Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 81

An employee in a corporate office clicks on a link in an email that was forwarded to them. The employee is redirected to a splash page that says the page is restricted. Which of the following security solutions is most likely in place?

A.

DLP

B.

Captive portal

C.

Content filtering

D.

DNS sinkholing

Full Access
Question # 82

A systems administrator is investigating why users cannot reach a Linux web server with a browser but can ping the server IP. The server is online, the web server process is running, and the link to the switch is up. Which of the following commands should the administrator run on the server first?

A.

traceroute

B.

netstat

C.

tcpdump

D.

arp

Full Access
Question # 83

A company has observed increased user traffic to gambling websites and wants to limit this behavior on work computers. Which of the following should the company most likely implement?

A.

ACLs

B.

Content filter

C.

Port security

D.

Screened subnet

Full Access
Question # 84
A.

Fire suppression

B.

Power budget

C.

Temperature

D.

Humidity

Full Access
Question # 85

A network engineer receives a new router to use for WAN connectivity. Which of the following best describes the layer the network engineer should connect the new router to?

A.

Access

B.

Core

C.

Leaf

D.

Spine

Full Access
Question # 86

A network administrator performed upgrades on a server and installed a new NIC to improve performance. Following the upgrades, usera are unable to reach the server. Which of the following is the most likely reason.

A.

The PoE power budget was exceeded.

B.

TX/RX was transposed.

C.

A port security violation occured.

D.

An incorrect cable type was installed.

Full Access
Question # 87

Which of the following could provide a lightweight and private connection to a remote box?

A.

Site-to-site VPN

B.

Telnet

C.

Console

D.

Secure Shell

Full Access
Question # 88

A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?

A.

MAC security

B.

Content filtering

C.

Screened subnet

D.

Perimeter network

Full Access
Go to page: