Practice Free N10-009 Exam Online Questions
A newly opened retail shop uses a combination of new tablets, PCs, printers, and legacy card readers.
Which of the following wireless encryption types is the most secure and compatible?
- A . WPA3
- B . WPA2
- C . WPA2/WPA3 mixed mode
- D . WPA/WPA2 mixed mode
C
Explanation:
WPA2/WPA3 mixed mode provides compatibility for older devices (that only support WPA2) while allowing newer devices to take advantage of stronger WPA3 encryption. This ensures maximum compatibility and security in a mixed-device environment.
A network technician is installing a new switch that does not support STP at the access layer of a network. The technician wants a redundant connection to the distribution switch.
Which of the following should the technician use?
- A . Link aggregation
- B . Sub interfaces
- C . Switch virtual interfaces
- D . Half-duplex connections
A
Explanation:
Link aggregation (also known as port channeling or EtherChannel) allows multiple physical connections to act as one logical connection. This avoids loops that would typically be prevented by STP and provides redundancy and increased bandwidth. It’s ideal when STP is not available or desirable.
Reference: Section 2.2 C Switching Technologies and Features C “Link Aggregation”
Which of the following routing protocols uses an autonomous system number?
- A . IS-IS
- B . EIGRP
- C . OSPF
- D . BGP
D
Explanation:
BGP (Border Gateway Protocol) uses an Autonomous System (AS) number for its operations. An AS is a collection of IP networks and routers under the control of a single organization that presents a common routing policy to the Internet. BGP is used to exchange routing information between different ASes on the Internet, making it the only protocol among the listed options that uses an AS number.
Reference: CompTIA Network+ study materials and RFC 4271.
A company’s Chief Information Security Officer requires that servers and firewalls have accurate timestamps when creating log files so that security analysts can correlate events during incident investigations.
Which of the following should be implemented?
- A . Syslog server
- B . SMTP
- C . SNMP
- D . NTP
D
Explanation:
NTP (Network Time Protocol) synchronizes clocks across network devices, ensuring accurate timestamps in logs. This is critical for correlating events across different systems during investigations.
Which of the following technologies is the best choice to listen for requests and distribute user traffic across web servers?
- A . Router
- B . Switch
- C . Firewall
- D . Load balancer
D
Explanation:
A load balancer is designed to distribute user requests across multiple servers to ensure high availability and performance.
Breakdown of Options:
Which of the following layers in the OSI model is responsible for establishing, maintaining, and terminating connections between nodes?
- A . Physical
- B . Network
- C . Session
- D . Transport
C
Explanation:
The Session Layer (Layer 5 of the OSI Model) is responsible for setting up, managing, and tearing down sessions between applications. It maintains dialog control and synchronizes data exchange between systems.
Reference: Section 1.1 C OSI Reference Model Concepts C “Layer 5 C Session”
A company’s VoIP phone connection is cutting in and out. A senior network engineer is recommending the implementation of a voice VLAN.
Which of the following should be configured?
- A . 802.1Q tagging
- B . Jumbo frames
- C . Native VLAN
- D . Link aggregation
A
Explanation:
Voice VLANs rely on 802.1Q tagging to separate voice traffic from data traffic on the same physical link. This separation allows QoS policies to prioritize VoIP, reducing jitter and packet loss.
B. Jumbo frames improve throughput for large data transfers, not voice.
C. Native VLAN is the untagged VLAN, not specifically for voice.
D. Link aggregation bundles links for bandwidth/redundancy, not QoS.
Reference (CompTIA Network+ N10-009):
Domain: Network Infrastructure ― VLANs, voice VLANs, 802.1Q tagging, QoS.
A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination.
Which of the following best describes the cause of this network traffic?
- A . Adware
- B . Ransomware
- C . Darkware
- D . Malware
D
Explanation:
Malware refers to any malicious software that can exfiltrate confidential data, including spyware, trojans, and rootkits. This fits the scenario where unauthorized data transfer is occurring.
Breakdown of Options:
After a recent merger, a large number of alerts are coming in regarding extremely high utilization.
Which of the following should be generated to help inform new alerting requirements?
- A . SLA
- B . Network diagram
- C . Baseline
- D . Heat map
C
Explanation:
A baseline establishes normal performance levels for network utilization, latency, jitter, and other metrics. After a merger, traffic patterns change, so a new baseline is needed to recalibrate monitoring thresholds and avoid excessive false alerts.
Two network switches at different locations are connected via fiber-optic cable at a distance of 10 miles (16 km). The duplex fiber-optic patch cord between the patch panel and switch is accidentally pinched, stopping connectivity between the two switches. A network technician replaces the broken cable with a new, single-mode patch cord. However, connectivity between both switches is still down and the link lights are still off.
Which of the following actions should the technician perform first?
- A . Replace the fiber-optic transceiver in the switch
- B . Log in to the switch to shut down and re-enable the switchport
- C . Transpose the two fiber connectors at one end of the new patch cord
- D . Swap the single-mode fiber patch cord with a multimode fiber patch cord
C
Explanation:
Fiber connections require Tx on one end to connect to Rx on the other end. If the patch cord is replaced and link lights remain off, the most common cause is that the connectors are reversed. Swapping (transposing) the connectors ensures proper transmit/receive alignment.
