A network technician installs a new 19.7ft (6m), Cat 6, UTP cable for the connection between a server and a switch. Communication to the server is degraded, and the NIC statistics show dropped packets and CRC errors. Which of the following cables would the technician most likely use instead to reduce the errors?
Answer : D
The errors described --- dropped packets and CRC (Cyclic Redundancy Check) errors --- often indicate electromagnetic interference (EMI) on unshielded twisted pair (UTP) cabling. The correct replacement is STP (Shielded Twisted Pair), which has shielding that protects signals from external interference, ensuring better reliability in noisy environments such as data centers or near heavy electrical equipment.
A . Coaxial is not used for modern Ethernet server-switch links.
B . Shorter UTP cable does not solve EMI issues.
C . Plenum cable refers to cable jacket type for fire safety, not electrical shielding.
STP cabling reduces interference and ensures reliable gigabit+ Ethernet connections between servers and switches.
Domain: Network Troubleshooting --- Cabling issues, UTP vs. STP, EMI.
A network engineer needs to deploy an access point at a remote office so that it will not communicate back to the wireless LAN controller. Which of the following deployment methods must the engineer use to accomplish this task?
Answer : B
Autonomous access points operate independently without needing to communicate with a central wireless LAN controller. This is ideal for remote deployments.
From Andrew Ramdayal's guide:
''Autonomous access points are stand-alone devices that manage their own configurations and operations. They do not require a WLC and are ideal for small or remote office deployments.''
Which of the following is an XML-based security concept that works by passing sensitive information about users, such as login information and attributes, to providers?
Answer : D
The correct answer is SAML (Security Assertion Markup Language). SAML is an XML-based standard used for single sign-on (SSO) and identity federation. It allows identity providers (IdPs) to share authentication and authorization data with service providers (SPs), passing secure tokens containing user attributes and credentials.
A . IAM (Identity and Access Management) is the broader framework, not specifically XML-based.
B . MFA enforces multiple factors for authentication but does not involve XML assertions.
C . RADIUS is an AAA protocol, but it uses UDP, not XML assertions.
SAML is widely used in federated identity systems, enabling secure authentication across different domains and applications without requiring multiple credentials.
Network administrators are using the Telnet protocol to administer network devices that are on the 192.168.1.0/24 subnet. Which of the following tools should the administrator use to best identify the devices?
Answer : B
nmap (Network Mapper) is the best tool in this scenario. It can scan the 192.168.1.0/24 subnet to discover live hosts, open ports (like Telnet on port 23), and device types. It's ideal for mapping and auditing the network.
A . dig is a DNS lookup tool; not useful for identifying hosts on a subnet.
C . tracert shows the path packets take to a destination, not for host discovery.
D . telnet is the protocol being used, not a tool for scanning or identifying devices.
Reference:
CompTIA Network+ N10-009 Official Objectives: 5.1 -- Given a scenario, use the appropriate network troubleshooting tools.
A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?
Answer : D
Smishing (SMS phishing) occurs when attackers send fraudulent text messages pretending to be a trusted source, tricking the victim into giving up sensitive credentials. Since this came via text message, it qualifies as smishing.
A . DNS poisoning corrupts name resolution.
B . ARP spoofing manipulates MAC-to-IP mappings.
C . Vishing is phishing via voice calls, not text.
Reference (CompTIA Network+ N10-009):
Users are reporting issues with mobile phone connectivity after a cellular repeater was recently installed. Users also note that the phones are rapidly losing battery charge. Which of the following should the technician check first to troubleshoot the issue?
Answer : B
When signal strength is poor, mobile devices constantly boost their transmission power in an attempt to maintain a stable connection. This results in dropped calls/data and rapid battery drain. Since a repeater was installed, misalignment or misconfiguration could be degrading the signal strength.
A . WPS applies to Wi-Fi, not cellular repeaters.
C . Channel frequency might matter for interference, but signal strength is the most direct cause of the described symptoms.
D . Power budget applies to PoE and wired devices, not mobile phones.
Reference (CompTIA Network+ N10-009):
Which of the following is the step that a troubleshooter should take immediately after implementing a solution?
Answer : C
After implementing the solution, the immediate next step is to verify full system functionality. This confirms that the problem has been resolved and helps ensure no new issues have been introduced.
From Andrew Ramdayal's guide:
''After the solution is implemented, test the system to ensure that it is fully operational, and the original problem has been resolved. Also, put in place any measures that could prevent the issue from recurring.''