CompTIA Network+ (Certification Exam N10-009) | 70 Questions with Explanations

CompTIA Network+ (Certification Exam N10-009) | 70 Questions with Explanations

Brief Summary

This video provides a comprehensive set of 70 practice questions designed to help individuals prepare for the CompTIA Network+ N10-009 exam. The questions cover a wide range of networking concepts and skills, including cable configurations, network attacks, switch configurations, email security, network troubleshooting, network topologies, and cloud service models. The video aims to measure viewers on the same objectives and skills tested in the actual exam, offering detailed explanations for each question and answer.

  • Cabling and Network Configuration
  • Network Security Threats and Mitigation
  • Network Troubleshooting and Tools
  • Cloud Services and Models

Question 1

This question tests the understanding of crossover cable configurations. The correct configuration for a crossover cable is identified as configuration B, where pin 1 (sender) on one end connects to pin 3 (receiver) on the other, and pin 2 (sender) connects to pin 6 (receiver). The other pins remain the same.

Question 2

The question identifies the type of network attack that overloads a server, service, or website with excessive traffic, leading to timeouts or crashes. The correct answer is a Distributed Denial of Service (DDoS) attack, which utilizes a botnet to flood the target with traffic.

Question 3

This question focuses on configuring a new switch with redundancy by connecting two ports to the core switch. The solution is link aggregation, also known as port aggregation or NIC teaming, which combines multiple cables between two switches to act as a single, faster connection with fault tolerance.

Question 4

The question asks for the port used for secure email. The correct answer is 995, which is used for secure email with TLS or SSL encryption. Other ports like 25 (SMTP), 110 (POP3), and 143 (IMAP) are for email but are not secure.

Question 5

This question involves determining which internet link is being used for a web application when two links are sharing the load. The correct tool is tracert, which traces the route of the connection and identifies the link being used.

Question 6

The question describes a scenario where users are being diverted to different websites than intended. This type of attack is identified as DNS poisoning, where DNS records are altered to redirect users to malicious sites.

Question 7

This question asks which network topology requires the most connections. The answer is mesh topology, where every device is connected to every other device, resulting in a high level of redundancy and a large number of connections. The formula to calculate the number of connections in a mesh topology is n(n-1)/2, where n is the number of devices.

Question 8

The question involves hardening a secure server by closing ports that are not encrypted. The ports that should be closed are 21 (Telnet), 25 (SMTP), and 80 (HTTP), while ports 22 (SSH), 443 (HTTPS), and 587 (encrypted email) should remain open.

Question 9

This question requires determining the subnet mask that allows for seven usable IP addresses. The correct subnet mask is 255.255.255.240, which provides 16 IP addresses with 14 usable addresses after subtracting the network ID and broadcast address.

Question 10

This section includes a game where viewers are encouraged to include the phrase "it smells like Christmas" or a creative rephrasing of it in the comments.

Question 11

The question asks which role needs to be installed and configured on a server to dish out IP addresses to devices on the network. The correct answer is DHCP (Dynamic Host Configuration Protocol).

Question 12

This question asks which network topology makes use of a central device with point-to-point connections to all other devices. The correct answer is the star topology.

Question 13

This question asks to identify the connector types used by Fiber Optic Cables. The correct answers are SC, LC and ST.

Question 14

This question asks to identify an example of an APIPA IP address. The correct answer is 169.254.1.1.

Question 15

This question asks which subnet mask should be used to assign two IP addresses to one interface on connected routers in order to conserve IP address space. The correct answer is /30.

Question 16

This question asks which of the following is a loopback address. The correct answer is 127.0.0.1.

Question 17

This question asks which of the following benefits will network segmentation provide. The correct answer is security through isolation.

Question 18

This question asks which of the following concepts are most important to help ensure long-term health in the event of a disaster. The correct answers are offsite backups and redundancy.

Question 19

This question asks which of the following ports should you block to prevent outside users from being able to telnet into any of the servers in the data center. The correct answer is 23.

Question 20

This question asks which of the following attacks encrypts user data and requires a proper backup implementation to be able to recover. The correct answer is ransomware.

Question 21

This question asks which of the following must you implement to assist with analyzing attacks directed towards the company's network. The correct answer is a Honeypot.

Question 22

This question asks which of the following has this user most likely brought into the network besides a router, when a user is having connectivity issues after bringing their own personal wired router. The correct answer is a rogue DHCP server.

Question 23

This question asks which of the following should you implement to prevent unauthorized hosts from connecting to the network via ethernet and implement an access control at Layer Two. The correct answers are Access Control lists and Port security.

Question 24

This question asks to identify which of the following will be an issue, given a network configuration plan. The correct answer is attenuation.

Question 25

This question asks with which of the following cloud service models do you have the least amount of control. The correct answer is Software as a Service.

Question 26

This question asks which of the following attacks against this user is taking place, given a scenario where a user is unable to log in after locking the computer, resets the password, but later in the day is again unable to log in after locking the computer. The correct answer is Brute Force attack.

Question 27

This question asks which of the following would best improve performance, given a scenario where one of the users in the company complains about poor quality with video conferencing after investigation and finding that other users are using excessive bandwidth. The correct answer is quality of service.

Question 28

This question asks which of the following can you implement to ensure that users agree to an acceptable usage policy before connecting to a wireless network. The correct answer is a captive portal.

Question 29

This question asks which type of connector to use for connecting a plain old telephone system. The correct answer is RJ11.

Question 30

This question asks which of the following provides you a virtualized hardware environment so you can go and run and create virtual machines. The correct answer is a hypervisor.

Question 31

This question asks which one of the following connectors is not a fiber optic cable connector. The correct answer is BNC.

Question 32

This question asks which of the following Services enables computers on a private IP version 4 Network to access the internet using a registered IP address. The correct answer is NAT.

Question 33

This question asks which of the following subnets will you have to go and use, given that you need to create an IP version 4 Network that needs to have eight subnets and 50 hosts per subnet and you have been assigned a Class C Network address. The correct answer is 255.255.255.224.

Question 34

This question asks which of the following is the default subnet mask for an IP version 4 Class A Network. The correct answer is 255.0.0.0.

Question 35

This question asks what port is used by HTTPS. The correct answer is 443.

Question 36

This question asks which of the following devices would you configure as a DHCP server. The correct answer is a router.

Question 37

This question asks which of the following message types are exchanged by DHCP during a successful lease renewal transaction. The correct answers are DHCP Discover, DHCP Offer, DHCP Request, and DHCP Acknowledge.

Question 38

This question asks which of the following cloud service models will allow you to perform a new installation of an operating system of your choice. The correct answer is Infrastructure as a Service.

Question 39

This question asks which of the following can be monitored by HVAC systems by using internet of things. The correct answers are humidity, temperature, and pressure.

Question 40

This question asks which of the following wireless security protocols provides the best security. The correct answer is WPA2.

Question 41

This question asks which of the following should you put in place to ensure a disaster recovery mechanism which can be made operational in the least amount of time. The correct answer is a hot site.

Question 42

This question asks which of the following is the best description of biometrics. The correct answer is something you are.

Question 43

This question asks which of the following refers to the process of determining whether a user is a member of a group that provides access to a particular Network resource. The correct answer is authorization.

Question 44

This question asks which of the following can be used, given that you have been asked to install a network cable in an environment where there is high Emi, the cable needs to provide decent speed, but cost is indeed a factor. The correct answer is STP.

Question 45

This question asks what does the tool in the image get used for. The correct answer is it can be used to detect and measure the electrical current flowing through a copper cable.

Question 46

This question asks which of the following tools is used to connect an RJ45 connector to a network cable. The correct answer is a network crimper.

Question 47

This question asks which of the following commands is used to test network connectivity to another device or another website. The correct answer is ping.

Question 48

This question asks what command you think needs to be run next to resolve this issue, given a scenario where you have been called in to help with troubleshooting a computer that does not have access to the internet and the command ipconfig shows an APIPA address. The correct answer is ipconfig /renew.

Question 49

This question asks which of the following wireless standards supports both the 2.4 GHz frequency as well as the 5 GHz frequency. The correct answer is 802.11n.

Question 50

This question asks which of the following cables could be installed in this situation, given that you need to install a network cable in an environment with extremely high Emi, the user wants good speed and cost is not of concern. The correct answer is fiber optic.

Question 51

This question asks which of the following would resolve the issue being experienced, given that one of the printers is getting a new different IP address every day from the DHCP, which is causing issues with printing. The correct answer is a reservation.

Question 52

This question asks which of the following types of interference on a twisted pair Network are designed to be prevented by the twists in The Wire pairs inside the cable. The correct answer is cross talk.

Question 53

This question asks which of the following does not prevent unauthorized people from entering a data center. The correct answer is motion detection.

Question 54

This question asks which of the following types of raid requires a minimum of two hard drives to work and does something called mirroring. The correct answer is raid one.

Question 55

This question asks which of the following cables is never used to connect a computer to an Ethernet Network. The correct answer is a rollover cable.

Question 56

This question asks which of the following is not a term for the process of combining the bandwidth of two or more network adapters to increase the overall speed of the connection and provide fault tolerance. The correct answer is clustering.

Question 57

This question asks which of the following types of VPN connection is the best solution for connecting a home user to a corporate Network. The correct answer is host to site.

Question 58

This question asks which of the following actions is that user performing, given that one of the users at Burning I stick swipes a smart card through the reader connected to a laptop and then types a password to log onto the system. The correct answer is authentication.

Question 59

This question asks what are the default ports used by HTTP and HTTPS. The correct answer is 80 and 443.

Question 60

This question asks which of the following commands should you run on the clients, given that a rogue DHCP server has been discovered at Burning ice Tech, you have disabled the Rogue DHCP server and now you still need to terminate all the Rogue IP addresses that was issued by two client devices. The correct answers are ipconfig /release and ipconfig /renew.

Question 61

This question asks which of the following connector types are used with fiber optic cables. The correct answers are ST, LC, and MT-RJ.

Question 62

This question asks which of the following would be used to forward requests and replies between a DHCP server and a client. The correct answer is a relay.

Question 63

This question asks which of the following will you have to use to get the job done, given that you have to connect a cat 6 EET cable to a device that only has LC ports. The correct answer is a media converter.

Question 64

This question asks which of the following tools or devices would allow you to distribute user traffic across multiple web servers. The correct answer is a load balancer.

Question 65

This question asks which of the following would be used to adjust resources dynamically for a virtual web server under variable loads. The correct answer is elastic Computing.

Question 66

This question asks which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure. The correct answers are change management and business continuity plan.

Question 67

This question asks which of the following has taken place, given that while walking from the parking lot to an access control door, you see an authorized user open that door, then you also notice that another person catches that door before it closes and that person then goes inside. The correct answer is tailgating.

Question 68

This question asks which of the following concepts will allow you to ensure this requirement is met, given that you are setting up a web-based application that needs to be continually accessible to the end users. The correct answer is high availability.

Question 69

This question asks which of the following would be used to enforce and schedule critical updates with supervisory approval and include backup plans in case of failure. The correct answers are change management and business continuity plan.

Question 70

This question asks which of the following attack types describes this action, given that an attacker is attempting to find the password to a network in Burning I Tech by inputting common words and phrases in plain text to the password prompt. The correct answer is a dictionary attack.

Share

Summarize Anything ! Download Summ App

Download on the Apple Store
© 2024 Summ