Practice Free N10-009 Exam Online Questions
An organization wants to ensure that incoming emails were sent from a trusted source.
Which of the following DNS records is used to verify the source?
- A . TXT
- B . AAAA
- C . CNAME
- D . MX
A
Explanation:
A TXT record can be used to store SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) information, which help verify that an email has been sent from a trusted source.
A network engineer adds a tunnel for a new branch network.
Which of the following ensures that all data is encrypted inside the tunnel?
- A . ESP
- B . SSH
- C . GRE
- D . IKE
A
Explanation:
ESP (Encapsulating Security Payload) is an IPsec protocol that provides encryption, integrity, and authentication for data inside a VPN tunnel. It ensures that all tunneled traffic is encrypted.
B. SSH secures remote terminal sessions, not site-to-site VPN tunnels.
C. GRE (Generic Routing Encapsulation) provides encapsulation but does not encrypt data.
D. IKE (Internet Key Exchange) negotiates keys and establishes the IPsec tunnel but does not encrypt the payload itself.
Reference (CompTIA Network+ N10-009):
Domain: Network Security ― VPN protocols, IPsec (AH vs. ESP), encryption in transit.
Which of the following types of routes takes precedence when building a routing table for a given subnet?
- A . Static
- B . BGP
- C . OSPF
- D . Default
A
Explanation:
The correct answer is Static because static routes have a lower administrative distance (AD) than most dynamic routing protocols, giving them higher priority when a router selects routes for the same destination network. According to CompTIA Network+ (N10-009) routing objectives, administrative distance is used to determine the trustworthiness of a route source when multiple routing protocols provide a path to the same subnet. The lower the administrative distance, the more preferred the route.
By default, a static route has an administrative distance of 1, which is lower than OSPF (110) and BGP (20 for eBGP, 200 for iBGP). Because of this, when identical routes to a subnet exist from both static and dynamic sources, the router installs the static route in the routing table.
A default route (0.0.0.0/0) is only used when no more specific route exists and does not take precedence over specific static or dynamic routes.
Therefore, when building the routing table for a given subnet and comparing route sources, static routes take precedence due to their lower administrative distance.
An administrator is setting up an SNMP server for use in the enterprise network and needs to create device IDs within a MIB.
Which of the following describes the function of a MIB?
- A . DHCP relay device
- B . Policy enforcement point
- C . Definition file for event translation
- D . Network access controller
C
Explanation:
MIB (Management Information Base): A MIB is a database used for managing the entities in a communication network. The MIB is used by Simple Network Management Protocol (SNMP) to translate events into a readable format, enabling network administrators to manage and monitor network devices effectively.
Function of MIB: MIBs contain definitions and information about all objects that can be managed on a network using SNMP. These objects are defined using a hierarchical namespace containing object identifiers (OIDs).
CompTIA Network+ materials discussing SNMP and MIB functionality .
A technician needs to set up a wireless connection that utilizes MIMO on non-overlapping channels.
Which of the following would be the best choice?
- A . 802.11a
- B . 802.11b
- C . 802.11g
- D . 802.11n
D
Explanation:
The 802.11n standard supports MIMO (Multiple Input Multiple Output), which allows multiple antennas to increase data throughput and improve reliability. Additionally, it uses non-overlapping channels in the 5 GHz band (and optionally the 2.4 GHz band), making it a good choice for high-speed, interference-resistant wireless connections. (Reference: CompTIA Network+ Study Guide, Chapter on Wireless Technologies)
Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?
- A . Jump box
- B . Console server
- C . API interface
- D . In-band management
A
Explanation:
A jump box is a hardened, isolated system that provides secure access to critical infrastructure devices like routers and firewalls.
Reference: CompTIA Network+ (N10-009) Official Study Guide C Domain 4.3: Explain network security techniques.
A user tries to visit a website, but instead of the intended site, the page displays vmw.cba.com.
Which of the following should be done to reach the correct website?
- A . Modify the CNAME record
- B . Update the PTR record
- C . Change the NTP settings
- D . Delete the TXT record
A
Explanation:
A CNAME (Canonical Name) record maps an alias to the correct fully qualified domain name (FQDN).
If a user is redirected to the wrong hostname, correcting or updating the CNAME ensures the alias points to the proper domain.
B. PTR record maps IP to hostname (reverse DNS), not forward website resolution.
C. NTP relates to time sync, irrelevant to DNS resolution.
D. TXT record stores metadata like SPF or DKIM info, not used for hostname aliasing.
Reference (CompTIA Network+ N10-009):
Domain: Network Standards, Protocols, and Implementations ― DNS record types (A, AAAA, CNAME, PTR, TXT).
Which of the following would be violated if an employee accidentally deleted a customer’s data?
- A . Integrity
- B . Confidentiality
- C . Vulnerability
- D . Availability
D
Explanation:
Availability refers to ensuring that data is accessible when needed. If a customer’s data is accidentally deleted, it impacts availability, as the data can no longer be accessed.
A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use.
Which of the following prefixes would fulfill this need?
- A . /23
- B . /25
- C . /29
- D . /32
A
Explanation:
A /23 subnet provides 512 total addresses, of which 510 are usable (subtracting 2 for network and broadcast addresses). This would satisfy the need for 255 additional addresses.
Which of the following is used to describe the average duration of an outage for a specific service?
- A . RPO
- B . MTTR
- C . RTO
- D . MTBF
B
Explanation:
MTTR (Mean Time to Repair) is the average time it takes to repair a system or service after a failure.
It helps in measuring the downtime and planning recovery processes.
