DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Dominate CompTIA N10-009 Mock Tests & Study Materials, CompTIA Network+ Exam | SPOTO

Prepare to excel in the N10-009 CompTIA Network+ exam by utilizing our comprehensive mock tests and study materials. Our practice tests are meticulously crafted to help you master the latest exam questions and ensure optimal preparation. Access our free test resources, including sample questions, exam dumps, and mock exams, to refine your exam practice. With our online exam questions, you can assess your knowledge and readiness effectively. Our study materials cover all essential topics, catering to learners at every stage of preparation. Utilize our exam simulator to simulate the actual exam environment and enhance your test-taking skills. By engaging with our exam questions and answers, you'll be equipped to dominate the N10-009 certification exam and pave the way for a successful career in networking and cybersecurity.
Take other online exams

Question #1
An attacker targeting a large company was able to inject malicious A records into internal name resolution servers. Which of the following attack types was MOST likely used?
A. DNS poisoning
B. On-path
C. IP spoofing
D. Rogue DHCP
View answer
Correct Answer: A
Question #2
A technician is tasked with setting up a mail server and a DNS server. The mail port should be secured and have the ability to transfer large files. Which of the following ports should be opened? (Select TWO).
A. 22
B. 53
C. 110
D. 389
E. 995
F. 3389
View answer
Correct Answer: A
Question #3
A network engineer performs the following tasks to increase server bandwidth: Connects two network cables from the server to a switch stack Configure LACP on the switchports Verifies the correct configurations on the switch interfaces Which of the following needs to be configured on the server?
A. Load balancing
B. Multipathing
C. NIC teaming
D. Clustering
View answer
Correct Answer: C
Question #4
A device is connected to a managed Layer 3 network switch. The MAC address of the device is known, but the static IP address assigned to the device is not. Which of the following features of a Layer 3 network switch should be used to determine the IPv4 address of the device?
A. MAC table
B. Neighbor Discovery Protocol
C. ARP table
D. IPConfig
E. ACL table
View answer
Correct Answer: C
Question #5
A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?
A. Standard operating procedures
B. Configuration baseline documents
C. Work instructions
D. Change management documentation
View answer
Correct Answer: C
Question #6
A PC user who is on a local network reports very slow speeds when accessing files on the network server The user's PC Is connecting, but file downloads are very slow when compared to other users' download speeds The PC's NIC should be capable of Gigabit Ethernet. Which of the following will MOST likely fix the issue?
A. Releasing and renewing the PC's IP address
B. Replacing the patch cable
C. Reseating the NIC inside the PC
D. Flushing the DNS cache
View answer
Correct Answer: B
Question #7
A company streams video to multiple devices across a campus. When this happens, several users report a degradation of network performance. Which of the following would MOST likely address this issue?
A. Enable IGMP snooping on the switches
B. Implement another DHCP server
C. Reconfigure port tagging for the video traffic
D. Change the SSID of the APs
View answer
Correct Answer: AC
Question #8
Which of the following protocols would enable a company to upgrade its internet connection by acquiring its own public IP prefixes and autonomous system number?
A. EIGRP
B. BGP
C. IPv6
D. MPLS
View answer
Correct Answer: D
Question #9
Which of the following DHCP settings would be used to ensure a device gets the same IP address each time it is connected to the network?
A. Scope options
B. Reservation
C. Exclusion
D. Relay
E. Pool
View answer
Correct Answer: A
Question #10
A security engineer is installing a new IOS on the network. The engineer has asked a network administrator to ensure all traffic entering and leaving the router interface is available for the IDS. Which of the following should the network administrator do?
A. Install a network tap for the IDS
B. Configure ACLs to route traffic to the IDS
C. Install an additional NIC into the IDS
D. Install a loopback adapter for the IDS
E. Add an additional route on the router for the IDS
View answer
Correct Answer: B
Question #11
A network administrator is given the network 80.87.78.0/26 for specific device assignments. Which of the following describes this network?
A. 80
B. 80
C. 80
D. 80
View answer
Correct Answer: A
Question #12
An engineer is using a tool to run an ICMP sweep of a network to find devices that are online. When reviewing the results, the engineer notices a number of workstations that are currently verified as being online are not listed in the report. The tool was configured to scan using the following information: Network address: 172.28.16.0 CIDR: /22 The engineer collected the following information from the client workstation: IP address: 172.28.17.206 Subnet mask: 255.255.252.0 Which of the following MOST likely
A. The scanned network range is incorrect
B. The subnet mask on the client is misconfigured
C. The workstation has a firewall enabled
D. The tool is unable to scan remote networks
View answer
Correct Answer: A
Question #13
Which of the following protocols uses Dijkstra’s algorithm to calculate the LOWEST cost between routers?
A. RIP
B. OSPF
C. BGP
D. EIGRP
View answer
Correct Answer: A
Question #14
A network administrator responds to a support ticket that was submitted by a customer who is having issues connecting to a website inside of the company network The administrator verities that the customer could not connect to a website using a URL Which of the following troubleshooting steps would be BEST for the administrator to take?
A. Check for certificate issues
B. Contact the ISP
C. Attempt to connect to the site via IP address
D. Check the NTP configuration
View answer
Correct Answer: A
Question #15
Which of the following is conducted frequently to maintain an updated list of a system's weaknesses?
A. Penetration test
B. Posture assessment
C. Risk assessment
D. Vulnerability scan
View answer
Correct Answer: B
Question #16
A network engineer is designing a wireless network that has the following requirements: ? Network speed must be higher than 100Mbps ? Must use the 2.4GHz and 5GHz bands Which of the following 802.11 standards should the engineer select?
A. 802
B. 802
C. 802
D. 802
View answer
Correct Answer: A
Question #17
Which of the following records can be used to track the number of changes on a DNS zone?
A. SOA
B. SRV
C. PTR
D. NS
View answer
Correct Answer: C
Question #18
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporate resources
B. Upgrade security via the use of an NFV technology
C. Connect two data centers across the internet
D. Increase VPN availability by using a SDWAN technology
View answer
Correct Answer: C
Question #19
A network technician is installing new software on a Windows-based server in a different geographical location. Which of the following would be BEST for the technician to use to perform this task?
A. RDP
B. SSH
C. FTP
D. DNS
View answer
Correct Answer: A
Question #20
A network administrator received a report staling a critical vulnerability was detected on an application that is exposed to the internet. Which of the following Is the appropriate NEXT step?
A. Check for the existence of a known exploit in order to assess the risk
B. Immediately shut down the vulnerable application server
C. Install a network access control agent on the server
D. Deploy a new server to host the application
View answer
Correct Answer: A
Question #21
An administrator is writing a script to periodically log the IPv6 and MAC addresses of all the devices on a network segment. Which of the following switch features will MOST likely be used to assist with this task?
A. Spanning Tree Protocol
B. Neighbor Discovery Protocol
C. Link Aggregation Control Protocol
D. Address Resolution Protocol
View answer
Correct Answer: B
Question #22
A medical building offers patients Wi-Fi in the waiting room. Which of the following security features would be the BEST solution to provide secure connections and keep the medical data protected?
A. Isolating the guest network
B. Securing SNMP
C. MAC filtering
D. Disabling unneeded switchports
View answer
Correct Answer: B
Question #23
A security engineer is trying to determine whether an internal server was accessed by hosts on the internet. The internal server was shut down during the investigation Which of the following will the engineer review to determine whether the internal server had an unauthorized access attempt?
A. The server's syslog
B. The NetFlow statistics
C. The firewall logs
D. The audit logs on the core switch
View answer
Correct Answer: C
Question #24
Which of the following is MOST appropriate for enforcing bandwidth limits when the performance of an application is not affected by the use of buffering but is heavily impacted by packet drops?
A. Traffic shaping
B. Traffic policing
C. Traffic marking
D. Traffic classification
View answer
Correct Answer: D
Question #25
A client who shares office space and an IT closet with another company recently reported connectivity issues throughout the network. Multiple third-party vendors regularly perform on-site maintenance in the shared IT closet. Which of the following security techniques would BEST secure the physical networking equipment?
A. Disabling unneeded switchports
B. Implementing role-based access
C. Changing the default passwords
D. Configuring an access control list
View answer
Correct Answer: A
Question #26
Which of the following protocols can be used to change device configurations via encrypted and authenticated sessions? (Select TWO).
A. SNMPv3
B. SSh
C. Telnet
D. IPSec
E. ESP
F. Syslog
View answer
Correct Answer: B
Question #27
Which of the following physical security methods Is the MOST effective to prevent tailgating?
A. Biometrics in an access control vestibule
B. IP cameras with motion detection
C. Smart lockers with tamper protection
D. Badge readers plus a PIN pad
View answer
Correct Answer: B
Question #28
An organization would like to implement a disaster recovery strategy that does not require a facility agreement or idle hardware. Which of the following strategies MOST likely meets the organization's requirements?
A. Cloud site
B. Cold site
C. Warm site
D. Hot site
View answer
Correct Answer: B

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: