Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Network+ Certification Exam

Last Update 8 hours ago Total Questions : 537

The CompTIA Network+ Certification Exam content is now fully updated, with all current exam questions added 8 hours ago. Deciding to include N10-009 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our N10-009 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these N10-009 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA Network+ Certification Exam practice test comfortably within the allotted time.

Question # 4

A company upgrades its wireless infrastructure with a 1Gbps backbone, new APs, and new tablets for all employees. However, the IT department notes that speeds are not improved from the previous tablets. Given the following network information, which of the following is the most likely cause of the performance issues?

A.

AP 4 has no devices connected.

B.

Too many devices are causing congestion.

C.

APs do not have the correct VLAN assignment.

D.

Switch bandwidth is creating a bottleneck.

Question # 5

A user ' s VoIP phone and workstation are connected through an inline cable. The user reports that the VoIP phone intermittently reboots, but the workstation is not having any network-related issues Which of the following is the most likely cause?

A.

The PoE power budget is exceeded.

B.

Port security is violated.

C.

The signal is degraded

D.

The Ethernet cable is not working

Question # 6

Which of the following should a company implement in order to share a single IP address among all the employees in the office?

A.

STP

B.

BGP

C.

PAT

D.

VXLAN

Question # 7

Which of the following network ports is used when a client accesses an SFTP server?

A.

22

B.

80

C.

443

D.

3389

Question # 8

Which of the following is the next step to take after successfully testing a root cause theory?

A.

Determine resolution steps.

B.

Duplicate the problem in a lab.

C.

Present the theory for approval.

D.

Implement the solution to the problem.

Question # 9

Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?

A.

SSH

B.

TLS

C.

SCADA

D.

RADIUS

Question # 10

A firewall receives traffic on port 80 and forwards it to an internal server on port 88. Which of the following technologies is being leveraged?

A.

TLS

B.

FHRP

C.

SSL

D.

PAT

Question # 11

A Chief Executive Officer (CEO) of a company purchases a new phone that will be used while traveling to different countries. The CEO needs to be able to place outgoing calls and receive incoming calls on the phone using a SIM card. Which of the following cellular technologies does the CEO ' s phone need?

A.

WDMA

B.

CDMA

C.

GSM

D.

SLA

Question # 12

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses (one for a computer and one for a phone). Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Question # 13

Following a fire in a data center, the cabling was replaced. Soon after, an administrator notices network issues. Which of the following are the most likely causes of the network issues? (Select two).

A.

The switches are not the correct voltage.

B.

The HVAC system was not verified as fully functional after the fire.

C.

The VLAN database was not deleted before the equipment was brought back online.

D.

The RJ45 cables were replaced with unshielded cables.

E.

The wrong transceiver type was used for the new termination.

F.

The new RJ45 cables are a higher category than the old ones.

Question # 14

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers ' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Question # 15

A network administrator is setting up two new firewalls for redundancy and needs to implement a redundant internet connection. Which of the following routing technologies will the administrator most likely use?

A.

EIGRP

B.

RIPv2

C.

OSPF

D.

BGP

Go to page: