Summer Special Sales Coupon - 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s55disc

N10-007 PDF

$49.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

N10-007 PDF + Testing Engine

$79.2

$175.99

3 Months Free Update

  • Exam Name: CompTIA Network+ N10-007
  • Last Update: Sep 28, 2022
  • Questions and Answers: 688
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

N10-007 Engine

$59.4

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

N10-007 CompTIA Network+ N10-007 Questions and Answers

Question # 6

A network technician has deployed an application that can remotely control desktops with different operating systems. The technician needs to be able to use a single client application for this control. Which of the following has the technician utilized?

A.

RDP

B.

VPN

C.

VNC

D.

SSH

Full Access
Question # 7

A VoIP device is not getting power at a new user's desk. The technician tests the components with a PoE injector at the switch and resolves the issue. Which of the following is the MOST likely cause of the issue?

A.

vlan mismatch

B.

Bad switchpod

C.

TXJRX reverse

D.

Latency

E.

Damaged cable

Full Access
Question # 8

A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?

A.

Punchdown tool

B.

Crimper

C.

OTDR

D.

Loopback adapter

Full Access
Question # 9

Which of the following technologies relies on circuit switching?

A.

DMVPN

B.

MPLS

C.

PPPoE

D.

DOCSIS

Full Access
Question # 10

An administrator is working on an email migration project and needs to verify if the new MX records have propagated across public DNS servers. Which of the following is the MOST appropriate software tool for the administrator to use?

A.

Iptables

B.

Nslookup

C.

PathPing

D.

netstat

Full Access
Question # 11

Which of the following is a system that is installed directly on a server's hardware and abstracts the hardware from any guest machines?

A.

Storage array

B.

Type 1 hypervisor

C.

Virtual machine

D.

Guest QS

Full Access
Question # 12

Which of the following DNS record types can help limit spam?

A.

SPF

B.

SRV

C.

A

D.

MX

Full Access
Question # 13

Internal users have been unable to access the web server on a local network that they are to use. qi have been to the help desk, and a technician has decided to apply the following commands to the equipment:

access-list 103 permit tcp any any eq 80

access-list 103 permit tcp any any eq 443

access-list 103 deny ip any any

On which of the following devices would the technician apply these commands?

D. Switch

B. Modem

C. Border router

D. Bridge

E. PDU

Full Access
Question # 14

A Chief Information Officer (CIO) is reviewing a proposal to provide access security for the IT department’s restricted area. Which of the following is a preventive measure that should be implemented?

A.

Motion detection

B.

Cameras

C.

Biometric lock

D.

Asset tags

Full Access
Question # 15

A network technician receives a help desk ticket indicating all users at a branch office are having problems connecting to the corporate wireless network, The technician verifies the wireless controller can see the WAPS at this

office and they are configured appropriately. After reviewing recently closed tickets, the network technician discovers a software upgrade was implemented to the wireless network at that branch office overnight. Which of the

following is MOST likely the cause of the issue?

A.

The office is over capacity.

B.

The power levels were reduced.

C.

The SSID is incorrect.

D.

There Is a security type mismatch.

Full Access
Question # 16

Which of the following would an organization MOST likely have users sign before granting administrative access?

A.

An NDA

B.

A PUA

C.

An AUP

D.

A DLP

Full Access
Question # 17

A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the company’s network? (Choose three.)

A.

67

B.

68

C.

161

D.

636

E.

1720

F.

5060

G.

5061

Full Access
Question # 18

A network technician is connecting medical monitoring devices on a personal area network for patients' phones. Which of the following technologies should be used?

A.

Bluetooth

B.

ROD

C.

NFC

D.

IR

Full Access
Question # 19

Several open conference rooms have active wired network connections. To discourage unauthorized users a network technician wants to require users in the conference rooms to authenticate to the network before gaining access. Which of the following would be the BEST network technology to use?

A.

WPA

B.

MAC filtering

C.

ACLs

D.

802.1X

Full Access
Question # 20

A network technician is running copper cable from a core switch to a network closet that is approximately 574ft(175m) away. Which of the following should the technician use to accomplish this?

A.

Bridge

B.

Hub

C.

Patch panel

D.

Load balancer

Full Access
Question # 21

Which of the following allows for connectionless communications?

A.

TGP

B.

MAG

C.

UDP

D.

IF

Full Access
Question # 22

A network engineer is planning to connect a legacy network switch to a core switch for redundancy. The proposed cable will run in the celling above high-voltage industrial equipment and fluorescent lights. The legacy

switch has 1000BASE-T ports with no expansion slots. The engineer has decided to use multimode cable to make this connection. Which of the following will be needed to connect the two switches?

A.

RG-6 connectors

B.

A patch panel

C.

A GBIC transceiver

D.

A media converter

Full Access
Question # 23

A network technician is installing a new lab network for systems engineers to test patches and updates in a simulated production environment. The engineers have requested that the lab network have unrestricted access to the Internet, but they want to limit connectivity from the LAN to the systems engineers only. Which of the following will the technician MOST likely implement to meet these requirements?

A.

A proxy server

B.

A bridge

C.

A firewall

D.

A switch

Full Access
Question # 24

A company wants to create a high-speed, highly redundant, metro-area network with the fastest possible fault handling in order to provide telecommunications circuits to its customer base. Which of the

following technologies would be BEST to use?

A.

Metropolitan Ethernet

B ISDN

B.

SONET OC-x

C.

THUT3

Full Access
Question # 25

A network administrator is concerned about the management traffic between a machine and the corporate router. Which of the following protocols should the administrator use to prevent a security breach?

A.

VNC

B.

SSH

C.

RDP

D.

SFTP

Full Access
Question # 26

You have been tasked with implementing an ACL on the router that will:

1. Permit appropriate, secure remote-access technologies from the management network to all other local network segments. Explicitly deny all other traffic from the management network

2. Ensure the user subnet cannot remotely menage devices in the Linux and Windows Server segments

3. Prohibit any traffic that has not been specifically allowed.

N10-007 question answer

N10-007 question answer

Full Access
Question # 27

A network technician needs to determine the reason for an outage in a building. During troubleshooting, the technician views the rules on a firewall and determines it has been configured to block

specific traffic and is affecting some users. According to the network troubleshooting methodology, which of the following should be the technician's NEXT step?

A.

Identify the potential effects of removing these rules.

B.

Document the findings and actions taken.

C.

Remove the rules and verify functionality.

D.

Establish a theory of probable cause

Full Access
Question # 28

Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?

A.

EIGRP

B.

BGP

C.

IPv6

D.

MPLS

Full Access
Question # 29

A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?

A.

Full backups

B.

Load balancing

C.

Hot site

D.

Snapshots

Full Access
Question # 30

A Chief Information Security Officer (CISO) has learned of a zero-day exploit that is being used against a vendor product that is currently deployed within the organization. The network team needs to provide a list of potentially vulnerable assets for the network security team to scan. Which of the following will the network learn MOST likely use?

A.

IDF documentation

B.

Change management process

C.

Physical network diagram

D.

Inventory management database

Full Access
Question # 31

A wireless administrator has configured a secure wireless network that can only be associated to specific domain accounts. This was done to help mitigate any risks associated with the wireless signal propagating outside of the facility. Which of the following has the administrator implemented?

A.

NAC

B.

Implicit deny

C.

WPA2

D.

Geofencing

Full Access
Question # 32

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?

A.

Transceiver mismatch

B.

VLAN mismatch

C.

Port security

D.

Damaged cable

E.

Duplex mismatch

Full Access
Question # 33

A company recently removed 50 computers that were connected via Cat 5e cables and replaced them with wireless tablets. Which of the following should be performed to help ensure network security?

A.

Label the ports as unused

B.

Educate the users on the new SOP regarding network access

C.

Ensure the DHCP scope has enough addresses

D.

Disable unneeded ports on the switch

E.

Reassign the ports back to the native VLAN

Full Access
Question # 34

A network support team needs to install a wireless network at a new branch office. The team must provide the strongest security to prevent unauthenticated users from viewing the traffic on the wireless network Which of the following solutions would BEST meet these needs?

A.

Enable WPA.TKIP encryption.

B.

Disable the DHCP server

C.

Disable the S3ID broadcast

D.

Enable AP isolation

Full Access
Question # 35

An engineer is rebooting a remote server after applying monthly patches. The patches are large and may take the server down for up to 20 minutes. The engineer wants to know exactly when the server

comes up. The server's static IP address is 192.10.10.54. Which of the following commands can the engineer issue to accomplish this task?

A.

ping -t 192.10.10.54

B.

tracert -D 192.10.10.54

C.

arp ~a 192.10.10.54

D.

nslookup 192.10.10.54

Full Access
Question # 36

Users are reporting that the company website is responding. A technician performs the following steps:

1. Pings the loopback address

2. Pings the default gateway

3. Pings the DNS server

4. Pings the IP address of the web server

All tests are successful, but users still report the server is unreachable. The technician next performs an nslockup and receives the proper server IP address. Which of the following would cause the website to be unreachable?

A.

Unresponsive service

B.

Incorrect gateway

C.

Name not resolving

D.

Rogue DHCP server

E.

DNS forward lookup error

Full Access
Question # 37

A technician needs to back up network devices to a central location to prepare for a natural disaster. Which of the following should the technician use?

A.

VPN

B.

TFTP

C.

RDP

D.

VNC

Full Access
Question # 38

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

A.

Physical diagram

B.

Heat map

C.

Asset list

D.

Device map

Full Access
Question # 39

Which of the following devices would allow a network administrator to block an application at Layer7 on the network?

A.

Firewall

B.

NGFW

C.

Router

D.

Spam filter

Full Access
Question # 40

A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss?

A.

Spectrum analyzer

B.

OTDR

C.

Packet sniffer

D.

Multimeter

Full Access
Question # 41

When deploying UTP cables In a networking environment, which of the following are acceptable standards? (Select TWO).

A.

10Base2

B.

10Base5

C.

10GBaseT

D.

1000BaseLX

E.

1000BaseSX

F.

1000BaseT

Full Access
Question # 42

Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?

A.

Offboarding

B.

Remote access

C.

AUP

D.

Incident response

E.

DLP

Full Access
Question # 43

A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following Is MOST likely the issue?

A.

EMI

B.

TX/RX reverse

C.

Open/short

D.

Attenuation

Full Access
Question # 44

A network technician has installed multiple new lightweight access points across the network. Which of the following devices should the technician use to manage the new access points?

A.

Wireless controller

B.

SSH

C.

DHCP server

D.

Content filter

E.

WiFi analyzer

Full Access
Question # 45

A technician is troubleshooting a server In the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?

A.

nslookup

B.

iptables

C.

pathping

D.

netstat

Full Access
Question # 46

A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?

A.

Change management

B.

Network diagrams

C.

Inventory report

D.

Labeling report

Full Access
Question # 47

Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance?

A.

Clustering

B.

Load balancing

C.

Redundant circuits

D.

NIC teaming

Full Access
Question # 48

A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?

A.

Gateway: 10.10.10.1

Netmask: 255.255.255.192

B.

Gateway: 172.15.18.128

Netmask: 255.255.255.224

C.

Gateway: 192.168.1.97

Netmask: 255.255.255.224

D.

Gateway: 224.102.113.65

Netmask: 255.255.255.192

Full Access
Question # 49

A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?

A.

Logical diagram

B.

Change management

C.

IDF documentation

D.

Configuration baseline

Full Access
Question # 50

Which of the following protocols operates at Layer 4 of the OSI model?

A.

TCP

B.

ARP

C.

IMAP

D.

POP3

Full Access
Question # 51

A home user has contacted the help desk to transfer files from an old smartphone to a new one. The help desk analyst informs the home user this can be completed using Bluetooth. Which of the following types of topologies is this called?

A.

PAN

B.

LAN

C.

SAN

D.

WAN

Full Access
Question # 52

Which of the following would block access to an untagged port when connected to a Layer 2 device?

A.

BPDU guard

B.

Spanning tree

C.

Flood guard

D.

Root guard

Full Access
Question # 53

While testing an ACL on the default gateway router to allow only web browsing, ports TCP 80 and TCP 443 were the only ports open. When tested, no websites were accessible via their URLs inside the network. Which of the following configurations should be added to the ACL?

A.

permit tcp any any eq 20

B.

permit udp any any eq 25

C.

C. permit udp any any eq 53

D.

permit udp any any eq 68

E.

permit tcp any any eq 110

F.

permit tcp any any eq 8080

Full Access
Question # 54

A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up. Which of the following should the technician attempt NEXT?

A.

Modify the speed and duplex

B.

Plug in to another port

C.

Replace the NIC

D.

Change the switch

Full Access
Question # 55

Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?

A.

Ransomware

B.

Phishing

C.

DDoS

D.

Social engineering

E.

Spoofing

Full Access
Question # 56

A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?

A.

Diagram symbols

B.

Rack diagram

C.

Logical diagram

D.

Port locations

Full Access
Question # 57

Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?

A.

Wireless controller

B.

Wireless range extender

C.

Wireless load balancer

D.

Wireless analyzer

Full Access
Question # 58

Which of the following should a network administrator deploy to control all preventive security measures?

A.

UTM

B.

Firewall

C.

IDS

D.

Proxy

Full Access
Question # 59

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Full Access
Question # 60

Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?

A.

Multicast

B.

Spanning tree

C.

ICMP

D.

SNMP

Full Access
Question # 61

A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely?

A.

The address provided by the ISP has a mask that is too small to be used and needs a larger mask.

B.

The address provided by the ISP is a private IP address space and is not routable on the Internet.

C.

The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30.

D.

The address provided by the ISP is part of the reserved loopback address space and cannot be used.

Full Access
Question # 62

Which of the following routing conventions is known as a link-state protocol?

A.

RIP

B.

BGP

C.

EIGRP

D.

OSPF

Full Access
Question # 63

Which of the following OSI layers contains the LLC function?

A.

Network

B.

Data link

C.

Session

D.

Transport

Full Access
Question # 64

A network administrator has noticed many systems on the network have traffic that is anomalous and may be part of a botnet. The administrator wants to implement an access control method that requires a computer to have antivirus software installed before being granted network access. Which of the following should the administrator deploy?

A.

802.1X

B.

Captive portal

C.

Port security

D.

NAC

Full Access
Question # 65

A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?

A.

File hash

B.

Encryption

C.

FCS

D.

Compression

Full Access
Question # 66

A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)

A.

Add a login banner.

B.

Disable unused services.

C.

Upgrade the firmware.

D.

Disable Telnet.

E.

Implement AAA.

F.

Disable SSH.

Full Access
Question # 67

A remote user is required to upload weekly reports to a server at the main office. Both the remote user and the server are using a Windows-based OS. Which of the following represents the BEST method for the remote user to connect to the server?

A.

RDP

B.

Telnet

C.

SSH

D.

VNC

Full Access
Question # 68

A company hires another firm to test the integrity of its information security controls. This is an example of

A.

role separation.

B.

device hardening

C.

risk assessment

D.

penetration testing.

Full Access
Question # 69

A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?

A.

Snapshots

B.

Incremental

C.

Replica

D.

Differential

Full Access
Question # 70

An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Select TWO).

A.

DNS poisoning

B.

ARP poisoning

C.

Man-in-the-middle

D.

Ransomware

E.

Evil twin

F.

Reflective

Full Access
Question # 71

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?

A.

Replace the omnidirectional antennas with unidirectional antennas.

B.

Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.

C.

Replace the 802.11 wireless standard and use GSM instead.

D.

Replace the wireless bridges with wireless routers.

Full Access
Question # 72

Which of the following statements about the OSI model is true?

A.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

B.

The network layer deals with the network cabling and network device interface compatibility.

C.

The transport layer deals with how the data is transported from one router to another based on the IP header.

D.

The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

Full Access
Question # 73

A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses?

A.

164.10.12.0/24

B.

164.10.12.64/29

C.

164.10.12.128/26

D.

164.10.12.191/28

Full Access
Question # 74

A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?

A.

Ping

B.

Log review

C.

Vulnerability scans

D.

Alerts

Full Access
Question # 75

Which of the following components can be used to manage network traffic to all nodes in a hypervisor?

A.

Virtual switch

B.

Virtual NIC

C.

Media converter

D.

Load balancer

E.

Multilayer switch

Full Access
Question # 76

A web server administrator has changed the domain registrar’s A record for the company’s website. External users can reach the website, but internal users are unable to do so. The web server is accessible by typing the internal IP into a web browser. Which of the following is the reason why the web server cannot be accessed?

A.

The NAT has not been configured to point to an internal resource.

B.

An egress firewall rule is blocking access to the web server.

C.

The IDS has determined it is a rogue web server.

D.

The corporate DNS server has not been updated.

Full Access
Question # 77

A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?

A.

Badge reader

B.

Bluetooth reader

C.

Cipher lock

D.

Mantrap

Full Access
Question # 78

A network technician is responding to a user’s trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?

A.

The user ordered Cat5e cable instead of Cat3.

B.

A crossover cable was installed.

C.

The total cable run exceeds the maximum distance.

D.

There is a network speed mismatch between the computer and the switch.

Full Access
Question # 79

A workstation is configured with the following network details:

N10-007 question answer

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Full Access
Question # 80

A small team is overloaded with requests for database resources. The Chief Information Officer (CIO) is concerned the company does not have the resources to deploy and manage these additional services efficiently. Which of the following types of cloud services would be the MOST effective?

A.

PaaS

B.

IaaS

C.

BaaS

D.

SaaS

Full Access
Question # 81

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Full Access
Question # 82

Which of the following ports are used for electronic mail protocols? (Choose three.)

A.

23

B.

25

C.

110

D.

123

E.

143

F.

161

G.

389

Full Access
Question # 83

A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.

Which of the following should the vendors recommend in response to the quote request?

A.

The use of lightweight APs with a load balancer

B.

The use of autonomous APs with a wireless controller

C.

The use of autonomous APs with a load balancer

D.

The use of lightweight APs with a wireless controller

Full Access
Question # 84

An administrator is redesigning a company's network and wants to reduce the amount of hardware needed Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration?

A.

Bridge

B.

Multilayer switch

C.

Switch

D.

Next-generation firewall

Full Access
Question # 85

A user does not have access to network services but has Internet access. The technician notices the

computer has an IP address of 192.168.1.144 when the network is 10.10.10.0. Which of the following is MOST likely the issue?

A.

Rogue DHCP server

B.

Duplicate IP addresses

C.

Incorrect gateway

D.

Server permission changes

Full Access
Question # 86

A network technician does not have access to the GUI of a server and needs to adjust some network properties. Given the command:

N10-007 question answer

Which of the following is the technician attempting to alter?

A.

The technician is clearing the route table.

B.

The technician is adding a static IP address.

C.

The technician is clearing the subnet mas setting.

D.

The technician is setting the default gateway.

Full Access
Question # 87

A network technician has been asked to create secure private networks between a company’s headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this?

A.

Site-to-site

B.

Client-to-site

C.

Point-to-point

D.

Point-to-multipoint

Full Access
Question # 88

A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

A.

Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.

B.

Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.

C.

Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.

D.

Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.

Full Access
Question # 89

A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?

A.

Pre-shared key

B.

Open

C.

EAP-TLS

D.

WPA2

Full Access
Question # 90

Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

A.

An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network.

B.

An IDS will detect traffic anomalies, alert and log them, and block the traffic.

C.

An IDS will detect previously unknown traffic anomalies, alert and log them, and block the traffic.

D.

An IPS will detect traffic anomalies, alert and log them, and allow them through the network.

E.

An IPS will detect previously unknown traffic signatures, and alert and log them.

F.

An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

Full Access
Question # 91

A network technician is reviewing the following output from a router:

N10-007 question answer

Which of the following is this an example of?

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Full Access
Question # 92

Which of the following BEST describes the RADIUS authentication service protocol?

A.

A protocol that sends passwords to the authentication server

B.

A protocol that sends encrypted tickets from the authentication server

C.

A protocol that sends X.500 service requests to the authentication server

D.

A protocol that sends configuration information from the authentication server

Full Access
Question # 93

A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:

A.

use a configuration management server

B.

configure a multilayer switch

C.

install a wireless controller

D.

use a proxy server

Full Access
Question # 94

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Full Access
Question # 95

A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?

A.

Standard operating procedures

B.

Wiring diagram

C.

Inventory documentation

D.

Network baseline

Full Access
Question # 96

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Full Access
Question # 97

A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement?

A.

MAC filtering

B.

WPA-PSK

C.

802.1X

D.

Geofencing

Full Access
Question # 98

The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?

A.

Frequency mismatch

B.

Crosstalk

C.

Interference

D.

Channel overlap

Full Access
Question # 99

An email server, which is called “Frederick,” has an IPv6 address of 2001:5689:23:ABCD:6A, but most users call it “Fred” for short. Which of the following DNS entries is needed so the alias “Fred” can also be used?

A.

MX

B.

AAAA

C.

SRV

D.

CNAME

E.

TXT

F.

NS

Full Access
Question # 100

A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?

A.

VNC application

B.

Kerberos

C.

Geotagging application

D.

Credentials

Full Access
Question # 101

A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue?

A.

Change the IP scope on the DHCP server to a public IP address range.

B.

Perform a traceroute command to identify the router that is not functioning.

C.

Verify the host has physical connectivity and is on the correct VLAN.

D.

Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address.

Full Access
Question # 102

A company wants to implement a wireless infrastructure on its campus to meet the needs of its BYOD initiative. The company has users with legacy devices and wants to accommodate them while delivering speed to other users who have modern systems.

Which of the following standards BEST fits these requirements?

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

Full Access
Question # 103

A user calls the help desk for assistance with setting up a new SOHO router. The user has three employees who all have laptops that need to connect to the wireless network. The users need to have firewall rules allowing access to an internal server, but cannot be configured with static IP addresses. Which of the following BEST describes what the technician should implement?

A.

CNAME record in the users’ dynamic DNS accounts

B.

Additional lease time for the laptop computers

C.

IP helper relay system for configuration hops

D.

DHCP reservation for the laptops’ MACs

Full Access