Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 25

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Full Access
Question # 26

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?

A.

MTTR

B.

MTBF

C.

RPO

D.

RTO

Full Access
Question # 27

A network administrator has beenmonitoring the company's serversto ensure that they are available. Which of the following should the administrator use for this task?

A.

Packet capture

B.

Data usage reports

C.

SNMP traps

D.

Configuration monitoring

Full Access
Question # 28

A network administrator needs to set up a multicast network for audio and video broadcasting. Which of the following networks would be the most appropriate for this application?

A.

172.16.0.0/24

B.

192.168.0.0/24

C.

224.0.0.0/24

D.

240.0.0.0/24

Full Access
Question # 29

A university is implementing anew campus wireless network. A network administrator needs to configure the network to supporta large number of devices and high-bandwidth demands from students.

Which of the followingwireless technologiesshould the administrator consider for this scenario?

A.

Bluetooth

B.

Wi-Fi 6E

C.

5G

D.

LTE

Full Access
Question # 30

Which of the following best describes the transmission format that occurs at the transport layer over connectionless communication?

A.

Datagram

B.

Segment

C.

Frames

D.

Packets

Full Access
Question # 31

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Full Access
Question # 32

Which of the following is the most likely reason an insurance brokerage would enforce VPN usage?

A.

To encrypt sensitive data in transit

B.

To secure the endpoint

C.

To maintain contractual agreements

D.

To comply with data retentin requirements

Full Access
Go to page: