A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and coverage?
- A. 802.11ac
- B. 802.11ax
- C. 802.11g
- D. 802.11n
Free N10-009 sample questions for the CompTIA Network+ exam. No account required: study at your own pace.
Want an interactive quiz? Take the full N10-009 practice testLooking for more? Click here to get the full PDF with 491+ practice questions for $10 for offline study and deeper preparation.
A company is implementing a wireless solution in a high-density environment. Which of the following 802.11 standards is used when a company is concerned about device saturation and coverage?
Which of the following would a network administrator most likely use to securely manage a network device on a closed network?
A network administrator needs to assign IP addresses to a newly installed network. They choose 192.168.1.0/24 as their network address and need to create three subnets with 30 hosts on each subnet. Which of the following is a valid subnet mask that will meet the requirements?
Which of the following typically uses compromised systems that become part of a bot network?
A network engineer needs to add a boundary network to isolate and separate the internal network from the public-facing internet. Which of the following security defense solutions would best accomplish this task?
Which of the following is the best device to use to provide security and filtering between a private network and a public network?
Which of the following is the OSI model layer that uses a connectionless protocol for packet delivery?
Which of the following ports is used for secure email?
An organization wants to ensure that incoming emails were sent from a trusted source. Which of the following DNS records is used to verify the source?
A network engineer configures an application server so that it automatically adjusts resource allocation as demand changes. This server will host a new application and demand is not predictable. Which of the following concepts does this scenario demonstrate?
A company discovers on video surveillance recordings that an unauthorized person installed a rogue access point in its secure facility. Which of the following allowed the unauthorized person to do this?
Which of the following is created to illustrate the effectiveness of wireless networking coverage in a building?
A technician needs to identify a computer on the network that is reportedly downloading unauthorized content. Which of the following should the technician use?
Which of the following are the main differences between ESP and AH? (Choose two.)
An ISP provided a company with an IP range of 98.174.235.142/28. A network technician configured a router with a subnet mask of 255.255.255.224 and default gateway of 98.174.235.129. After the configuration was set up. the company is unable to connect to the ISP. Which of the following would resolve this issue?
Which of the following should a network administrator configure when adding OT devices to an organization's architecture?
Which of the following connectors allows a singular QSFP transceiver to have several physical connections?
Which of the following attacks utilizes a network packet that contains multiple network tags?
Users at a satellite office are experiencing issues when using videoconferencing. Which of the following should a technician focus on first to rectify these issues?
Which of the following should an installer orient a port-side exhaust to when installing equipment?
Download the complete N10-009 study bundle with 491+ questions in a single printable PDF.