Practice Free N10-009 Exam Online Questions
A network administrator is conducting an assessment and finds network devices that do not meet standards.
Which of the following configurations is considered a set of rules that devices should adhere to?
- A . Production
- B . Backup
- C . Candidate
- D . Golden
D
Explanation:
The correct answer is golden configuration. This is a reference standard or baseline that defines the approved settings and rules devices should follow. Any deviation from the golden configuration indicates drift or misconfiguration that must be remediated.
Which of the following allows a network administrator to analyze attacks coming from the internet without affecting latency?
- A . IPS
- B . IDS
- C . Load balancer
- D . Firewall
B
Explanation:
An IDS (Intrusion Detection System) is deployed out-of-band, meaning it passively monitors network traffic using a SPAN/mirror port or network tap. It detects and analyzes suspicious traffic without introducing latency since it does not sit in-line.
A network technician is requesting a fiber patch cord with a connector that is round and twists to install.
Which of the following is the proper name of this connector type?
- A . ST
- B . BNC
- C . SC
- D . LC
A
Explanation:
The ST (Straight Tip) fiber connector is round with a bayonet twist-lock mechanism. It is older but still used in some fiber installations.
B. BNC is a coaxial connector.
C. SC (Subscriber Connector) is a square push-pull fiber connector.
D. LC (Lucent Connector) is a small form-factor fiber connector.
Reference (CompTIA Network+ N10-009):
Domain: Networking Concepts ― Fiber connectors (ST, SC, LC).
Which of the following ports is a secure protocol?
- A . 20
- B . 23
- C . 443
- D . 445
C
Explanation:
Port 443 is used by HTTPS (Hypertext Transfer Protocol Secure), a secure version of HTTP that uses SSL/TLS to encrypt the communication between a client and server. This ensures confidentiality and integrity of data in transit.
The document states:
“Port 443 is the default port for HTTPS, which secures HTTP traffic using SSL/TLS, providing encryption and secure identification of web servers.”
Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?
- A . Establish a theory.
- B . Implement the solution.
- C . Create a plan of action.
- D . Verify functionality.
A
Explanation:
The CompTIA troubleshooting methodology includes steps like identifying the problem, establishing a theory of probable cause, testing the theory, creating a plan of action, implementing the solution, verifying functionality, and documenting findings. Establishing a theory involves analyzing the problem and considering possible causes, often by systematically checking each level of the OSI model (Physical, Data Link, Network, etc.) to pinpoint the root cause.
Why not Implement the solution? This step involves applying the fix, not analyzing the OSI model.
Why not Create a plan of action? This step focuses on planning the solution, not diagnosing the cause.
Why not Verify functionality? This step confirms the solution worked, not analyzing the OSI model.
Reference: CompTIA Network+ N10-009 Objective 5.2: Explain the troubleshooting methodology. The CompTIA Network+ Study Guide (e.g., Chapter 13: Network Troubleshooting) details the troubleshooting steps, noting that establishing a theory often involves using the OSI model to systematically identify the cause of network issues.
Which of the following routing protocols needs to have an autonomous system set in order to establish communication with neighbor devices?
- A . OSPF
- B . EIGRP
- C . FHRP
- D . RIP
B
Explanation:
EIGRP (Enhanced Interior Gateway Routing Protocol) is a Cisco proprietary advanced distance-vector routing protocol. While it operates within an Autonomous System (AS), it requires the AS number to be configured for routers to recognize each other as EIGRP neighbors.
OSPF (Open Shortest Path First) uses areas and routers must be in the same area to form adjacencies, but it doesn’t require AS numbers in the same way.
FHRP (First Hop Redundancy Protocol) is not a routing protocol but a group of protocols (e.g., HSRP, VRRP) to ensure high availability at the default gateway level.
RIP (Routing Information Protocol) does not use autonomous system numbers.
Reference: CompTIA Network+ N10-009 Official Objectives: 3.1 C Compare and contrast various routing
technologies.
A network engineer receives a vendor alert regarding a vulnerability in a router CPU.
Which of the following should the engineer do to resolve the issue?
- A . Update the firmware.
- B . Replace the system board.
- C . Patch the OS.
- D . Isolate the system.
A
Explanation:
Understanding the Vulnerability:
Vulnerabilities in the router CPU can be exploited to cause performance degradation, unauthorized access, or other security issues.
Firmware Update:
Firmware Role: The firmware is low-level software that controls the hardware of a device. Updating the firmware can address vulnerabilities by providing patches and enhancements from the manufacturer.
Procedure: Download the latest firmware from the vendor’s website, follow the manufacturer’s instructions to apply the update, and verify that the update resolves the vulnerability.
Comparison with Other Options:
Replace the System Board: This is a costly and often unnecessary step if the issue can be resolved with a firmware update.
Patch the OS: Patching the OS is relevant for devices with a full operating system but not directly applicable to addressing a CPU vulnerability on a router.
Isolate the System: Temporarily isolating the system can mitigate immediate risk but does not
resolve the underlying vulnerability.
Best Practice:
Regularly check for and apply firmware updates to ensure that network devices are protected against
known vulnerabilities.
Reference: CompTIA Network+ study materials on network security and device management.
A network engineer receives a vendor alert regarding a vulnerability in a router CPU.
Which of the following should the engineer do to resolve the issue?
- A . Update the firmware.
- B . Replace the system board.
- C . Patch the OS.
- D . Isolate the system.
A
Explanation:
Understanding the Vulnerability:
Vulnerabilities in the router CPU can be exploited to cause performance degradation, unauthorized access, or other security issues.
Firmware Update:
Firmware Role: The firmware is low-level software that controls the hardware of a device. Updating the firmware can address vulnerabilities by providing patches and enhancements from the manufacturer.
Procedure: Download the latest firmware from the vendor’s website, follow the manufacturer’s instructions to apply the update, and verify that the update resolves the vulnerability.
Comparison with Other Options:
Replace the System Board: This is a costly and often unnecessary step if the issue can be resolved with a firmware update.
Patch the OS: Patching the OS is relevant for devices with a full operating system but not directly applicable to addressing a CPU vulnerability on a router.
Isolate the System: Temporarily isolating the system can mitigate immediate risk but does not
resolve the underlying vulnerability.
Best Practice:
Regularly check for and apply firmware updates to ensure that network devices are protected against
known vulnerabilities.
Reference: CompTIA Network+ study materials on network security and device management.
A network engineer receives a vendor alert regarding a vulnerability in a router CPU.
Which of the following should the engineer do to resolve the issue?
- A . Update the firmware.
- B . Replace the system board.
- C . Patch the OS.
- D . Isolate the system.
A
Explanation:
Understanding the Vulnerability:
Vulnerabilities in the router CPU can be exploited to cause performance degradation, unauthorized access, or other security issues.
Firmware Update:
Firmware Role: The firmware is low-level software that controls the hardware of a device. Updating the firmware can address vulnerabilities by providing patches and enhancements from the manufacturer.
Procedure: Download the latest firmware from the vendor’s website, follow the manufacturer’s instructions to apply the update, and verify that the update resolves the vulnerability.
Comparison with Other Options:
Replace the System Board: This is a costly and often unnecessary step if the issue can be resolved with a firmware update.
Patch the OS: Patching the OS is relevant for devices with a full operating system but not directly applicable to addressing a CPU vulnerability on a router.
Isolate the System: Temporarily isolating the system can mitigate immediate risk but does not
resolve the underlying vulnerability.
Best Practice:
Regularly check for and apply firmware updates to ensure that network devices are protected against
known vulnerabilities.
Reference: CompTIA Network+ study materials on network security and device management.
Which of the following indicates a computer has reached end-of-support?
- A . The computer does not have any users.
- B . The antivirus protection is expired.
- C . The operating system license is expired.
- D . No more patches or bug fixes are available indefinitely.
D
Explanation:
A system has reached end-of-support when the vendor no longer provides patches, updates, or bug fixes. This significantly increases the risk of security vulnerabilities and is a major operational concern.
Reference: Section 3.3 C Disaster Recovery Concepts C “End-of-Support Considerations”
