N10-009 Practice Test Questions

240 Questions


A network engineer configures a new switch and connects it to an existing switch for expansion and redundancy. Users immediately lose connectivity to the network. The network engineer notes the following spanning tree information from both switches:

Switch 1

Port State Cost

1 Forward 2
2 Forward 2

Switch 2

Port State Cost

1 Forward 2
2 Forward 2

Which of the following best describes the issue?


A. The port cost should not be equal.


B. The ports should use link aggregation.


C. A root bridge needs to be identified.


D. The switch should be configured for RSTP.





C.
  A root bridge needs to be identified.

Explanation: Explanation: The issue is that no root bridge has been identified. In STP, a root bridge is necessary to manage redundant paths and avoid loops in the network. Without a root bridge, all switches will assume they can forward traffic, causing a network loop and connectivity problems.

Which of the following can support a jumbo frame?


A. Access point


B. Bridge


C. Hub


D. Switch





D.
  Switch

Explanation:
Definition of Jumbo Frames:

Jumbo frames are Ethernet frames with more than 1500 bytes of payload, typically up to 9000 bytes. They are used to improve network performance by reducing the overhead caused by smaller frames.

Why Switches Support Jumbo Frames:

Switches are network devices designed to manage data packets and can be configured to support jumbo frames. This capability enhances throughput and efficiency, particularly in high-performance networks and data centers.

Incompatibility of Other Devices:

Access Point: Primarily handles wireless communications and does not typically support jumbo frames.
Bridge: Connects different network segments but usually operates at standard Ethernet frame sizes.
Hub: A simple network device that transmits packets to all ports without distinguishing between devices, incapable of handling jumbo frames.

Practical Application:

Enabling jumbo frames on switches helps in environments where large data transfers are common, such as in storage area networks (SANs) or large-scale virtualized environments.

References:
CompTIA Network+ course materials and networking hardware documentation.

A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled Which of the following tools would be best to identify the proper wiring in the IDF?


A. Toner and probe


B. Cable tester


C. Visual fault locator


D. Network tap





A.
  Toner and probe

Explanation: A toner and probe tool, also known as a tone generator and probe, is used to trace and identify individual cables within a bundle or to locate the termination points of cables in wiring closets and patch panels. It generates a tone that can be picked up by the probe, helping technicians quickly and accurately identify and label wall plates and wiring. This is the best tool for identifying proper wiring in the Intermediate Distribution Frame (IDF). References: CompTIA Network+ Exam Objectives and official study guides.

A network administrator notices interference with industrial equipment in the 2.4GHz range. Which of the following technologies would most likely mitigate this issue? (Select two).


A. Mesh network


B. 5GHz frequency


C. Omnidirectional antenna


D. Non-overlapping channel


E. Captive portal


F. Ad hoc network





B.
  5GHz frequency

A network architect needs to create a wireless field network to provide reliable service to public safety vehicles. Which of the following types of networks is the best solution?


A. Mesh


B. Ad hoc


C. Point-to-point


D. Infrastructure





A.
  Mesh

A client wants to increase overall security after a recent breach. Which of the following would be best to implement? (Select two.)


A. Least privilege network access


B. Dynamic inventeries


C. Central policy management


D. Zero-touch provisioning


E. Configuration drift prevention


F. Subnet range limits





A.
  Least privilege network access

C.
  Central policy management

Which of the following is a characteristic of the application layer?


A. It relies upon other layers for packet delivery. O


B. It checks independently for packet loss.


C. It encrypts data in transit.


D. It performs address translation.





A.
  It relies upon other layers for packet delivery. O

B.
   It checks independently for packet loss.

A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?


A. Extranet


B. Trusted


C. VPN


D. Public





B.
  Trusted

Which of the following disaster recovery concepts is calculated by dividing the total hours of operation by the total number of units?


A. MTTR


B. MTBF


C. RPO


D. RTO





B.
  MTBF

Which of the following should be configured so users can authenticate to a wireless network using company credentials?


A. SSO


B. SAML


C. MFA


D. RADIUS





D.
  RADIUS

A network manager wants to implement a SIEM system to correlate system events. Which of the following protocols should the network manager verify?


A. NTP


B. DNS


C. LDAP


D. DHCP





A.
  NTP

Which of the following most likely determines the size of a rack for installation?


A. KVM size


B. Switch depth


C. Hard drive size


D. Cooling fan speed


E. Outlet amperage


F. Server height





B.
  Switch depth


Page 8 out of 20 Pages
Previous