Practice Free N10-009 Exam Online Questions
Which of the following is the next step to take after successfully testing a root cause theory?
- A . Determine resolution steps.
- B . Duplicate the problem in a lab.
- C . Present the theory for approval.
- D . Implement the solution to the problem.
A
Explanation:
Troubleshooting Methodology:
Confirming the Root Cause: After testing and confirming the theory, the next logical step is to address the issue by implementing a solution.
Implementation of the Solution:
Resolve the Issue: Implement the identified solution to rectify the problem. This step involves making necessary changes to the network configuration, replacing faulty hardware, or applying software patches.
Documentation: Document the solution and the steps taken to resolve the issue to provide a reference for future troubleshooting.
Comparison with Other Steps:
Determine Resolution Steps: This is part of the implementation process where specific actions are outlined, but the actual next step after testing is to implement those steps.
Duplicate the Problem in a Lab: This step is typically done earlier in the troubleshooting process to understand the problem, not after confirming the root cause.
Present the Theory for Approval: In some scenarios, presenting the theory might be necessary for major changes, but generally, once the root cause is confirmed, the solution should be implemented.
Final Verification:
After implementing the solution, it is important to verify that the issue is resolved and that normal operations are restored. This may involve monitoring the network and testing to ensure no further issues arise.
Reference: CompTIA Network+ study materials on troubleshooting methodologies and best practices.
A network administrator needs to ensure all network ports use a security method that only permits authenticated devices.
The solution must meet the following requirements:
• Reduced chance of spoofing
• Centrally managed solution
• Auditable logs
Which of the following technologies provides this functionality?
- A . MAC filtering
- B . Port security
- C . ACLs
- D . 802.1X
D
Explanation:
A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address.
Which of the following should the administrator do to address the issue?
- A . Enable IP helper.
- B . Change the subnet mask.
- C . Increase the scope size.
- D . Add address exclusions.
C
Explanation:
The issue is that more students have arrived on campus, meaning the available IP addresses are exhausted. To fix this, the administrator should increase the DHCP scope size to allow more devices to obtain IP addresses.
Breakdown of Options:
As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch.
Which of the following types of attacks is this scenario an example of?
- A . ARP spoofing
- B . Evil twin
- C . MAC flooding
- D . DNS poisoning
C
Explanation:
Definition of MAC Flooding:
MAC flooding is an attack where a malicious actor sends numerous fake MAC addresses to a switch, overwhelming its CAM table. The CAM table stores MAC addresses and their associated ports for efficient traffic forwarding.
Impact of MAC Flooding:
CAM Table Overflow: When the CAM table is full, the switch cannot learn new MAC addresses and is forced to broadcast traffic to all ports, leading to a degraded network performance and potential data interception.
Switch Behavior: The switch operates in a fail-open mode, treating the network as a hub, which can be exploited for eavesdropping on traffic.
Comparison with Other Attacks:
ARP Spoofing: Involves sending false ARP (Address Resolution Protocol) messages to associate the attacker’s MAC address with the IP address of another device.
Evil Twin: Involves creating a rogue wireless access point that mimics a legitimate one to intercept data.
DNS Poisoning: Involves corrupting the DNS cache with false information to redirect traffic to malicious sites.
Preventive Measures:
Port Security: Configure port security on switches to limit the number of MAC addresses per port, preventing CAM table overflow.
Network Segmentation: Use VLANs to segment network traffic and limit the impact of such attacks.
Reference: CompTIA Network+ study materials on network security threats and mitigation techniques.
A network administrator is extending a network beyond the primary equipment location.
Which of the following is where the administrator should install additional network switches?
- A . MDF
- B . VPC
- C . VXLAN
- D . IDF
D
Explanation:
When extending a network beyond the primary equipment location, additional access/distribution switches are typically placed in an IDF (Intermediate Distribution Frame). Network+ (N10-009) infrastructure objectives differentiate between the MDF and IDF: the MDF is the main, central wiring/equipment location (often where core switches, routers, WAN demarcation, and main cross-connects reside). As a building grows or spans multiple floors/areas, an IDF is used as a secondary wiring closet to reduce cable runs, provide local switching, and aggregate user access connections back to the MDF using backbone cabling (often fiber). This supports scalability, cable management, and performance by keeping horizontal runs within recommended distance limits.
VPC (Virtual Private Cloud) is a cloud networking construct, not a physical wiring location. VXLAN is an overlay tunneling technology used in virtualized/data center networks, not where you physically install switches. The question specifically references extending the network beyond the primary equipment location, which is a classic use case for deploying an IDF to host additional switches closer to endpoint areas while uplinking back to the MDF.
Which of the following kinds of targeted attacks uses multiple computers or bots to request the same resource repeatedly?
- A . On-path
- B . DDoS
- C . ARP spoofing
- D . MAC flooding
B
Explanation:
A Distributed Denial of Service (DDoS) attack leverages multiple computers or bots (botnet) to flood a target system with requests, overwhelming its resources and making it unavailable to legitimate users. This is a common tactic used by attackers to disrupt services. The document explains:
“A DDoS (Distributed Denial of Service) attack involves multiple computers (often called bots) simultaneously sending requests to a single resource, overwhelming the system and causing a denial of service to legitimate users.”
A network technician is troubleshooting a faulty NIC and tests the theory.
Which of the following should the technician do next?
- A . Develop a theory.
- B . Establish a plan of action.
- C . Implement the solution.
- D . Document the findings.
C
Explanation:
Once the theory has been tested and confirmed, the next step is to implement the solution based on the CompTIA troubleshooting model.
CompTIA Troubleshooting Model:
Identify the problem.
Establish a theory of probable cause.
Test the theory.
Establish a plan of action and implement the solution. ✅ (Correct step)
Verify full system functionality.
Document findings, actions, and outcomes.
Breakdown of Options:
An investment bank is seeking a DR backup solution.
Which of the following provides the most cost-effective backup site?
- A . Hot
- B . Cold
- C . Cluster
- D . Warm
B
Explanation:
• Cold sites are the most cost-effective disaster recovery (DR) option since they require the least infrastructure investment. They provide space and power but no pre-configured systems.
• Hot sites (A) are fully operational and very expensive.
• Warm sites (D) offer some pre-configured hardware but still require setup, making them more costly than cold sites.
• Clusters (C) are active failover systems, not DR sites.
Reference: CompTIA Network+ N10-009 Official Documentation C Disaster Recovery & Business Continuity Planning.
Which of the following could provide a lightweight and private connection to a remote box?
- A . Site-to-site VPN
- B . Telnet
- C . Console
- D . Secure Shell
D
Explanation:
Secure Shell (SSH) is a protocol used to securely access remote devices over an unsecured network. It provides encrypted command-line access and is a lightweight and secure method of remote administration.
A network administrator is configuring a wireless network with an ESSID.
Which of the following is a user benefit of ESSID compared to SSID?
- A . Stronger wireless connection
- B . Roaming between access points
- C . Advanced security
- D . Increased throughput
B
Explanation:
An Extended Service Set Identifier (ESSID) allows multiple access points to share the same SSID, enabling seamless roaming for users. This means that users can move between different access points within the same ESSID without losing connection or having to reauthenticate. This provides a better user experience, especially in large environments such as office buildings or campuses.
Reference: CompTIA Network+ study materials.
