Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

N10-009Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 51

Which of the following allows a user to connect to an isolated device on a stand-alone network?

  • A: Jump box
  • B: API gateway
  • C: Secure Shell
  • D: Clientless VPN

Question 52

Early in the morning, an administrator installs a new DHCP server. In the afternoon, some users report they are experiencing network outages. Which of the following is the most likely issue?

  • A: The administrator did not provision enough IP addresses.
  • B: The administrator configured an incorrect default gateway.
  • C: The administrator did not provision enough routes.
  • D: The administrator did not provision enough MAC addresses.

Question 53

A company is implementing a policy that will not allow employees to bring personal devices to the office and connect to the wireless network. Which of the following is the best way to enforce this policy?

  • A: MAC filtering
  • B: 802.1X
  • C: Port security
  • D: ACL

Question 54

A network engineer is troubleshooting an issue with a VoIP network. After performing analysis, the engineer found that when users upload large files, voice quality is severely degraded. When no other traffic is on the network, voice quality is fine. Which of the following should the engineer do to most likely resolve the issue?

  • A: Enable MAC filtering.
  • B: Reduce the VLAN database.
  • C: Configure QoS on the router.
  • D: Implement ACLs.

Question 55

Which of the following disaster recovery metrics is used to describe the amount of data that is lost since the last backup?

  • A: MTTR
  • B: RTO
  • C: RPO
  • D: MTBF

Question 56

A network administrator needs to improve network monitoring. Which of the following should the administrator do first?

  • A: Establish baseline metrics.
  • B: Implement a SIEM.
  • C: Perform regular packet captures.
  • D: Conduct availability monitoring.

Question 57

Which of the following attacks utilizes a network packet that contains multiple network tags?

  • A: MAC flooding
  • B: VLAN hopping
  • C: DNS spoofing
  • D: ARP poisoning

Question 58

A network administrator is troubleshooting issues with a DHCP server at a university. More students have recently arrived on campus, and the users are unable to obtain an IP address. Which of the following should the administrator do to address the issue?

  • A: Enable IP helper.
  • B: Change the subnet mask.
  • C: Increase the scope size.
  • D: Add address exclusions.

Question 59

Which of the following is designed to distribute network traffic among devices based on the quantity of traffic?

  • A: Load balancer
  • B: Router
  • C: Proxy
  • D: Switch

Question 60

A user recently moved a workstation to a different part of the office. The user is able to access the internet and print but is unable to access server resources. Which of the following is the most likely cause of the issue?

  • A: Incorrect default gateway
  • B: Wrong VLAN assignment
  • C: Error-disabled port
  • D: Duplicate IP address

Question 61

A technician is planning an equipment installation into a rack in a data center that practices hot aisle/cold aisle ventilation. Which of the following directions should the equipment exhaust face when installed in the rack?

  • A: Sides
  • B: Top
  • C: Front
  • D: Rear

Question 62

A network administrator needs to add 255 useable IP addresses to the network. A /24 is currently in use. Which of the following prefixes would fulfill this need?

  • A: /23
  • B: /25
  • C: /29
  • D: /32

Question 63

Which of the following allows an organization to map multiple internal devices to a single external-facing IP address?

  • A: NAT
  • B: BGP
  • C: OSPF
  • D: FHRP

Question 64

Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?

  • A: Identify the problem.
  • B: Document the findings and outcomes.
  • C: Test the theory to determine cause.
  • D: Establish a plan of action.

Question 65

Which of the following configurations exempts traffic to the internet from traversing a VPN?

  • A: Client-to-site
  • B: Active-passive
  • C: Split-tunnel
  • D: Out-of-band

Question 66

Which of the following ports creates a secure connection to a directory service?

  • A: 22
  • B: 389
  • C: 445
  • D: 636

Question 67

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches.

Image 1

Which of the following best describes the issue?

  • A: The port cost should not be equal.
  • B: The ports should use link aggregation.
  • C: A root bridge needs to be identified.
  • D: The switch should be configured for RSTP.

Question 68

A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configurations would meet this requirement?

  • A: Full duplex
  • B: 802.1Q tagging
  • C: Native VLAN
  • D: Link aggregation

Question 69

A network administrator is implementing security zones for each department. Which of the following should the administrator use to accomplish this task?

  • A: ACLs
  • B: Port security
  • C: Content filtering
  • D: NAC

Question 70

Which of the following protocols is used to route traffic on the public internet?

  • A: BGP
  • B: OSPF
  • C: EIGRP
  • D: RIP

Question 71

Which of the following protocols provides remote access utilizing port 22?

  • A: SSH
  • B: Telnet
  • C: TLS
  • D: RDP

Question 72

After changes were made to a firewall, users are no longer able to access a web server. A network administrator wants to ensure that ports 80 and 443 on the web server are still accessible from the user IP space. Which of the following commands is best suited to perform this testing?

  • A: dig
  • B: ifconfig
  • C: ping
  • D: nmap

Question 73

Which of the following attacks would most likely cause duplicate IP addresses in a network?

  • A: Rogue DHCP server
  • B: DNS poisoning
  • C: Social engineering
  • D: Denial-of-service

Question 74

An organization wants better network visibility. The organization's requirements include:

• Multivendor/OS-monitoring capabilities
• Real-time collection
• Data correlation

Which of the following meets these requirements?

  • A: SNMP
  • B: SIEM
  • C: Nmap
  • D: Syslog

Question 75

An administrator is evaluating the use of authentication within SNMP. Which of the following is the most secure way of authenticating devices using only SNMP?

  • A: Use version 1 of SNMP and use a community string to serve as a PSK
  • B: Use version 3 of SNMP and set up trap messages for critical events on the network
  • C: Use version 2c of SNMP and use informs to validate device authentication
  • D: Use version 2u of SNMP to authenticate devices for network monitoring
Page 3 of 17 • Questions 51-75 of 416

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!