Winter 50% Special Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28285018

N10-007 CompTIA Network+ N10-007 Questions and Answers

Questions 4

A disgruntled employee decides to leak critical information about a company’s new product. The employee places keyloggers on the department’s computers, allowing the information to be sent out to the Internet. Which of the following attacks is occurring?

Options:

A.

Man-in-the-middle

B.

Logic bomb

C.

Insider threat

D.

Social engineering

Buy Now
Questions 5

A technician is troubleshooting a workstation’s network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using. Which of the following concepts would BEST help the technician?

Options:

A.

Consistent labeling

B.

Change management

C.

Standard work instructions

D.

Inventory management

E.

Network baseline

Buy Now
Questions 6

A junior network technician receives a help desk ticket from an end user who is having trouble accessing a web application that was working the previous day. After talking with the end user and gathering information about the issue, which of the following would be the most likely course of action for the technician to perform NEXT?

Options:

A.

Establish a theory of probable cause.

B.

Escalate the ticket to a senior technician.

C.

Implement the solution.

D.

Document the findings and outcomes.

Buy Now
Questions 7

A technician is observing brownout issues at a smaller office. At least once a week, the edge switch power cycles. Which of the following should the technician do to resolve the issue?

Options:

A.

Install a new switch

B.

Install a UPS

C.

Replace the switch uplink cable.

D.

Install a new electrical circuit.

Buy Now
Questions 8

A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should the network administrator use to terminate this cable?

Options:

A.

DB-9

B.

RS-232

C.

DB-25

D.

RJ-45

Buy Now
Questions 9

A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?

Options:

A.

DHCP scrope

B.

DHCP lease

C.

Default gateway

D.

DNS zone

Buy Now
Questions 10

A technician has deployed an additional DHCP server for redundancy. Clients in certain subnets are not receiving DHCP leases from the new DHCP server. Which of the following is the MOST likely cause?

Options:

A.

The new DHCP server’s IP address was not added to the router’s IP helper list.

B.

The new DHCP server is not receiving the requests from the clients.

C.

The ARP cache of the new DHCP server needs to be updated.

D.

The ARP table on the router needs to be cleared.

Buy Now
Questions 11

Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses. Which of the following IP address schemas is being utilized?

Options:

A.

Private IP

B.

Static IP

C.

APIPA

D.

Loopback

Buy Now
Questions 12

A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible modem. The modem needs to be connected to the ISP’s network at the demarc. Which of the following cable types should be used?

Options:

A.

UTP

B.

Multimode

C.

Coaxial

D.

Serial

Buy Now
Questions 13

A network engineer at a multinational company is asked to purchase mobile phones for senior executives who often travel internationally. The executives want their phones to work with wireless carriers in multiple countries when they travel. Which of the following cellular standards should these new phones support?

Options:

A.

GSM

B.

TDM

C.

CDMA

D.

PSTN

Buy Now
Questions 14

A network technician has salvaged several Ethernet cables from a datacenter. The technician attempts to use the cables to connect desktops to the network without success. Which of the following is MOST likely the issue?

Options:

A.

The cables have an incorrect pin-out.

B.

The cables are UTP instead of STP.

C.

The cables are Cat 6 instead of Cat 5.

D.

The cables are not plenum rated.

Buy Now
Questions 15

Management has requested that a wireless solution be installed at a new office. Which of the following is the FIRST thing the network technician should do?

Options:

A.

Order equipment

B.

Create network diagrams

C.

Perform a site survey

D.

Create an SSID.

Buy Now
Questions 16

A network technician recently installed a new server on a network. The technician must ensure the server does not have any unnecessary services running. The IP address of the server is 204.211.38.50. Which of the following commands would allow the technician to make this determination?

Options:

A.

nmap

B.

pathping

C.

route

D.

nslookup

Buy Now
Questions 17

A critical vulnerability is discovered on a network device. The vendor states it has already patched this vulnerability in its current release. Which of the following actions should an administrator take?

Options:

A.

Change the default password

B.

Use a firewall in front of the device.

C.

Update the firmware.

D.

Upgrade the configuration.

Buy Now
Questions 18

Joe, an employee at a large regional bank, wants to receive company email on his personal smartphone and tablet. To authenticate on the mail server, he must first install a custom security application on those mobile devices. Which of the following policies would BEST enforce this requirement?

Options:

A.

Incident response policy

B.

BYOD policy

C.

DLP policy

D.

Remote access policy

Buy Now
Questions 19

A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?

Options:

A.

Load balancer

B.

IDS

C.

Proxy server

D.

Wireless controller

Buy Now
Questions 20

Which of the following protocols is associated with a three-way handshake?

Options:

A.

UDP

B.

ICMP

C.

GRE

D.

TCP

Buy Now
Questions 21

A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?

Options:

A.

VLAN

B.

DMZ

C.

SNMP

D.

NTP

Buy Now
Questions 22

While working on a Linux-based OS, a technician experiences an issue accessing some servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?

Options:

A.

dig

B.

iptables

C.

ifconfig

D.

traceroute

Buy Now
Questions 23

Wireless users have been experiencing connectivity problems. Investigation shows neighboring wireless appliances, which are not connected to the network, have been on the same 5GHz frequency to communicate. Which of the following wireless performance problem concepts defines this issue?

Options:

A.

Interference

B.

Distance limitation

C.

Signal-to-noise ratio

D.

Absorption

Buy Now
Questions 24

A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users’ devices to the company network. To complete this step, which of the following should be used to secure the remote network location?

Options:

A.

Host-based firewalls

B.

WPA2/WPA

C.

Open access

D.

Port filtering

Buy Now
Questions 25

A network technician has recently installed new VoIP phones at all employee’s desks to support a new SIP cloud VoIP solution. However, the technician is unable to make a call from the device after testing. Which of the following should the technician verify? (Choose two.)

Options:

A.

TCP 443 is allowed.

B.

UDP 1720 is allowed.

C.

UDP 5060 is allowed.

D.

UDP 5061 is allowed.

E.

TCP 8080 is allowed.

F.

TCP 8181 is allowed.

Buy Now
Questions 26

Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?

Options:

A.

ATM

B.

Frame relay

C.

MPLS

D.

PPP

Buy Now
Questions 27

Which of the following can be done to implement network device hardening? (Choose two.)

Options:

A.

Implement spanning tree

B.

Perform VLAN hopping

C.

Patch and update

D.

Perform backups

E.

Enable port mirroring

F.

Change default admin password

Buy Now
Questions 28

A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?

Options:

A.

IPSec

B.

IGRP

C.

L2TP

D.

PPTP

Buy Now
Questions 29

A network technician receives a request for a disaster recovery solution. Management has requested no downtime in the event of a disaster. Which of the following recovery solutions is the appropriate choice?

Options:

A.

Hot site

B.

Business continuity

C.

File backups

D.

Virtual snapshot

Buy Now
Questions 30

A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network. Which of the following must be configured to implement this solution?

Options:

A.

EAP-PEAP

B.

CCMP-AES

C.

WPA2-PSK

D.

TKIP-RC4

Buy Now
Questions 31

A technician is configuring a new server with an IP address of 10.35.113.47 on the 10.35.112.0 subnet to allow for the maximum number of hosts. When configuring network settings, which of the following is the correct subnet mask?

Options:

A.

10.35.112.0/30

B.

10.35.112.0/24

C.

255.255.240.0

D.

255.255.248.0

E.

255.255.255.0

Buy Now
Questions 32

A network technician notices that most of the nodes in the 10.10.74.0/23 address space return either 1 or 2 node hop after running a tracert, however, some of the new servers are showing a hop count larger than 10. Which of the following is the MOST likely reason for this?

Options:

A.

New servers are being provisioned in the cloud.

B.

Those servers have host-based firewalls.

C.

Some of the servers are configured to use different gateways.

D.

Part of the subnet is configured to use different VLANs.

Buy Now
Questions 33

Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?

Options:

A.

Wireless hub

B.

Wireless firewall

C.

Wireless access point

D.

Wireless bridge

Buy Now
Questions 34

Which of the following provides two-factor authentication?

Options:

A.

Username + password

B.

Smart card + PIN

C.

Fingerprint + retina scan

D.

Key fob + ID card

Buy Now
Questions 35

Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server using the FASTEST method possible?

Options:

A.

UDP port 22

B.

TCP port 22

C.

TCP port 25

D.

UDP port 53

E.

UDP port 69

Buy Now
Questions 36

A network technician is attempting to troubleshoot a connectivity issue. The issue is only reported during the evening hours, and only a single workstation loses connectivity. Which of the following is the MOST likely cause of the issue?

Options:

A.

The router has a time-based ACL, applied for the network segment.

B.

A light source is creating EMI interference, affecting the UTP cabling.

C.

Nightly backups are consuming excessive bandwidth.

D.

The user has violated the AUP, and Internet access has been restricted.

Buy Now
Questions 37

A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?

Options:

A.

File hash

B.

File date

C.

File type

D.

File size

Buy Now
Questions 38

Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use. The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST solution?

Options:

A.

Plug in a second spare cable at each end to double the speed.

B.

Replace the switches with ones that utilize port bonding and use the spare cables.

C.

Replace the switches with 10Gb switches and utilize the existing cabling.

D.

Plug in a second cable and set one port to TX and one port to RX.

Buy Now
Questions 39

Which of the following protocols are classified as connectionless? (Choose two.)

Options:

A.

TFTP

B.

FTP

C.

HTTP

D.

SNMP

E.

SSH

F.

IMAP

Buy Now
Questions 40

A technician is setting up a wireless access point in a coffee shop. The shop is not concerned with security but only wants to allow customers to have access. Which of the following configurations should the technician deploy?

Options:

A.

Use a pre-shared key.

B.

Set up EAP.

C.

Configure RADIUS.

D.

Configure MAC filtering.

Buy Now
Questions 41

Your company recently purchased a new building down the street from the existing office. For each of the tasks below, select the appropriate antenna type and encryption object for all wireless access point (AP).

1. Create an encrypted wireless connection between the two buildings that BEST controls signal propagation, while maximizing security.

2. Restrict the wireless signal generated by the access points (APs) inside Building 1, so that it minimizes broadcast beyond the building.

3. Maximize wireless coverage inside Building 1.

4. Building 1’s internal wireless network is for visitors only and must not require any special configuration on the visitor’s device to connect.

Instructions: When you have completed the simulation, select the Done button to submit.

Options:

Buy Now
Questions 42

Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer?

Options:

A.

Bend radius exceeded

B.

Fiber cable mismatch

C.

Fiber type mismatch

D.

Bad fiber switch

Buy Now
Questions 43

A network administrator frequently needs to assist users with troubleshooting network hardware remotely, but the users are non-technical and unfamiliar with network devices. Which of the following would BEST help the administrator and users during hands-on troubleshooting?

Options:

A.

Logical diagrams

B.

MDF documentation

C.

Equipment labeling

D.

Standard operating procedures

Buy Now
Questions 44

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

Options:

A.

Document the reason for the request

B.

Scan the file for malware to protect the sales department’s computers

C.

Follow the company’s approval process for the implementation

D.

Install a TFTP server for the customers to use for the transfer

E.

Create a honeypot to store the file on for the customers to use

F.

Write the SLA for the sales department authorizing the change

Buy Now
Questions 45

The security manager reports that individual systems involved in policy or security violations or incidents cannot be located quickly. The security manager notices the hostnames all appear to be randomly generated characters. Which of the following would BEST assist the security manager identifying systems involved in security incidents?

Options:

A.

Enforce port security to require system authentication

B.

Implement a standardized UNC

C.

Label existing systems with current hostnames

D.

Forward the DHCP logs to the security manager every day

Buy Now
Questions 46

The IT manager at a small firm is in the process of renegotiating an SLA with the organization’s ISP. As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth. However, if the ISP determines that a host on the organization’s internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps. Which of the following policies is being agreed to in the SLA?

Options:

A.

Session hijacking

B.

Blocking

C.

Throttling

D.

Data usage limits

E.

Bandwidth quotas

Buy Now
Questions 47

A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues?

Options:

A.

Change management records

B.

Inventory management

C.

Network log files

D.

Logical diagrams

Buy Now
Questions 48

Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?

Options:

A.

ISDN

B.

MPLS

C.

PRI

D.

Broadband cable

E.

Frame relay

Buy Now
Questions 49

A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the MOST likely explanation?

Options:

A.

There is less local congestion on the wireless network

B.

The testing server for the wired network was farther away

C.

The firewall is configured to throttle traffic to specific websites

D.

The wireless access points were misconfigured

Buy Now
Questions 50

A network technician has just configured NAC for connections using Cat 6 cables. However, none of the Windows clients can connect to the network.

Which of the following components should the technician check on the Windows workstations? (Choose two.)

Options:

A.

Start the Wired AutoConfig service in the Services console

B.

Enable IEEE 802.1q Authentication in Network Interface Card Properties

C.

Enable IEEE 802.1x Authentication in Network Interface Card Properties

D.

Start the Wireless AutoConfig service in the Services console

E.

Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties

Buy Now
Questions 51

A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources?

Options:

A.

Utilize an SSH connection to the corporate server.

B.

Use TFTP to transfer files to corporate resources.

C.

Allow RDP through an external firewall.

D.

Connect utilizing client-to-site VPN.

Buy Now
Questions 52

Which of the following BEST describes the BGP routing protocol?

Options:

A.

distance vector

B.

hybrid

C.

static

D.

link state

Buy Now
Questions 53

A technician is assigned to secure a basic wireless network. Which of the following authentication protocols should the technician use to perform this task? (Choose two.)

Options:

A.

RDP

B.

SNMP

C.

WPA2

D.

EAP

E.

SSL

Buy Now
Questions 54

Which of the following would be the MOST efficient subnet mask for a point-to-point link?

Options:

A.

/28

B.

/29

C.

/31

D.

/32

Buy Now
Questions 55

Which of the following physical security controls is MOST likely to be susceptible to a false positive?

Options:

A.

Identification card

B.

Biometric device

C.

Proximity reader

D.

Video camera

Buy Now
Questions 56

A system administrator receives reports from users of odd behavior in regard to a recently installed server. While reviewing the server network configuration, the systems administrator does both a forward and a reverse DNS lookup on the host, along with the network adapter configuration.

Which of the following is the problem identified in the output above?

Options:

A.

There is no reverse DNS entry for this host.

B.

The server IP address is incorrectly configured.

C.

The DNS lookup entry is incorrectly configured.

D.

The reverse DNS entry is pointing to a different host.

Buy Now
Questions 57

A technician replaces a failed router with a spare that has been in inventory for some time. After attempting to enable HTTPS on the spare router, the technician discovers the feature is unavailable. The support office was able to connect to the previous router. Which of the following actions should the technician perform to enable HTTPS access for the support team?

Options:

A.

Reboot the router

B.

Enable HTTP on the router

C.

Update the firmware of the spare router

D.

Perform a factory reset on the router

Buy Now
Questions 58

A technician has installed a Linux server in the tax office. The server can access most of the resources on the network, but it cannot connect to another server that has a share for backup. The technician learns that the target server is on a different subnet. Which of the following tools should the technician use to ensure the Linux server can reach the backup location?

Options:

A.

netstat

B.

traceroute

C.

route

D.

dig

E.

ifconfig

Buy Now
Questions 59

When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?

Options:

A.

iSCSI

B.

Fibre Channel

C.

NAS

D.

DAS

Buy Now
Questions 60

Which of the following are DNS record types? (Choose three.)

Options:

A.

CNAME

B.

NTP

C.

PTR

D.

LDAP

E.

DHCP

F.

TTL

G.

SRV

Buy Now
Questions 61

A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?

Options:

A.

Perform antivirus and anti-malware scans of the file.

B.

Perform a hash on the file for comparison with the vendor’s hash.

C.

Download the file a second time and compare the version numbers.

D.

Compare the hash of the file to the previous firmware update.

Buy Now
Questions 62

Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence?

Options:

A.

AUP

B.

SLA

C.

NDA

D.

MOU

Buy Now
Questions 63

A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will collect traffic. Which of the following should the technician install to BEST meet the goal?

Options:

A.

Bridge

B.

Crossover cable

C.

Hub

D.

Media converter

Buy Now
Questions 64

A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)

Options:

A.

Point-to-multipoint

B.

Bus

C.

Point-to-point

D.

Mesh

E.

Peer-peer

F.

Ring

Buy Now
Questions 65

A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician identify in the proposal?

Options:

A.

IaaS

B.

PaaS

C.

SaaS

D.

MaaS

Buy Now
Questions 66

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

Options:

A.

Loopback adapter

B.

Cable tester

C.

Tone generator

D.

Multimeter

Buy Now
Questions 67

An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause this condition?

Options:

A.

VLAN mismatch

B.

Duplex/Speed mismatch

C.

Duplicate IP address

D.

TX/RX reverse

Buy Now
Questions 68

Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?

Options:

A.

10.8.0.0/16

B.

10.8.0.0/19

C.

10.8.0.0/20

D.

10.0.0.0/24

Buy Now
Questions 69

An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas?

Options:

A.

Single-mode fiber-optic cabling

B.

Cat 5e-rated cabling

C.

Cat 6-rated cabling

D.

Plenum-rated cabling

Buy Now
Questions 70

A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?

Options:

A.

DLP

B.

IDS

C.

WAF

D.

WPA

E.

TPM

Buy Now
Questions 71

A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would provide the information on TCP connections?

Options:

A.

netstat

B.

tracert

C.

arp

D.

ipconfig

E.

route

Buy Now
Questions 72

A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?

Options:

A.

192.168.0.55

B.

192.168.1.0

C.

192.168.1.1

D.

192.168.5.5

E.

255.255.255.0

Buy Now
Questions 73

Which of the following is a vulnerable system designed to detect and log unauthorized access?

Options:

A.

SIEM

B.

Honeypot

C.

DMZ

D.

Proxy server

Buy Now
Questions 74

An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?

Options:

A.

DHCP relay

B.

DHCP exclusion

C.

DHCP option

D.

DHCP reservation

Buy Now
Questions 75

A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?

Options:

A.

SSH in tunnel mode

B.

RDP set to console connection

C.

EAP-PEAP

D.

SFTP

Buy Now
Questions 76

A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)

Options:

A.

SIP

B.

NTP

C.

H.323

D.

SMB

E.

ICMP

F.

RTP

G.

IPSec

Buy Now
Questions 77

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?

Options:

A.

Proxy server

B.

UTM appliance

C.

Content filter

D.

Load balancer

Buy Now
Questions 78

Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?

Options:

A.

DHCP lease time

B.

IP helper

C.

TTL

D.

DNS record type

Buy Now
Questions 79

According to the OSI model, at which of the following layers is data encapsulated into a packet?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

E.

Layer 6

Buy Now
Questions 80

An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:

  • WLAN architecture supporting speeds in excess of 150 Mbps
  • Clientless remote network access
  • Port-based network access control

Which of the following solution sets properly addresses all of the identified requirements?

Options:

A.

802.11a, IPSec VPN, 802.1x

B.

802.11ac, MPLS, 802.3

C.

802.11b, PPTP, 802.1x

D.

802.11g, MS-CHAP, 802.16

E.

802.11n, SSL-VPN, 802.1x

Buy Now
Questions 81

A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?

Options:

A.

Place a switch at the hotel’s patch panel for connecting each room’s cables

B.

Place a switch on each table to ensure strong connectivity

C.

Place repeaters between the patch panel and the rooms

D.

place a switch at the wall jack and run the cables in the room from there

Buy Now
Questions 82

A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. Which of the following should the technician perform to discover possible interference?

Options:

A.

Site survey

B.

Vulnerability scanning

C.

Wardriving

D.

Checking logical diagram

E.

Bandwidth test

Buy Now
Questions 83

A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?

Options:

A.

IaaS

B.

PaaS

C.

SaaS

D.

DaaS

Buy Now
Questions 84

A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?

Options:

A.

Install additional WAPs

B.

Install external antennas

C.

Move the WAPs closer to the more populated area

D.

Change the antenna types

Buy Now
Questions 85

A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?

Options:

A.

GSM

B.

TDM

C.

CDMA

D.

PSTN

E.

MIMO

Buy Now
Questions 86

A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?

Options:

A.

Time division multiplexing

B.

Analog circuit switching

C.

CSMA/CD

D.

Time division spread spectrum

Buy Now
Questions 87

A network engineer wants to a segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?

Options:

A.

Layer 2 switch

B.

Layer 3 switch

C.

Bridge

D.

Load balancer

Buy Now
Questions 88

A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on the firewall so the new email server can relay email?

Options:

A.

23

B.

25

C.

110

D.

143

Buy Now
Questions 89

Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address?

Options:

A.

Sticky MAC

B.

802.1x

C.

ACL

D.

NAC

Buy Now
Questions 90

Which of the following WAN technologies is MOST preferred when developing a VoIP system with 23 concurrent channels?

Options:

A.

DSL

B.

POTS

C.

T1

D.

DOCSIS

Buy Now
Questions 91

A company has contracted with an outside vendor to perform a service that will provide hardware, software, and procedures in case of a catastrophic failure of the primary datacenter. The Chief Information Officer (CIO) is concerned because this contract does not include a long-term strategy for extended outages. Which of the following should the CIO complete?

Options:

A.

Disaster recovery plan

B.

Business continuity plan

C.

Service level agreement

D.

First responder training

Buy Now
Questions 92

A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?

Options:

A.

Changing the management software’s default credentials

B.

Disabling unnecessary services from the server and management software

C.

Changing the management software’s default port

D.

Replacing the management software’s self-signed certificate with a valid certificate

Buy Now
Questions 93

A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a network-based firewall using the following IP addressing scheme on each interface:

Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?

Options:

A.

Place the web server in the public zone with an inbound rule from eth0 interface to accept traffic over port 80 designated to the web server

B.

Place the web server in the DMZ with an inbound rule from eth0 interface to eth1 to accept traffic over port 80 designated to the web server

C.

Place the web server in the private zone with an inbound rule from eth2 interface to eth1 to accept traffic over port 80 designated to the web server

D.

Place the web server in the DMZ with an inbound rule from eth1 interface to eth0 to accept traffic over port 80 designated to the web server

Buy Now
Questions 94

The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?

Options:

A.

The brown pair UTP has a short.

B.

The camera requires 802.3at power

C.

The camera requires Cat 7 cabling.

D.

The switchport has PoE disabled.

Buy Now
Questions 95

A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?

Options:

A.

WPA-PSK

B.

EAP-TLS

C.

AES-CCMP

D.

WEP-TKIP

Buy Now
Questions 96

A network technician needs to visit a datacenter. To be admitted, the security officer requests to see a driver's license, and then directs the technician to a fingerprint scanner. Which of the following authentication factors is the facility requiring for admittance? (Select TWO).

Options:

A.

Something you have

B.

Something you know

C.

Something you do

D.

Something you are

E.

Somewhere you are

Buy Now
Questions 97

A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement?

Options:

A.

MAC filtering

B.

WPA-PSK

C.

802.1X

D.

Geofencing

Buy Now
Questions 98

A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

Options:

A.

UTM appliance

B.

IDS appliance

C.

Proxy server

D.

RADIUS server

Buy Now
Questions 99

A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

Options:

A.

Privileged user agreement

B.

AUP

C.

Non-disclosure agreement

D.

Offboarding

Buy Now
Questions 100

A network administrator is installing the company first external-facing web server and examining where to place it on the network. In which of the following zones should the server be configured?

Options:

A.

DMZ

B.

WAN

C.

LAN

D.

VPN

E.

VLAN

Buy Now
Questions 101

Which of the following allows for file-level network storage?

Options:

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Buy Now
Questions 102

A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

Options:

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filter

Buy Now
Questions 103

A technician Is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

Options:

A.

HTTP

B.

SMTP

C.

NTP

D.

RDP

Buy Now
Questions 104

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

Options:

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services

Buy Now
Questions 105

A network technician is helping an end user who is working on a spreadsheet for a very important client. The client can see the file on the remote share but is not able to open the document to print it. This issue is associated with which of the following OSI layers?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 6

D.

Layer 7

Buy Now
Questions 106

A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?

Options:

A.

Allow RDP connections through the firewall.

B.

Install VNC clients on the sales representatives' machines.

C.

Create an SSL VPN for remote access to the network

D.

Place all servers in the publicly available DMZ

Buy Now
Questions 107

A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?

Options:

A.

Non-disclosure policy

B.

Data loss prevention policy

C.

Acceptable use policy

D.

Incident response policy

Buy Now
Questions 108

Two computers are connected to a multilayer switch, and both can access the corporate file server. The computers cannot talk to one another. Which of the following is MOST likley the cause?

Options:

A.

Duplex/speed mismatch

B.

ACL misconfiguration

C.

Bad port

D.

Crosstalk

Buy Now
Questions 109

A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?

Options:

A.

VNC application

B.

Kerberos

C.

Geotagging application

D.

Credentials

Buy Now
Questions 110

A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue?

Options:

A.

Change the IP scope on the DHCP server to a public IP address range.

B.

Perform a traceroute command to identify the router that is not functioning.

C.

Verify the host has physical connectivity and is on the correct VLAN.

D.

Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address.

Buy Now
Questions 111

A technician receives a report that Joe. an existing user is unable to access the network. Joe confirms that he had full access the previous clay. The change log is reviewed, and there have been no changes on Joe's computer or any network changes in the last week. The technician moves the connection to an adjacent location on the switch, and Joe Is able to access the network. Which of the following is the MOST likely cause of this issue?

Options:

A.

Incorrect pin-out

B.

Bad port

C.

Transceiver mismatch

D.

Incorrect cable type

Buy Now
Questions 112

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

Options:

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Buy Now
Questions 113

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

Options:

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Buy Now
Questions 114

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.

Options:

Buy Now
Questions 115

A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away In the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?

Options:

A.

Add more access points to the mesh network.

B.

Increase Transmit power levels on the access points

C.

Physically connect more access points.

D.

Change the antenna type on the WAPs.

Buy Now
Questions 116

Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)

Options:

A.

Change the default credentials.

B.

Disable unnecessary services.

C.

Secure the physical access.

D.

Generate new encryption keys.

E.

Enable HTTPS access.

F.

Turn on WPS.

Buy Now
Questions 117

First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?

Options:

A.

Firewall configuration documentation

B.

Change management documentation

C.

Network performance baseline

D.

Logical diagram

Buy Now
Questions 118

Ann a customer was using a coffee shop's public WiFi and had her connection briefly interrupted, but It reconnected again Unbeknownst to Ann. the disconnection was intentional and was connected to a malicious user's device. Which of the following attacks did Ann experience? (Select TWO).

Options:

A.

Evil twin

B.

DNS poisoning

C.

Denial of service

D.

Brule force

E.

Deauthentication

F.

Phishing

Buy Now
Questions 119

A technician needs to back up network devices to a central location to prepare for a natural disaster. Which of the following should the technician use?

Options:

A.

VPN

B.

TFTP

C.

RDP

D.

VNC

Buy Now
Questions 120

Which of the following is used to purposely attack a system to exploit vulnerabilities?

Options:

A.

Honeypot

B.

Vulnerability scan

C.

Device hardening

D.

Penetration testing

Buy Now
Questions 121

According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Select TWO).

Options:

A.

Test solutions.

B.

Duplicate the problem

C.

Establish a theory of probable cause

D.

Question users

E.

Implement preventive measures.

F.

Document findings

Buy Now
Questions 122

A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?

Options:

A.

TXT

B.

A

C.

SRV

D.

CNAME

Buy Now
Exam Code: N10-007
Exam Name: CompTIA Network+ N10-007
Last Update: Apr 22, 2021
Questions: 814

PDF + Testing Engine

$70  $139.99

Testing Engine

$52.5  $104.99

PDF (Q&A)

$47.5  $94.99