Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the CompTIA CompTIA Network+ N10-009 Questions and answers with CertsForce

Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions
Questions # 121:

Which of the following routing technologies uses an attribute list for path selection?

Options:

A.

BGP


B.

RIP


C.

EIGRP


D.

OSPF


Expert Solution
Questions # 122:

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perfom this testing?

Options:

A.

Dig


B.

Ifconfig


C.

Ping


D.

nmap


Expert Solution
Questions # 123:

A network administrator prepares a VLAN for a new office while planning for minimal IP address waste. The new office will have approximately 800 workstations. Which of the following network schemes meets the requirements?

Options:

A.

10.0.100.0/22


B.

172.16.8.0/23


C.

172.16.15.0/20


D.

192.168.4.0/21


Expert Solution
Questions # 124:

A network analyst is installing a wireless network in a corporate environment. Employees are required to use their domain identities and credentials to authenticate and connect to the WLAN. Which of the following actions should the analyst perform on the AP to fulfill the requirements?

Options:

A.

Enable MAC security.


B.

Generate a PSK for each user.


C.

Implement WPS.


D.

Set up WPA3 protocol.


Expert Solution
Questions # 125:

A company is concerned that the public can use network wall jacks in publicly available conference rooms to access company servers. Which of the following is the best way to mitigate the vulnerability?

Options:

A.

Create a trusted zone.


B.

Disable unused services.


C.

Use MAC filtering.


D.

Implement 802.1X.


Expert Solution
Questions # 126:

A network administrator is setting up two new firewalls for redundancy and needs to implement a redundant internet connection. Which of the following routing technologies will the administrator most likely use?

Options:

A.

EIGRP


B.

RIPv2


C.

OSPF


D.

BGP


Expert Solution
Questions # 127:

Which of the following actions should be taken as part of the first step of the troubleshooting methodology?

Options:

A.

Conduct tests to verify ideas


B.

Handle multiple problems individually


C.

Create a theory about the possible root cause


D.

Use a top-down approach


Expert Solution
Questions # 128:

A network engineer adds a tunnel for a new branch network. Which of the following ensures that all data is encrypted inside the tunnel?

Options:

A.

ESP


B.

SSH


C.

GRE


D.

IKE


Expert Solution
Questions # 129:

A network technician is attempting to harden a commercial switch that was recently purchased. Which of the following hardening techniques best mitigates the use of publicly available information?

Options:

A.

Changing the default password


B.

Blocking inbound SSH connections


C.

Removing the gateway from the network configuration


D.

Restricting physical access to the switch


Expert Solution
Questions # 130:

After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?

Options:

A.

Implement DNS filtering.


B.

Update ACLs to only allow HTTPS.


C.

Configure new IPS hardware.


D.

Deploy 802.1X security features.


Expert Solution
Questions # 131:

A customer calls the help desk to report issues connection to the internet. The customer can reach a local database server. A technician goes to the site and examines the configuration:

Which of the following is causing the user ' s issue?

Options:

A.

Incorrect DNS


B.

Unreachable gateway


C.

Failed root bridge


D.

Poor upstream routing


Expert Solution
Questions # 132:

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

Options:

A.

NTP


B.

DNS


C.

LDAP


D.

DHCP


Expert Solution
Questions # 133:

An employee has a new laptop and reports slow performance when using the wireless network. Switch firmware was updated the previous night. A network administrator logs in to the switch and sees the following statistics on the switch interface for that employee:

98469 packets input, 1681937 bytes, 0 no buffer

Received 1548 broadcasts (25285 multicasts)

65335 runts, 0 giants, 0 throttles

11546 input errors, 5 CRC, 0 frame, 0 overrun, 0 ignored

0 input packets with dribble condition detected

22781 packets output, 858040 bytes, 0 underruns

0 output errors, 89920 collisions, 0 interface resets

0 babbles, 0 late collision, 0 deferred

0 lost carrier, 0 no carrier

0 output buffer failures, 0 output buffers swapped out

Which of the following is most likely the cause of the issue?

Options:

A.

The patch cord from the wall jack is faulty.


B.

The switchport bandwidth needs to be increased.


C.

Multicast is not configured correctly on the switch.


D.

The NIC is set to half duplex.


Expert Solution
Questions # 134:

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

Options:

A.

Stronger wireless connection


B.

Roaming between access points


C.

Advanced security


D.

Increased throughput


Expert Solution
Questions # 135:

Which of the following VPN types provides secure remote access to the network resources through a web portal?

Options:

A.

Proxy


B.

Clientless


C.

Site-to-site


D.

Direct connect


Expert Solution
Viewing page 9 out of 11 pages
Viewing questions 121-135 out of questions