Free CompTIA N10-009 Exam Questions (page: 20)

Which of the following is used to estimate the average life span of a device?

  1. RPO
  2. RTO
  3. MTTR
  4. MTBF

Answer(s): D

Explanation:

MTBF (Mean Time Between Failures) represents expected operational lifespan and overall reliability of hardware components.



Which of the following is the most secure way to provide site-to-site connectivity?

  1. VXLAN
  2. IKE
  3. GRE
  4. IPSec

Answer(s): D

Explanation:

IPSec provides encrypted, authenticated tunnels with integrity and confidentiality, making it the most secure site-to-site method listed.



A network technician is terminating a cable to a fiber patch panel in the MDF. Which of the following connector types is most likely in use?

  1. F-type
  2. RJ11
  3. BNC
  4. SC

Answer(s): D

Explanation:

SC connectors are commonly used in enterprise-grade fiber patch panels because of their robust push-pull locking mechanism.



A network administrator is connecting two Layer 2 switches in a network. These switches must transfer data in multiple networks.
Which of the following would fulfill this requirement?

  1. Jumbo frames
  2. 802.1Q tagging
  3. Native VLAN
  4. Link aggregation

Answer(s): B

Explanation:

To carry multiple VLANs between two Layer 2 switches, the link must be configured as a trunk, which uses 802.1Q tagging.
This tagging inserts a VLAN ID into each Ethernet frame, allowing several networks (VLANs) to travel over the same physical connection.

Jumbo frames = increases MTU size, not related to VLAN transport

Native VLAN = designates untagged traffic, but does not carry multiple VLANs by itself

Link aggregation = increases bandwidth, but without tagging it cannot transport multiple VLANs

802.1Q is the required technology to allow multiple VLANs across a switch-to-switch link.



A network administrator wants users to be able to authenticate to the corporate network using a port-based authentication framework when accessing both wired and wireless devices.
Which of the following is the best security feature to accomplish this task?

  1. 802.1X
  2. Access control list
  3. Port security
  4. MAC filtering

Answer(s): A

Explanation:

802.1X provides centralized port-based authentication using RADIUS for both wired and wireless clients.



Viewing page 20 of 104



Post your Comments and Discuss CompTIA N10-009 exam prep with other Community members:

N10-009 Exam Discussions & Posts