Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA N10-009 Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following ports is a secure protocol?

Options:
A.

20

B.

23

C.

443

D.

445

CompTIA N10-009 Premium Access
Questions 12

Which of the following connector types would most likely be used to connect to an external antenna?

Options:
A.

BNC

B.

ST

C.

LC

D.

MPO

Questions 13

Which of the following attacks utilizes a network packet that contains multiple network tags?

Options:
A.

MAC flooding

B.

VLAN hopping

C.

DNS spoofing

D.

ARP poisoning

Questions 14

A data center interconnect using a VXLAN was recently implemented. A network engineer observes slow performance and fragmentation on the interconnect. Which of the following technologies will resolve the issue?

Options:
A.

802.1Q tagging

B.

Spanning tree

C.

Link aggregation

D.

Jumbo frames

Questions 15

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

Options:
A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Questions 16

Which of the following routing protocols is most commonly used to interconnect WANs?

Options:
A.

IGP

B.

EIGRP

C.

BGP

D.

OSPF

Questions 17

A technician is planning an equipement installation into a rack in a data center that practices hot aisle/cold aise ventilation. Which of the following directions should the equipement exhaust face when installed in the rack?

Options:
A.

Sides

B.

Top

C.

Front

D.

Rear

Questions 18

A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices. Which of the following is the best security feature to accomplish this task?

Options:
A.

802.1X

B.

Access control list

C.

Port security

D.

MAC filtering

Questions 19

While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?

Options:
A.

LLDP

B.

IKE

C.

VLAN

D.

netstat

Questions 20

After a recent power outage, users are reporting performance issues accessing the application servers. Wireless users are also reporting intermittent Internet issues.

INSTRUCTIONS

Click on each tab at the top of the screen. Select a widget to view information, then

use the drop-down menus to answer the associated questions. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-009 Question 20

N10-009 Question 20

Options: