Brief Summary
This video provides a comprehensive set of 70 practice questions designed to help individuals prepare for the CompTIA Network+ N10-009 exam. The questions cover a wide range of networking concepts and skills, including cable configurations, network attacks, switch configurations, email security, network troubleshooting, network topologies, and cloud service models. The video aims to measure viewers on the same objectives and skills tested in the actual exam, offering detailed explanations for each question and answer.
- Cabling and Network Configuration
- Network Security Threats and Mitigation
- Network Troubleshooting and Tools
- Cloud Services and Models
Question 1
This question tests the understanding of crossover cable configurations. The correct configuration for a crossover cable is identified as configuration B, where pin 1 (sender) on one end connects to pin 3 (receiver) on the other, and pin 2 (sender) connects to pin 6 (receiver). The other pins remain the same.
Question 2
The question identifies the type of network attack that overloads a server, service, or website with excessive traffic, leading to timeouts or crashes. The correct answer is a Distributed Denial of Service (DDoS) attack, which utilizes a botnet to flood the target with traffic.
Question 3
This question focuses on configuring a new switch with redundancy by connecting two ports to the core switch. The solution is link aggregation, also known as port aggregation or NIC teaming, which combines multiple cables between two switches to act as a single, faster connection with fault tolerance.
Question 4
The question asks for the port used for secure email. The correct answer is 995, which is used for secure email with TLS or SSL encryption. Other ports like 25 (SMTP), 110 (POP3), and 143 (IMAP) are for email but are not secure.
Question 5
This question involves determining which internet link is being used for a web application when two links are sharing the load. The correct tool is tracert, which traces the route of the connection and identifies the link being used.
Question 6
The question describes a scenario where users are being diverted to different websites than intended. This type of attack is identified as DNS poisoning, where DNS records are altered to redirect users to malicious sites.
Question 7
This question asks which network topology requires the most connections. The answer is mesh topology, where every device is connected to every other device, resulting in a high level of redundancy and a large number of connections. The formula to calculate the number of connections in a mesh topology is n(n-1)/2, where n is the number of devices.
Question 8
The question involves hardening a secure server by closing ports that are not encrypted. The ports that should be closed are 21 (Telnet), 25 (SMTP), and 80 (HTTP), while ports 22 (SSH), 443 (HTTPS), and 587 (encrypted email) should remain open.
Question 9
This question requires determining the subnet mask that allows for seven usable IP addresses. The correct subnet mask is 255.255.255.240, which provides 16 IP addresses with 14 usable addresses after subtracting the network ID and broadcast address.
Question 10
This section includes a game where viewers are encouraged to include the phrase "it smells like Christmas" or a creative rephrasing of it in the comments.
Question 11
The question asks which role needs to be installed and configured on a server to dish out IP addresses to devices on the network. The correct answer is DHCP (Dynamic Host Configuration Protocol).
Question 12
This question asks which network topology makes use of a central device with point-to-point connections to all other devices. The correct answer is the star topology.
Question 13
This question asks to identify the connector types used by Fiber Optic Cables. The correct answers are SC, LC and ST.
Question 14
This question asks to identify an example of an APIPA IP address. The correct answer is 169.254.1.1.
Question 15
This question asks which subnet mask should be used to assign two IP addresses to one interface on connected routers in order to conserve IP address space. The correct answer is /30.
Question 16
This question asks which of the following is a loopback address. The correct answer is 127.0.0.1.
Question 17
This question asks which of the following benefits will network segmentation provide. The correct answer is security through isolation.
Question 18
This question asks which of the following concepts are most important to help ensure long-term health in the event of a disaster. The correct answers are offsite backups and redundancy.
Question 19
This question asks which of the following ports should you block to prevent outside users from being able to telnet into any of the servers in the data center. The correct answer is 23.
Question 20
This question asks which of the following attacks encrypts user data and requires a proper backup implementation to be able to recover. The correct answer is ransomware.
Question 21
This question asks which of the following must you implement to assist with analyzing attacks directed towards the company's network. The correct answer is a Honeypot.
Question 22
This question asks which of the following has this user most likely brought into the network besides a router, when a user is having connectivity issues after bringing their own personal wired router. The correct answer is a rogue DHCP server.
Question 23
This question asks which of the following should you implement to prevent unauthorized hosts from connecting to the network via ethernet and implement an access control at Layer Two. The correct answers are Access Control lists and Port security.
Question 24
This question asks to identify which of the following will be an issue, given a network configuration plan. The correct answer is attenuation.
Question 25
This question asks with which of the following cloud service models do you have the least amount of control. The correct answer is Software as a Service.
Question 26
This question asks which of the following attacks against this user is taking place, given a scenario where a user is unable to log in after locking the computer, resets the password, but later in the day is again unable to log in after locking the computer. The correct answer is Brute Force attack.
Question 27
This question asks which of the following would best improve performance, given a scenario where one of the users in the company complains about poor quality with video conferencing after investigation and finding that other users are using excessive bandwidth. The correct answer is quality of service.
Question 28
This question asks which of the following can you implement to ensure that users agree to an acceptable usage policy before connecting to a wireless network. The correct answer is a captive portal.
Question 29
This question asks which type of connector to use for connecting a plain old telephone system. The correct answer is RJ11.
Question 30
This question asks which of the following provides you a virtualized hardware environment so you can go and run and create virtual machines. The correct answer is a hypervisor.
Question 31
This question asks which one of the following connectors is not a fiber optic cable connector. The correct answer is BNC.
Question 32
This question asks which of the following Services enables computers on a private IP version 4 Network to access the internet using a registered IP address. The correct answer is NAT.
Question 33
This question asks which of the following subnets will you have to go and use, given that you need to create an IP version 4 Network that needs to have eight subnets and 50 hosts per subnet and you have been assigned a Class C Network address. The correct answer is 255.255.255.224.
Question 34
This question asks which of the following is the default subnet mask for an IP version 4 Class A Network. The correct answer is 255.0.0.0.
Question 35
This question asks what port is used by HTTPS. The correct answer is 443.
Question 36
This question asks which of the following devices would you configure as a DHCP server. The correct answer is a router.
Question 37
This question asks which of the following message types are exchanged by DHCP during a successful lease renewal transaction. The correct answers are DHCP Discover, DHCP Offer, DHCP Request, and DHCP Acknowledge.
Question 38
This question asks which of the following cloud service models will allow you to perform a new installation of an operating system of your choice. The correct answer is Infrastructure as a Service.
Question 39
This question asks which of the following can be monitored by HVAC systems by using internet of things. The correct answers are humidity, temperature, and pressure.
Question 40
This question asks which of the following wireless security protocols provides the best security. The correct answer is WPA2.
Question 41
This question asks which of the following should you put in place to ensure a disaster recovery mechanism which can be made operational in the least amount of time. The correct answer is a hot site.
Question 42
This question asks which of the following is the best description of biometrics. The correct answer is something you are.
Question 43
This question asks which of the following refers to the process of determining whether a user is a member of a group that provides access to a particular Network resource. The correct answer is authorization.
Question 44
This question asks which of the following can be used, given that you have been asked to install a network cable in an environment where there is high Emi, the cable needs to provide decent speed, but cost is indeed a factor. The correct answer is STP.
Question 45
This question asks what does the tool in the image get used for. The correct answer is it can be used to detect and measure the electrical current flowing through a copper cable.
Question 46
This question asks which of the following tools is used to connect an RJ45 connector to a network cable. The correct answer is a network crimper.
Question 47
This question asks which of the following commands is used to test network connectivity to another device or another website. The correct answer is ping.
Question 48
This question asks what command you think needs to be run next to resolve this issue, given a scenario where you have been called in to help with troubleshooting a computer that does not have access to the internet and the command ipconfig shows an APIPA address. The correct answer is ipconfig /renew.
Question 49
This question asks which of the following wireless standards supports both the 2.4 GHz frequency as well as the 5 GHz frequency. The correct answer is 802.11n.
Question 50
This question asks which of the following cables could be installed in this situation, given that you need to install a network cable in an environment with extremely high Emi, the user wants good speed and cost is not of concern. The correct answer is fiber optic.
Question 51
This question asks which of the following would resolve the issue being experienced, given that one of the printers is getting a new different IP address every day from the DHCP, which is causing issues with printing. The correct answer is a reservation.
Question 52
This question asks which of the following types of interference on a twisted pair Network are designed to be prevented by the twists in The Wire pairs inside the cable. The correct answer is cross talk.
Question 53
This question asks which of the following does not prevent unauthorized people from entering a data center. The correct answer is motion detection.
Question 54
This question asks which of the following types of raid requires a minimum of two hard drives to work and does something called mirroring. The correct answer is raid one.
Question 55
This question asks which of the following cables is never used to connect a computer to an Ethernet Network. The correct answer is a rollover cable.
Question 56
This question asks which of the following is not a term for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance. The correct answer is clustering.
Question 57
This question asks which of the following types of VPN connection is the best solution for connecting a home user to a corporate Network. The correct answer is host to site.
Question 58
This question asks which of the following actions is that user performing, given that one of the users at Burning I stick swipes a smart card through the reader connected to a laptop and then types a password to log onto the system. The correct answer is authentication.
Question 59
This question asks what are the default ports used by HTTP and HTTPS. The correct answer is 80 and 443.
Question 60
This question asks which of the following commands should you run on the clients, given that a rogue DHCP server has been discovered at Burning ice Tech, you have disabled the Rogue DHCP server and now you still need to terminate all the Rogue IP addresses that was issued by two client devices. The correct answers are ipconfig /release and ipconfig /renew.
Question 61
This question asks which of the following connector types are used with fiber optic cables. The correct answers are ST, LC, and MT-RJ.
Question 62
This question asks which of the following would be used to forward requests and replies between a DHCP server and a client. The correct answer is a relay.
Question 63
This question asks which of the following will you have to use to get the job done, given that you have to connect a cat 6 EET cable to a device that only has LC ports. The correct answer is a media converter.
Question 64
This question asks which of the following tools or devices would allow you to distribute user traffic across multiple web servers. The correct answer is a load balancer.
Question 65
This question asks which of the following would be used to adjust resources dynamically for a virtual web server under variable loads. The correct answer is elastic Computing.
Question 66
This question asks which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure. The correct answers are change management and business continuity plan.
Question 67
This question asks which of the following has taken place, given that while walking from the parking lot to an access control door, you see an authorized user open that door, then you also notice that another person catches that door before it closes and that person then goes inside. The correct answer is tailgating.
Question 68
This question asks which of the following concepts will allow you to ensure this requirement is met, given that you are setting up a web-based application that needs to be continually accessible to the end users. The correct answer is high availability.
Question 69
This question asks which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure. The correct answers are change management and business continuity plan.
Question 70
This question asks which of the following attack types describes this action, given that an attacker is attempting to find the password to a network in Burning I Tech by inputting common words and phrases in plain text to the password prompt. The correct answer is a dictionary attack.