A network administrator wants to configure a backup route in case the primary route fails. A dynamic routing protocol is not installed on the router. Which of the following routing features should the administrator choose to accomplish this task?
A. Neighbor adjacency
B. Link state flooding
C. Administrative distance D. Hop count
A network administrator is planning to implement device monitoring to enhance network visibility. The security that the solution provies authentication and encryption. Which of the following meets these requirements?
A. SIEM
B. Syslog
C. NetFlow
D. SNMPv3
Which of the following network cables involves bounding light off of protective cladding?
A. Twinaxial
B. Coaxial
C. Single-mode
D. Multimode
A network technician needs to install patch cords from the UTP patch panel to the access switch for a newly occupied set of offices. The patch panel is not labeled for easy jack identification. Which of the following tools provides the easiest way to identify the appropriate patch panel port?
A. Toner
B. Laptop
C. Cable tester
D. Visual fault locator
Which of the following best describes a group of devices that is used to lure unsuspecting attackers and to study the attackers' activities?
A. Geofencing
B. Honeynet
C. Jumpbox
D. Screened subnet
Which of the following IP transmission types encrypts all of the transmitted data?
A. ESP
B. AH
C. GRE
D. UDP
E. TCP
A research facility is expecting to see an exponential increase in global network traffic in the near future. The offices are equipped with 2.5Gbps fiber connections from the ISP, but the facility is currently only utilizing 1Gbps connections. Which of the following would need to be configured in order to use the ISP's connection speed?
A. 802.1Q tagging
B. Network address translation
C. Port duplex
D. Link aggregation
Which of the following network topologies contains a direct connection between every node in the network?
A. Mesh
B. Hub-and-spoke
C. Star
D. Point-to-point
A company receives a cease-and-desist order from its ISP regarding prohibited torrent activity. Which of the following should be implemented to comply with the cease-and-desist order?
A. MAC security
B. Content filtering
C. Screened subnet
D. Perimeter network
A network engineer is now in charge of all SNMP management in the organization. The engineer must use a SNMP version that does not utilize plaintext data. Which of the following is the minimum version of SNMP that supports this requirement?
A. v1
B. v2c
C. v2u
D. v3
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-009 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.