Pass CompTIA Network+ N10-009 in Just 3 Days – Stress-Free, No Study Needed!
Have questions? Contact us directly on WhatsApp for quick support!
A company is purchasing a 40Gbps broadband connection service from an ISP. Which of the following should most likely be configured on the 10G switch to take advantage of the new service?
- A. 802.11Q tagging
- B. Jumbo frames
- C. Half duplex
- D. Link aggregation
Which of the following are the main differences between ESP and AH? (Choose two.)
- A. AH provides confidentiality through the use of encryption.
- B. ESP provides authentication for IP headers and their payloads.
- C. ESP provides confidentiality through the use of encryption.
- D. AH provides authentication for IP headers and their payloads.
- E. AH provides data origin authorization over shared secret.
- F. ESP provides data origin authorization over shared secret.
An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?
- A. TXT
- B. AAA
- C. CNAME
- D. MX
Which of the following is the most closely associated with segmenting compute resources within a single cloud account?
- A. Network security group
- B. IaaS
- C. VPC
- D. Hybrid cloud
Which of the following is the most likely function to be decremented when a tool is used to measure the distance between two locations on the internet?
- A. GRE
- B. TTL
- C. VPN
- D. QoS
The power company notifies a network administrator that it will be turning off the power to the building over the weekend. Which of the following is the BEST solution to prevent the servers from going down?
- A. Redundant power supplies
- B. Uninterruptible power supply
- C. Generator
- D. Power distribution unit
A network engineer implements a 192.168.100.0/25 subnet for a building without obtaining sizing requirements. It is later determined that the building will house 700 people. Which of the following subnet masks will most efficiently support that number of people?
- A. 255.255.252.0
- B. 255.255.254.0
- C. 255.255.255.0
- D. 255.255.255.128
A network administrator wants to check all network connections and see the output in integer form. Which of the following commands should the administrator run on the command line?
- A. netstat
- B. netstat -a
- C. netstat -e
- D. netstat -n
Following the troubleshooting methodology, a technician implements a solution that resolves the reported issue. Which of the following should the technician do next?
- A. Document the findings.
- B. Create a plan of action.
- C. Establish a theory.
- D. Identify the problem.
A network administrator needs to divide 192.168.1.0/24 into two equal halves. Which of the following subnet masks should the administrator use?
- A. 255.255.0.0
- B. 255.255.254.0
- C. 255.255.255.0
- D. 255.255.255.128