Pass the CompTIA CompTIA Network+ N10-009 Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:

A.

Multitenancy


B.

VPC


C.

NFV


D.

SaaS


Questions # 2:

Which of the following indicates a computer has reached end-of-support?

Options:

A.

The computer does not have any users.


B.

The antivirus protection is expired.


C.

The operating system license is expired.


D.

No more patches or bug fixes are available indefinitely.


Questions # 3:

Which of the following protocols uses the Dijkstra's Link State Algorithm to establish routes inside its routing table?

Options:

A.

OSPF


B.

EIGRP


C.

BGP


D.

RIP


Questions # 4:

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

Options:

A.

tcpdump


B.

tracert


C.

nmap


D.

dig


Questions # 5:

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:

A.

Shoulder surfing


B.

Impersonation


C.

Vishing


D.

Tailgating


Questions # 6:

Which of the following is used to estimate the average life span of a device?

Options:

A.

RTO


B.

RPO


C.

MTBF


D.

MTTR


Questions # 7:

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

Options:

A.

802.1Q tagging


B.

Network address translation


C.

Port duplex


D.

Link aggregation


Questions # 8:

A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?

Options:

A.

Lightweight


B.

Autonomous


C.

Mesh


D.

Ad hoc


Questions # 9:

Which of the following attacks would most likely cause duplicate IP addresses in a network?

Options:

A.

Rogue DHCP server


B.

DNS poisoning


C.

Social engineering


D.

Denial-of-service


Questions # 10:

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

Options:

A.

Port


B.

DNS


C.

MAC


D.

Content


Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions