? VIP NAT APIPA IPv6 tunneling Broadcast IP. An organization set up its offices so that a desktop is connected to the network through a VoIP phone. The VoIP vendor requested that voice traffic be segmented separately from non-voice traffic. Which of the following would allow the organization to configure multiple devices with network isolation on a single switch port? Subinterfaces Link aggregation Load balancing Tunneling. A network technician is troubleshooting a new web server connectivity issue. The network technician discovers the following on the support ticket • The server's IP address can be pinged from the client PCs, • Access to the web resource works correctly when on the server's console. • No clients can access the servers data via URL. • The server does not have a firewall configured • No ACLs are preventing connectivity from the client's network. • All services on the server are operating normally, which was confirmed by the server team. Which of the following actions will resolve the issue? Reset port security on the switchport connecting the server. Adjust the web server's NTP settings to match the client settings. Configure A records for the web server. Install the correct MIB on the web server. A non-employee was able to enter a server room. Which of the following could have prevented this from happening? A security camera A biometric reader OTP key fob Employee training. A network team is getting reports that air conditioning is out in an IDF. The team would like to determine whether additional network issues are occurring. Which of the following should the network team do? Confirm that memory usage on the network devices in the IDF is normal. Access network baseline data for references to an air conditioning issue. Verify severity levels on the corporate syslog server. Check for SNMP traps from a network device in the IDF. Review interface statistics looking for cyclic redundancy errors. A consultant is working with two international companies. The companies will be sharing cloud resources for a project. Which of the following documents would provide an agreement on how to utilize the resources? MOU NDA AUP SLA. A user calls the help desk to report being unable to reach a file server. The technician logs in to the user's computer and verifies that pings fall to respond back when trying to reach the file server. Which of the following would BEST help the technician verify whether the file server is reachable? netstat ipconfig nslookup traceroute. A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber? 10GBaseT 1000BaseT 1000BaseSX 1000BaseLX. A network technician is planning a network scope. The web server needs to be within 12.31 69.1 to 12.31.69.29. Which of the following would meet this requirement? Lease time Range reservation DNS Superscope. A technician is writing documentation regarding a company’s server farm. The technician needs to confirm the server name for all Linux servers. Which of the following commands should the technician run? ipconfig nslookup arp route. Which of the following devices have the capability to allow communication between two different subnetworks? (Select TWO). IDS Access point Layer 2 switch Layer 3 switch Router Media converter. A network administrator redesigned the positioning of the APs to create adjacent areas of wireless coverage. After project validation, some users still report poor connectivity when their devices maintain an association to a distanced AP. Which of the following should the network administrator check FIRST? Validate the roaming settings on the APs and WLAN clients Verify that the AP antenna type is correct for the new layout Check to see if MU-MIMO was properly activated on the APs Deactivate the 2.4GHz band on the APS. Which of the following compromises internet-connected devices and makes them vulnerable to becoming part of a botnet? (Select TWO). Deauthentication attack Malware infection IP spoofing Firmware corruption Use of default credentials Dictionary attack. Client devices cannot enter a network, and the network administrator determines the DHCP scope is exhausted. The administrator wants to avoid creating a new DHCP pool. Which of the following can the administrator perform to resolve the issue? Install load balancers Install more switches Decrease the number of VLANs Reduce the lease time. A malicious user is using special software 10 perform an on-path attack. Which of the following best practices should be configured to mitigate this threat? Dynamic ARP inspection Role-based access Control plane policing MAC filtering. A network technician needs to correlate security events to analyze a suspected intrusion. Which of the following should the technician use? SNMP Log review Vulnerability scanning SIEM. A technician is troubleshooting a wireless connectivity issue in a small office located in a high-rise building. Several APs are mounted in this office. The users report that the network connections frequently disconnect and reconnect throughout the day. Which of the following is the MOST likely cause of this issue? The AP association time is set too low EIRP needs to be boosted Channel overlap is occurring The RSSI is misreported. A client moving into a new office wants the IP network set up to accommodate 412 network-connected devices that are all on the same subnet. The subnet needs to be as small as possible. Which of the following subnet masks should be used to achieve the required result? 255.255.0.0 255.255.252.0 255.255.254.0 255.255.255.0. Branch users are experiencing issues with videoconferencing. Which of the following will the company MOST likely configure to improve performance for these applications? Link Aggregation Control Protocol Dynamic routing Quality of service Network load balancer Static IP addresses. According to troubleshooting methodology, which of the following should the technician do NEXT after determining the most likely probable cause of an issue? Establish a plan of action to resolve the issue and identify potential effects Verify full system functionality and, if applicable, implement preventive measures Implement the solution or escalate as necessary Test the theory to determine the cause. Which of the following would be BEST suited for a long cable run with a 40Gbps bandwidth? Cat 5e Cat 6a Cat 7 Cat 8. A desktop support department has observed slow wireless speeds for a new line of laptops using the organization's standard image. No other devices have experienced the same issue. Which of the following should the network administrator recommend troubleshooting FIRST to resolve this issue? Increasing wireless signal power Installing a new WAP Changing the protocol associated to the SSID Updating the device wireless drivers. A network administrator is implementing OSPF on all of a company’s network devices. Which of the following will MOST likely replace all the company’s hubs? A Layer 3 switch A proxy server A NGFW A WLAN controller. A network is experiencing extreme latency when accessing a particular website. Which of the following commands will BEST help identify the issue? ipconfig netstat tracert ping. A client recently added 100 users who are using VMs. All users have since reported slow or unresponsive desktops. Reports show minimal network congestion, zero packet loss, and acceptable packet delay. Which of the following metrics will MOST accurately show the underlying performance issues? (Choose two.) CPU usage Memory Temperature Bandwidth Latency Jitter. A network technician is implementing a solution that will allow end users to gain access to multiple applications after logging on. Which of the following authentication methods would allow this type of access? SSO LDAP EAP TACACS+. Which of the following types of connections would need to be set up to provide access from the internal network to an external network so multiple satellite offices can communicate securely using various ports and protocols? Client-to-site VPN Clientless VPN RDP Site-to-site VPN SSH. A technician needs to configure a Linux computer for network monitoring. The technician has the following information: After connecting the Linux computer to the mirror port on the switch, which of the following commands should the technician run on the Linux computer? ifconfig ecth0 promisc ifconfig eth1 up ifconfig eth0 10.1.2.3 ifconfig eth1 hw ether A1:B2:C3:D4:E5:F6 . A technician notices that equipment is being moved around and misplaced in the server room, even though the room has locked doors and cabinets. Which of the following would be the BEST solution to identify who is responsible? Install motion detection Install cameras. Install tamper detection. Hire a security guard. Which of the following is MOST likely to generate significant East-West traffic in a datacenter? A backup of a large video presentation to cloud storage for archival purposes A duplication of a hosted virtual server to another physical server for redundancy A download of navigation data to a portable device for offline access A query from an IoT device to a cloud-hosted server for a firmware update. Which of the following would be used when connecting devices that have different physical characteristics? A proxy server An industrial control system A load balancer A media converter. A network technician is attempting to increase throughput by configuring link port aggregation between a Gigabit Ethernet distribution switch and a Fast Ethernet access switch. Which of the following is the BEST choice concerning speed and duplex for all interfaces that are participating in the link aggregation? Half duplex and 1GB speed Full duplex and 1GB speed Half duplex and 10OMB speed Full duplex and 100MB speed. |
Report abuse