CompTIA N10-009 Practice Test - Questions Answers, Page 6

List of questions
Question 51

Which of the following does a full-tunnel VPN provide?
A full-tunnel VPN routes all of a user's network traffic through the corporate network. This means that the organization can inspect all network traffic for security and compliance purposes, as all data is tunneled through the VPN, allowing for comprehensive monitoring and inspection.
Reference: CompTIA Network+ study materials.
Question 52

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?
When working with fiber optic cables, one common issue is that the transmit (TX) and receive (RX) fibers might be reversed. The first step in troubleshooting should be to reverse the fibers at one end to ensure they are correctly aligned (TX to RX and RX to TX). This is a simple and quick step to rule out a common issue before moving on to more complex troubleshooting.
Reference: CompTIA Network+ study materials.
Question 53

Which of the following protocols has a default administrative distance value of 90?
EIGRP (Enhanced Interior Gateway Routing Protocol) has a default administrative distance (AD) value of 90 for internal routes. The administrative distance is used to rate the trustworthiness of routing information received from different routing protocols. EIGRP, developed by Cisco, has an AD of 90, which is lower than that of RIP (120) and OSPF (110), making it more preferred if multiple protocols provide a route to the same destination.
Reference: CompTIA Network+ study materials.
Question 54

Which of the following is a cost-effective advantage of a split-tunnel VPN?
Question 55

Which of the following should be configured so users can authenticate to a wireless network using company credentials?
Question 56

Which of the following is most likely responsible for the security and handling of personal data in Europe?
Question 57

Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:
1 3ms 2ms 3ms 192.168.25.234
2 2ms 3ms 1ms 192.168.3.100
3 4ms 5ms 2ms 10.249.3.1
4 *
5 '
6 *
7 *
Which of the following command-line tools is the network administrator using?
Question 58

Which of the following attacks would most likely cause duplicate IP addresses in a network?
Question 59

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?
Question 60

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?
Question