Users cannot connect to an internal website with an IP address 10.249.3.76. A network administrator runs a command and receives the following output:
1 3ms 2ms 3ms 192.168.25.234
2 2ms 3ms 1ms 192.168.3.100
3 4ms 5ms 2ms 10.249.3.1
4 *
5 '
6 *
7 *
Which of the following command-line tools is the network administrator using?
A. tracert
B. netstat
C. tcpdump
D. nmap
A customer recently moved into a new office and notices that some wall plates are not working and are not properly labeled
Which of the following tools would be best to identify the proper wiring in the IDF?
A. Toner and probe
B. Cable tester
C. Visual fault locator
D. Network tap
Which of the following protocols provides remote access utilizing port 22?
A. SSH
B. Telnet
C. TLS
D. RDP
Which of the following is the most secure way to provide site-to-site connectivity?
A. VXLAN
B. IKE
C. GRE
D. IPsec
Which of the following connectors provides console access to a switch?
A. ST
B. RJ45
C. BNC
D. SFP
Which of the following steps in the troubleshooting methodology includes checking logs for recent changes?
A. Identify the problem.
B. Document the findings and outcomes.
C. Test the theory to determine cause.
D. Establish a plan of action.
Which of the following should a network administrator configure when adding OT devices to an organization's architecture?
A. Honeynet
B. Data-at-rest encryption
C. Time-based authentication
D. Network segmentation
While troubleshooting a VoIP handset connection, a technician's laptop is able to successfully connect to network resources using the same port. The technician needs to identify the port on the switch. Which of the following should the technician use to determine the switch and port?
A. LLDP
B. IKE
C. VLAN
D. netstat
A network administrator wants to implement security zones in the corporate network to control access to only individuals inside of the corporation. Which of the following security zones is the best solution?
A. Extranet
B. Trusted
C. VPN
D. Public
Which of the following best explains the role of confidentiality with regard to data at rest?
A. Datacanbe accessedby anyone on the administrative network.
B. Datacanbe accessedremotely with proper training.
C. Datacanbe accessedafter privileged access Is granted.
D. Datacanbe accessedafter verifying the hash.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-009 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.