ExamGecko
Home Home / CompTIA / N10-009

CompTIA N10-009 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A.
Port
A.
Port
Answers
B.
DNS
B.
DNS
Answers
C.
MAC
C.
MAC
Answers
D.
Content
D.
Content
Answers
Suggested answer: D

Explanation:

To implement data loss prevention (DLP) and restrict user access to social media platforms and personal cloud storage, the company should deploy content filtering. Content filtering examines the data being transmitted over the network and can block specific types of content or websites based on predefined policies. This type of filtering is effective in preventing access to specific web services and ensuring that sensitive information does not leave the network through unauthorized channels. Port, DNS, and MAC filtering serve different purposes and are not as effective for DLP in this context.

Reference: CompTIA Network+ Certification Exam Objectives - Network Security section.

A network administrator's device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network. Which of the following is most likely the cause of the issue?

A.
Too much wireless reflection
A.
Too much wireless reflection
Answers
B.
Too much wireless absorption
B.
Too much wireless absorption
Answers
C.
Too many wireless repeaters
C.
Too many wireless repeaters
Answers
D.
Too many client connections
D.
Too many client connections
Answers
Suggested answer: A

Explanation:

Severe Wi-Fi interference within a corporate headquarters causing devices to constantly drop off the network is most likely due to too much wireless reflection. Wireless reflection occurs when Wi-Fi signals bounce off surfaces like walls, metal, or glass, causing multipath interference. This can lead to poor signal quality and frequent disconnections. Other causes like wireless absorption, too many repeaters, or too many client connections can also affect Wi-Fi performance, but excessive reflection is a common culprit in environments with many reflective surfaces.

Reference: CompTIA Network+ Certification Exam Objectives - Wireless Networks section.

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.
LLDP
A.
LLDP
Answers
B.
IKE
B.
IKE
Answers
C.
VLAN
C.
VLAN
Answers
D.
netstat
D.
netstat
Answers
Suggested answer: A

Explanation:

Link Layer Discovery Protocol (LLDP) is a network protocol used for discovering devices and their capabilities on a local area network, primarily at the data link layer (Layer 2). It helps in identifying the connected switch and the specific port to which a device is connected. When troubleshooting a VoIP handset connection, the technician can use LLDP to determine the exact switch and port where the handset is connected. This protocol is widely used in network management to facilitate the discovery of network topology and simplify troubleshooting.

Other options such as IKE (Internet Key Exchange), VLAN (Virtual LAN), and netstat (network statistics) are not suitable for identifying the switch and port information. IKE is used in setting up secure IPsec connections, VLAN is used for segmenting networks, and netstat provides information about active connections and listening ports on a host but not for discovering switch port details.

SIMULATION

Users are unable to access files on their department share located on flle_server 2. The network administrator has been tasked with validating routing between networks hosting workstation A and file server 2.

INSTRUCTIONS

Click on each router to review output, identity any Issues, and configure the appropriate solution

If at any time you would like to bring back the initial state of trie simulation, please click the reset All button;

A.
See the solutio nconfiguration below in Explanation
A.
See the solutio nconfiguration below in Explanation
Answers
Suggested answer: A

Explanation:


SIMULATION

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

A.
See the answer and solution below
A.
See the answer and solution below
Answers
Suggested answer: A

Explanation:

A network administrator is configuring access points for installation in a dense environment where coverage is often overlapping. Which of the following channel widths should the administrator choose to help minimize interference in the 2.4GHz spectrum?

A.
11MHz
A.
11MHz
Answers
B.
20MHz
B.
20MHz
Answers
C.
40MHz
C.
40MHz
Answers
D.
80MHz
D.
80MHz
Answers
E.
160MHz
E.
160MHz
Answers
Suggested answer: B

Explanation:

In the 2.4GHz spectrum, channels are spaced 5MHz apart but have a bandwidth of 20MHz, resulting in overlapping channels. To minimize interference, especially in a dense environment where access point coverage overlaps, a narrower channel width of 20MHz should be used. Using wider channel widths like 40MHz, 80MHz, or 160MHz in the 2.4GHz band will increase the overlap and interference. The 20MHz channel width provides a good balance between performance and minimal interference.

Reference: CompTIA Network+ Certification Exam Objectives - Wireless Networks section.

Which of the following cloud service models most likely requires the greatest up-front expense by the customer when migrating a data center to the cloud?

A.
Infrastructure as a service
A.
Infrastructure as a service
Answers
B.
Software as a service
B.
Software as a service
Answers
C.
Platform as a service
C.
Platform as a service
Answers
D.
Network as a service
D.
Network as a service
Answers
Suggested answer: A

Explanation:

Infrastructure as a Service (IaaS) typically requires the greatest up-front expense by the customer when migrating a data center to the cloud. IaaS provides virtualized computing resources over the internet, where customers rent virtual machines, storage, and networks. The customer is responsible for managing the operating systems, applications, and data. This model often necessitates significant initial investment in planning, migration, and configuring the infrastructure. In contrast, Software as a Service (SaaS) and Platform as a Service (PaaS) models usually involve lower up-front costs because they offer more managed services.

Reference: CompTIA Network+ Certification Exam Objectives - Cloud Models section.

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

A.
Identify the problem.
A.
Identify the problem.
Answers
B.
Document the findings and outcomes.
B.
Document the findings and outcomes.
Answers
C.
Test the theory to determine cause.
C.
Test the theory to determine cause.
Answers
D.
Establish a plan of action.
D.
Establish a plan of action.
Answers
Suggested answer: A

Explanation:

Checking logs for recent changes is part of the 'Identify the problem' step in the CompTIA troubleshooting methodology. This step involves gathering information, including reviewing logs and documentation, to understand what might have changed or caused the issue. This preliminary analysis is critical for forming an accurate theory about the problem.

Reference: CompTIA Network+ Certification Exam Objectives - Troubleshooting section.

Before using a guest network, an administrator requires users to accept the terms of use Which of the following is the best way to accomplish this goal?

A.
Pre-shared key
A.
Pre-shared key
Answers
B.
Autonomous access point
B.
Autonomous access point
Answers
C.
Captive portal
C.
Captive portal
Answers
D.
WPA2 encryption
D.
WPA2 encryption
Answers
Suggested answer: C

Explanation:

A captive portal is a web page that users must view and interact with before being granted access to a network. It is commonly used in guest networks to enforce terms of use agreements. When a user connects to the network, they are redirected to this portal where they must accept the terms of use before proceeding. This method ensures that users are aware of and agree to the network's policies, making it the best choice for this scenario.

Reference: CompTIA Network+ Exam Objectives and official study guides.

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

A.
Access, distribution, and core
A.
Access, distribution, and core
Answers
B.
Core, root, and distribution
B.
Core, root, and distribution
Answers
C.
Core, spine, and leaf
C.
Core, spine, and leaf
Answers
D.
Access, core, and roof
D.
Access, core, and roof
Answers
Suggested answer: A

Explanation:

The three-tier hierarchical model in network design consists of three layers: access, distribution, and core. The access layer is where devices like PCs and printers connect to the network. The distribution layer aggregates the data received from the access layer switches before it is transmitted to the core layer, which is responsible for high-speed data transfer and routing. This approach improves scalability and performance in larger networks.

Reference: CompTIA Network+ Exam Objectives and official study guides.

Total 153 questions
Go to page: of 16