We at Crack4sure are committed to giving students who are preparing for the CompTIA N10-007 Exam the most current and reliable questions . To help people study, we've made some of our CompTIA Network+ N10-007 exam materials available for free to everyone. You can take the Free N10-007 Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
A network engineer created a guest wireless network named "Visitor" for clients to use when they are on site. After a couple of months, visiting clients state they cannot access the Internet after connecting to the "Visitor" wireless network, even though configuration changes have not been made. Which of the following is the MOST likely cause of this issue?
A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)
A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?
A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?
A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?
Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likley the cause?
An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring?
A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?
A company’s web-based application has a database that is set up for high availability in case of a failure. Which of the following is necessary to achieve this type of setup?
A SAN serves out storage to a company’s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?
A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?
A business with a point-to-point fiber-optic connection is suddenly unable to communicate between locations. A fiber cut is suspected. Which of the following tools should the network technician use to determine the exact location of the cut?
Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?
A network technician receives a trouble ticket and speaks to the user who is experiencing the issues with the application. Which of the following should the technician perform NEXT?
A network technician is setting up a WiFi network in a multi-tenant building. When trying to determine the best channel, which of the following is the BEST tool to use?
A network administrator is reviewing the following output from a switch.

Which of the following attacks has occurred on the switch?
A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring?
Joe, a technician, is attempting to resolve an issue with an off-site router remotely. Joe needs to reset the WAN connection settings and wants to ensure he will have access to the router at all times to monitor the changes.
Which of the following solutions would BEST meet this goal?
A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement?
According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Select TWO).
The engineering department wants to bring a legacy computer online to test a failed component. When patching the device into the switch, there are no link lights or connectivity. The legacy computer can ping its loopback address successfully. Another device can connect to that same port without issues. Which of the following should the network technician check NEXT? (Choose two.)
The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?
Which of the following Is an object held within an MIB?
A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?
A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?
A technician needs to connect several computers in close proximity to control manufacturing equipment in a factory. The medium to connect the computers most be cost effective and suitable for short distances Which of the following mediums should the technician use?
A technician wants to set an IP address to a specific MAC address on a host machine. Which of the following commands should the technician use?
A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?
A network technician is reviewing the network configuration of a large company. All of the branch routers are connected to each other to allow for redundancy. Which of the following BEST describes this network topology?
A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?
When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?
Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?
An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization and auditing?
The IT director has requested that systems administrators be able to RDP to their servers. Internal users should not be able to access external websites that do not use HTTPS. The network technician implements the following ruleset:
10 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 3389
20 deny tcp 192.168.1.0 0.0.0.255 any eq 80
30 permit tcp 192.168.1.0 0.0.0.255 any eq 443
40 permit tcp 192.168.1.0 0.0.0.255 192.168.10.0 0.0.0.255 eq 80
50 deny ip any any
After implementing this change, users on the 192.168.1.0/24 subnet begin reporting they can no longer access internal servers, Which of the following should the network technician do to correct the issue
and satisfy the director's request?
Which of the following technologies relies on circuit switching?
A network administrator has set up a corporate wireless network at a branch office. Users are able to log into the wireless network with their network credentials after they accept the company root
certificate. Which of the following is the wireless network MOST likely using?
The network team is searching for one device that can perform the routing tote for the LAN and offer a higher number of interfaces for future expansion. Which of the following devices should be used in this scenario?
Joe, a user, needs to utilize a laptop in a conference room When he moves the laptop from his desk and connects it to the conference room port, he does not receive a connection There are no link
lights on the laptop. Which of the following is the MOST likely reason Joe has not received a connection?
A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same
equipment?
An organization with one core and five distribution switches is transitioning from a star to a full-mesh topology Which of the following is the number of additional network connections needed?
A Chief Information Security Officer (CISO) has learned of a zero-day exploit that is being used against a vendor product that is currently deployed within the organization. The network team needs to provide a list of potentially vulnerable assets for the network security team to scan. Which of the following will the network learn MOST likely use?
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?
A network administrator is setting up the network for two new floors and has single Class C net block to use. Each floor must be its own network. Each will have a router and an IP addressed switch,
and each floor population will contain a maximum of 30 endpoints. Which of the following network segments is the MOST efficient use of the Class C to meet the stated requirements?
A network technician has been attempting to gain access to a switch over the network after an extended power outage but has been unsuccessful. The technician runs a network scan and does not find
the switch in the results. The switch is turned on, and the link lights are all green. Which of the following should the technician use to gain access to the switch?
A network technician needs to replace a failed hard drive on a server at the company's large, remote datacenter Which of the following types of documentation should be reviewed to locate this server easily?
The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?
A network technician built a wireless network in a ten-story office building but has found it does not perform well. The technician performed the following steps during the installation:
* Researched and decided that 802.11ac would be the best technology
* Ensured the switch supports PoE+
* Purchased an AP for each floor and spare APs in case of failure
* Put each AP into non-overlapping channels
Which of the following is the MOST likely reason users are experiencing poor performance?
Given the table below:

Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?
Which of the following BEST explains why a network engineer would use a wireless mesh network when connecting sensors to a sensor gateway?
A network technician receives an update in an RSS feed that a new exploit was released for specific hardware used on the network After verifying the vulnerability with the vendor the network. technician discovers the vulnerability was patched almost two years ago. Which of the following techniques should be implemented to discover out-of-date firmware in the future?
Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?
A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:
Which of the following WAN transmission mediums is the fastest and can travel the longest distance?
A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?
A network technician is installing a wireless solution. The solution needs to support new and legacy wireless network clients at the maximum possible speed. Which of the following wireless standards should the technician install?
Which of the following provides information about how often some devices fail so the IT department can take proactive measures?
A company recently removed 50 computers that were connected via Cat 5e cables and replaced them with wireless tablets. Which of the following should be performed to help ensure network security?
hich of the following can be used to prevent devices from handing out IP addresses?
A network technician is troubleshooting a DOCSIS network. Which of the following devices marks the termination of the ISP’s network and the start of the customer’s network?
During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied?
Which of the following accurately describes a warm site in datacenter disaster recovery?
A company’s information security team has requested that wireless devices connect using wireless security that utilizes block-cipher encryption for data in transit. Which of the following wireless security mechanisms should be
configured?
Which of the following technologies allows traffic to be sent through two different ISPs to increase performance?
A security bulletin requires that every access to the VWAN be authenticated using the internal PKI infrastructure and mutual authentication for the servers and clients is mandatory Which of the following will address these requirements?
Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?
A senior technician is reconfiguring the company’s firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?
A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?
While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?
Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?
Some users are reporting a high response time to access network resources after a new network router was installed. Which of the following documents should be updated every time a change is implemented on the network to have information about the metrics that represents how the network behaves during the normal scenarios?
Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)
A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)
An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?
A new technician has been tasked with checking the status of a switchport. The technician needs to find the information quickly without the use of command-line utilities. Which of the following remote management methods would help the technician?
A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?
A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?
A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?
An end user at an Internet cafe tries to visit an online retailer’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor’s page still loads. Which of the following BEST describes what is occurring?
A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?
A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?
A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?
A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company’s firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?
You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:
The SSIDs need to be configured as CorpNet with a key of S3cr3t!
The wireless signals should not interfere with each other.
The subnet the Access Points and switch are on should only support 30 devices maximum.
The Access Points should be configured to only support TKIP clients at a maximum speed.
INSTRUCTIONS
Click on the devices to review their information and adjust the settings of the APs to meet the given requirements.
If any time you would like to bring back the initial state of the simulation, please click the Reset All button.









A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?
Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?
A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?
A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?
A network technician is reviewing the following output from a router:

Which of the following is this an example of?
Which of the following OSI layers contains the LLC function?
Which of the following protocols operates at Layer 4 of the OSI model?
A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?
Which of the following allows for file-level network storage?
A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?
Which of the following manages the delegation of physical equipment to the virtual components?
A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?
A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?