Practice Free N10-009 Exam Online Questions
An imaging workstation at a hospital is experiencing intermittent connectivity loss.
Which of the following would most likely be used to resolve the issue at the least expense?
- A . Single-mode fiber
- B . Twinaxial cable
- C . Spanning tree
- D . Shielded twisted pair
D
Explanation:
The correct answer is Shielded Twisted Pair (STP). According to the CompTIA Network+ N10-009 objectives, intermittent connectivity issues―especially in environments like hospitals―are often caused by electromagnetic interference (EMI) from medical imaging equipment, power systems, and other electronic devices. These environments are electrically noisy and can disrupt standard copper Ethernet cabling.
STP cabling is specifically designed to mitigate EMI by incorporating shielding around the twisted pairs. This shielding reduces external interference and improves signal stability without requiring a complete redesign of the network. Importantly, STP is significantly less expensive than deploying fiber-optic solutions while still being highly effective in environments prone to interference.
Single-mode fiber would eliminate EMI entirely, but it is far more costly due to specialized cabling, transceivers, and installation requirements. Twinaxial cable is typically used for short-distance, high-speed data center connections and is not appropriate for workstation connectivity. Spanning Tree Protocol (STP) is a Layer 2 loop-prevention protocol and has nothing to do with physical connectivity or interference issues.
The Network+ objectives stress choosing solutions that balance effectiveness, cost, and environmental suitability. In this case, upgrading to shielded twisted pair cabling provides the most practical and cost-effective resolution for intermittent connectivity in a hospital imaging environment.
An imaging workstation at a hospital is experiencing intermittent connectivity loss.
Which of the following would most likely be used to resolve the issue at the least expense?
- A . Single-mode fiber
- B . Twinaxial cable
- C . Spanning tree
- D . Shielded twisted pair
D
Explanation:
The correct answer is Shielded Twisted Pair (STP). According to the CompTIA Network+ N10-009 objectives, intermittent connectivity issues―especially in environments like hospitals―are often caused by electromagnetic interference (EMI) from medical imaging equipment, power systems, and other electronic devices. These environments are electrically noisy and can disrupt standard copper Ethernet cabling.
STP cabling is specifically designed to mitigate EMI by incorporating shielding around the twisted pairs. This shielding reduces external interference and improves signal stability without requiring a complete redesign of the network. Importantly, STP is significantly less expensive than deploying fiber-optic solutions while still being highly effective in environments prone to interference.
Single-mode fiber would eliminate EMI entirely, but it is far more costly due to specialized cabling, transceivers, and installation requirements. Twinaxial cable is typically used for short-distance, high-speed data center connections and is not appropriate for workstation connectivity. Spanning Tree Protocol (STP) is a Layer 2 loop-prevention protocol and has nothing to do with physical connectivity or interference issues.
The Network+ objectives stress choosing solutions that balance effectiveness, cost, and environmental suitability. In this case, upgrading to shielded twisted pair cabling provides the most practical and cost-effective resolution for intermittent connectivity in a hospital imaging environment.
A network administrator is troubleshooting a connectivity issue between two devices on two different subnets. The administrator verifies that both devices can successfully ping other devices on the same subnet.
Which of the following is the most likely cause of the connectivity issue?
- A . Incorrect default gateway
- B . Faulty Ethernet cable
- C . Wrong duplex settings
- D . VLAN mismatch
A
Explanation:
When two devices on different subnets are unable to communicate, but can communicate with other devices on their own subnet, the issue is most often related to routing. Devices on different subnets require a default gateway to route traffic between networks.
If the default gateway is incorrectly configured, the device won’t know how to reach other subnets.
Faulty cables (Option B) or duplex mismatches (Option C) would likely cause connectivity issues even within the local subnet, which is not the case here.
VLAN mismatches (Option D) are typically issues with switch port configurations and would likely cause total loss of connectivity, including within the same subnet.
✅ So, the most probable and logical cause is an incorrect default gateway.
Reference: CompTIA Network+ N10-009 Official Study Guide ― Objective 2.4: "Compare and contrast routing technologies."
After a security incident, a technician reveals that company data was stolen. During the investigation, it is discovered that a host disguised itself as a switch.
Which of the following best describes the attack that occurred?
- A . VLAN hopping
- B . Evil twin
- C . DNS poisoning
- D . ARP spoofing
A
Explanation:
VLAN hopping occurs when an attacker tricks a switch into believing the host is another switch by generating tagged frames or exploiting trunk negotiation (DTP). This allows the attacker to access traffic from multiple VLANs, potentially stealing sensitive data.
B. Evil twin is a rogue wireless AP attack, unrelated to switch impersonation.
C. DNS poisoning corrupts name resolution, not VLAN access.
D. ARP spoofing is a Layer 2 on-path attack, not masquerading as a switch.
Reference (CompTIA Network+ N10-009):
Domain: Network Security ― VLAN hopping attacks, switch spoofing techniques.
Which of the following OSI model layers can utilize a connectionless protocol for data transmission?
- A . Physical
- B . Network
- C . Transport
- D . Application
B
Explanation:
The Network layer (Layer 3 of the OSI model) can utilize the connectionless protocol IP (Internet Protocol) to send data packets independently without establishing a connection. This approach is typical for protocols like IP, which provide best-effort delivery rather than guaranteed delivery.
The document explains:
“The OSI Network Layer is responsible for logical addressing and routing, and it can utilize connectionless protocols like IP to send packets without requiring a session setup. This layer does not guarantee packet delivery, relying on higher layers for error detection or correction if needed.”
A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users.
Which of the following concepts describes this arrangement?
- A . Multitenancy
- B . VPC
- C . NFV
- D . SaaS
A
Explanation:
Multitenancy is a cloud computing architecture where a single instance of software serves multiple customers or tenants. Each tenant’s data is isolated and remains invisible to other tenants. Hosting a company application in the cloud to be available for both internal and third-party users fits this concept, as it allows shared resources and infrastructure while maintaining data separation and security.
Reference: CompTIA Network+ Exam Objectives and official study guides.
A new network is being created to support 126 users.
Which of the following CIDR ranges provides the most efficient use of space?
- A . 10.2.2.0/23
- B . 10.2.2.0/24
- C . 10.2.2.0/25
- D . 10.2.2.0/26
C
Explanation:
To support 126 users, the subnet must provide at least 126 usable host addresses. In IPv4 subnetting, usable hosts are calculated as: (2^(host bits)) − 2, subtracting the network and broadcast addresses.
A /25 leaves 7 host bits (because 32 − 25 = 7). That yields 2^7 = 128 total addresses, and 128 − 2 = 126 usable―an exact fit and therefore the most efficient option listed.
A /24 provides 256 total addresses and 254 usable, which would waste more addresses than necessary. A /23 provides 512 total addresses and 510 usable―far more waste. A /26 leaves 6 host bits, giving 64 total addresses and 62 usable, which is not enough for 126 users.
The 10.2.2.0 address is within the private 10.0.0.0/8 range, so it’s appropriate for internal addressing. Therefore, 10.2.2.0/25 is the correct CIDR range for efficiently supporting 126 hosts.
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential.
Which of the following will achieve this goal?
- A . GRE
- B . IKE
- C . ESP
- D . AH
C
Explanation:
Definition of ESP (Encapsulating Security Payload):
ESP is a part of the IPsec protocol suite designed to provide confidentiality, integrity, and authenticity of data by encrypting the payload and optional ESP trailer.
Ensuring Confidentiality:
Encryption: ESP encrypts the payload, ensuring that the data remains confidential during transmission. Only authorized parties with the correct decryption keys can access the data.
Modes of Operation: ESP can operate in transport mode (encrypts only the payload) or tunnel mode (encrypts the entire IP packet), both providing strong encryption to secure data between sites.
Comparison with Other Protocols:
GRE (Generic Routing Encapsulation): A tunneling protocol that does not provide encryption or security features.
IKE (Internet Key Exchange): A protocol used to set up a secure, authenticated communications channel, but it does not encrypt the data itself.
AH (Authentication Header): Provides integrity and authentication for IP packets but does not encrypt the payload.
Implementation:
Use ESP as part of an IPsec VPN configuration to encrypt and secure communication between two sites. This involves setting up IPsec policies and ensuring both endpoints are configured to use ESP for data encryption.
Reference: CompTIA Network+ study materials on IPsec and secure communication protocols.
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential.
Which of the following will achieve this goal?
- A . GRE
- B . IKE
- C . ESP
- D . AH
C
Explanation:
Definition of ESP (Encapsulating Security Payload):
ESP is a part of the IPsec protocol suite designed to provide confidentiality, integrity, and authenticity of data by encrypting the payload and optional ESP trailer.
Ensuring Confidentiality:
Encryption: ESP encrypts the payload, ensuring that the data remains confidential during transmission. Only authorized parties with the correct decryption keys can access the data.
Modes of Operation: ESP can operate in transport mode (encrypts only the payload) or tunnel mode (encrypts the entire IP packet), both providing strong encryption to secure data between sites.
Comparison with Other Protocols:
GRE (Generic Routing Encapsulation): A tunneling protocol that does not provide encryption or security features.
IKE (Internet Key Exchange): A protocol used to set up a secure, authenticated communications channel, but it does not encrypt the data itself.
AH (Authentication Header): Provides integrity and authentication for IP packets but does not encrypt the payload.
Implementation:
Use ESP as part of an IPsec VPN configuration to encrypt and secure communication between two sites. This involves setting up IPsec policies and ensuring both endpoints are configured to use ESP for data encryption.
Reference: CompTIA Network+ study materials on IPsec and secure communication protocols.
A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet.
Which of the following technologies should be implemented?
- A . ACL
- B . Trunking
- C . Port security
- D . Private VLAN
D
Explanation:
Private VLANs (PVLANs) are used to segment devices on the same subnet and switch so they cannot communicate with each other, while still accessing a shared resource like a router or gateway. This is often used in shared hosting or DMZ environments.
