Users report they cannot reach any websites on the internet. An on-site network engineer is able to duplicate the issue on a different PC. The network engineer then tries to ping a website and receives the following message
Ping request could not find host www.google.com. Please check the name and try again.
Which of the following is the next step the engineer should take?
A. Ping 127.0.0.l to test local hardware.
B. Test the website from outside the company.
C. Ping internal name server functionality.
D. Check internet firewall logs for blocked DNS traffic.
A network engineer wants to establish a site-o-site VPN tunnel using a protocol that allows for both data confidentially and authentication. Which of the following is the best choice?
A. IKE
B. AH
C. ESP
D. IPSec
Which of the following copper wire standards utilizes four pairs of wires to achieve Gigabit Ethernet speeds?
A. 1000BASE-FX
B. 1000BASE-T
C. 1000BASE.LR
D. 1000BASE-SX
A network administrator is troubleshooting an issue on a newly configured college campus network. A Linux workstation can connect to the internet, but it fails to connect to the campus intranet, which is located on another campus. Which of the following commands should the administrator run next to troubleshoot the connection?
A. ifconfig
B. traceroute
C. nmap
D. dig
A network consultant is installing a new wireless network with the following specifications:
1.
5GHz
2.
1,300Mbps
3.
20/40/80MHZ
Which of the following standards should the network consultant use?
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11n
Which of the following is most closely associated with attempting to actively prevent network intrusion?
A. IDS
B. Firewall
C. IPS
D. VPN
A user wants to avoid using a password to access a third-party website. Which of the following does the user need in order to allow this type of access to the third-party website?
A. Multifactor
B. RADIUS
C. SSO
D. Local authentication
A technician wants to assign addresses to PCs on a subnet that uses IPv4 and IPv6. The DHCP server only supports IPv4. Which of the following can the technician use to assign IPv6 addresses without DHCP?
A. SLAAC
B. APIPA
C. MAC reservation
D. IPv4 to IPv6 tunnel
Which of the following attacks can be effectively protected against by using techniques to check if a connection was made by a human user? (Choose two.)
A. Brute-force
B. Dictionary
C. On-path attack
D. Phishing
E. Shoulder surfing
F. Evil twin
Users report that the network is slower than usual when accessing on-premises email. Which of the following should a network technician do to confirm the issue?
A. Review the logging levels of network devices.
B. Check the audit logs to see if users are accessing email
C. Compare the network baselines to the current network status.
D. Verify that users who are trying to access email have LDAP accounts
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-009 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.