Practice Free N10-009 Exam Online Questions
Which of the following is a cost-effective advantage of a split-tunnel VPN?
- A . Web traffic is filtered through a web filter.
- B . More bandwidth is required on the company’s internet connection.
- C . Monitoring detects insecure machines on the company’s network.
- D . Cloud-based traffic flows outside of the company’s network.
D
Explanation:
A split-tunnel VPN allows certain traffic (e.g., cloud-based services) to bypass the VPN and go directly to the Internet. This reduces the amount of traffic that needs to traverse the company’s VPN and Internet connection, conserving bandwidth and reducing costs. It also means that not all traffic is subject to the same level of inspection or filtering, which can improve performance for cloud-based services.
Reference: CompTIA Network+ study materials.
A technician is designing a cloud service solution that will accommodate the company’s current size, compute capacity, and storage capacity.
Which of the following cloud deployment models will fulfill these requirements?
- A . SaaS
- B . PaaS
- C . IaaS
- D . IaC
C
Explanation:
Infrastructure as a Service (IaaS) provides scalable compute power, storage, and networking resources on demand. It is the best choice for a company that needs to customize its cloud solution based on size, compute capacity, and storage needs.
IaaS Benefits:
Provides virtual machines, storage, and networking resources.
Scalable based on company needs.
Reduces the need for physical infrastructure.
Incorrect Options:
A network engineer is completing a new VoIP installation, but the phones cannot find the TFTP server to download the configuration files.
Which of the following DHCP features would help the phone reach the TFTP server?
- A . Exclusions
- B . Lease time
- C . Options
- D . Scope
C
Explanation:
DHCP Options: DHCP options allow additional configuration parameters, such as the address of a
TFTP server, to be provided to clients during the DHCP lease process. This is essential for VoIP phones to locate the server for configuration files.
Exclusions (A): Prevents certain IP addresses from being assigned by DHCP but does not direct devices to servers.
Lease time (B): Determines how long an IP address is assigned but does not impact TFTP settings.
Scope (D): Defines a range of IP addresses but does not include additional server information.
Reference: CompTIA Network+ Official Study Guide, Domain 1.3 (DHCP Configuration).
Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?
- A . Datagram
- B . Segment
- C . Frames
- D . Packets
A
Explanation:
At the transport layer, connectionless communication is typically handled using the User Datagram Protocol (UDP), which transmits data in units called datagrams. Unlike TCP, UDP does not establish a connection before sending data and does not guarantee delivery, making datagrams the correct term for the transmission format in this context.
Reference: CompTIA Network+ Exam Objectives and official study guides.
A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on.
Which of the following should a technician try first to troubleshoot this issue?
- A . Reverse the fibers.
- B . Reterminate the fibers.
- C . Verify the fiber size.
- D . Examine the cable runs for visual faults.
A
Explanation:
When working with fiber optic cables, one common issue is that the transmit (TX) and receive (RX) fibers might be reversed. The first step in troubleshooting should be to reverse the fibers at one end to ensure they are correctly aligned (TX to RX and RX to TX). This is a simple and quick step to rule out a common issue before moving on to more complex troubleshooting.
Reference: CompTIA Network+ study materials.
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity.
Which of the following should be implemented to comply with the cease-and-desist order?
- A . MAC security
- B . Content filtering
- C . Screened subnet
- D . Perimeter network
B
Explanation:
Content filtering can be used to block or restrict access to websites and services that facilitate torrenting and other prohibited activities. By implementing content filtering, the company can comply with the ISP’s cease-and-desist order and prevent users from accessing torrent sites and engaging in prohibited activities.
Reference: CompTIA Network+ study materials.
A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels.
Which of the following would be the best choice?
- A . 802.11a
- B . 802.11b
- C . 802.11g
- D . 802.11n
D
Explanation:
The 802.11n standard supports MIMO (Multiple Input Multiple Output), which allows multiple antennas to increase data throughput and improve reliability. Additionally, it uses non-overlapping channels in the 5 GHz band (and optionally the 2.4 GHz band), making it a good choice for high-speed, interference-resistant wireless connections. (Reference: CompTIA Network+ Study Guide, Chapter on Wireless Technologies)
A network administrator’s device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network.
Which of the following is most likely the cause of the issue?
- A . Too much wireless reflection
- B . Too much wireless absorption
- C . Too many wireless repeaters
- D . Too many client connections
A
Explanation:
Reference: CompTIA Network+ Certification Exam Objectives – Wireless Networks section.
Which of the following are the best device-hardening techniques for network security? (Select two).
- A . Disabling unused ports
- B . Performing regular scanning of unauthorized devices
- C . Monitoring system logs for irregularities
- D . Enabling logical security such as SSO
- E . Changing default passwords
- F . Ensuring least privilege concepts areinplace
A,E
Explanation:
Disabling unused ports prevents unauthorized access and reduces the attack surface by ensuring that no inactive or unmonitored entry points are available for exploitation. Changing default passwords is critical for security because default credentials are widely known and can easily be exploited by attackers. These techniques are fundamental steps in hardening devices against unauthorized access and ensuring network security.
Reference: CompTIA Network+ Exam Objectives and official study guides.
A network administrator is configuring a new switch and wants to ensure that only assigned devices can connect to the switch.
Which of the following should the administrator do?
- A . Configure ACLs.
- B . Implement a captive portal.
- C . Enable port security.
- D . Disable unnecessary services.
C
Explanation:
Reference: CompTIA Network+ Certification Exam Objectives – Network Security section.