Pass the CompTIA CompTIA Network+ N10-009 Questions and answers with CertsForce

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which of the following is the next step to take after successfully testing a root cause theory?

Options:

A.

Determine resolution steps.


B.

Duplicate the problem in a lab.


C.

Present the theory for approval.


D.

Implement the solution to the problem.


Expert Solution
Questions # 22:

A network technician was recently onboarded to a company. A manager has

tasked the technician with documenting the network and has provided the technician With partial information from previous documentation.

Instructions:

Click on each switch to perform a network discovery by entering commands into the terminal. Fill in the missing information using drop-down menus provided.

Question # 22

Question # 22


Expert Solution
Questions # 23:

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access


B.

Dynamic inventeries


C.

Central policy management


D.

Zero-touch provisioning


E.

Configuration drift prevention


F.

Subnet range limits


Expert Solution
Questions # 24:

Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?

Options:

A.

SSH


B.

TLS


C.

SCADA


D.

RADIUS


Expert Solution
Questions # 25:

A network administrator is creating a subnet that will include 45 separate hosts on a small private network within a large network architecture. Which of the following options is the most efficient use of network addresses when assigning this network?

Options:

A.

10.0.50.128/25


B.

10.7.142.128/27


C.

10.152.4.192/26


D.

10.192.1.64/28


Expert Solution
Questions # 26:

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 <1 ms 2. * <1 ms <1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

Options:

A.

Review the router's ACL.


B.

Execute netstat.


C.

Perform an nslookup.


D.

Enable LLDP.


Expert Solution
Questions # 27:

Which of the following OSI model layers can utilize a connectionless protocol for data transmission?

Options:

A.

Physical


B.

Network


C.

Transport


D.

Application


Expert Solution
Questions # 28:

A network administrator recently updated configurations on a Layer 3 switch. Following the updates, users report being unable to reach a specific file server. Which of the following is the most likely cause?

Options:

A.

Incorrect ACLs


B.

Switching loop


C.

Duplicate IP addresses


D.

Wrong default route


Expert Solution
Questions # 29:

You are tasked with verifying the following requirements are met in order to ensure network security.

Requirements:

Datacenter

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a dedicated server to resolve IP addresses and hostnames correctly and handle port 53 traffic

Building A

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide devices to support 5 additional different office users

Add an additional mobile user

Replace the Telnet server with a more secure solution

Screened subnet

Ensure network is subnetted to allow all devices to communicate properly while minimizing address space usage

Provide a server to handle external 80/443 traffic

Provide a server to handle port 20/21 traffic

INSTRUCTIONS

Drag and drop objects onto the appropriate locations. Objects can be used multiple times and not all placeholders need to be filled.

Available objects are located in both the Servers and Devices tabs of the Drag & Drop menu.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Question # 29


Expert Solution
Questions # 30:

Users usually use RDP to connect to a terminal server with hostname TS19 that points to 10.0.100.19. However, users recently have been unable to connect to TS19. The technician pings 10.0.100.19 and gets an unreachable error. Which of the following is the most likely cause?

Options:

A.

The users are on the wrong subnet.


B.

The DHCP server renewed the lease.


C.

The IP address was not reserved.


D.

The hostname was changed.


Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions