ExamGecko
Home Home / CompTIA / N10-009

CompTIA N10-009 Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?

A.
General Data Protection Regulation
A.
General Data Protection Regulation
Answers
B.
Least privilege network access
B.
Least privilege network access
Answers
C.
Acceptable use policy
C.
Acceptable use policy
Answers
D.
End user license agreement
D.
End user license agreement
Answers
Suggested answer: B

Explanation:

Least privilege network access is a principle that restricts users' access rights to only what is necessary for them to perform their job functions. In this case, the accountant's access is limited to only the financial department's shared folders, ensuring that they cannot access other parts of the network unnecessarily. This reduces the risk of unauthorized access and potential data breaches.

Reference: CompTIA Network+ Exam Objectives and official study guides.

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

A.
Datagram
A.
Datagram
Answers
B.
Segment
B.
Segment
Answers
C.
Frames
C.
Frames
Answers
D.
Packets
D.
Packets
Answers
Suggested answer: A

Explanation:

At the transport layer, connectionless communication is typically handled using the User Datagram Protocol (UDP), which transmits data in units called datagrams. Unlike TCP, UDP does not establish a connection before sending data and does not guarantee delivery, making datagrams the correct term for the transmission format in this context.

Reference: CompTIA Network+ Exam Objectives and official study guides.

A user's VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

A.
The PoE power budget is exceeded.
A.
The PoE power budget is exceeded.
Answers
B.
Port security is violated.
B.
Port security is violated.
Answers
C.
The signal is degraded
C.
The signal is degraded
Answers
D.
The Ethernet cable is not working
D.
The Ethernet cable is not working
Answers
Suggested answer: A

Explanation:

Power over Ethernet (PoE) delivers power to devices such as VoIP phones over the same cables used for data. If the total power requirement of connected devices exceeds the PoE power budget of the switch or injector, some devices may not receive adequate power and could intermittently reboot. This issue would not affect the workstation, which is likely receiving power separately.

Reference: CompTIA Network+ Exam Objectives and official study guides.

Which of the following are the best device-hardening techniques for network security? (Select two).

A.
Disabling unused ports
A.
Disabling unused ports
Answers
B.
Performing regular scanning of unauthorized devices
B.
Performing regular scanning of unauthorized devices
Answers
C.
Monitoring system logs for irregularities
C.
Monitoring system logs for irregularities
Answers
D.
Enabling logical security such as SSO
D.
Enabling logical security such as SSO
Answers
E.
Changing default passwords
E.
Changing default passwords
Answers
F.
Ensuring least privilege concepts areinplace
F.
Ensuring least privilege concepts areinplace
Answers
Suggested answer: A, E

Explanation:

Disabling unused ports prevents unauthorized access and reduces the attack surface by ensuring that no inactive or unmonitored entry points are available for exploitation. Changing default passwords is critical for security because default credentials are widely known and can easily be exploited by attackers. These techniques are fundamental steps in hardening devices against unauthorized access and ensuring network security.

Reference: CompTIA Network+ Exam Objectives and official study guides.

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.
Geofencing
A.
Geofencing
Answers
B.
Honeynet
B.
Honeynet
Answers
C.
Jumpbox
C.
Jumpbox
Answers
D.
Screened subnet
D.
Screened subnet
Answers
Suggested answer: B

Explanation:

A honeynet is a network of honeypots designed to attract and study attackers. Honeypots are decoy systems set up to lure cyber attackers and analyze their activities. A honeynet, being a collection of these systems, provides a broader view of attack methods and patterns, helping organizations improve their security measures.

Reference: CompTIA Network+ Exam Objectives and official study guides.

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?

A.
Toner and probe
A.
Toner and probe
Answers
B.
Cable tester
B.
Cable tester
Answers
C.
Visual fault locator
C.
Visual fault locator
Answers
D.
Network tap
D.
Network tap
Answers
Suggested answer: A

Explanation:

A toner and probe tool, also known as a tone generator and probe, is used to trace and identify individual cables within a bundle or to locate the termination points of cables in wiring closets and patch panels. It generates a tone that can be picked up by the probe, helping technicians quickly and accurately identify and label wall plates and wiring. This is the best tool for identifying proper wiring in the Intermediate Distribution Frame (IDF).

Reference: CompTIA Network+ Exam Objectives and official study guides.

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

A.
Multitenancy
A.
Multitenancy
Answers
B.
VPC
B.
VPC
Answers
C.
NFV
C.
NFV
Answers
D.
SaaS
D.
SaaS
Answers
Suggested answer: A

Explanation:

Multitenancy is a cloud computing architecture where a single instance of software serves multiple customers or tenants. Each tenant's data is isolated and remains invisible to other tenants. Hosting a company application in the cloud to be available for both internal and third-party users fits this concept, as it allows shared resources and infrastructure while maintaining data separation and security.

Reference: CompTIA Network+ Exam Objectives and official study guides.

A company wants to implement a disaster recovery site or non-critical applicance, which can tolerance a short period of downltime. Which of the followig type of sites should the company impelement to achive this goal?

A.
Hot
A.
Hot
Answers
B.
Cold
B.
Cold
Answers
C.
Warm
C.
Warm
Answers
D.
Passive
D.
Passive
Answers
Suggested answer: C

Explanation:

A warm site is a compromise between a hot site and a cold site, providing a balance between cost and recovery time. It is partially equipped with the necessary hardware, software, and infrastructure, allowing for a quicker recovery compared to a cold site but at a lower cost than a hot site.

Recovery Time: Warm sites can be operational within hours to a day, making them suitable for non-critical applications that can tolerate short downtimes.

Cost-Effectiveness: Warm sites are more economical than hot sites as they do not require all systems to be fully operational at all times.

Network


A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?

A.
Dig
A.
Dig
Answers
B.
Nmap
B.
Nmap
Answers
C.
Tracert
C.
Tracert
Answers
D.
nslookup
D.
nslookup
Answers
Suggested answer: B

Explanation:

Nmap (Network Mapper) is a powerful network scanning tool used to discover hosts and services on a computer network. It can be used to identify which ports are open on a remote server, which can help diagnose access issues to services like a remote file server.

Port Scanning: Nmap can perform comprehensive port scans to determine which ports are open and what services are running on those ports.

Network Discovery: It provides detailed information about the host's operating system, service versions, and network configuration.

Security Audits: Besides troubleshooting, Nmap is also used for security auditing and identifying potential vulnerabilities.

Network


A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

A.
Sides
A.
Sides
Answers
B.
Top
B.
Top
Answers
C.
Front
C.
Front
Answers
D.
Rear
D.
Rear
Answers
Suggested answer: D

Explanation:

In a data center that practices hot aisle/cold aisle ventilation, equipment should be installed so that the exhaust faces the rear of the rack. This setup ensures that hot air is expelled into the hot aisle, maintaining proper airflow and cooling efficiency.

Hot Aisle/Cold Aisle Configuration: Equipment intake should face the cold aisle where cool air is supplied, and exhaust should face the hot aisle where hot air is expelled.

Cooling Efficiency: Proper orientation of equipment helps maintain an efficient cooling environment by segregating hot and cold air, preventing overheating and improving energy efficiency.

Network


Total 153 questions
Go to page: of 16