Father's Day Flat 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4s55disc

N10-007 PDF

$42.75

$94.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

N10-007 PDF + Testing Engine

$63

$139.99

3 Months Free Update

  • Exam Name: CompTIA Network+ N10-007
  • Last Update: Jun 13, 2021
  • Questions and Answers: 823
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

N10-007 Engine

$49.5

$109.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

N10-007 CompTIA Network+ N10-007 Questions and Answers

Question # 4

A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will collect traffic. Which of the following should the technician install to BEST meet the goal?

A.

Bridge

B.

Crossover cable

C.

Hub

D.

Media converter

Full Access
Question # 5

An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas?

A.

Single-mode fiber-optic cabling

B.

Cat 5e-rated cabling

C.

Cat 6-rated cabling

D.

Plenum-rated cabling

Full Access
Question # 6

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?

A.

23

B.

25

C.

110

D.

143

Full Access
Question # 7

A network engineer wants to a segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?

A.

Layer 2 switch

B.

Layer 3 switch

C.

Bridge

D.

Load balancer

Full Access
Question # 8

A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?

A.

Bridge

B.

Access point

C.

Router

D.

Range extender

Full Access
Question # 9

When enabling jumbo frames on a network device, which of the following parameters is being adjusted?

A.

Speed

B.

Duplex

C.

MTU

D.

TTL

Full Access
Question # 10

A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?

A.

Disaster recovery plan

B.

Business continuity plan

C.

Service level agreement

D.

First responder training

Full Access
Question # 11

A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)

A.

TCP 25

B.

TCP 110

C.

TCP 143

D.

TCP 389

E.

TCP 587

F.

TCP 993

G.

TCP 995

Full Access
Question # 12

Which of the following protocols do MOST MITM attacks utilize?

A.

ARP

B.

SIP

C.

FTP

D.

SCP

Full Access
Question # 13

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

A.

MAC address reservation

B.

Static IP address

C.

IP address exclusion

D.

Custom DNS server entry

Full Access
Question # 14

A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?

A.

Time division multiplexing

B.

Analog circuit switching

C.

CSMA/CD

D.

Time division spread spectrum

Full Access
Question # 15

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?

A.

Asset tracking tags

B.

Motion detectors

C.

Security guards

D.

Computer locks

Full Access
Question # 16

A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?

A.

Damaged fiber

B.

Corrupted operating system

C.

VLAN mismatch

D.

Bad port

Full Access
Question # 17

As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)

A.

OSPF

B.

IS-IS

C.

RIPv1

D.

BGP

E.

VRRP

Full Access
Question # 18

A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?

A.

Perform file hashing

B.

Generate new keys

C.

Update firmware

D.

Change default credentials

Full Access
Question # 19

A company recently upgraded all of its printers to networked multifunction devices. Users can print to the new devices, but they would also like the ability to scan and fax files from their computers. Which of the following should the technician update to allow this functionality?

A.

Device software

B.

Printer drivers

C.

Printer firmware

D.

NIC drivers

Full Access
Question # 20

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?

A.

Power levels

B.

Overcapacity

C.

Distance limitations

D.

Channel overlap

Full Access
Question # 21

A network technician has created a network that consists of a router, a firewall, a switch, and several PCs. Which of the following physical network topologies was created?

A.

Star

B.

Mesh

C.

Ring

D.

Bus

Full Access
Question # 22

A network technician is troubleshooting an end-user connectivity problem. The network technician goes to the appropriate IDF but is unable to identify the appropriate cable due to poor labeling. Which of the following should the network technician use to help identify the appropriate cable?

A.

Tone generator

B.

Multimeter

C.

OTDR

D.

Loopback adapter

Full Access
Question # 23

A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)

A.

RG-9

B.

DB-9

C.

RJ-11

D.

DB-25

E.

RJ-45

F.

BNC

Full Access
Question # 24

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

A.

DLP

B.

AUP

C.

NDA

D.

SLA

Full Access
Question # 25

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?

A.

DSL

B.

POTS

C.

T1

D.

DOCSIS

Full Access
Question # 26

A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using the following IP addressing scheme on each interface:

Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?

A.

Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the web server

B.

Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server

C.

Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the web server

D.

Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the web server

Full Access
Question # 27

A technician is allocating the IP address space needed for a new remote office. This office will contain the engineering staff with six employees and the digital marketing staff with 55 employees. The technician has decided to allocate the 192.168.1.0/24 block to the remote office. The engineering staff has been allocated the 192.168.1.64/29 subnet. Using the LEAST amount of space possible, which of the following would be the last usable IP address in the engineering subnet?

A.

192.168.1.62

B.

192.168.1.63

C.

192.168.1.70

D.

192.168.1.71

Full Access
Question # 28

Which of the following should be configured on the network to achieve performance for the FCoE storage traffic?

A.

PoE

B.

DHCP snooping

C.

Jumbo frames

D.

Virtual IP

Full Access
Question # 29

A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?

A.

Change the default password

B.

Use a firewall in front of the device.

C.

Update the firmware.

D.

Upgrade the configuration.

Full Access
Question # 30

A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone?

A.

CDMA

B.

GSM

C.

TDMA

D.

CSMA

Full Access
Question # 31

A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?

A.

10.35.112.0/30

B.

10.35.112.0/24

C.

255.255.240.0

D.

255.255.248.0

E.

255.255.255.0

Full Access
Question # 32

A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the following should the technician do FIRST to locate the switchport?

A.

Perform a DNS lookup on the server.

B.

Set up an SSH session to the desktop.

C.

Reference the ARP table in the router.

D.

Configure port security on the switch.

Full Access
Question # 33

A technician is troubleshooting network connectivity issues with a remote host. Which of the following tools would BEST inform the technician of nodes between the client and the remote host? (Choose two.)

A.

tracert

B.

ping

C.

tcpdump

D.

pathping

E.

netstat

F.

nslookup

G.

route

Full Access
Question # 34

A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

A.

Loopback IP

B.

Virtual IP

C.

Reserved IP

D.

Public IP

Full Access
Question # 35

Management has requested that a wireless solution be installed at a new office. Which of the following is the FIRST thing the network technician should do?

A.

Order equipment

B.

Create network diagrams

C.

Perform a site survey

D.

Create an SSID.

Full Access
Question # 36

An administrator is troubleshooting a user’s intermittent wireless connectivity issue. Other users across the hallway can connect and use the wireless network properly. Upon inspection of the connection details, the administrator finds the following:

Which of the following is MOST likely the cause of the poor wireless connection?

A.

Channel overlap

B.

Overcapacity

C.

Incorrect antenna type

D.

Latency

Full Access
Question # 37

A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day’s upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

A.

Confirm the patch’s MD5 hash prior to the upgrade.

B.

Schedule the switches to reboot after an appropriate amount of time.

C.

Download each switch’s current configuration before the upgrade.

D.

Utilize FTP rather than TFTP to upload the patch.

Full Access
Question # 38

A network technician is installing a new wireless network in a small office. Due to environmental concerns, the customer wants the network to run exclusively on the 5GHz frequency. Which of the following wireless technologies should the technician install to BEST meet this requirement? (Choose two.)

A.

802.11ac

B.

802.11b

C.

802.11g

D.

802.11n

E.

Bluetooth

F.

Z-Wave

Full Access
Question # 39

A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?

A.

The cables have an incorrect pin-out.

B.

The cables are UTP instead of STP.

C.

The cables are Cat 6 instead of Cat 5.

D.

The cables are not plenum rated.

Full Access
Question # 40

Which of the following DNS record types allows IPv6 records to be resolved to DNS names?

A.

PTR

B.

A

C.

AAAA

D.

SRV

Full Access
Question # 41

A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users’ devices to the company network. To complete this step, which of the following should be used to secure the remote network location?

A.

Host-based firewalls

B.

WPA2/WPA

C.

Open access

D.

Port filtering

Full Access
Question # 42

After rebooting a PC, a user is no longer able to connect to the corporate network. As a test, the technician plugs a different laptop into the same network jack and receives an IP address of 169.254.112.137. Which of the following is MOST likely causing the issue?

A.

DHCP scope exhaustion

B.

Improper DNS setting

C.

Incorrect ACL setting

D.

Port-security violation

Full Access
Question # 43

While working on a Linux-based OS, a technician experiences an issue accessing some servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?

A.

dig

B.

iptables

C.

ifconfig

D.

traceroute

Full Access
Question # 44

The length of an IPv6 address is:

A.

32 bits

B.

64 bits

C.

128 bits

D.

256 bits

Full Access
Question # 45

A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?

A.

IPSec

B.

IGRP

C.

L2TP

D.

PPTP

Full Access
Question # 46

A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this?

A.

TLS

B.

Remote file access

C.

Split tunneling

D.

HTTPS

Full Access
Question # 47

A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?

A.

DHCP scrope

B.

DHCP lease

C.

Default gateway

D.

DNS zone

Full Access
Question # 48

A security guard notices an authorized individual, who is dressed like a lab technician, has entered a secure area of the hospital with a large group. Which of the following security attacks is taking place?

A.

Evil twin

B.

Social engineering

C.

Insider threat

D.

Phishing

Full Access
Question # 49

Greater bandwidth and availability are required between two switches. Each switch has multiple 100Mb Ethernet ports available. Which of the following should a technician implement to help achieve these requirements?

A.

Spanning tree

B.

Clustering

C.

Power management

D.

Port aggregation

Full Access
Question # 50

A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?

A.

VLAN

B.

DMZ

C.

SNMP

D.

NTP

Full Access
Question # 51

A company decides to deploy customer-facing, touch-screen kiosks. The kiosks appear to have several open source service ports that could potentially become compromised. Which of the following is the MOST effective way to protect the kiosks?

A.

Install an IDS to monitor all traffic to and from the kiosks.

B.

Install honeypots on the network to detect and analyze potential kiosk attacks before they occur.

C.

Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks.

D.

Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network.

Full Access
Question # 52

A technician has installed an older IP camera as a temporary replacement for a recently failed newer one. The technician notices that when the camera’s video stream is off, the ping roundtrip time between the camera and the network DVR is consistently less than 1ms without dropped packets. When the camera video stream is turned on, the ping roundtrip time increases dramatically, and network communication is slow and inconsistent. Which of the following is MOST likely the issue in this scenario?

A.

VLAN mismatch

B.

Duplex mismatch

C.

Cat 6 RX/TX reversed

D.

Damaged cable

Full Access
Question # 53

In which of the following ways does a DDoS attack differ from a spoofing attack?

A.

DDoS attacks target multiple networks

B.

Spoofing attacks originate from a single host

C.

DDoS attacks are launched from multiple hosts

D.

Spoofing attacks require physical presence

Full Access
Question # 54

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?

A.

Enforce port security to require system authentication

B.

Implement a standardized UNC

C.

Label existing systems with current hostnames

D.

Forward the DHCP logs to the security manager every day

Full Access
Question # 55

Which of the following are DNS record types? (Choose three.)

A.

CNAME

B.

NTP

C.

PTR

D.

LDAP

E.

DHCP

F.

TTL

G.

SRV

Full Access
Question # 56

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

A.

Document the reason for the request

B.

Scan the file for malware to protect the sales department’s computers

C.

Follow the company’s approval process for the implementation

D.

Install a TFTP server for the customers to use for the transfer

E.

Create a honeypot to store the file on for the customers to use

F.

Write the SLA for the sales department authorizing the change

Full Access
Question # 57

A network technician is working on a new switch implementation to expand the network. Which of the following is the BEST option to ensure the implementation goes according to business requirements?

A.

AUP

B.

NDA

C.

SOP

D.

SLA

Full Access
Question # 58

A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users’ laptops. Which of the following issues should be reviewed to help the user to connect to the wireless network?

A.

Wireless switch toggled off

B.

WAP settings

C.

WLAN IP address out of scope

D.

Wireless controller misconfiguration

Full Access
Question # 59

A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the MOST likely explanation?

A.

There is less local congestion on the wireless network

B.

The testing server for the wired network was farther away

C.

The firewall is configured to throttle traffic to specific websites

D.

The wireless access points were misconfigured

Full Access
Question # 60

Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

E.

802.11n

Full Access
Question # 61

Which of the following DNS records needs to be configured for SMTP traffic?

A.

MX

B.

CNAME

C.

AAAA

D.

PTR

Full Access
Question # 62

The Chief Executive Officer’s (CEO’s) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?

A.

Absorption

B.

Reflection

C.

Distance

D.

Refraction

E.

Attenuation

Full Access
Question # 63

Which of the following BEST describes the BGP routing protocol?

A.

distance vector

B.

hybrid

C.

static

D.

link state

Full Access
Question # 64

A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do FIRST?

A.

Document the scene

B.

Take pictures upon arrival

C.

Secure the area

D.

Implement chain of custody

Full Access
Question # 65

An assistant systems analyst reports the following findings of an investigation of slow Internet connections in a remote office to the senior systems analyst:

Which of the following devices is causing the issue?

A.

Router

B.

Firewall

C.

Switch 1

D.

Switch 2

Full Access
Question # 66

Which of the following networking devices operates at Layer1?

A.

Router

B.

Firewall

C.

Hub

D.

Bridge

Full Access
Question # 67

The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?

A.

Session hijacking

B.

Blocking

C.

Throttling

D.

Data usage limits

E.

Bandwidth quotas

Full Access
Question # 68

A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the application. Which of the following would be the MOST cost effective for the administrator to recommend?

A.

Create Ethernet VLANs

B.

Disable autonegotiation on the servers

C.

Install 10Gb Ethernet NICs in the servers

D.

Install Fibre Channel for the server network

Full Access
Question # 69

A company has two geographically separate locations that need to connect using a VPN. Which of the following devices must be specifically configured to allow VPN traffic into the network?

A.

Firewall

B.

Switch

C.

Router

D.

Modem

Full Access
Question # 70

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?

A.

Bluesnarfing

B.

Session hijacking

C.

MAC spoofing

D.

VLAN hopping

E.

Man-in-the-middle

Full Access
Question # 71

A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure the Linux server can reach the backup location?

A.

netstat

B.

traceroute

C.

route

D.

dig

E.

ifconfig

Full Access
Question # 72

A system administrator receives reports from users of odd behavior in regard to a recently installed server. While reviewing the server network configuration, the systems administrator does both a forward and a reverse DNS lookup on the host, along with the network adapter configuration.

Which of the following is the problem identified in the output above?

A.

There is no reverse DNS entry for this host.

B.

The server IP address is incorrectly configured.

C.

The DNS lookup entry is incorrectly configured.

D.

The reverse DNS entry is pointing to a different host.

Full Access
Question # 73

A technician is setting up a wireless access point in a coffee shop. The shop is not concerned with security but only wants to allow customers to have access. Which of the following configurations should the technician deploy?

A.

Use a pre-shared key.

B.

Set up EAP.

C.

Configure RADIUS.

D.

Configure MAC filtering.

Full Access
Question # 74

A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues?

A.

Change management records

B.

Inventory management

C.

Network log files

D.

Logical diagrams

Full Access
Question # 75

Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?

A.

biometric scanners

B.

door locks

C.

video surveillance

D.

motion detectors

Full Access
Question # 76

A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate?

A.

Air flow and cooling

B.

UPS capability

C.

Circuit labeling

D.

Power redundancy

Full Access
Question # 77

Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment?

A.

Packet capturing

B.

Port scanning

C.

Log scanning

D.

Baseline review

Full Access
Question # 78

A technician needs to upgrade a SOHO wireless router’s firmware. The technician resets the router to factory settings and installs the new firmware. The technician enters the DHCP information and sets the SSID. Which of the following configurations would provide the MOST protection from advance hackers?

A.

Disable the broadcasting of the SSID.

B.

Enable WPA2 authentication for all hosts.

C.

Use private addressing for the DHCP scope.

D.

Install unidirectional antennas.

Full Access
Question # 79

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Full Access
Question # 80

Which of the following technologies should be used in hjgh-throughput networks to reduce network overhead?

A.

iscsi

B.

QoStags

C.

Port aggregation

D.

Jumbo frames

Full Access
Question # 81

An on-site systems administrator is attempting to log in to several workstations remotely to apply patches. One of the systems on the network is refusing the connection. The administrator is able to log in locally and apply patches. Which of the following should the administrator perform to allow for remote administration?

A.

Ensure the host-based firewall allows TCP port 3389.

B.

Log in to the border firewall and ensure TCP port 3389 Is allowed.

C.

Check the iptables configuration for TCP port 3389.

D.

Use netstat to determine If there Is a connection to TCP port 3389.

Full Access
Question # 82

A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filter

Full Access
Question # 83

A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developer’s request?

A.

Connect the five PCs to a hub that is not connected to the corporate network.

B.

Connect the five PCs to a switching router and assign the PCs to a separate VLAN.

C.

Connect the five PCs to a hardware firewall that is connected to the router.

D.

Connect the five PCs to a switch and configure the ports with implicit deny ACLs for outbound traffic.

Full Access
Question # 84

A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

A.

Open wireless

B.

Geofencing

C.

Pre-shared key

D.

MAC filtering

Full Access
Question # 85

Which of the following is an IPv6 transition mechanism in which network devices utilize IPv4 and IPv6 at the same time?

A.

6to4

B.

ISATAP

C.

Teredo

D.

Dual stack

Full Access
Question # 86

A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)

A.

Disabling unused ports

B.

Upgrading firmware

C.

Using secure protocols

D.

File hashing

E.

MAC filtering

F.

Configuring a honeypot

Full Access
Question # 87

A network technician is designing a network cable upgrade in a newly acquired office space. The IT manager wants to install a standardized twisted pair cable solution that supports speeds up to 1 Gbps and terminates with a standard RJ45 connector. Which of the following cable types should the technician suggest?

A.

SMF

B.

Cat 3

C.

Cat 5

D.

Cat 6

E.

RG-6

Full Access
Question # 88

A network technician needs to distribute an updated OS for all network switches at company locations throughout the world The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet. Which of the following methods should be used to distribute the images while ensuring integrity?

A.

Use a TFTP server and UDP protocol

B.

Use an FTP server and provide the file hash

C.

Use an HTTP server to share the file

D.

Use a modem and dial-up connection

Full Access
Question # 89

A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods would meet this requirement?

A.

PEAP

B.

WP2-PSK

C.

Captive portal

D.

EAP-TLS

Full Access
Question # 90

A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A.

Channel 6

B.

Channel 7

C.

Channel 9

D.

Channel 10v

Full Access
Question # 91

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

A.

WEP

B.

EAP-PEAP

C.

PSK

D.

CCMP-AES

Full Access
Question # 92

Which of the following default ports should be opened on a firewall to allow for SSH and Telnet? (Select TWO)

A.

21

B.

22

C.

23

D.

25

E.

123

F.

443

Full Access
Question # 93

Which of the following should be configured to allow for IP-to-name resolutions?

A.

CNAME

B.

A

C.

PTR

D.

NS

Full Access
Question # 94

A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?

A.

3

B.

4

C.

5

D.

6

E.

7

Full Access
Question # 95

The engineering department wants to bring a legacy computer online to test a failed component. When patching the device into the switch, there are no link lights or connectivity. The legacy computer can ping its loopback address successfully. Another device can connect to that same port without issues. Which of the following should the network technician check NEXT? (Choose two.)

A.

Speed setting on the switch

B.

Duplex requirements

C.

Firmware version

D.

Protocols the legacy computer supports

E.

Network card drivers

F.

VLAN settings

Full Access
Question # 96

A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?

A.

Rack location

B.

Room number

C.

Media type

D.

Hostname

Full Access
Question # 97

Which of the following is the physical location where the customer-premise equipment comes together with the ISP or third-party telecommunications equipment?

A.

Server room

B.

Equipment closet

C.

Demarcation point

D.

Intermediate distribution frame

Full Access
Question # 98

Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion?

A.

Reviewing application logs

B.

Reviewing a baseline report

C.

Reviewing a vulnerability scan

D.

Reviewing SLA requirements

Full Access
Question # 99

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.

INSTRUCTIONS

Verify the settings by using the command prompt, after making any system changes.

Next, restore connectivity by making the appropriate changes to the infrastructure.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Full Access
Question # 100

A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?

A.

Standard operating procedures

B.

Wiring diagram

C.

Inventory documentation

D.

Network baseline

Full Access
Question # 101

A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will BEST ensure unauthorized devices cannot consume the shop owner’s limited Internet bandwidth?

A.

Disable the SSID broadcast.

B.

Implement WEP authentication.

C.

Change the WiFi password.

D.

Activate MAC address filtering.

Full Access
Question # 102

A manufacturing company has signed an agreement with another company to collaborate on an upcoming project. Both companies require secure and persistent access to resources on each others' networks. Which of the following remote access technologies should the companies implement to satisfy their requirements?

A.

Out-of-band management

B.

Site-to-site VPN

C.

DMZ networks

D.

SFTP site

Full Access