New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! N10-007 has been withdrawn. The new exam code is N10-008

Practice Free N10-007 CompTIA Network+ N10-007 Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the CompTIA N10-007 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Network+ N10-007 exam materials available for free to everyone. You can take the Free N10-007 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

A network engineer created a guest wireless network named "Visitor" for clients to use when they are on site. After a couple of months, visiting clients state they cannot access the Internet after connecting to the "Visitor" wireless network, even though configuration changes have not been made. Which of the following is the MOST likely cause of this issue?

A.

The access point's antenna is not powerful enough to allow all the visitors to establish a connection.

B.

The SSID suggests there is a rogue access point masquerading as the guest network.

C.

The visiting clients are trying to connect to the corporate network without the proper credentials.

D.

The network Is overlapping with the internal corporate wireless network and causing signal loss.

Question # 7

A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)

A.

Disable the HTTP port in the host firewall.

B.

Upgrade the firmware on the firewall.

C.

Generate new SSH host keys.

D.

Remove unnecessary testing accounts.

E.

Issue a new self-signed certificate.

Question # 8

A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?

A.

Use port mirroring

B.

Install an inline tap

C.

Periodically view the server logs

D.

Configure port aggregation

Question # 9

A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

A.

VLAN routing

B.

Server-based firewall configuration issue

C.

Patch cable type

D.

DHCP scope availability

Question # 10

A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

A.

HTTP

B.

Telnet

C.

SSH

D.

TFTP

Question # 11

Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likley the cause?

A.

Duplex/speed mismatch

B.

ACL misconfiguration

C.

Bad port

D.

Crosstalk

Question # 12

An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring?

A.

Phishing

B.

DDoS

C.

Evil twin

D.

MITM

E.

OCSP stapling

Question # 13

A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

A.

Privileged user agreement

B.

AUP

C.

Non-disclosure agreement

D.

Offboarding

Question # 14

A company’s web-based application has a database that is set up for high availability in case of a failure. Which of the following is necessary to achieve this type of setup?

A.

A virtual IP pointing to the active DB

B.

A static IP pointing to the passive DB

C.

A private IP pointing to the web front end

D.

A private IP pointing to the web proxy

Question # 15

A SAN serves out storage to a company’s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?

A.

InfiniBand

B.

iSCSI

C.

Fibre Channel

D.

CIFS

Question # 16

A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?

A.

MT-RJ

B.

BNC

C.

GBIC

D.

F-type

Question # 17

A business with a point-to-point fiber-optic connection is suddenly unable to communicate between locations. A fiber cut is suspected. Which of the following tools should the network technician use to determine the exact location of the cut?

A.

Reflectometer

B.

Cable tester

C.

Loopback tester

D.

Spectrum analyzers

Question # 18

Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?

A.

Powerline extender

B.

Ethernet-over-power adapter

C.

Power-over-Ethernet switch

D.

Power distribution unit

E.

Ethernet power controller

Question # 19

A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform NEXT?

A.

Gather information.

B.

Determine the symptoms.

C.

Establish a plan of action.

D.

Document the findings

Question # 20

A network technician is setting up a WiFi network in a multi-tenant building. When trying to determine the best channel, which of the following is the BEST tool to use?

A.

Protocol analyzer

B.

Tone generator

C.

Spectrum analyzer

D.

Multimeter

Question # 21

A network administrator is reviewing the following output from a switch.

N10-007 question answer

Which of the following attacks has occurred on the switch?

A.

DNS poisoning

B.

ARP poisoning

C.

VLAN hopping

D.

MAC address spoofing

Question # 22

A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring?

A.

Layer 1 - Physical

B.

Layer 3 - Network

C.

Layer 4 - Transport

D.

Layer 7 - Application

Question # 23

Joe, a technician, is attempting to resolve an issue with an off-site router remotely. Joe needs to reset the WAN connection settings and wants to ensure he will have access to the router at all times to monitor the changes.

Which of the following solutions would BEST meet this goal?

A.

Use a secure SSH connection over the WAN link.

B.

Telnet into the router over the company VPN.

C.

Implement a modem on the AUX port.

D.

Configure a DSL router to the console port.

Question # 24

A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement?

A.

CNAME record in the users’ dynamic DNS accounts

B.

Additional lease time for the laptop computers

C.

IP helper relay system for configuration hops

D.

DHCP reservation for the laptops’ MACs

Question # 25

According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Select TWO).

A.

Test solutions.

B.

Duplicate the problem

C.

Establish a theory of probable cause

D.

Question users

E.

Implement preventive measures.

F.

Document findings

Question # 26

The engineering department wants to bring a legacy computer online to test a failed component. When patching the device into the switch, there are no link lights or connectivity. The legacy computer can ping its loopback address successfully. Another device can connect to that same port without issues. Which of the following should the network technician check NEXT? (Choose two.)

A.

Speed setting on the switch

B.

Duplex requirements

C.

Firmware version

D.

Protocols the legacy computer supports

E.

Network card drivers

F.

VLAN settings

Question # 27

The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?

A.

nmap

B.

arp

C.

tcpdump

D.

dig

Question # 28

Which of the following Is an object held within an MIB?

A.

OUI

B.

OTDR

C.

OID

D.

SNMP host

E.

SNMP agent

F.

SNMP trap

Question # 29

A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A.

Channel 6

B.

Channel 7

C.

Channel 9

D.

Channel 10v

Question # 30

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Question # 31

A technician needs to connect several computers in close proximity to control manufacturing equipment in a factory. The medium to connect the computers most be cost effective and suitable for short distances Which of the following mediums should the technician use?

A.

RJ11 connector and Cal6 cable

B.

ST connector and UTP cable

C.

DB-9 connector and plenum cable

D.

BNC connector and RG-59 cable

Question # 32

A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?

A.

ipconfig

B.

nslookup

C.

arp

D.

dig

Question # 33

A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

A.

Open wireless

B.

Geofencing

C.

Pre-shared key

D.

MAC filtering

Question # 34

A network technician is reviewing the network configuration of a large company. All of the branch routers are connected to each other to allow for redundancy. Which of the following BEST describes this network topology?

A.

Mesh

B.

Ring

C.

Bus

D.

Star

Question # 35

A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?

A.

IDF

B.

WAN

C.

LAN

D.

DMZ

Question # 36

When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?

A.

SFTP

B.

SSH

C.

SNMPv1

D.

LDAPS

Question # 37

Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?

A.

Storage array

B.

Type 1 hypervisor

C.

Virtual machine

D.

Guest QS

Question # 38

An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?

A.

MS-CHAP

B.

RADIUS

C.

LDAPS

D.

RSTP

Question # 39

The IT director has requested that systems administrators be able to RDP to their servers. Internal users should not be able to access external websites that do not use HTTPS. The network technician implements the following ruleset:

10 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 3389

20 deny tcp 192.168.1.0 0.0.0.255 any eq 80

30 permit tcp 192.168.1.0 0.0.0.255 any eq 443

40 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 80

50 deny ip any any

After implementing this change, users on the 192.168.1.0/24 subnet begin reporting they can no longer access internal servers, Which of the following should the network technician do to correct the issue

and satisfy the director's request?

A.

Move line 20 to appear after line 40.

B.

Move line 30 to appear before line 10.

C.

Remove line 40.

D.

Remove line 50.

Question # 40

Which of the following technologies relies on circuit switching?

A.

DMVPN

B.

MPLS

C.

PPPoE

D.

DOCSIS

Question # 41

A network administrator has set up a corporate wireless network at a branch office. Users are able to log into the wireless network with their network credentials after they accept the company root

certificate. Which of the following is the wireless network MOST likely using?

A.

WPA2 Enterprise with PSK

B.

WPA2 Personal with PEAP

C.

WPA2 Enterprise with Kerberos

D.

WPA2 Personal with LEAP

Question # 42

The network team is searching for one device that can perform the routing tote for the LAN and offer a higher number of interfaces for future expansion. Which of the following devices should be used in this scenario?

A.

Multilayer switch

B.

VPN concentrator

C.

UTM appliance

D.

NGFW/layer 7 firewall

Question # 43

Joe, a user, needs to utilize a laptop in a conference room When he moves the laptop from his desk and connects it to the conference room port, he does not receive a connection There are no link

lights on the laptop. Which of the following is the MOST likely reason Joe has not received a connection?

A.

202.1x

B.

NAC

C.

Sticky MAC

D.

VLAN assignment

Question # 44

A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same

equipment?

A.

MIMO

B.

TKIP

C.

LTE

D.

SSID

Question # 45

An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?

A.

5

B.

7

C.

10

D.

15

Question # 46

A Chief Information Security Officer (CISO) has learned of a zero-day exploit that is being used against a vendor product that is currently deployed within the organization. The network team needs to provide a list of potentially vulnerable assets for the network security team to scan. Which of the following will the network learn MOST likely use?

A.

IDF documentation

B.

Change management process

C.

Physical network diagram

D.

Inventory management database

Question # 47

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

A.

Omni

B.

Directional

C.

Yagi

D.

Parabolic

Question # 48

A network administrator is setting up the network for two new floors and has single Class C net block to use. Each floor must be its own network. Each will have a router and an IP addressed switch,

and each floor population will contain a maximum of 30 endpoints. Which of the following network segments is the MOST efficient use of the Class C to meet the stated requirements?

A.

192.168.10.0/26

B.

192.168.10.128/25

C.

192.168.10.32/28

D.

192.168.10.64/27

Question # 49

A network technician has been attempting to gain access to a switch over the network after an extended power outage but has been unsuccessful. The technician runs a network scan and does not find

the switch in the results. The switch is turned on, and the link lights are all green. Which of the following should the technician use to gain access to the switch?

A.

SSH

B.

OOB

C.

VNC

D.

Telnet

Question # 50

A network technician needs to replace a failed hard drive on a server at the company's large, remote datacenter Which of the following types of documentation should be reviewed to locate this server easily?

A.

Logical diagrams

B.

Rack diagrams

C.

Change management

D.

Standard operating procedures

Question # 51

The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?

A.

SaaS

B.

PaaS

C.

CaaS

D.

laaS

Question # 52

A network technician built a wireless network in a ten-story office building but has found it does not perform well. The technician performed the following steps during the installation:

* Researched and decided that 802.11ac would be the best technology

* Ensured the switch supports PoE+

* Purchased an AP for each floor and spare APs in case of failure

* Put each AP into non-overlapping channels

Which of the following is the MOST likely reason users are experiencing poor performance?

A.

802.11ac is not the proper wireless technology for a multistory building.

B.

A comprehensive site survey of each floor was not conducted.

C.

Users were not consulted to find out what type of wireless cards they had.

D.

APs in non-overlapping channels are not able to provide proper redundancy.

Question # 53

Given the table below:

N10-007 question answer

Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?

A.

192.168.5.1

B.

192.168.11.0

C.

192.168.11.255

D.

192.168.255.255

Question # 54

Which of the following BEST explains why a network engineer would use a wireless mesh network when connecting sensors to a sensor gateway?

A.

It creates various paths to a particular destination

B.

It increases the overall throughput of the links connecting the devices

C.

It provides redundancy if the sensor network experiences broad wireless interference

D.

It allows autonomous communication if the sensor network goes down

Question # 55

A network technician receives an update in an RSS feed that a new exploit was released for specific hardware used on the network After verifying the vulnerability with the vendor the network. technician discovers the vulnerability was patched almost two years ago. Which of the following techniques should be implemented to discover out-of-date firmware in the future?

A.

Application fuzzing

B.

Malware signature management

C.

Network traffic analysis with tcpdump

D.

Vulnerability scanning

Question # 56

Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?

A.

Remote access

B.

NDA

C.

SLA

D.

BYOD

E.

Incident response

Question # 57

A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:

A.

use a configuration management server

B.

configure a multilayer switch

C.

install a wireless controller

D.

use a proxy server

Question # 58

Which of the following WAN transmission mediums is the fastest and can travel the longest distance?

A.

Satellite

B.

Copper

C.

Wireless

D.

Fiber

Question # 59

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?

A.

DMZ network

B.

Server network

C.

External network

D.

Internal network

Question # 60

A network technician is installing a wireless solution. The solution needs to support new and legacy wireless network clients at the maximum possible speed. Which of the following wireless standards should the technician install?

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

E.

802.11n

Question # 61

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

A.

MTBF

B.

MTTR

C.

SLA

D.

UPS

Question # 62

A company recently removed 50 computers that were connected via Cat 5e cables and replaced them with wireless tablets. Which of the following should be performed to help ensure network security?

A.

Label the ports as unused

B.

Educate the users on the new SOP regarding network access

C.

Ensure the DHCP scope has enough addresses

D.

Disable unneeded ports on the switch

E.

Reassign the ports back to the native VLAN

Question # 63

hich of the following can be used to prevent devices from handing out IP addresses?

A.

DHCP snooping

B.

Dynamic ARP inspection

C.

MAC filtering

D.

BPDU guard

Question # 64

A network technician is troubleshooting a DOCSIS network. Which of the following devices marks the termination of the ISP’s network and the start of the customer’s network?

A.

Router

B.

Hub

C.

Modern

D.

Switch

Question # 65

During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied?

A.

Privileged user accounts

B.

Role separation

C.

Container administration

D.

Job rotation

Question # 66

Which of the following accurately describes a warm site in datacenter disaster recovery?

A.

An online standby datacenter that is fully equipped without company data

B.

A backup datacenter location that is ready for equipment to be installed

C.

A backup datacenter location that is fully equipped bot not online

D.

An online, standby datacenter that is fully equipped with all company data

Question # 67

A company’s information security team has requested that wireless devices connect using wireless security that utilizes block-cipher encryption for data in transit. Which of the following wireless security mechanisms should be

configured?

A.

TKIP-RC4

B.

PEAP

C.

WPA2

D.

EAP-TLS

Question # 68

Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?

A.

Fault tolerance

B.

Quality of service

C.

Load balancing

D.

Port aggregation

Question # 69

A security bulletin requires that every access to the VWAN be authenticated using the internal PKI infrastructure and mutual authentication for the servers and clients is mandatory Which of the following will address these requirements?

A.

EAP-TLS

B.

WPA

C.

Captive portals

D.

Kerberos

Question # 70

Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?

A.

BYOD

B.

NDA

C.

SLA

D.

AUP

Question # 71

A senior technician is reconfiguring the company’s firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?

A.

The technician should put the junior team’s lab in a VLAN and the phone system in the DMZ.

B.

The technician should put the junior team’s lab in a DMZ and the phone system in a VLAN.

C.

The technician should put the junior team’s lab in the LAN and the phone system in the WAN.

D.

The technician should put the junior team’s lab in the WAN and the phone system in a WLAN

Question # 72

A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?

A.

Two days

B.

Three days

C.

Six days

D.

Seven days

Question # 73
A.

install bidirectional transceivers.

B.

Install SFP+ transceivers.

C.

install media converters.

D.

Install duplex transceivers.

Question # 74

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?

A.

Avoiding common passwords

B.

File hashing

C.

Disabling unused IP ports

D.

Using secure protocols

Question # 75

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

A.

1

B.

2

C.

3

D.

4

E.

5

Question # 76

Some users are reporting a high response time to access network resources after a new network router was installed. Which of the following documents should be updated every time a change is implemented on the network to have information about the metrics that represents how the network behaves during the normal scenarios?

A.

Logical diagram

B.

Performance baseline

C.

Change management documentation

D.

IDF/MDF documentation

Question # 77

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Question # 78

A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)

A.

Add a login banner.

B.

Disable unused services.

C.

Upgrade the firmware.

D.

Disable Telnet.

E.

Implement AAA.

F.

Disable SSH.

Question # 79

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?

A.

Brute force

B.

VLAN hopping

C.

Evil twin

D.

DNS poisoning

Question # 80

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

A.

Cat6a

B.

RG-6

C.

UTP

D.

Multimode

E.

Single mode

Question # 81

A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?

A.

SSH

B.

VNC

C.

RDP

D.

HTTPS

Question # 82

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Question # 83

A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?

A.

TXT

B.

A

C.

SRV

D.

CNAME

Question # 84

A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

A.

PAN

B.

WLAN

C.

SAN

D.

MAN

Question # 85

An end user at an Internet cafe tries to visit an online retailer’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor’s page still loads. Which of the following BEST describes what is occurring?

A.

Cross-site scripting

B.

Session hijacking

C.

Man in the middle

D.

DNS poisoning

Question # 86

A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?

A.

Client-to-site VPN

B.

DMVPN

C.

Site-to-site VPN

D.

MPLS VPN

Question # 87

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

A.

Run a port scanner on each name server to ensure TCP port 53 is open and listening.

B.

Run tracert from a desktop client to query each name server and see what answers are sent back from each server.

C.

Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

D.

Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Question # 88

A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?

A.

MU-MIMO

B.

MIMO

C.

Channel bonding

D.

TDM

E.

Automatic channel selection

Question # 89

A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company’s firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?

A.

Bridge

B.

Router

C.

Multilayer switch

D.

Media converter

Question # 90

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

N10-007 question answerThe SSIDs need to be configured as CorpNet with a key of S3cr3t!

N10-007 question answerThe wireless signals should not interfere with each other.

N10-007 question answerThe subnet the Access Points and switch are on should only support 30 devices maximum.

N10-007 question answerThe Access Points should be configured to only support TKIP clients at a maximum speed.

INSTRUCTIONS

Click on the devices to review their information and adjust the settings of the APs to meet the given requirements.

If any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-007 question answer

N10-007 question answer

N10-007 question answer

N10-007 question answer

N10-007 question answer

N10-007 question answer

N10-007 question answer

N10-007 question answer

N10-007 question answer

Question # 91

A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?

A.

Pre-shared key

B.

Open

C.

EAP-TLS

D.

WPA2

Question # 92

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Question # 93

A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?

A.

No QoS configured on the network

B.

Signal-to-noise ratio

C.

Interference from the microwave in the breakroom

D.

Rogue AP installed in the office

Question # 94

A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

A.

10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.

B.

127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.

C.

172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.

D.

192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.

Question # 95

A network technician is reviewing the following output from a router:

N10-007 question answer

Which of the following is this an example of?

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Question # 96

Which of the following OSI layers contains the LLC function?

A.

Network

B.

Data link

C.

Session

D.

Transport

Question # 97

Which of the following protocols operates at Layer 4 of the OSI model?

A.

TCP

B.

ARP

C.

IMAP

D.

POP3

Question # 98

A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?

A.

VLSM

B.

Class B private network

C.

EUI-64

D.

IPv6

Question # 99

Which of the following allows for file-level network storage?

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Question # 100

A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?

A.

Bridge

B.

WAP

C.

Hub

D.

Switch

Question # 101

Which of the following manages the delegation of physical equipment to the virtual components?

A.

Virtual router

B.

Hypervisor

C.

Virtual switch

D.

Network card

Question # 102

A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

A.

Implement WPA2-PSK.

B.

Implement a captive portal.

C.

Implement certificate-based 802.1X.

D.

Implement MAC filtering.

Question # 103

A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filter