Special Black Friday Discounts Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

N10-007 CompTIA Network+ N10-007 Questions and Answers

Questions 4

APC cannot reach a server in the same VLAN with IP address 10.10.5.0. The PC has the following information:

IP address: 10,10.0.255

Net mask: 255.255 252.0

Gateway: 10.10.1.1

Which of the following is the reason for this issue?

Options:

A.

The server IP address ends in a network address.

B.

The gateway address is incorrect

C.

The server address is not in the same subnet as the PC address.

D.

The IP address is configured to be the broadcast address.

Buy Now
Questions 5

A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?

Options:

A.

Physical diagram

B.

Heat map

C.

Asset list

D.

Device map

Buy Now
Questions 6

A technician has completed configuration on a new satellite location. The location has a new firewall and a small internal network. The technician has been asked to perform basic vulnerability testing. Which of the following tools would BEST assist the technician in verifying the security of the site?

Options:

A.

Packet sniffer

B.

Bandwidth tester

C.

Port scanner

D.

Protocol analyzer

Buy Now
Questions 7

A network administrator needs to keep track of the locations of installed network equipment. Which of the following would be the BEST method to accomplish this task?

Options:

A.

Tamper detection

B.

Asset tags

C.

Video surveillance

D.

Motion detection

Buy Now
Questions 8

A network technician is installing a network printer in a factory setting. The connection from the switch contains an LC connector, yet the printer only supports an RJ45 connector. Which of the following should the technician use?

Options:

A.

Range extender

B.

Media converter

C.

Multilayer switch

D.

Load balancer

Buy Now
Questions 9

A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?

Options:

A.

Punchdown tool

B.

Crimper

C.

OTDR

D.

Loopback adapter

Buy Now
Questions 10

A company recently implemented a new VoIP solution to replace copper lines that cost too much to maintain. Users have been complaining of the voice quality when they are on phone calls, and management wants the network team to address the concerns. Which of the following should the network team do to improve the performance and security of the VoIP phones?

Options:

A.

Set up an in-house server to process the voice traffic and install repeaters to boost the voice signals at regular intervals.

B.

Install the VoIP phones in line with the users' workstations so the operating system relieves some of the processing load.

C.

Set up a VLAN for the phones and QoS throughout the network to prioritize the traffic.

D.

Open more ports on the router so the phone traffic does not have to wait for a used port to be released, cutting down on user delay.

Buy Now
Questions 11

A network manager is drafting a document mat outlines what employees can and cannot do when using personal tablets that are connected to the network. Which of the following is the manager drafting?

Options:

A.

An AUP policy

B.

A BYOD policy

C.

A DLP policy

D.

An NDA policy

Buy Now
Questions 12

A Chief Information Officer (CIO) wants to control the category of sites that employees access when using the Internet web browser. This objective must be achieved to be compliant with corporate policy and avoid

some security and legal risks. Which of the following devices would BEST accomplish this task? (Choose two.)

Options:

A.

IDS

B.

Proxy server

C.

Content filter

D.

Virtual firewall

E.

Hypervisor

F.

Load balancer

Buy Now
Questions 13

A network technician needs to install network devices in a new building. The building will be a pan of the corporate network and has the connection to the core network already. Which of the following devices must be configured in the new building?

Options:

A.

Firewall

B.

Switch

C.

Modem

D.

IDS

Buy Now
Questions 14

To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?

Options:

A.

WPA2-Personal

B.

WPA2-Enterprise

C.

WPA

D.

WEP

Buy Now
Questions 15

A security team needs to restrict access to a wireless network in a certain area. Which of the following would be used to enforce this restriction?

Options:

A.

Geofencing

B.

WPA2-PSK

C.

EAP-TLS

D.

VLAN tagging

Buy Now
Questions 16

A server administrator is building an email server. To protect the corporate/internal network from external users, the email server should be placed:

Options:

A.

on the intranet.

B.

in a subnet isolated from the internal network.

C.

on the company LAN segment.

D.

in the DMZ.

Buy Now
Questions 17

A recent vulnerability was discovered in the code a company is running on its network devices. The vendor has released a security patch to address the vulnerability. To ensure an unaltered version of the patch is

downloaded, which of the following should the network technician validate before installing the patch?

Options:

A.

Date the patch was created

B.

Version of the patch

C.

Hash values of the patch

D.

Change log for the patch

Buy Now
Questions 18

A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?

Options:

A.

Transport

B.

Network

C.

Session

D.

Application

Buy Now
Questions 19

Which of the following protocols are used to configure an email client to receive email? (Select TWO).

Options:

A.

IMAP

B.

SMTP

C.

POP

D.

SFTP

E.

TFTP

Buy Now
Questions 20

A client requests a new dynamic address and receives a response from two DHCP servers. Which of the following addressing information would the client use?

Options:

A.

The IP addressing information received last

B.

The IP addressing information from the highest server MAC address

C.

The IP addressing information from the highest server IP address

D.

The IP addressing information received first

Buy Now
Questions 21

Which of the following BEST describes the characteristics of a differential backup solution?

Options:

A.

Backs up files with the creation or modified date as the current date.

B.

Backs up all files and sets the archive bit.

C.

Backs up files with a date earlier than today’s date with a clear archive bit.

D.

Backs up files with the archive bit set but does not clear the bit.

Buy Now
Questions 22

Users have been experiencing connection timeout issues when using a web-based program. The network technician determines the problem happened due to a TTL setting that was set too low on the firewall. Which of the following BEST enabled the network technician to reach this conclusion?

Options:

A.

Reviewing application logs

B.

Reviewing a baseline report

C.

Reviewing a vulnerability scan

D.

Reviewing SLA requirements

Buy Now
Questions 23

A OLP system configured on a network's point of egress captured sensitive company documents going out to the Internet from an Internal workstation. The user o that workstation left to work for a competitor the next day. Which of the following attacks is lib MOST likely an example of?

Options:

A.

Ransomware

B.

Evil twin

C.

insider threat

D.

Social engineering

Buy Now
Questions 24

Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?

Options:

A.

Powerline extender

B.

Ethernet-over-power adapter

C.

Power-over-Ethernet switch

D.

Power distribution unit

E.

Ethernet power controller

Buy Now
Questions 25

At which of the following layers of the OSI model would TCP/UDP operate?

Options:

A.

Layer 3

B.

Layer 4

C.

Layer 5

D.

Layer 6

Buy Now
Questions 26

A network administrator is investigating an issue with VoIP calls that are not establishing properly. After troubleshooting, the administrator is able to determine the SIP responses are not being received by the gateway.

Which of the following did the administrator use to determine this information?

Options:

A.

netstat

B.

A spectrum analyzer

C.

tracert

D.

A packet analyzer

Buy Now
Questions 27

A network technician is reading a network diagram and looking for the edge router. Which of the following is MOST likely the symbol used for the router?

Options:

A.

A circle with four outward arrows

B.

A rectangle with two horizontal arrows

C.

A square with two circular arrows

D.

A triangle with three outward arrows

Buy Now
Questions 28

A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?

Options:

A.

Two days

B.

Three days

C.

Six days

D.

Seven days

Buy Now
Questions 29

A company hires another firm to test the integrity of its information security controls. This is an example of

Options:

A.

role separation.

B.

device hardening

C.

risk assessment

D.

penetration testing.

Buy Now
Questions 30

The process of searching for open or weakly secured wireless networks in a geographic area is known as:

Options:

A.

phishing.

B.

social engineering.

C.

war driving.

D.

an evil twin.

Buy Now
Questions 31

Which of the following would MOST likely contain information about credential reuse?

Options:

A.

Acceptable use policy

B.

Password policy

C.

Non-disclosure agreement

D.

Remote access policy

Buy Now
Questions 32

A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue?

Options:

A.

Change the IP scope on the DHCP server to a public IP address range.

B.

Perform a traceroute command to identify the router that is not functioning.

C.

Verify the host has physical connectivity and is on the correct VLAN.

D.

Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address.

Buy Now
Questions 33

Which of the following MUST be installed on an employee’s computer if the remote access VPN implements an SSL VPN with PKI authentication?

Options:

A.

Shared secret

B.

HTTPS server

C.

Soft spoken

D.

Private certificate

Buy Now
Questions 34

A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat .Which of the following policies did the technician violate'?

Options:

A.

Data loss prevention

B.

Incident response

C.

Asset disposal

D.

Acceptable use

Buy Now
Questions 35

After setting up In a temporary office, Joe tries to access the company's wireless network. Following several attempts, Joe is able to get an IP, but cannot access network resources. Which of the following is the MOST likely cause of this error when trying to connect to the compan/s wireless network?

Options:

A.

Incorrect passphrase

B.

Incorrect power levels

C.

Incorrect workstation certificate

D.

Incorrect encryption

Buy Now
Questions 36

A network technician is troubleshooting a problem with a user’s client-to-site VPN connection. The user is unable to establish a connection to the server, but the error message that appears on screen does not contain useful information. Which of the following should the technician do NEXT to troubleshoot the issue?

Options:

A.

Reconfigure the user’s VPN connection in the router to fix profile corruption.

B.

Inform the user that provisioning sometimes fails and the connection needs to be attempted again.

C.

Review the logs in the VPN client to check for any informational messages.

D.

Verify the system has the latest OS patches installed.

Buy Now
Questions 37

A technician needs to connect two routers using copper cables. Which of the following cables would utilize both the TIA/EIA 568a and TIA/EIA 568b standards?

Options:

A.

Cat5 crossover

B.

Cat5e straight-through

C.

Cat5e rollover

D.

Cat6 console

E.

Cat6a straight-through

Buy Now
Questions 38

A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will BEST ensure unauthorized devices cannot consume the shop owner’s limited Internet bandwidth?

Options:

A.

Disable the SSID broadcast.

B.

Implement WEP authentication.

C.

Change the WiFi password.

D.

Activate MAC address filtering.

Buy Now
Questions 39

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

Options:

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing

Buy Now
Questions 40

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

Options:

A.

WEP

B.

EAP-PEAP

C.

PSK

D.

CCMP-AES

Buy Now
Questions 41

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

Options:

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Buy Now
Questions 42

A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

Options:

A.

Privileged user agreement

B.

AUP

C.

Non-disclosure agreement

D.

Offboarding

Buy Now
Questions 43

A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Select TWO).

Options:

A.

Cat 6 with a repeater placed in the middle of the run

B.

Cat 7

C.

Crossover cable

D.

Fiber-optic cabling

E.

Cat 7 with a patch panel placed in the middle of the run

Buy Now
Questions 44

A company has just installed a new cloud VoIP solution, however, users occasionally report poor call quality or dead air being present. Which of the following describes the NEXT troubleshooting step the technician should take?

Options:

A.

The technician should check the internal diagnostics on all the phones to look for a common thread.

B.

The technician should reset all the phones and deprovision information from the provider

C.

The technician should use a packet tracer to see if the traffic is getting out of the network

D.

The technician should run ping tests on the Internet line to monitor for packet loss and latency

Buy Now
Questions 45

Which of the following storage network technologies has the HIGHEST throughput?

Options:

A.

FCoE

B.

InfiniBand

C.

iSCSI

D.

OC3

Buy Now
Questions 46

A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?

Options:

A.

3

B.

4

C.

5

D.

6

E.

7

Buy Now
Questions 47

An employee, who Is using a laptop connected to the wireless network. Is able to connect to the Internet but not to internal company resources. A systems administrator reviews the following information from the laptop:

The administrator was expecting to see a network address within 10.100.0.0/23. which is consistent with the company's wireless network. The network administrator verifies the company's wireless network is configured and working properly. Which of the following is the MOST likely cause of this issue?

Options:

A.

Interference

B.

Security type mismatch

C.

Wrong SSID

D.

Channel overlap

Buy Now
Questions 48

An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring?

Options:

A.

Phishing

B.

DDoS

C.

Evil twin

D.

MITM

E.

OCSP stapling

Buy Now
Questions 49

Which of the following devices would allow a network administrator to block an application at Layer7 on the network?

Options:

A.

Firewall

B.

NGFW

C.

Router

D.

Spam filter

Buy Now
Questions 50

A business with a point-to-point fiber-optic connection is suddenly unable to communicate between locations. A fiber cut is suspected. Which of the following tools should the network technician use to determine the exact location of the cut?

Options:

A.

Reflectometer

B.

Cable tester

C.

Loopback tester

D.

Spectrum analyzers

Buy Now
Questions 51

A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?

Options:

A.

tracert

B.

netstat

C.

arp

D.

dig

Buy Now
Questions 52

A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following Is MOST likely the issue?

Options:

A.

EMI

B.

TX/RX reverse

C.

Open/short

D.

Attenuation

Buy Now
Questions 53

A technician wants to configure a SOHO network to use a specific public DNS server. Which of the following network components should the technician configure to point all clients on a network to a new DNS server?

Options:

A.

Router

B.

Switch

C.

Load balancer

D.

Proxy server

Buy Now
Questions 54

A company wants to implement a wireless infrastructure on its campus to meet the needs of its BYOD initiative. The company has users with legacy devices and wants to accommodate them while delivering speed to other users who have modern systems.

Which of the following standards BEST fits these requirements?

Options:

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

Buy Now
Questions 55

A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue?

Options:

A.

Attenuation

B.

Incorrect pin-out

C.

Damaged cable

D.

Switch configuration

Buy Now
Questions 56

A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

Options:

A.

Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.

B.

Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.

C.

Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.

D.

Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.

Buy Now
Questions 57

Which of the following OSI layers contains the LLC function?

Options:

A.

Network

B.

Data link

C.

Session

D.

Transport

Buy Now
Questions 58

Which of the following should a network administrator deploy to control all preventive security measures?

Options:

A.

UTM

B.

Firewall

C.

IDS

D.

Proxy

Buy Now
Questions 59

A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?

Options:

A.

TXT

B.

A

C.

SRV

D.

CNAME

Buy Now
Questions 60

A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developer’s request?

Options:

A.

Connect the five PCs to a hub that is not connected to the corporate network.

B.

Connect the five PCs to a switching router and assign the PCs to a separate VLAN.

C.

Connect the five PCs to a hardware firewall that is connected to the router.

D.

Connect the five PCs to a switch and configure the ports with implicit deny ACLs for outbound traffic.

Buy Now
Questions 61

Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)

Options:

A.

Change the default credentials.

B.

Disable unnecessary services.

C.

Secure the physical access.

D.

Generate new encryption keys.

E.

Enable HTTPS access.

F.

Turn on WPS.

Buy Now
Questions 62

A home user has contacted the help desk to transfer files from an old smartphone to a new one. The help desk analyst informs the home user this can be completed using Bluetooth. Which of the following types of topologies is this called?

Options:

A.

PAN

B.

LAN

C.

SAN

D.

WAN

Buy Now
Questions 63

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.

INSTRUCTIONS

Verify the settings by using the command prompt, after making any system changes.

Next, restore connectivity by making the appropriate changes to the infrastructure.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 64

A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?

Options:

A.

Non-disclosure policy

B.

Data loss prevention policy

C.

Acceptable use policy

D.

Incident response policy

Buy Now
Questions 65

The network team at a university, which has on-campus residences, recently expanded the WiFi offerings to the dormitories. Each dormitory houses approximately 75 students, who each have multiple wireless devices. The WLAN utilizes an intelligent wireless controller for configuration and management. While the WiFi in academic buildings continues to receive few to no complaints, dormitory complaints are on the rise. Which of the following is MOST likely causing the complaints?

Options:

A.

Frequency mismatch

B.

Crosstalk

C.

Interference

D.

Channel overlap

Buy Now
Questions 66

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

Options:

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services

Buy Now
Questions 67

A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

Options:

A.

Configure MIMO.

B.

Remove the channel overlap.

C.

Add another AP.

D.

Adjust the security type.

Buy Now
Questions 68

First thing on Monday morning, after a maintenance weekend, the help desk receives many calls that no one can access the Internet. Which of the following types of documentation should the on-call network administrator consult FIRST?

Options:

A.

Firewall configuration documentation

B.

Change management documentation

C.

Network performance baseline

D.

Logical diagram

Buy Now
Questions 69

Some users are reporting a high response time to access network resources after a new network router was installed. Which of the following documents should be updated every time a change is implemented on the network to have information about the metrics that represents how the network behaves during the normal scenarios?

Options:

A.

Logical diagram

B.

Performance baseline

C.

Change management documentation

D.

IDF/MDF documentation

Buy Now
Questions 70

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

Options:

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Buy Now
Questions 71

A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

Options:

A.

Implement WPA2-PSK.

B.

Implement a captive portal.

C.

Implement certificate-based 802.1X.

D.

Implement MAC filtering.

Buy Now
Questions 72

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

Options:

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Buy Now
Questions 73

Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?

Options:

A.

Wireless controller

B.

Wireless range extender

C.

Wireless load balancer

D.

Wireless analyzer

Buy Now
Questions 74

Which of the following components acts as an intermediary device between the internal user’s PC and external web servers to provide caching services that save on Internet bandwidth resources?

Options:

A.

Firewall

B.

Proxy server

C.

IDS

D.

Load balancer

Buy Now
Questions 75

A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?

Options:

A.

File hash

B.

Encryption

C.

FCS

D.

Compression

Buy Now
Questions 76

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?

Options:

A.

Replace the omnidirectional antennas with unidirectional antennas.

B.

Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.

C.

Replace the 802.11 wireless standard and use GSM instead.

D.

Replace the wireless bridges with wireless routers.

Buy Now
Questions 77

A company must create a way for partners to access a web portal to update documents for a project. This should be done only via web browser in a transparent way for the users. Which of the following should be used?

Options:

A.

Site-to-site connection

B.

SSL VPN

C.

GRE tunnel

D.

VNC

Buy Now
Questions 78

A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

Options:

A.

10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.

B.

127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.

C.

172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.

D.

192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.

Buy Now
Questions 79

A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?

Options:

A.

Public cloud

B.

SaaS

C.

PaaS

D.

Hybrid cloud

Buy Now
Questions 80

Which of the following services describes a distribution model in which applications are hosted by a service provider and made available to users?

Options:

A.

PaaS

B.

SaaS

C.

IaaS

D.

MaaS

Buy Now
Questions 81

A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

Options:

A.

Additional PIN

B.

Security questions

C.

RSA token

D.

Access control lists

Buy Now
Questions 82

An email server, which is called “Frederick,” has an IPv6 address of 2001:5689:23:ABCD:6A, but most users call it “Fred” for short. Which of the following DNS entries is needed so the alias “Fred” can also be used?

Options:

A.

MX

B.

AAAA

C.

SRV

D.

CNAME

E.

TXT

F.

NS

Buy Now
Questions 83

A company requires a network storage solution that allows for the use of OS-specific credentials and permissions. The company purchases a SOHO solution, which includes support for SMB, iSCSI, FTP, Telnet, and NFS natively out of the box. Which of the following should be done FIRST?

Options:

A.

Verify user credentials.

B.

Generate new keys and certificates.

C.

Disable unnecessary services.

D.

Hash files that will be stored.

Buy Now
Questions 84

A technician is installing six PCs and six VoIP telephones on a small office LAN. The VoIP telephones require QoS to be configured for proper operation. The customer router does not have QoS capability. Which of the following network devices should the technician purchase and install at this office?

Options:

A.

Managed PoE switch

B.

Load balancer

C.

Layer 3 switch

D.

Unmanaged PoE switch

Buy Now
Questions 85

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

Options:

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Buy Now
Questions 86

An end user at an Internet cafe tries to visit an online retailer’s website; however, the website for a competitor loads. The user checks the URL in the address bar and verifies it is correct, but the competitor’s page still loads. Which of the following BEST describes what is occurring?

Options:

A.

Cross-site scripting

B.

Session hijacking

C.

Man in the middle

D.

DNS poisoning

Buy Now
Questions 87

A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?

Options:

A.

Diagram symbols

B.

Rack diagram

C.

Logical diagram

D.

Port locations

Buy Now
Questions 88

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?

Options:

A.

DMZ network

B.

Server network

C.

External network

D.

Internal network

Buy Now
Questions 89

Which of the following allows for file-level network storage?

Options:

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Buy Now
Questions 90

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?

Options:

A.

Allow communication through ifconfig.

B.

Use netstat to open necessary ports.

C.

Add access rules in iptables.

D.

Employ arp to configure a new route.

Buy Now
Questions 91

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

Options:

A.

1

B.

2

C.

3

D.

4

E.

5

Buy Now
Questions 92

Which of the following can be used to enable and translate the communication between legacy non-IP phone systems with solutions for voice communications that can run over the Internet?

Options:

A.

Media converter

B.

RTP

C.

ISDN service

D.

VoIP gateway

E.

SIP trunk

Buy Now
Questions 93

A company has moved to a building with a large number of WLANs. All clients are 802.11b/g/n capable. Which of the following can be performed to reduce the chance of interference with the nearby APs and maintain or improve the performance of the wireless clients?

Options:

A.

Migrate the clients to 802.11a NICs.

B.

Disable 802.11n.

C.

Disable the 2.4GHz radio

D.

Use omnidirectional antennas

Buy Now
Questions 94

A user reports a laptop wireless connection is working at the user's desk but not in a recent building addition. A network administrator logs into the wireless controller, searches for the user's MAC address, and receives the following results:

Which of the following describes the reason for the issue?

Options:

A.

Frequency mismatch

B.

Distance limitation

C.

Channel overlap

D.

Wrong SSID

Buy Now
Questions 95

A network administrator discovered a rogue access point was sending a signal from inside the corporate headquarters. Which of the following would prevent the access point from providing access to the company's internal network?

Options:

A.

Disabling unnecessary services

B.

Placing unused pons in a separate VLAN

C.

Enabling BPDU guard

D.

Configuring a geofence at the corporate boundary

Buy Now
Questions 96

A network engineer utilizes a box of Cat5e cable in a datacenter for use between 10Gbps switches in a single rack. After the engineer finishes the installation, switch administrators notice random speed drops and

intermittent connection issues. Which of the following is this an example of?

Options:

A.

Incorrect cable type

B.

Attenuation

C.

Incorrect pinout

D.

Bad ports

Buy Now
Questions 97

A network administrator is reviewing interface errors on a switch. Which of the following indicates that a switchport is receiving packets in excess of the configured MTU?

Options:

A.

CRC errors

B.

Giants

C.

Runts

D.

Flooding

Buy Now
Questions 98

Joe, a user, needs to utilize a laptop in a conference room When he moves the laptop from his desk and connects it to the conference room port, he does not receive a connection There are no link

lights on the laptop. Which of the following is the MOST likely reason Joe has not received a connection?

Options:

A.

202.1x

B.

NAC

C.

Sticky MAC

D.

VLAN assignment

Buy Now
Questions 99

A network engineer is surveying the existing wireless infrastructure to propose additional changes to increase throughput The SSID is already on an uncongested 5GHz frequency Which of the following should the engineer configure?

Options:

A.

Channel bonding

B.

802.11a

C.

Dual-band frequency

D.

An omnidirectional antenna

Buy Now
Questions 100

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?

Options:

A.

Ethernet collisions

B.

A DDoS attack

C.

A broadcast storm

D.

Routing loops

Buy Now
Questions 101

Which of the following WAN transmission mediums is typically used in geographically remote locations?

Options:

A.

Fiber

B.

Copper

C.

Wireless

D.

Satellite

Buy Now
Questions 102

A network technician is planning to upgrade an end-of-life network switch and wants to reuse as much of the existing infrastructure as possible. The end-of-life switch uses a GBIC, but the new switch will use an SFP.

Which of the following will the network technician MOST likely need to perform before completing the upgrade?

Options:

A.

Reterminate the fiber with ST connectors.

B.

Reterminate the fiber with SC connectors.

C.

Reterminate the fiber with LC connectors.

D.

Reroute the fiber through a media converter.

Buy Now
Questions 103

During the security audit of a financial firm the Chief Executive Officer (CEO) questions why there are three employees who perform very distinct functions on the server. There is an administrator for creating users another for assigning the users lo groups and a third who is the only administrator to perform file rights assignment Which of the following mitigation techniques is being applied?

Options:

A.

Privileged user accounts

B.

Role separation

C.

Container administration

D.

Job rotation

Buy Now
Exam Code: N10-007
Exam Name: CompTIA Network+ N10-007
Last Update: Nov 28, 2021
Questions: 688

PDF + Testing Engine

$72  $179.99

Testing Engine

$56  $139.99
buy now N10-007 testing engine

PDF (Q&A)

$48  $119.99
buy now N10-007 pdf