N10-009Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 1

SIMULATION -

A network technician replaced an access layer switch and needs to reconfigure it to allow the connected devices to connect to the correct networks.

INSTRUCTIONS -

Click on the appropriate port(s) on Switch 1 and Switch 3 to verify or reconfigure the correct settings:
Ensure each device accesses only its correctly associated network.
Disable all unused switchports.
Require fault-tolerant connections between the switches.
Only make necessary changes to complete the above requirements.
If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Image 1 Image 2 Image 3 Image 4 Image 5 Image 6 Image 7 Image 8 Image 9 Image 10 Image 11 Image 12 Image 13 Image 14 Image 15 Image 16

Question 2

Which of the following technologies are X.509 certificates most commonly associated with?

  • A: PKI
  • B: VLAN tagging
  • C: LDAP
  • D: MFA

Question 3

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

  • A: SNMP trap
  • B: Port mirroring
  • C: Syslog collection
  • D: API integration

Question 4

Which of the following most likely requires the use of subinterfaces?

  • A: A router with only one available LAN port
  • B: A firewall performing deep packet inspection
  • C: A hub utilizing jumbo frames
  • D: A switch using Spanning Tree Protocol

Question 5

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

  • A: MAC security
  • B: Content filtering
  • C: Screened subnet
  • D: Perimeter network

Question 6

Which of the following requires network devices to be managed using a different set of IP addresses?

  • A: Console
  • B: Split tunnel
  • C: Jump box
  • D: Out of band

Question 7

A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?

  • A: Neighbor adjacency
  • B: Link state flooding
  • C: Administrative distance
  • D: Hop count

Question 8

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?

  • A: Duplicate the problem.
  • B: Identify the symptoms.
  • C: Gather information.
  • D: Determine any changes.

Question 9

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

  • A: 4096
  • B: 8192
  • C: 32768
  • D: 36684

Question 10

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

  • A: Stronger wireless connection
  • B: Roaming between access points
  • C: Advanced security
  • D: Increased throughput

Question 11

A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space. Which of the following subnets should the administrator use?

  • A: /24
  • B: /26
  • C: /28
  • D: /30

Question 12

An attacker follows an employee through a badge-secured door before the door closes. Which of the following types of attacks is occurring?

  • A: Shoulder surfing
  • B: Tailgating
  • C: Phishing
  • D: On-path

Question 13

A network administrator wants to implement an authentication process for temporary access to an organization's network. Which of the following technologies would facilitate this process?

  • A: Captive portal
  • B: Enterprise authentication
  • C: Ad hoc network
  • D: WPA3

Question 14

A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?

  • A: 802.1Q tagging
  • B: Network address translation
  • C: Port duplex
  • D: Link aggregation

Question 15

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

  • A: Trunk all VLANs on the port.
  • B: Configure the native VLAN.
  • C: Tag the traffic to voice VLAN.
  • D: Disable VLANs.

Question 16

Which of the following can support a jumbo frame?

  • A: Access point
  • B: Bridge
  • C: Hub
  • D: Switch

Question 17

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?

  • A: NTP
  • B: DNS
  • C: LDAP
  • D: DHCP

Question 18

A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential. Which of the following will achieve this goal?

  • A: GRE
  • B: IKE
  • C: ESP
  • D: AH

Question 19

Which of the following protocols has a default administrative distance value of 90?

  • A: RIP
  • B: EIGRP
  • C: OSPF
  • D: BGP

Question 20

An office is experiencing intermittent connection issues. A network engineer identifies that the issue occurs whenever someone uses the fax machine that is connected to a switch. Which of the following should the engineer do first to resolve the issue?

  • A: Run a new Cat 5 line.
  • B: Enable 802.1Q tagging.
  • C: Change the MTU.
  • D: Configure a VLAN.

Question 21

A network engineer receives a vendor alert regarding a vulnerability in a router CPU. Which of the following should the engineer do to resolve the issue?

  • A: Update the firmware.
  • B: Replace the system board.
  • C: Patch the OS.
  • D: Isolate the system.

Question 22

Which of the following fiber connector types is the most likely to be used on a network interface card?

  • A: LC
  • B: SC
  • C: ST
  • D: MPO

Question 23

Which of the following connectors provides console access to a switch?

  • A: ST
  • B: RJ45
  • C: BNC
  • D: SFP

Question 24

A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?

  • A: Hosts file
  • B: Self-signed certificate
  • C: Nameserver record
  • D: IP helper

Question 25

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Choose two.)

  • A: Mesh network
  • B: 5GHz frequency
  • C: Omnidirectional antenna
  • D: Non-overlapping channel
  • E: Captive portal
  • F: Ad hoc network
Page 1 of 17 • Questions 1-25 of 416

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!