Pass CompTIA Network+ N10-009 in Just 3 Days – Stress-Free, No Study Needed!
Have questions? Contact us directly on WhatsApp for quick support!
A network administrator wants to implement an authentication process for temporary access to an organization’s network. Which of the following technologies would facilitate this process?
- A. Captive portal
- B. Enterprise authentication
- C. Ad hoc network
- D. WPA3
A user is unable to navigate to a website because the provided URL is not resolving to the correct IP address. Other users are able to navigate to the intended website without issue. Which of the following is most likely causing this issue?
- A. Hosts file
- B. Self-signed certificate
- C. Nameserver record
- D. IP helper
A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?
- A. Multitenancy
- B. VPC
- C. NFV
- D. SaaS
Which of the following should be used to obtain remote access to a network appliance that has failed to start up properly?
- A. Crash cart
- B. Jump box
- C. Secure Shell
- D. Out-of-band management
Which of the following attacks utilizes a network packet that contains multiple network tags?
- A. MAC flooding
- B. VLAN hopping
- C. DNS spoofing
- D. ARP poisoning
A network administrator is configuring a new switch and wants to connect two ports to the core switch to ensure redundancy. Which of the following configurations would meet this requirement?
- A. Full duplex
- B. 802.1Q tagging
- C. Native VLAN
- D. Link aggregation
Which of the following ports is used for secure email?
- A. 25
- B. 110
- C. 143
- D. 587
A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Choose two.)
- A. Least privilege network access
- B. Dynamic inventories
- C. Central policy management
- D. Zero-touch provisioning
- E. Configuration drift prevention
- F. Subnet range limits
Which of the following is a cost-effective advantage of a split-tunnel VPN?
- A. Web traffic is filtered through a web filler.
- B. More bandwidth is required on the company’s internet connection.
- C. Monitoring detects insecure machines on the company’s network.
- D. Cloud-based traffic flows outside of the company’s network.
A network technician is troubleshooting a web application’s poor performance. The office has two internet links that share the traffic load. Which of the following tools should the technician use to determine which link is being used for the web application?
- A. netstat
- B. nslookup
- C. ping
- D. tracert