Pass CompTIA Network+ N10-009 in Just 3 Days – Stress-Free, No Study Needed!
Have questions? Contact us directly on WhatsApp for quick support!
An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?
- A. SD-WAN
- B. VXLAN
- C. VPN
- D. NFV
Which of the following steps of the troubleshooting methodology would most likely include checking through each level of the OSI model after the problem has been identified?
- A. Establish a theory.
- B. Implement the solution.
- C. Create a plan of action.
- D. Verify functionality.
An organization has a security requirement that all network connections can be traced back to a user. A network administrator needs to identify a solution to implement on the wireless network. Which of the following is the best solution?
- A. Implementing enterprise authentication
- B. Requiring the use of PSKs
- C. Configuring a captive portal for users
- D. Enforcing wired equivalent protection
Access to a datacenter should be individually recorded by a card reader even when multiple employees enter the facility at the same time. Which of the following allows the enforcement of this policy?
- A. Motion detection
- B. Access control vestibules
- C. Smart lockers
- D. Cameras
A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?
- A. 10.1.2.0
- B. 10.1.2.1
- C. 10.1.2.23
- D. 10.1.2.255
- E. 10.1.2.31
A network administrator’s device is experiencing severe Wi-Fi interference within the corporate headquarters causing the device to constantly drop off the network.
Which of the following is most likely the cause of the issue?
A. Too much wireless reflection
B. Too much wireless absorption
C. Too many wireless repeaters
D. Too many client connections
A technician is troubleshooting a user’s laptop that is unable to connect to a corporate server. The technician thinks the issue pertains to routing. Which of the following commands should the technician use to identify the issue?
- A. tcpdump
- B. dig
- C. tracert
- D. arp
A technician is installing multiple UPS units in a major retail store. The technician is required to keep track of all changes to new and old equipment. Which of the following will allow the technician to record these changes?
- A. Asset tags
- B. A smart locker
- C. An access control vestibule
- D. A camera
A small business is deploying new phones, and some of the phones have full HD videoconferencing features. The Chief Information Officer is concerned that the network might not be able to handle the traffic if the traffic reaches a certain threshold. Which of the following can the network engineer configure to help ease these concerns?
- A. A VLAN with 100Mbps speed limits
- B. An IP helper to direct VoIP traffic
- C. A smaller subnet mask
- D. Full duplex on all user ports
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity.
Which of the following should be implemented to comply with the cease-and-desist order?
MAC security
Content filtering
Screened subnet
Perimeter network