Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 17

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

B.

Configure the native VLAN.

C.

Tag the traffic to voice VLAN.

D.

Disable VLANs.

Full Access
Question # 18

A medical clinic recently configured a guest wireless network on the existing router. Since then, guests have been changing the music on the speaker system. Which of the following actions should the clinic take to prevent unauthorized access? (Select two).

A.

Isolate smart devices to their own network segment.

B.

Configure IPS to prevent guests from making changes.

C.

Install a new AP on the network.

D.

Set up a syslog server to log who is making changes.

E.

Change the default credentials.

F.

Configure GRE on the wireless router.

Full Access
Question # 19

Which of the following is the correct order of components in a bottom-up approach for the three-tier hierarchical model?

A.

Access, distribution, and core

B.

Core, root, and distribution

C.

Core, spine, and leaf

D.

Access, core, and roof

Full Access
Question # 20

A network engineer configures the network settings in a new server as follows:

IP address = 192.163.1.15

Subnet mask = 255.255.255.0

Gateway = 192.163.1.255

The server can reach other hosts on the same subnet successfully, but it cannot reach hosts on different subnets. Which of the following is most likely configured incorrectly?

A.

Subnet mask

B.

Gateway

C.

Default route

D.

IP address

Full Access
Question # 21

A network engineer discovers network traffic that is sending confidential information to an unauthorized and unknown destination. Which of the following best describes the cause of this network traffic?

A.

Adware

B.

Ransomware

C.

Darkware

D.

Malware

Full Access
Question # 22

A network administrator suspects users are being sent to malware sites that are posing as legitimate sites. The network administrator investigates and discovers that user workstations are configured with incorrect DNS IP addresses. Which of the following should the network administrator implement to prevent this from happening again?

A.

Dynamic ARP inspection

B.

Access control lists

C.

DHCP snooping

D.

Port security

Full Access
Question # 23

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?

A.

SSE

B.

ACL

C.

Perimeter network

D.

802.1x

Full Access
Question # 24

Which of the following would allow a network administrator to analyze attacks coming from the internet without affecting latency?

A.

IPS

B.

IDS

C.

Load balancer

D.

Firewall

Full Access
Go to page: