CompTIA N10-009 CompTIA Network+ Certification Exam Practice Test

Page: 1 / 14
Total 272 questions
Question 1

Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?



Answer : A

Network segmentation involves dividing a network into smaller segments or subnets. This is particularly important when integrating OT (Operational Technology) devices to ensure that these devices are isolated from other parts of the network. Segmentation helps protect the OT devices from potential threats and minimizes the impact of any security incidents. It also helps manage traffic and improves overall network performance.Reference: CompTIA Network+ study materials.


Question 2

Which of the following protocols is used to route traffic on the public internet?



Answer : A

Comprehensive and Detailed

Border Gateway Protocol (BGP) is the primary protocol used to route traffic on the public internet. It allows ISPs and large networks to exchange routing information, making it an Exterior Gateway Protocol (EGP).

Breakdown of Options:

A . BGP -- Correct answer. Used for internet routing and exchanges routing information between ISPs.

B . OSPF -- An Interior Gateway Protocol (IGP) used for routing within an autonomous system (not the public internet).

C . EIGRP -- Cisco's proprietary IGP, used within private networks, not the public internet.

D . RIP -- An older distance-vector protocol, not scalable for the internet.


CompTIA Network+ (N10-009) Official Study Guide -- Domain 1.4: Explain routing technologies.

RFC 4271: Border Gateway Protocol 4 (BGP-4)

Question 3

A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2

2 Forward 2

Switch 2

Port State Cost

1 Forward 2

2 Forward 2

Which of the following best describes the issue?



Answer : C

The issue is that no root bridge has been identified. In STP, a root bridge is necessary to manage redundant paths and avoid loops in the network. Without a root bridge, all switches will assume they can forward traffic, causing a network loop and connectivity problems.


Question 4

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?



Answer : D

IPv4 addresses are divided into classes:

Class A: Supports 16,777,214 hosts (large enterprises).

Class B: Supports 65,534 hosts (medium to large networks).

Class C: Supports 254 hosts (small to medium networks).

Class D: Used for multicast, not for assigning IPs to hosts.

Step-by-step Calculation:

The network will have 150 users initially, with a projected growth of 10 users, totaling 160 users.

Each user has two devices, so 160 2 = 320 IP addresses needed.

A Class C subnet has 254 usable IPs by default, which is not sufficient.

A Class B subnet can support thousands of hosts, making it the most appropriate option.

Incorrect Options:

A . Class D: Reserved for multicast, not for host assignments.

C . Class A: Overkill for a network of this size.

D . Class C: Cannot support 320 hosts without subnetting, making Class B the best choice.


CompTIA Network+ N10-009 Official Study Guide -- Chapter on IP Addressing and Subnetting

Question 5

A network administrator is developing a method of device monitoring with the following requirements:

*Allows for explicit, by user, privilege management

*Includes centralized logging of changes

*Offers widely accessible remote management

*Provides support of service accounts

Which of the following will most closely meet these requirements?



Answer : B

*API (Application Programming Interface) enables secure and granular access control, remote management, and logging, making it ideal for network monitoring.

*SNMP (A) is mainly used for device monitoring but lacks centralized logging and user-based privilege control.

*SIEM (C) is a security monitoring tool focused on log collection, not device management.

*SSO (D) is related to authentication, not monitoring.

Reference: CompTIA Network+ N10-009 Official Documentation -- Network Monitoring & Management Technologies.


Question 6

Which of the following is used to stage copies of a website closer to geographically dispersed users?



Answer : B

Comprehensive and Detailed

A Content Delivery Network (CDN) caches website content across multiple geographically distributed servers to reduce latency and improve load times for users worldwide.

Breakdown of Options:

A . VPN -- Encrypts network connections, does not distribute website content.

B . CDN -- Correct answer. A network of caching servers that delivers web content faster.

C . SAN -- Storage Area Network, not related to web content distribution.

D . SDN -- Software-defined networking, which controls network flows but does not stage website content.


CompTIA Network+ (N10-009) Official Study Guide -- Domain 1.5: Compare and contrast different networking services.

Question 7

An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time. Which of the following technologies will best meet this requirement?



Answer : A

Definition of SD-WAN:

Software-Defined Wide Area Network (SD-WAN) is a technology that simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. It allows for centralized management and enhanced security.

Benefits of SD-WAN:

Reduced Provisioning Time: SD-WAN enables quick and easy deployment of new sites with centralized control and automation.

Security: Incorporates advanced security features such as encryption, secure tunneling, and integrated firewalls.

Scalability: Easily scales to accommodate additional sites and bandwidth requirements.

Comparison with Other Technologies:

VXLAN (Virtual Extensible LAN): Primarily used for network virtualization within data centers.

VPN (Virtual Private Network): Provides secure connections but does not offer the centralized management and provisioning efficiency of SD-WAN.

NFV (Network Functions Virtualization): Virtualizes network services but does not specifically address WAN management and provisioning.

Implementation:

SD-WAN solutions are implemented by deploying edge devices at each site and connecting them to a central controller. This allows for dynamic routing, traffic management, and security policy enforcement.


CompTIA Network+ course materials and networking solution guides.

Page:    1 / 14   
Total 272 questions