CompTIA Network+ Certification N10-009 Exam Practice Test

Page: 1 / 14
Total 363 questions
Question 1

A company recently implemented a videoconferencing system that utilizes large amounts of bandwidth. Users start reporting slow internet speeds and an overall decrease in network performance. Which of the following are most likely the causes of the network performance issues? (Select two)



Answer : E, F

When high-bandwidth services like videoconferencing are introduced, two primary factors may degrade performance:

Incorrect QoS Settings (E):QoS (Quality of Service) is used to prioritize traffic. If not configured correctly, critical services like video may not get the necessary bandwidth and prioritization.

Network Congestion (F):Video services consume large amounts of data. If the network doesn't have sufficient bandwidth or is not segmented properly, congestion will slow down all services.

DNS misconfiguration (A) would affect name resolution, not bandwidth.

Malware (C) could degrade performance, but is not tied to the described scenario.

Outdated software (D) may affect performance in some cases, but not directly linked to network congestion in this case.

Inadequate network security (B) isn't likely to cause general slowness related to video traffic.

So, the most likely culprits are E. Incorrect QoS settings and F. Network congestion.


===========

Question 2

Which of the following allows a standard user to log in to multiple resources with one account?



Answer : D

Single Sign-On (SSO) enables a user to access multiple resources or applications with one set of credentials, improving usability and security. The document confirms:

''Single Sign-On (SSO) allows a user to authenticate once and gain access to multiple resources or applications without needing to log in again for each. It streamlines the login process and improves security by reducing the number of passwords that need to be managed.''


Question 3

Which of the following is a company most likely enacting if an accountant for the company can only see the financial department's shared folders?



Answer : B

Least privilege network access is a principle that restricts users' access rights to only what is necessary for them to perform their job functions. In this case, the accountant's access is limited to only the financial department's shared folders, ensuring that they cannot access other parts of the network unnecessarily. This reduces the risk of unauthorized access and potential data breaches. Reference: CompTIA Network+ Exam Objectives and official study guides.


Question 4

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?



Answer : D, D

The issue is clearly related to DNS resolution, as IP-based connections succeed but domain name-based ones fail.


Question 5

Which of the following protocol ports should be used to securely transfer a file?



Answer : A

Port 22 is used for SFTP (Secure File Transfer Protocol) and SCP (Secure Copy Protocol), which encrypt file transfers using SSH (Secure Shell). This ensures data is transmitted securely over the network.

*Why not the other options?

*Port 69 (B) -- TFTP (Trivial File Transfer Protocol): Transfers files but is not secure (no encryption).

*Port 80 (C) -- HTTP: Used for web traffic, not for file transfer.

*Port 3389 (D) -- RDP (Remote Desktop Protocol): Used for remote desktop access, not file transfer.


CompTIA Network+ (N10-009) Official Guide -- Chapter 5: Network Protocols and Ports

Question 6

Which of the following steps of the troubleshooting methodology should a technician take to confirm a theory?



Answer : A

Troubleshooting Methodology:

Troubleshooting involves a systematic approach to diagnosing and resolving issues. It typically includes steps such as identifying symptoms, gathering information, formulating and testing theories, and implementing solutions.

Confirming a Theory:

Duplicate the Problem: To confirm a theory, the technician should reproduce the problem in a controlled environment. This helps verify that the identified cause actually leads to the observed issue.

Verification: By duplicating the problem, the technician can observe the issue firsthand, validate the hypothesis, and rule out other potential causes.

Comparison with Other Steps:

Identify the Symptoms: Initial step to understand what the problem is, not specifically for confirming a theory.

Gather Information: Involves collecting data and details about the issue, usually done before formulating a theory.

Determine Any Changes: Involves checking for recent changes that could have caused the issue, a part of the information-gathering phase.

Implementation:

Use similar equipment or software in a test environment to recreate the issue.

Observe the results to see if they match the original problem, thereby confirming the theory.


CompTIA Network+ study materials on troubleshooting methodologies and best practices.

Question 7

An organization requires the ability to send encrypted email messages to a partner from an email server that is hosted on premises. The organization prefers to use the standard default ports when creating firewall rules. Which of the following ports should be open to satisfy the requirements?



Answer : C

Port 587 is the standard default port for sending email (SMTP) with TLS encryption, which is used to secure email transmissions between mail servers or between clients and mail servers. Allowing traffic over port 587 enables secure email sending while maintaining standard protocol usage. (Reference: CompTIA Network+ Study Guide, Chapter on Ports and Protocols)


Page:    1 / 14   
Total 363 questions