Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CompTIA Network+ Certification Exam

Last Update 12 hours ago Total Questions : 507

The CompTIA Network+ Certification Exam content is now fully updated, with all current exam questions added 12 hours ago. Deciding to include N10-009 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our N10-009 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these N10-009 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CompTIA Network+ Certification Exam practice test comfortably within the allotted time.

Question # 4

A junior network administrator gets a text message from a number posing as the domain registrar of the firm. The administrator is tricked into providing global administrator credentials. Which of the following attacks is taking place?

A.

DNS poisoning

B.

ARP spoofing

C.

Vishing

D.

Smishing

Question # 5

A virtual machine has the following configuration:

•IPv4 address: 169.254.10.10

•Subnet mask: 255.255.0.0

The virtual machine can reach colocated systems but cannot reach external addresses on the Internet. Which of the following Is most likely the root cause?

A.

Thesubnet mask is incorrect.

B.

TheDHCP server is offline.

C.

TheIP address is an RFC1918 private address.

D.

TheDNS server is unreachable.

Question # 6

A detective is investigating an identity theft case in which the target had an RFID-protected payment card issued and compromised in the same day. The only place the target claims to have used the card was at a local convenience store. The detective notices a video camera at the store is placed in such a way that customers ' credentials can be seen when they pay. Which of the following best explains this social engineering technique?

A.

Shoulder surfing

B.

Impersonation

C.

Vishing

D.

Tailgating

Question # 7

Which of the following indicates a computer has reached end-of-support?

A.

The computer does not have any users.

B.

The antivirus protection is expired.

C.

The operating system license is expired.

D.

No more patches or bug fixes are available indefinitely.

Question # 8

Which of the following best describes the amount of time between a disruptive event and the point that affected resources need to be back to fully functional status?

A.

RTO

B.

MTBF

C.

RPO

D.

MTTR

Question # 9

Which of the following most likely requires the use of subinterfaces?

A.

A router with only one available LAN port

B.

A firewall performing deep packet inspection

C.

A hub utilizing jumbo frames

D.

A switch using Spanning Tree Protocol

Question # 10

A network engineer is designing an internal network that needs to support both IPv4 and IPv6 routing. Which of the following routing protocols is capable of supporting both IPv4 and IPv6?

A.

OSPFv3

B.

RIPv2

C.

BGP

D.

EIGRP

Go to page: