Pass CompTIA Network+ N10-009 in Just 3 Days – Stress-Free, No Study Needed!
Have questions? Contact us directly on WhatsApp for quick support!
A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?
- A. nslookup
- B. netstat -a
- C. ipconfig /a
- D. arp -a
Which of the following is the most secure way to provide site-to-site connectivity?
- A. VXLAN
- B. IKE
- C. GRE
- D. IPSec
A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?
- A. F-type
- B. RJ11
- C. BNC
- D. SC
A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?
- A. 802.1X
- B. Access control list
- C. Port security
- D. MAC filtering
A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?
- A. traceroute
- B. netstat
- C. tcpdump
- D. arp
Two remote offices need to be connected securely over an untrustworthy MAN. Each office needs to access network shares at the other site. Which of the following will BEST provide this functionality?
- A. Client-to-site VPN
- B. Third-party VPN service
- C. Site-to-site VPN
- D. Split-tunnel VPN
Before using a guest network, an administrator requires users to accept the terms of use. Which of the following is the best way to accomplish this goal?
- A. Pre-shared key
- B. Autonomous access point
- C. Captive portal
- D. WPA2 encryption
Which of the following most likely requires the use of subinterfaces?
- A. A router with only one available LAN port
- B. A firewall performing deep packet inspection
- C. A hub utilizing jumbo frames
- D. A switch using Spanning Tree Protocol
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
- A. MAC security
- B. Content filtering
- C. Screened subnet
- D. Perimeter network
Which of the following requires network devices to be managed using a different set of IP addresses?
- A. Console
- B. Split tunnel
- C. Jump box
- D. Out of band