CompTIA N10-009 CompTIA Network+ Certification Online Training
CompTIA N10-009 Online Training
The questions for N10-009 were last updated at Feb 28,2025.
- Exam Code: N10-009
- Exam Name: CompTIA Network+ Certification
- Certification Provider: CompTIA
- Latest update: Feb 28,2025
An IT manager needs to connect ten sites in a mesh network. Each needs to be secured with reduced provisioning time.
Which of the following technologies will best meet this requirement?
- A . SD-WAN
- B . VXLAN
- C . VPN
- D . NFV
After installing a series of Cat 8 keystones, a data center architect notices higher than normal interference during tests.
Which of the following steps should the architect take to troubleshoot the issue?
- A . Check to see if the end connections were wrapped in copper tape before terminating.
- B . Use passthrough modular crimping plugs instead of traditional crimping plugs.
- C . Connect the RX/TX wires to different pins.
- D . Run a speed test on a device that can only achieve 100Mbps speeds.
Which of the following most likely determines the size of a rack for installation? (Select two).
- A . KVM size
- B . Switch depth
- C . Hard drive size
- D . Cooling fan speed
- E . Outlet amperage
- F . Server height
A VoIP phone is plugged in to a port but cannot receive calls.
Which of the following needs to be done on the port to address the issue?
- A . Trunk all VLANs on the port.
- B . Configure the native VLAN.
- C . Tag the traffic to voice VLAN.
- D . Disable VLANs.
As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch.
Which of the following types of attacks is this scenario an example of?
- A . ARP spoofing
- B . Evil twin
- C . MAC flooding
- D . DNS poisoning
A network manager wants to implement a SIEM system to correlate system events.
Which of the following protocols should the network manager verify?
- A . NTP
- B . DNS
- C . LDAP
- D . DHCP
A network engineer is designing a secure communication link between two sites. The entire data stream needs to remain confidential.
Which of the following will achieve this goal?
- A . GRE
- B . IKE
- C . ESP
- D . AH
Which of the following routing protocols uses an autonomous system number?
- A . IS-IS
- B . EIGRP
- C . OSPF
- D . BGP
Which of the following is the most secure way to provide site-to-site connectivity?
- A . VXLAN
- B . IKE
- C . GRE
- D . IPsec
A network administrator needs to connect two routers in a point-to-point configuration and conserve IP space.
Which of the following subnets should the administrator use?
- A . /24
- B . /26
- C . /28
- D . /30