Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

N10-009 Exam Dumps - CompTIA Network+ Certification Exam

Go to page:
Question # 57

A network administrator is configuring a network for a new site that will have 150 users. Within the next year, the site is expected to grow by ten users. Each user will have two IP addresses, one for a computer and one for a phone connected to the network. Which of the following classful IPv4 address ranges will be best-suited for the network?

A.

Class D

B.

Class B

C.

Class A

D.

Class C

Full Access
Question # 58

A network engineer is testing a website to ensure it is compatible with IPv6. After attempting to ping the website by its IPv6 address, the engineer determines that the DNS has not been set up properly. Which of the following should the network engineer complete to resolve this issue?

A.

Enable a PTR record.

B.

Update the existing TXT record.

C.

Add a new AAAA record.

D.

Configure a secondary NS record.

Full Access
Question # 59

A customer needs six usable IP addresses. Which of the following best meets this requirement?

A.

255.255.255.128

B.

255.255.255.192

C.

255.255.255.224

D.

255.255.255.240

Full Access
Question # 60

A network administrator wants to increase network security by preventing client devices from communicating directly with each other on the same subnet. Which of the following technologies should be implemented?

A.

ACL

B.

Trunking

C.

Port security

D.

Private VLAN

Full Access
Question # 61

Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?

A.

Geofencing

B.

Honeynet

C.

Jumpbox

D.

Screened subnet

Full Access
Question # 62

During a recent security assessment, an assessor attempts to obtain user credentials by pretending to be from the organization's help desk. Which of the following attacks is the assessor using?

A.

Social engineering

B.

Tailgating

C.

Shoulder surfing

D.

Smishing

E.

Evil twin

Full Access
Question # 63

Which of the following is most likely responsible for the security and handling of personal data in Europe?

A.

GDPR

B.

SCADA

C.

SAML

D.

PCI DSS

Full Access
Question # 64

A network administrator is configuring a wireless network with an ESSID. Which of the following is a user benefit of ESSID compared to SSID?

A.

Stronger wireless connection

B.

Roaming between access points

C.

Advanced security

D.

Increased throughput

Full Access
Go to page: