Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the CompTIA Network+ N10-009 Questions and answers with ValidTests

Exam N10-009 All Questions
Exam N10-009 Premium Access

View all detail and faqs for the N10-009 exam

Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions
Questions # 76:

A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

Options:

A.

F-type

B.

RJ11

C.

BNC

D.

SC

Expert Solution
Questions # 77:

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

Options:

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Expert Solution
Questions # 78:

Which of the following is associated with avoidance, acceptance, mitigation, and transfer?

Options:

A.

Risk

B.

Exploit

C.

Threat

D.

Vulnerability

Expert Solution
Questions # 79:

An IT department asks a newly hired employee to use a personal laptop until the company can provide one. Which of the following policies is most applicable to this situation?

Options:

A.

IAM

B.

BYOD

C.

DLP

D.

AUP

Expert Solution
Questions # 80:

Which of the following explains what happens if a packet is lost in transit when using UDP?

Options:

A.

The data link layer will recognize the error and resend the packet.

B.

IP uses the TTL field to track packet hops and will resend the packet if necessary.

C.

If the sender does not receive a UDP acknowledgement, the packet will be resent.

D.

Some applications will recognize the loss and initiate a resend of the packet if necessary.

Expert Solution
Questions # 81:

Several users in an organization report connectivity issues and lag during a video meeting. The network administrator performs a tcpdump and observes increased retransmissions for other non-video applications on the network. Which of the following symptoms describes the users' reported issues?

Options:

A.

Latency

B.

Packet loss

C.

Bottlenecking

D.

Jitter

Expert Solution
Questions # 82:

A user reports having intermittent connectivity issues to the company network. The network configuration for the user reveals the following:

IP address: 192.168.1.10

Subnet mask: 255.255.255.0

Default gateway: 192.168.1.254

The network switch shows the following ARP table:

Question # 82

Which of the following is the most likely cause of the user's connection issues?

Options:

A.

A port with incorrect VLAN assigned

B.

A switch with spanning tree conflict

C.

Another PC with manually configured IP

D.

A router with overlapping route tables

Expert Solution
Questions # 83:

A network technician is troubleshooting the connection to the company website. The traceroute command produces the following output:

Traceroute towww.mysite.com(8.8.8.8) over a maximum of 30 hops

10.1.1.1 <1 ms 2. * <1 ms <1 ms

k k

k kTraceroute completeWhich of the following should the technician do to identify the path to the server?

Options:

A.

Review the router's ACL.

B.

Execute netstat.

C.

Perform an nslookup.

D.

Enable LLDP.

Expert Solution
Questions # 84:

Which of the following best explains the role of confidentiality with regard to data at rest?

Options:

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Expert Solution
Questions # 85:

An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?

Options:

A.

TXT

B.

AAAA

C.

CNAME

D.

MX

Expert Solution
Questions # 86:

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

Options:

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Expert Solution
Questions # 87:

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?

Options:

A.

Clientless

B.

Client-to-site

C.

Full tunnel

D.

Site-to-site

Expert Solution
Questions # 88:

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the

correct settings:

· Ensure each device accesses only its

correctly associated network.

· Disable all unused switchports.

. Require fault-tolerant connections

between the switches.

. Only make necessary changes to

complete the above requirements.

Question # 88

Question # 88

Question # 88

Question # 88

Question # 88

Question # 88

Question # 88

Options:

Expert Solution
Questions # 89:

A company's marketing team created a new application and would like to create a DNS record for newapplication.comptia.org that always resolves to the same address as www.comptia.org. Which of the following records should the administrator use?

Options:

A.

SOA

B.

MX

C.

CNAME

D.

NS

Expert Solution
Questions # 90:

A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss. Which of the following is the best way for the engineer to implement the IDS?

Options:

A.

Use a network tap.

B.

Use Nmap software.

C.

Use a protocol analyzer.

D.

Use a port mirror.

Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 76-90 out of questions