N10-009 Practice Test Questions

122 Questions


Which of the following protocols provides remote access utilizing port 22?


A. SSH


B. Telnet


C. TLS


D. RDP





A.
  SSH


Explanation:

SSH (Secure Shell) is a protocol used to securely connect to a remote server/system over a network. It operates on port 22 and provides encrypted communication, unlike Telnet which operates on port 23 and is not secure. TLS is used for securing HTTP connections (HTTPS) and operates on ports like 443, while RDP (Remote Desktop Protocol) is used for remote desktop connections and operates on port 3389.

Reference:,

The CompTIA Network+ materials and tutorials cover SSH as the standard protocol for secure remote access, highlighting its operation on port 22., ,

An administrator is configuring a switch that will be placed in an area of the office that is accessible to customers. Which of the following is the best way for the administrator to mitigate unknown devices from connecting to the network?


A. SSE


B. ACL


C. Perimeter network


D. 802.1x





D.
  802.1x


Explanation:

802.1x is a network access control protocol that provides an authentication mechanism to devices trying to connect to a LAN or WLAN. This ensures that only authorized devices can access the network, making it ideal for mitigating the risk of unknown devices connecting to the network, especially in accessible areas.

802.1x Authentication: Requires devices to authenticate using credentials (e.g., username and password, certificates) before gaining network access.

Access Control: Prevents unauthorized devices from connecting to the network, enhancing security in public or semi-public areas.

Implementation: Typically used in conjunction with a RADIUS server to manage authentication requests.

Network References:

CompTIA Network+ N10-007 Official Certification Guide: Covers 802.1x and its role in network security.

Cisco Networking Academy: Provides training on implementing 802.1x for secure network access control.

Network+ Certification All-in-One Exam Guide: Explains the benefits and configuration of 802.1x authentication in securing network access.

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?


A. Stronger wireless connection


B. Roaming between access points


C. Advanced security


D. Increased throughput





B.
  Roaming between access points


Explanation:

An Extended Service Set Identifier (ESSID) allows multiple access points to share the same SSID, enabling seamless roaming for users. This means that users can move between different access points within the same ESSID without losing connection or having to reauthenticate. This provides a better user experience, especially in large environments such as office buildings or campuses.

References:

CompTIA Network+ study materials.

Which of the following connectors provides console access to a switch?


A. ST


B. RJ45


C. BNC


D. SFP





B.
  RJ45


Explanation:

Console Access:

Purpose:

Console access to a switch allows administrators to configure and manage the device directly. This is typically done using a terminal emulator program on a computer.

RJ45 Connector:

Common Use: The RJ45 connector is widely used for Ethernet cables and also for console connections to network devices like switches and routers.

Console Cables: Console cables often have an RJ45 connector on one end (for the switch) and a DB9 serial connector on the other end (for the computer).

Comparison with Other Connectors:


ST (Straight Tip): A fiber optic connector used for networking, not for console access.

BNC (Bayonet Neill-Concelman): A connector used for coaxial cable, typically in older network setups and not for console access.

SFP (Small Form-factor Pluggable): A modular transceiver used for network interfaces, not for console access.

Practical Application:

Connection Process: Connect the RJ45 end of the console cable to the console port of the switch. Connect the DB9 end (or USB via adapter) to the computer. Use a terminal emulator (e.g., PuTTY, Tera Term) to access the switch’s command-line interface (CLI).

References:

CompTIA Network+ study materials on network devices and connectors.

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?


A. 802.1X


B. Access control list


C. Port security


D. MAC filtering





A.
  802.1X


Explanation:

802.1X is a port-based network access control (PNAC) protocol that provides an authentication mechanism to devices wishing to connect to a LAN or WLAN. It is widely used for secure network access, ensuring that only authenticated devices can access the network, whether they are connecting via wired or wireless means. 802.1X works in conjunction with an authentication server, such as RADIUS, to validate the credentials of devices trying to connect.

References:

CompTIA Network+ study materials.

Which of the following panels would be best to facilitate a central termination point for all network cables on the floor of a company building?


A. Patch


B. UPS


C. MDF


D. Rack





A.
  Patch


Explanation:

[Reference: CompTIA Network+ Certification Exam Objectives - Network Installation section., ]

A user connects to a corporate VPN via a web browser and is able to use TLS to access the internal financial system to input a time card. Which of the following best describes how the VPN is being used?


A. Clientless


B. Client-to-site


C. Full tunnel


D. Site-to-site





A.
  Clientless


Explanation:

[Reference: CompTIA Network+ Certification Exam Objectives - Remote Access Methods section., ]

Which of the following should a network administrator configure when adding OT devices to an organization’s architecture?


A. Honeynet


B. Data-at-rest encryption


C. Time-based authentication


D. Network segmentation





D.
  Network segmentation


Explanation:

Network segmentation involves dividing a network into smaller segments or subnets. This is particularly important when integrating OT (Operational Technology) devices to ensure that these devices are isolated from other parts of the network. Segmentation helps protect the OT devices from potential threats and minimizes the impact of any security incidents. It also helps manage traffic and improves overall network performance.References: CompTIA Network+ study materials.

Which of the following best explains the role of confidentiality with regard to data at rest?


A. Datacanbe accessedby anyone on the administrative network.


B. Datacanbe accessedremotely with proper training.


C. Datacanbe accessedafter privileged access Is granted.


D. Datacanbe accessedafter verifying the hash.





C.
  Datacanbe accessedafter privileged access Is granted.

Explanation: Confidentiality with Data at Rest: Confidentiality is a core principle of data security, ensuring that data stored (at rest) is only accessible to authorized individuals. This protection is achieved through mechanisms such as encryption, access controls, and permissions.

Privileged Access: The statement "Data can be accessed after privileged access is granted" aligns with the confidentiality principle, as it restricts data access to users who have been granted specific permissions or roles. Only those with the appropriate credentials or permissions can access the data.

Incorrect Options:

A. "Data can be accessed by anyone on the administrative network." This violates the principle of confidentiality by allowing unrestricted access.
B. "Data can be accessed remotely with proper training." This focuses on remote access rather than restricting access based on privileges.
D. "Data can be accessed after verifying the hash." This option relates more to data integrity rather than confidentiality.

[: CompTIA Network+ materials on data security principles, particularly sections on confidentiality and access control mechanisms​​., ]

A customer is adding fiber connectivity between adjacent buildings. A technician terminates the multimode cable to the fiber patch panel. After the technician connects the fiber patch cable, the indicator light does not turn on. Which of the following should a technician try first to troubleshoot this issue?


A. Reverse the fibers.


B. Reterminate the fibers.


C. Verify the fiber size.


D. Examine the cable runs for visual faults.





A.
  Reverse the fibers.

Explanation: When working with fiber optic cables, one common issue is that the transmit (TX) and receive (RX) fibers might be reversed. The first step in troubleshooting should be to reverse the fibers at one end to ensure they are correctly aligned (TX to RX and RX to TX). This is a simple and quick step to rule out a common issue before moving on to more complex troubleshooting.References: CompTIA Network+ study materials.

A network technician is examining the configuration on an access port and notices more than one VLAN has been set. Which of the following best describes how the port is configured?


A. With a voice VLAN


B. With too many VLANs


C. With a default VLAN


D. With a native VLAN





A.
  With a voice VLAN

Explanation: Explanation: It is common for an access port to have both a voice VLAN and a data VLAN. A voice VLAN separates voice traffic from regular data traffic, ensuring better quality and security for voice communications.

A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare. Which of the following tools wold help identify which ports are open on the remote file server?


A. Dig


B. Nmap


C. Tracert


D. nslookup





B.
  Nmap

Explanation: Nmap (Network Mapper) is a powerful network scanning tool used to discover hosts and services on a computer network. It can be used to identify which ports are open on a remote server, which can help diagnose access issues to services like a remote file server.
Port Scanning: Nmap can perform comprehensive port scans to determine which ports are open and what services are running on those ports.
Network Discovery: It provides detailed information about the host’s operating system, service versions, and network configuration.
Security Audits: Besides troubleshooting, Nmap is also used for security auditing and identifying potential vulnerabilities.
Network References:
CompTIA Network+ N10-007 Official Certification Guide: Covers network scanning tools and their uses.
Nmap Documentation: Official documentation provides extensive details on how to use Nmap for port scanning and network diagnostics.
Network+ Certification All-in-One Exam Guide: Discusses various network utilities, including Nmap, and their applications in network troubleshooting.


Page 2 out of 11 Pages
Previous