Pass CompTIA Network+ N10-009 in Just 3 Days – Stress-Free, No Study Needed!
Have questions? Contact us directly on WhatsApp for quick support!
A network administrator notices uncommon communication between VMs on ephemeral ports on the same subnet. The administrator is concerned about that traffic moving laterally within the network. Which of the following describes the type of traffic flow the administrator is analyzing?
- A. East-west
- B. Point-to-point
- C. Horizontal-scaling
- D. Hub-and-spoke
Which of the following would be violated if an employee accidentally deleted a customer’s data?
- A. Integrity
- B. Confidentiality
- C. Vulnerability
- D. Availability
A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?
- A. v1
- B. v2c
- C. v2u
- D. v3
A network administrator is troubleshooting an issue with a new Internet connection. The ISP is asking detailed questions about the configuration of the router that the network administrator is troubleshooting. Which of the following commands is the network administrator using? (Choose two.)
- A. tcpdump
- B. show config
- C. hostname
- D. show route
- E. netstat
- F. show ip arp
A network administrator recently upgraded a wireless infrastructure with new APs. Users are reporting that, when stationary, the wireless connection drops and reconnects after 20 to 30 seconds. While reviewing the logs, the administrator notices that the APs are changing channels. Which of the following is the most likely reason for the service interruptions?
- A. Channel interference
- B. Roaming misconfiguration
- C. Network congestion
- D. Insufficient wireless coverage
A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?
- A. 172.16.0.0/24
- B. 192.168.0.0/24
- C. 224.0.0.0/24
- D. 240.0.0.0/24
A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?
- A. Clientless
- B. Client-to-site
- C. Full tunnel
- D. Site-to-site
A network administrator needs to fail over services to an off-site environment. This process will take four weeks to become fully operational. Which of the following DR concepts does this describe?
- A. Hot site
- B. Warm site
- C. Cold site
- D. Active-active approach
A wireless technician wants to implement a technology that will allow user devices to automatically navigate to the best available frequency standard. Which of the following technologies should the technician use?
- A. Band steering
- B. Wireless LAN controller
- C. Directional antenna
- D. Autonomous access point
A user called the help desk after business hours to complain that files on a device are inaccessible and the wallpaper was changed. The network administrator thinks that this issue is an isolated incident, but the security analyst thinks the issue might be a ransomware attack. Which of the following troubleshooting steps should be taken first?
- A. Identify the problem.
- B. Establish a theory.
- C. Document findings.
- D. Create a plan of action.