Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Network+ N10-009 Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions
Questions # 61:

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

Options:

A.

4096


B.

8192


C.

32768


D.

36684


Expert Solution
Questions # 62:

A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provides authentication and encryption. Which of the following meets these requirements?

Options:

A.

SIEM


B.

Syslog


C.

NetFlow


D.

SNMPv3


Expert Solution
Questions # 63:

Which of the following protocol ports should be used to securely transfer a file?

Options:

A.

22


B.

69


C.

80


D.

3389


Expert Solution
Questions # 64:

Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?

Options:

A.

Crash cart


B.

Jump box


C.

Secure Shell (SSH)


D.

Out-of-band management


Expert Solution
Questions # 65:

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

Options:

A.

Risk


B.

Exploit


C.

Threat


D.

Vulnerability


Expert Solution
Questions # 66:

Which of the following could provide a lightweight and private connection to a remote box?

Options:

A.

Site-to-site VPN


B.

Telnet


C.

Console


D.

Secure Shell


Expert Solution
Questions # 67:

Which of the following is the most closely associated with segmenting compute resources within a single cloud account?

Options:

A.

Network security group


B.

laaS


C.

VPC


D.

Hybrid cloud


Expert Solution
Questions # 68:

A network security administrator needs to monitor the contents of data sent between a secure network and the rest of the company. Which of the following monitoring methods will accomplish this task?

Options:

A.

Port mirroring


B.

Flow data


C.

Syslog entries


D.

SNMP traps


Expert Solution
Questions # 69:

A network administrator is creating a subnet that will include 45 separate hosts on a small private network within a large network architecture. Which of the following options is the most efficient use of network addresses when assigning this network?

Options:

A.

10.0.50.128/25


B.

10.7.142.128/27


C.

10.152.4.192/26


D.

10.192.1.64/28


Expert Solution
Questions # 70:

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers ' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:

A.

Shoulder surfing


B.

Impersonation


C.

Vishing


D.

Tailgating


Expert Solution
Questions # 71:

Ten new laptops are added to an existing network, and they can only communicate with one another. An administrator reviews documentation and sees the following:

Subnet: 10.8.100.1/24

Scope: 10.8.100.50 – 10.8.100.150

Reservation: 10.8.100.151 – 10.8.100.175

A technician scans the network and receives the following results:

IP addresses used: 10.8.100.45 – 10.8.100.175

Which of the following should be done to ensure connectivity on all laptops?

Options:

A.

Increase the scope to 10.8.100.35 – 10.8.100.150


B.

Increase the scope to 10.8.100.40 – 10.8.100.150


C.

Increase the scope to 10.8.100.40 – 10.8.100.175


D.

Increase the scope to 10.8.100.50 – 10.8.100.175


Expert Solution
Questions # 72:

A company experiences an incident involving a user who connects an unmanaged switch to the network. Which of the following technologies should the company implement to help avoid similar incidents without conducting an asset inventory?

Options:

A.

Screened subnet


B.

802.1X


C.

MAC filtering


D.

Port security


Expert Solution
Questions # 73:

A network administrator determines that some switch ports have more errors present than expected. The administrator traces the cabling associated with these ports. Which of the following would most likely be causing the errors?

Options:

A.

arp


B.

tracert


C.

nmap


D.

ipconfig


Expert Solution
Questions # 74:

Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?

Options:

A.

Identify the problem.


B.

Develop a theory of probable cause.


C.

Test the theory to determine cause.


D.

Establish a plan of action.


Expert Solution
Questions # 75:

A support engineer is troubleshooting a network outage that is affecting 3,000 users. The engineer has isolated the issue to the internet firewall. Packet captures confirm that the firewall is blocking the traffic. Which of the following is the next step in troubleshooting?

Options:

A.

Implement the solution or escalate as necessary


B.

Create a plan of action to resolve the issue and identify potential effects


C.

Establish a theory of probable cause


D.

Document findings, actions, outcomes, and lessons learned throughout the process


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 61-75 out of questions