Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CompTIA N10-009 Practice Exam with Questions & Answers | Set: 6

Questions 51

A network administrator is in the process of installing 35 PoE security cameras. After the administrator installed and tested the new cables, the administrator installed the cameras. However, a small number of the cameras do not work. Which of the following is the most reason?

Options:
A.

Incorrect wiring standard

B.

Power budget exceeded

C.

Signal attenuation

D.

Wrong voltage

CompTIA N10-009 Premium Access
Questions 52

Which of the following is an XML-based security concept that works by passing sensitve information about users, such as log-in information and attributes, to providers.

Options:
A.

IAM

B.

MFA

C.

RADIUS

D.

SAML

Questions 53

A help desk technician receives a report that users cannot access internet URLs. The technician performs ping tests and finds that sites fail when a URL is used but succeed when an IP is used. Which of the following tools should the technician utilize next?

Options:
A.

tcpdump

B.

tracert

C.

nmap

D.

dig

Questions 54

Which of the following is the most cost-effective way to safely expand outlet capacity in an IDF?

Options:
A.

PDU

B.

Surge protector

C.

UPS

D.

Power strip

Questions 55

A network administrator is planning to host a company application in the cloud, making the application available for all internal and third-party users. Which of the following concepts describes this arrangement?

Options:
A.

Multitenancy

B.

VPC

C.

NFV

D.

SaaS

Questions 56

A network administrator is deploying a new switch and wants to make sure that the default priority value was set for a spanning tree. Which of the following values would the network administrator expect to see?

Options:
A.

4096

B.

8192

C.

32768

D.

36684

Questions 57

After a recent security awareness phishing campaign, the cybersecurity team discovers that additional security measures need to be set up when users access potentially malicious websites. Which of the following security measures will best address this concern?

Options:
A.

Implement DNS filtering.

B.

Update ACLs to only allow HTTPS.

C.

Configure new IPS hardware.

D.

Deploy 802.1X security features.

Questions 58

Which of the following typically uses compromised systems that become part of a bot network?

Options:
A.

Evil twin attack

B.

DDoS attack

C.

XML injection

D.

Brute-force password attack

Questions 59

Which of the following can support a jumbo frame?

Options:
A.

Access point

B.

Bridge

C.

Hub

D.

Switch

Questions 60

Two companies successfully merged. Following the merger, a network administrator identified a connection bottleneck. The newly formed company plans to acquire a high-end 40GB switch and redesign the network from a three-tier model to a collapsed core. Which of the following should the administrator do until the new devices are acquired?

Options:
A.

Implement the FHRP.

B.

Configure a route selection metric change.

C.

Install a load balancer.

D.

Enable link aggregation.