Search Header Logo

CompTIA Network+ Certification Exam N10-009 Practice Test 9

Authored by Wayne Stallworth

Information Technology (IT)

Vocational training

Used 2+ times

CompTIA Network+ Certification Exam N10-009 Practice Test 9
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following answers lists the broadcast address for the 192.168.50.155/20 network?

192.168.31.255

192.168.47.255

192.168.63.255

192.168.79.255

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following answers refer(s) to both SDN and SD-WAN? (Select all that apply)

Prioritization and management of network traffic based on applications being used (application awareness)

Automatic configuration and deployment of network devices without manual intervention (zero-touch provisioning)

Capability to operate over a variety of network connection types (transport-agnostic technology)

Unified control over network policies and configurations (central policy management)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary advantage/improvement of VXLANs over traditional VLANs?

Improved scalability

Cost reduction

Enhanced security

Simplified network configuration

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the answers listed below refers to the technology and solutions used to link multiple data centers into a single, unified network?

SDN

DCI

IaC

VPN

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which VXLAN feature enables the creation of a single, unified network that spans multiple locations?

Frame tagging

Layer 2 encapsulation

IP tunneling

Zero-touch provisioning

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Zero Trust Architecture (ZTA) is a security framework that eliminates implicit trust from networks. In ZTA, access decisions are made based on a combination of policies that consider factors like user identity, device health, and location (policy-based authentication). Additionally, in ZTA users and devices are continuously verified before being granted access to resources, based on real-time assessment of risk and behavior (authorization). To further enhance security, ZTA enforces the principle of giving users and devices only the minimum level of access required for their tasks, thereby reducing the attack surface (least privilege access).

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following acronyms refers to a cybersecurity framework that combines networking and security functions into a single cloud-based service?

SASE

SWG

SSE

SD-WAN

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?