Practice Free N10-009 Exam Online Questions
A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet.
Which of the following technologies should be implemented?
- A . ACL
- B . Trunking
- C . Port security
- D . Private VLAN
D
Explanation:
Private VLANs (PVLANs) are used to segment devices on the same subnet and switch so they cannot communicate with each other, while still accessing a shared resource like a router or gateway. This is often used in shared hosting or DMZ environments.
Which of the following ports should a network administrator enable for encrypted login to a network switch?
- A . 22
- B . 23
- C . 80
- D . 123
A
Explanation:
Port 22 is used for Secure Shell (SSH), which enables encrypted remote login and command execution on network devices.
Port 23 = Telnet (unencrypted)
Port 80 = HTTP
Port 123 = NTP
From Andrew Ramdayal’s guide:
“SSH uses port 22 to provide secure command-line access to devices such as switches and routers. Unlike Telnet (port 23), SSH encrypts session traffic, making it the preferred method for remote administration.”
A network administrator upgraded the wireless access points and wants to implement a configuration that will give users higher speed and less channel overlap based on device compatibility.
Which of the following will accomplish this goal?
- A . 802.1X
- B . MIMO
- C . ESSID
- D . Band steering
D
Explanation:
Band steering allows wireless access points to automatically direct capable devices to the 5GHz band, which typically has higher throughput and less interference than the 2.4GHz band, improving performance.
The document confirms:
“Band steering helps balance wireless client loads by steering dual-band capable devices to the 5GHz band, which offers higher speeds and less channel congestion than 2.4GHz.”
A company recently experienced outages of one of its critical, customer-facing applications. The root cause was an overutilized network router, but the Chief Technology Officer is concerned that the support staff was unaware of the issue until notified by customers.
Which of the following is the best way to address this issue in the future?
- A . Packet capture
- B . SNMP
- C . Syslog collector
- D . SIEM
B
Explanation:
The best answer is SNMP (Simple Network Management Protocol). SNMP enables monitoring of network devices (routers, switches, firewalls, servers) and provides performance data such as CPU usage, bandwidth utilization, and interface status. In this scenario, if SNMP monitoring had been in place, administrators would have received alerts that the router was overutilized before customers noticed outages.
A network administrator is responding to a request to configure a new IP phone.
Which of the following should the network administrator do to allow data and voice traffic to be properly prioritized?
- A . Configure full duplex.
- B . Modify QoS.
- C . Enable 802.1Q tagging.
- D . Change the native VLAN.
B
Explanation:
To ensure voice and data traffic are properly prioritized for an IP phone, the administrator should modify (configure) QoS. In Network+ (N10-009), QoS is the primary mechanism used to prioritize latency-sensitive traffic such as VoIP. By classifying and marking voice frames/packets (often using DSCP/CoS values) and applying priority queuing, the network ensures voice traffic experiences minimal delay and jitter even when links are congested. This is essential for call quality because voice is highly sensitive to variation in delivery time and packet loss.
An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules.
Which of the following ports should be open to satisfy the requirements?
- A . 110
- B . 143
- C . 587
- D . 636
C
Explanation:
Port 587 is the standard default port for sending email (SMTP) with TLS encryption, which is used to secure email transmissions between mail servers or between clients and mail servers. Allowing traffic over port 587 enables secure email sending while maintaining standard protocol usage. (Reference: CompTIA Network+ Study Guide, Chapter on Ports and Protocols)
Which of the following protocols is used to route traffic on the public internet?
- A . BGP
- B . OSPF
- C . EIGRP
- D . RIP
A
Explanation:
Border Gateway Protocol (BGP) is the primary protocol used to route traffic on the public internet. It allows ISPs and large networks to exchange routing information, making it an Exterior Gateway Protocol (EGP).
Breakdown of Options:
Which of the following protocols is used to route traffic on the public internet?
- A . BGP
- B . OSPF
- C . EIGRP
- D . RIP
A
Explanation:
Border Gateway Protocol (BGP) is the primary protocol used to route traffic on the public internet. It allows ISPs and large networks to exchange routing information, making it an Exterior Gateway Protocol (EGP).
Breakdown of Options:
Which of the following is most likely responsible for the security and handling of personal data in Europe?
- A . GDPR
- B . SCADA
- C . SAML
- D . PCI DSS
A
Explanation:
Definition of GDPR:
General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for all individuals within the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.
Scope and Objectives:
GDPR aims to give individuals control over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
It enforces rules about data protection, requiring companies to protect the personal data and privacy of EU citizens for transactions that occur within EU member states.
Comparison with Other Options:
SCADA (Supervisory Control and Data Acquisition): Refers to control systems used in industrial and infrastructure processes, not related to personal data protection.
SAML (Security Assertion Markup Language): A standard for exchanging authentication and authorization data between parties, not specifically for personal data protection.
PCI DSS (Payment Card Industry Data Security Standard): A set of security standards designed to ensure that all companies that accept, process, store or transmit credit card information maintain a secure environment, not specific to personal data protection in Europe.
Key Provisions:
GDPR includes provisions for data processing, data subject rights, obligations of data controllers and processors, and penalties for non-compliance.
Reference: CompTIA Network+ study materials on regulatory and compliance standards.
Voice traffic is experiencing excessive jitter. A network engineer wants to improve call performance and clarity.
Which of the following features should the engineer configure?
- A . QoS
- B . STP
A
Explanation:
Quality of Service (QoS) prioritizes delay-sensitive traffic such as VoIP by assigning higher priority in queues, reducing jitter, latency, and packet loss. Implementing QoS policies ensures stable and clear voice communication.
B. STP (Spanning Tree Protocol) prevents switching loops, but it does not address jitter or real-time traffic performance.
Reference (CompTIA Network+ N10-009):
Domain: Network Infrastructure ― QoS, traffic shaping, prioritization of voice/video.
