Practice Free N10-009 Exam Online Questions
Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- A . Identify the problem.
- B . Develop a theory of probable cause.
- C . Test the theory to determine cause.
- D . Establish a plan of action.
D
Explanation:
A Change Advisory Board (CAB) reviews and approves network changes. Before approval, they need a detailed action plan outlining the change, potential impacts, and mitigation strategies.
A Plan of Action includes risk assessments, rollback procedures, and deployment steps, which are critical for decision-making.
Reference: CompTIA Network+ (N10-009) Official Study Guide C Section: Network Troubleshooting Methodologies
Which of the following troubleshooting steps would provide a change advisory board with the information needed to make a decision?
- A . Identify the problem.
- B . Develop a theory of probable cause.
- C . Test the theory to determine cause.
- D . Establish a plan of action.
D
Explanation:
A Change Advisory Board (CAB) reviews and approves network changes. Before approval, they need a detailed action plan outlining the change, potential impacts, and mitigation strategies.
A Plan of Action includes risk assessments, rollback procedures, and deployment steps, which are critical for decision-making.
Reference: CompTIA Network+ (N10-009) Official Study Guide C Section: Network Troubleshooting Methodologies
A systems administrator needs to connect two laptops to a printer via Wi-Fi. The office does not have
access points and cannot purchase any.
Which of the following wireless network types best fulfills this requirement?
- A . Mesh
- B . Infrastructure
- C . Ad hoc
- D . Point-to-point
C
Explanation:
Comprehensive and Detailed Explanation (aligned to N10-009):
An ad hoc wireless network allows devices to connect directly to each other without an access point.
This is suitable for small, temporary setups like two laptops and a printer.
A network engineer adds a tunnel for a new branch network.
Which of the following ensures that all data is encrypted inside the tunnel?
- A . ESP
- B . SSH
- C . GRE
- D . IKE
A
Explanation:
ESP (Encapsulating Security Payload) is an IPsec protocol that provides encryption, integrity, and authentication for data inside a VPN tunnel. It ensures that all tunneled traffic is encrypted.
B. SSH secures remote terminal sessions, not site-to-site VPN tunnels.
C. GRE (Generic Routing Encapsulation) provides encapsulation but does not encrypt data.
D. IKE (Internet Key Exchange) negotiates keys and establishes the IPsec tunnel but does not encrypt the payload itself.
Reference (CompTIA Network+ N10-009):
Domain: Network Security ― VPN protocols, IPsec (AH vs. ESP), encryption in transit.
Which of the following services runs on port 636?
- A . SMTP
- B . Syslog
- C . TFTP
- D . LDAPS
D
Explanation:
LDAP over SSL (LDAPS) uses port 636 to provide secure, encrypted authentication for directory services.
Breakdown of Options:
A network manager connects two switches together and uses two connecting links.
Which of the following configurations will prevent Layer 2 loops?
- A . 802.1Q tagging
- B . Full duplex
- C . Link aggregation
- D . QoS
C
Explanation:
Link aggregation (also known as port trunking or EtherChannel) combines multiple network connections in parallel to increase throughput and provide redundancy. When two switches are connected with multiple links without any additional configuration, a Layer 2 loop may occur. Link aggregation prevents these loops by treating the multiple connections as a single logical link, using a protocol such as LACP (Link Aggregation Control Protocol).
From Andrew Ramdayal’s guide:
“Link aggregation allows you to combine multiple network connections to increase the bandwidth
and provide redundancy. It helps prevent Layer 2 loops when connecting switches with multiple links by making them operate as a single logical interface.”
Which of the following could provide a lightweight and private connection to a remote box?
- A . Site-to-site VPN
- B . Telnet
- C . Console
- D . Secure Shell
D
Explanation:
Secure Shell (SSH) is a protocol used to securely access remote devices over an unsecured network. It provides encrypted command-line access and is a lightweight and secure method of remote administration.
Which of the following is enforced through legislation?
- A . AUP
- B . GDPR
- C . Code of conduct
- D . EULA
B
Explanation:
GDPR (General Data Protection Regulation) is a legal framework enforced by the European Union to protect personal data and privacy. Unlike internal organizational policies such as AUPs or codes of conduct, GDPR is a legislated regulation, and organizations must comply or face legal consequences.
Reference: Section 4.1 C Basic Network Security Concepts C “GDPR and Compliance Regulations”
A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly.
Which of the following should the network engineer complete to resolve this issue?
- A . Enable a PTR record.
- B . Update the existing TXT record.
- C . Add a new AAAA record.
- D . Configure a secondary NS record.
C
Explanation:
• AAAA records map domain names to IPv6 addresses, enabling proper resolution.
• PTR records (A) are for reverse DNS lookups.
• TXT records (B) store text-based information, not IP addresses.
• NS records (D) define authoritative name servers but don’t directly affect IPv6 resolution.
Reference: CompTIA Network+ N10-009 Official Documentation C DNS Configuration & IPv6.
A government entity wants to implement technology that can block websites based on country code.
Which of the following will best enable this requirement?
- A . URL filtering
- B . Content filtering
- C . DNS poisoning
- D . MAC filtering
A
Explanation:
URL filtering can block access to websites based on their domain or country code TLDs (e.g., .cn, .ru).
This is the correct method to block by location identifiers in URLs.
B. Content filtering blocks based on keywords or categories within websites, not country code.
C. DNS poisoning is an attack, not a control mechanism.
D. MAC filtering restricts devices, not websites.
Reference (CompTIA Network+ N10-009):
Domain: Network Security ― Filtering technologies, URL vs content filtering.
