Practice Free N10-009 Exam Online Questions
After a company installed a new IPS, the network is experiencing speed degradation. A network
administrator is troubleshooting the issue and runs a speed test.
The results from the different network locations are as follows:
Location Speed Down Speed Up
Wireless laptop4.8 Mbps47.1 Mbps
Wired desktop5.2 Mbps49.3 Mbps
Firewall48.8 Mbps49.5 Mbps
Which of the following is the most likely issue?
- A . Packet loss
- B . Bottlenecking
- C . Channel overlap
- D . Network congestion
B
Explanation:
Bottlenecking occurs when a device in the network (such as an IPS) cannot process traffic efficiently, resulting in a dramatic drop in throughput. The significant difference between the firewall’s speed (48.8 Mbps down) and the end-user devices’ speeds (4.8 – 5.2 Mbps down) indicates a bottleneck caused by the IPS.
• Why not the other options?
• Packet loss (A) C Would typically cause connection timeouts, not just slow speeds.
• Channel overlap (C) C Affects only wireless networks, but the wired desktop is also experiencing slow speeds.
• Network congestion (D) C Would show fluctuations in both upload and download speeds, but upload speeds remain unaffected.
Reference: CompTIA Network+ (N10-009) Official Guide C Chapter 13: Network Performance Optimization
Which of the following would most likely be utilized to implement encryption in transit when using HTTPS?
- A . SSH
- B . TLS
- C . SCADA
- D . RADIUS
B
Explanation:
TLS (Transport Layer Security) is the protocol that provides encryption in transit for HTTPS. It ensures data is encrypted between the client (browser) and the web server, protecting it from interception or tampering.
168.100.1/25. However, the firewall software only uses dotted decimal notation in configuration fields.
Which of the following is the correct subnet mask to use?
- A . 255.255.254.0
- B . 255.255.255.1
- C . 255.255.255.128
- D . 255.255.255.192
C
Explanation:
A /25 subnet mask means 25 bits are reserved for the network portion, leaving 7 bits for host addresses. In dotted decimal, that is:
A network engineer wants to implement a new IDS between the switch and a router connected to the LAN. The engineer does not want to introduce any latency by placing the IDS in line with the gateway. The engineer does want to ensure that the IDS sees all packets without any loss.
Which of the following is the best way for the engineer to implement the IDS?
- A . Use a network tap.
- B . Use Nmap software.
- C . Use a protocol analyzer.
- D . Use a port mirror.
D
Explanation:
Reference: CompTIA Network+ Certification Exam Objectives – Network Security section.
A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers.
Which of the following should the company most likely implement?
- A . ACLs
- B . Content filter
- C . Port security
- D . Screened subnet
B
Explanation:
A content filter blocks access to specific websites based on category, URL, or keywords. This is the best solution to restrict gambling websites.
Breakdown of Options:
Which of the following can be implemented to add an additional layer of security between a corporate network and network management interfaces?
- A . Jump box
- B . Console server
- C . API interface
- D . In-band management
A
Explanation:
A jump box is a hardened, isolated system that provides secure access to critical infrastructure devices like routers and firewalls.
Reference: CompTIA Network+ (N10-009) Official Study Guide C Domain 4.3: Explain network security techniques.
An organization wants to ensure that incoming emails were sent from a trusted source.
Which of the following DNS records is used to verify the source?
- A . TXT
- B . AAAA
- C . CNAME
- D . MX
A
Explanation:
A TXT record can be used to store SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) information, which help verify that an email has been sent from a trusted source.
A client with a 2.4GHz wireless network has stated that the entire office is experiencing intermittent issues with laptops after the WAP was moved.
Which of the following is the most likely reason for these issues?
- A . The network uses a non-overlapping channel.
- B . The signal is reflecting too much.
- C . The network has excessive noise.
- D . A microwave is in the office.
D
Explanation:
Microwaves are known to interfere with the 2.4GHz frequency, which is the same frequency used by many wireless networks. This can cause signal degradation and intermittent connectivity issues, especially if the WAP is placed near such devices.
Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity.
Which of the following features should the engineer configure?
- A . QoS
- B . STP
A
Quality of Service (QoS) prioritizes delay-sensitive traffic such as VoIP by assigning higher priority in queues, reducing jitter, latency, and packet loss. Implementing QoS policies ensures stable and clear voice communication.
B. STP (Spanning Tree Protocol) prevents switching loops, but it does not address jitter or real-time traffic performance.
Reference (CompTIA Network+ N10-009):
Domain: Network Infrastructure ― QoS, traffic shaping, prioritization of voice/video.
Which of the following network ports is used when a client accesses an SFTP server?
- A . 22
- B . 80
- C . 443
- D . 3389
A
Explanation:
SFTP (Secure File Transfer Protocol) operates over port 22, using SSH (Secure Shell) encryption for secure file transfers.
Breakdown of Options:
