New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 9

A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?

A.

Toner

B.

Laptop

C.

Cable tester

D.

Visual fault locator

Full Access
Question # 10

Three access points have Ethernet that runs through the ceiling. One of the access points cannot reach the internet. Which of the following tools can help identify the issue?

A.

Network tap

B.

Cable tester

C.

Visual fault locator

D.

Toner and probe

Full Access
Question # 11

Which of the following best explains the role of confidentiality with regard to data at rest?

A.

Datacanbe accessedby anyone on the administrative network.

B.

Datacanbe accessedremotely with proper training.

C.

Datacanbe accessedafter privileged access Is granted.

D.

Datacanbe accessedafter verifying the hash.

Full Access
Question # 12

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

Full Access
Question # 13

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)

A.

Least privilege network access

B.

Dynamic inventeries

C.

Central policy management

D.

Zero-touch provisioning

E.

Configuration drift prevention

F.

Subnet range limits

Full Access
Question # 14

Which of the following is a cost-effective advantage of a split-tunnel VPN?

A.

Web traffic is filtered through a web filter.

B.

More bandwidth is required on the company's internet connection.

C.

Monitoring detects insecure machines on the company’s network.

D.

Cloud-based traffic flows outside of the company's network.

Full Access
Question # 15

A company wants to implement data loss prevention by restricting user access to social media platforms and personal cloud storage on workstations. Which of the following types of filtering should the company deploy to achieve these goals?

A.

Port

B.

DNS

C.

MAC

D.

Content

Full Access
Question # 16

You have been tasked with implementing an ACL on the router that will:

1. Permit the most commonly used secure remote access technologies from the management network to all other local network segments

2. Ensure the user subnet cannot use the most commonly used remote access technologies in the Linux and Windows Server segments.

3. Prohibit any traffic that has not been specifically allowed.

INSTRUCTIONS

Use the drop-downs to complete the ACL

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Go to page: