ExamGecko
Home Home / CompTIA / N10-009

CompTIA N10-009 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











Which of the following steps in the troubleshooting methodology would be next after putting preventive measures in place?

A.
Implement the solution.
A.
Implement the solution.
Answers
B.
Verify system functionality.
B.
Verify system functionality.
Answers
C.
Establish a plan of action.
C.
Establish a plan of action.
Answers
D.
Test the theory to determine cause.
D.
Test the theory to determine cause.
Answers
Suggested answer: B

Explanation:

After implementing a solution and putting preventive measures in place, the next step is to verify that the system is functioning correctly. This ensures that the issue has been fully resolved.

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

A.
TXT
A.
TXT
Answers
B.
AAAA
B.
AAAA
Answers
C.
CNAME
C.
CNAME
Answers
D.
MX
D.
MX
Answers
Suggested answer: A

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?

A.
The port cost should not be equal.
A.
The port cost should not be equal.
Answers
B.
The ports should use link aggregation.
B.
The ports should use link aggregation.
Answers
C.
A root bridge needs to be identified.
C.
A root bridge needs to be identified.
Answers
D.
The switch should be configured for RSTP.
D.
The switch should be configured for RSTP.
Answers
Suggested answer: C

Which of the following facilities is the best example of a warm site in the event of information system disruption?

A.
A combination of public and private cloud services to restore data
A.
A combination of public and private cloud services to restore data
Answers
B.
A partial infrastructure, software, and data on site
B.
A partial infrastructure, software, and data on site
Answers
C.
A full electrical infrastructure in place, but no customer devices on site
C.
A full electrical infrastructure in place, but no customer devices on site
Answers
D.
A full infrastructure in place, but no current data on site
D.
A full infrastructure in place, but no current data on site
Answers
Suggested answer: D

Explanation:

A warm site typically has a full infrastructure ready, but it lacks the most up-to-date data or is not immediately operational. It requires some configuration or data restoration to become fully functional.

Which of the following would be violated if an employee accidentally deleted a customer's data?

A.
Integrity
A.
Integrity
Answers
B.
Confidentiality
B.
Confidentiality
Answers
C.
Vulnerability
C.
Vulnerability
Answers
D.
Availability
D.
Availability
Answers
Suggested answer: D

Explanation:

Availability refers to ensuring that data is accessible when needed. If a customer's data is accidentally deleted, it impacts availability, as the data can no longer be accessed.

Which of the following is used to describe the average duration of an outage for a specific service?

A.
RPO
A.
RPO
Answers
B.
MTTR
B.
MTTR
Answers
C.
RTO
C.
RTO
Answers
D.
MTBF
D.
MTBF
Answers
Suggested answer: B

Explanation:

MTTR (Mean Time to Repair) is the average time it takes to repair a system or service after a failure. It helps in measuring the downtime and planning recovery processes.

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

A.
Network tap
A.
Network tap
Answers
B.
Cable tester
B.
Cable tester
Answers
C.
Visual fault locator
C.
Visual fault locator
Answers
D.
Toner and probe
D.
Toner and probe
Answers
Suggested answer: B

Explanation:

A cable tester is a tool that can help identify issues with the physical cabling, such as breaks or improper terminations, which may prevent the access point from reaching the internet.

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

A.
The switches are not the correct voltage.
A.
The switches are not the correct voltage.
Answers
B.
The HVAC system was not verified as fully functional after the fire.
B.
The HVAC system was not verified as fully functional after the fire.
Answers
C.
The VLAN database was not deleted before the equipment was brought back online.
C.
The VLAN database was not deleted before the equipment was brought back online.
Answers
D.
The RJ45 cables were replaced with unshielded cables.
D.
The RJ45 cables were replaced with unshielded cables.
Answers
E.
The wrong transceiver type was used for the new termination.
E.
The wrong transceiver type was used for the new termination.
Answers
F.
The new RJ45 cables are a higher category than the old ones.
F.
The new RJ45 cables are a higher category than the old ones.
Answers
Suggested answer: D, E

Explanation:

Unshielded cables (D) are more prone to interference and may not be suitable for certain environments, especially after a fire where interference could be heightened.

Using the wrong transceiver (E) for new terminations can lead to compatibility issues, causing network failures.

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?

A.
With a voice VLAN
A.
With a voice VLAN
Answers
B.
With too many VLANs
B.
With too many VLANs
Answers
C.
With a default VLAN
C.
With a default VLAN
Answers
D.
With a native VLAN
D.
With a native VLAN
Answers
Suggested answer: A

Explanation:

It is common for an access port to have both a voice VLAN and a data VLAN. A voice VLAN separates voice traffic from regular data traffic, ensuring better quality and security for voice communications.

Which of the following can also provide a security feature when implemented?

A.
NAT
A.
NAT
Answers
B.
BGP
B.
BGP
Answers
C.
FHRP
C.
FHRP
Answers
D.
EIGRP
D.
EIGRP
Answers
Suggested answer: A

Explanation:

NAT (Network Address Translation) helps hide internal IP addresses from external networks, adding a layer of security by preventing direct access to internal systems from the outside.

Total 153 questions
Go to page: of 16