Practice Free N10-009 Exam Online Questions
Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.
- A . IAM
- B . MFA
- C . RADIUS
- D . SAML
D
Explanation:
Security Assertion Markup Language (SAML) is an XML-based standard used for exchanging authentication and authorization data between parties, particularly between an identity provider (IdP) and a service provider (SP). SAML is commonly used in Single Sign-On (SSO) solutions to pass sensitive user information, such as login credentials and attributes, securely between the identity provider and the service provider.
SAML (Security Assertion Markup Language): Facilitates web-based authentication and authorization, allowing users to access multiple services with a single set of credentials.
XML-based: Uses XML to encode the authentication and authorization data, ensuring secure transmission of user information.
Identity Federation: Enables secure sharing of identity information across different security domains, making it ideal for enterprise SSO solutions.
Network
Reference: CompTIA Network+ N10-007 Official Certification Guide: Covers authentication protocols, including SAML.
Cisco Networking Academy: Provides training on identity management and federation technologies.
Network+ Certification All-in-One Exam Guide: Explains SAML and its role in secure identity management and SSO.
Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.
- A . IAM
- B . MFA
- C . RADIUS
- D . SAML
D
Explanation:
Security Assertion Markup Language (SAML) is an XML-based standard used for exchanging authentication and authorization data between parties, particularly between an identity provider (IdP) and a service provider (SP). SAML is commonly used in Single Sign-On (SSO) solutions to pass sensitive user information, such as login credentials and attributes, securely between the identity provider and the service provider.
SAML (Security Assertion Markup Language): Facilitates web-based authentication and authorization, allowing users to access multiple services with a single set of credentials.
XML-based: Uses XML to encode the authentication and authorization data, ensuring secure transmission of user information.
Identity Federation: Enables secure sharing of identity information across different security domains, making it ideal for enterprise SSO solutions.
Network
Reference: CompTIA Network+ N10-007 Official Certification Guide: Covers authentication protocols, including SAML.
Cisco Networking Academy: Provides training on identity management and federation technologies.
Network+ Certification All-in-One Exam Guide: Explains SAML and its role in secure identity management and SSO.
A company is expanding to another floor in the same building. The network engineer configures a new switch with the same VLANs as the existing stack. When the network engineer connects the new switch to the existing stack, all users lose connectivity.
Which of the following is the MOST likely reason?
- A . The new switch has unused ports disabled
- B . The new switch does not have a default gateway
- C . The new switch is connected to an access port
- D . The new switch is in a spanning tree loop
D
Explanation:
This describes a Spanning Tree Protocol (STP) loop. If STP isn’t correctly configured or a redundant link is added without STP protection, it causes broadcast storms and network outages.
A network engineer needs to change, update, and control APs remotely, with real-time visibility over HTTPS.
Which of the following will best allow these actions?
- A . Web interface
- B . Command line
- C . SNMP console
- D . API gateway
D
Explanation:
API gateways offer programmable control and real-time communication, commonly over HTTPS, which allows administrators to update and manage devices like access points remotely and efficiently.
From Andrew Ramdayal’s guide:
“APIs enable automation and real-time interaction with network devices via secure interfaces, often using HTTPS for encrypted communication and control.”
Three new employees report that they are unable to access company resources, but they can connect to each other’s devices.
Which of the following would most likely need to be modified to resolve the issue?
- A . The routing table on the gateway
- B . The DNS configuration on the router
- C . The pool on the DHCP server
- D . The firewall on the workstation
C
Explanation:
If the three new employees can communicate with each other’s devices, that strongly suggests their local Layer 2/Layer 3 connectivity is working (same VLAN/subnet, switching is fine, and they have IP addressing that allows local communication). The fact that they cannot access company resources (often on other subnets, servers, or the internet via internal routing) points to a problem with how these new endpoints are being addressed or routed beyond their local segment.
The most likely shared root cause affecting only “new employees” is DHCP scope/pool configuration. If the DHCP pool is exhausted, mis-scoped, or handing out incorrect options (such as an incorrect default gateway, wrong subnet mask, or an address range tied to an isolated VLAN), users could still talk locally but fail to reach resources outside their subnet. Modifying the DHCP server pool (expanding the scope, correcting the scope network, or ensuring the correct options are assigned) would resolve this with minimal changes.
A gateway routing table issue would typically affect many users, not just three new ones. DNS misconfiguration on the router would more commonly cause name-resolution problems, not block all resource access (and wouldn’t be isolated to only new employees). A workstation firewall would not usually prevent access to “company resources” in a way that consistently affects three new devices while still allowing peer connectivity.
A network consultant needs to decide between running an ethernet uplink or using the built-in 5GHz-to-point functionality on a WAP.
Which of the following documents provides the best information to assist the consultant with this decision?
- A . Site survey results
- B . Physical diagram
- C . Service-level agreement
- D . Logical diagram
Which of the following should be configured so users can authenticate to a wireless network using company credentials?
- A . SSO
- B . SAML
- C . MFA
- D . RADIUS
D
Explanation:
RADIUS (Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service. RADIUS is often used to manage access to wireless networks, enabling users to authenticate with their company credentials, ensuring secure access to the network.
Reference: CompTIA Network+ study materials.
