2022 New Year Express Limited Time 55% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 5763r953

Welcome To DumpsPedia

N10-007 Sample Questions Answers

Questions 4

A network administrator is creating a new WLAN that should only be used by legacy devices that do not support a secure method c following should be configured to provide connectivity and minimal security to the new network? (Select TWO).

Options:

A.

Pre-shared key

B.

Open authentication

C.

PEAP

D.

MAC filtering

E.

EAP-FAST

F.

EAP-TLS

Buy Now
Questions 5

A technician is troubleshooting a workstation's network connectivity and wants to confirm which switchport corresponds to the wall jack the PC is using. Which of the following concepts would BEST help the technician?

Options:

A.

Consistent labeling

B.

Change management

C.

Standard work instructions

D.

Inventory management

E.

Network baseline

Buy Now
Questions 6

An order was placed for the necessary equipment for a large network-cabling installation in a factory. Technicians on site ran Cat 6to all locations, but they were provided with a fiber-optic termination point. Which of the following termination blocks should have been provided instead?

Options:

A.

66

B.

110

C.

FDP

D.

F-type

Buy Now
Questions 7

A corporation has a critical system that would cause unrecoverable damage to the brand if it was taken offline. Which of the following disaster recovery solutions should the corporation implement?

Options:

A.

Full backups

B.

Load balancing

C.

Hot site

D.

Snapshots

Buy Now
Questions 8

A wireless administrator has configured a secure wireless network that can only be associated to specific domain accounts. This was done to help mitigate any risks associated with the wireless signal propagating outside of the facility. Which of the following has the administrator implemented?

Options:

A.

NAC

B.

Implicit deny

C.

WPA2

D.

Geofencing

Buy Now
Questions 9

A network administrator received a ticket about intermittent poor performance of a manufacturing device. The engineer who submitted the ticket states the issue occurs when the device is sending or receiving larger

volumes of network traffic. The physical copper path between the device and the switch tests successfully. Which of the following should the network administrator do NEXT?

Options:

A.

Verify the speed/duplex settings.

B.

Replace the switch uplink transceivers.

C.

Enable port aggregation.

D.

Change to shielded patch cables.

E.

Enable quality of service.

Buy Now
Questions 10

A network technician needs a way to centrally manage and authenticate users. Which of the following would be BEST for this purpose?

Options:

A.

A RADIUS server

B.

A captive portal

C.

Port security

D.

A proxy server

Buy Now
Questions 11

According to the troubleshooting methodology, which of the following steps will help a technician gather information about a network problem? (Select TWO).

Options:

A.

Test solutions.

B.

Duplicate the problem

C.

Establish a theory of probable cause

D.

Question users

E.

Implement preventive measures.

F.

Document findings

Buy Now
Questions 12

A network technician is troubleshooting a connectivity issue with Joe, a user. Joe has reported that when he attempts to RDP to machine1 (192.168.21.21) by name, he is connected to machine3 (192.168.21.23). When the network technician runs the command nslookup machine1, it returns the IP address 192.168.21.23; but

when the ping –a 192.168.21.23 command is run, the results return the hostname machine3. Which of the following DNS records should be updated to allow RDP connections to machine1 by hostname?

Options:

A.

A

B.

SRV

C.

PTR

D.

TXT

Buy Now
Questions 13

A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is masking to the company network?

Options:

A.

Change management

B.

Network diagrams

C.

Inventory report

D.

Labeling report

Buy Now
Questions 14

Which of the following can a network administrator use to access a network switch using standard AAA configurations?

Options:

A.

TACACS+

B.

Single sign-on

C.

LDAP

D.

Local authentication

Buy Now
Questions 15

A department is reporting network Issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large Industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following Is MOST likely the issue?

Options:

A.

EMI

B.

TX/RX reverse

C.

Open/short

D.

Attenuation

Buy Now
Questions 16

A network technician installed a new host on the network. The host is not connecting to the company’s cloud servers. The technician attemtps to ping a server using the AP address with no success. Checking the IP address using ipconfing displays:

Which of the following should the technician perform NEXT to determine where the issue is located?

Options:

A.

Modify the default gateway address and ping the server to test connectivity.

B.

Change the DNS servers to be on the same subnet as the host.

C.

Modify the router’s ACL to allow port 80 to exit the network.

D.

Perform a tracert command to locate where the packet is dropped.

Buy Now
Questions 17

A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered?

Options:

A.

Evil twin

B.

ARP poisoning

C.

DHCP exhaustion

D.

Social engineering

Buy Now
Questions 18

A company’s web-based application has a database that is set up for high availability in case of a failure. Which of the following is necessary to achieve this type of setup?

Options:

A.

A virtual IP pointing to the active DB

B.

A static IP pointing to the passive DB

C.

A private IP pointing to the web front end

D.

A private IP pointing to the web proxy

Buy Now
Questions 19

The engineering department wants to bring a legacy computer online to test a failed component. When patching the device into the switch, there are no link lights or connectivity. The legacy computer can ping its loopback address successfully. Another device can connect to that same port without issues. Which of the following should the network technician check NEXT? (Choose two.)

Options:

A.

Speed setting on the switch

B.

Duplex requirements

C.

Firmware version

D.

Protocols the legacy computer supports

E.

Network card drivers

F.

VLAN settings

Buy Now
Questions 20

A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server’s local firewall? (Select TWO).

Options:

A.

20

B.

21

C.

53

D.

67

E.

68

F.

389

Buy Now
Questions 21

A network technician is installing a new wireless network for a client. The client has experienced issues with other building tenants connecting to the wireless network and utilizing the bandwidth. The client wants to prevent this from happening by using certificate-based authentication. Which of the following technologies should the network administrator implement?

Options:

A.

WPA-PSK

B.

EAP-TLS

C.

AES-CCMP

D.

WEP-TKIP

Buy Now
Questions 22

A network administrator reviews the following command output while troubleshooting a system that is unable to connect to the www.comptia.com website:

Which of the following is the reason the system cannot connect?

Options:

A.

The DNS server is under maintenance.

B.

A cable is not connected to the NIC.

C.

The domain complia.com is having network issues.

D.

The interface eth0 Is using an APIPA address.

Buy Now
Questions 23

To achieve a more efficient and secure work environment, a company needs a way to control what is being accessed on the Internet using corporate resources. Which of the following devices should be used to accomplish this task? (Choose two.)

Options:

A.

Proxy server

B.

IDS

C.

Load balancer

D.

Content filter

E.

VPN concentrator

F.

IPS

Buy Now
Questions 24

A network manager is concerned about visitors taking advantage of open cubicles at a company's facilities. Which of the following would mitigate this issue?

Options:

A.

Create a VLAN for all unused switchports

B.

Implement a DM2 for all external services

C.

Implement root guard on all switches

D.

Create a honeypot to attract attackers

Buy Now
Questions 25

An on-site systems administrator is attempting to log in to several workstations remotely to apply patches. One of the systems on the network is refusing the connection. The administrator is able to log in locally and apply patches. Which of the following should the administrator perform to allow for remote administration?

Options:

A.

Ensure the host-based firewall allows TCP port 3389.

B.

Log in to the border firewall and ensure TCP port 3389 Is allowed.

C.

Check the iptables configuration for TCP port 3389.

D.

Use netstat to determine If there Is a connection to TCP port 3389.

Buy Now
Questions 26

Which of the following protocols are used to configure an email client to receive email? (Select TWO).

Options:

A.

IMAP

B.

SMTP

C.

POP

D.

SFTP

E.

TFTP

Buy Now
Questions 27

Management is concerned there is excessive traffic on the network. A network technician wants to run a quick port scan to see any systems that have open ports. Which of the following tools should be used to do this?

Options:

A.

tcp dump

B.

dig

C.

nmap

D.

netstat

Buy Now
Questions 28

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.

Options:

Buy Now
Questions 29

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

Options:

A.

Partial mesh

B.

Ad hoc

C.

Ring

D.

Bus

Buy Now
Questions 30

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

Options:

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Buy Now
Questions 31

A technician Is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

Options:

A.

HTTP

B.

SMTP

C.

NTP

D.

RDP

Buy Now
Questions 32

A company hires another firm to test the integrity of its information security controls. This is an example of

Options:

A.

role separation.

B.

device hardening

C.

risk assessment

D.

penetration testing.

Buy Now
Questions 33

A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?

Options:

A.

Snapshots

B.

Incremental

C.

Replica

D.

Differential

Buy Now
Questions 34

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

Options:

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing

Buy Now
Questions 35

A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.

Which of the following should the vendors recommend in response to the quote request?

Options:

A.

The use of lightweight APs with a load balancer

B.

The use of autonomous APs with a wireless controller

C.

The use of autonomous APs with a load balancer

D.

The use of lightweight APs with a wireless controller

Buy Now
Questions 36

A few weeks after starting a new position, Joe, a junior network administrator, receives a call from an internal number asking for his username and password to update some records. Joe realizes this may be a type of attack on the network, since he has full access to network resources. Which of the following attacks is described?

Options:

A.

Logic bomb

B.

Social engineering

C.

Trojan horse

D.

Insider threat

Buy Now
Questions 37

The corporate head office has assigned the subnet of 10.1.100.0/24 to a network technician. The technician wants to create subnets for the finance department, human resources, and IT. Given the following device counts:

Finance: 70 devices

Human resources: 38 devices

IT: 16 devices

Which of the following outlines how the technician should allocate the address space given?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 38

Joe, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Joe use?

Options:

A.

Telnet

B.

LDAP

C.

TFTP

D.

Samba

Buy Now
Questions 39

A network technician has purchased a 10GBase-T switch and wishes to connect it to 30 computers with 10GB network cards. The computers are 225ft (69m) away, and all need to establish a 10 Gbps connection to meet business requirements. To minimize costs while still meeting these requirements, which of the following cable types should the technician choose?

Options:

A.

Cat 5e

B.

Cat 6

C.

Cat 6a

D.

Cat 7

Buy Now
Questions 40

A network technician needs to monitor the traffic going to a mission-critical server in the datacenter. Which of the following is the BEST method to perform this?

Options:

A.

Use port mirroring

B.

Install an inline tap

C.

Periodically view the server logs

D.

Configure port aggregation

Buy Now
Questions 41

Joe, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message:

Joe has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error.

Which of the following is the MOST likely cause of this error?

Options:

A.

The web server is missing an intermediate certificate.

B.

The website is missing an HTTPS certificate.

C.

TLS is not enabled in the browser.

D.

The SSL certificate has expired.

Buy Now
Questions 42

A network engineer created a guest wireless network named "Visitor" for clients to use when they are on site. After a couple of months, visiting clients state they cannot access the Internet after connecting to the "Visitor" wireless network, even though configuration changes have not been made. Which of the following is the MOST likely cause of this issue?

Options:

A.

The access point's antenna is not powerful enough to allow all the visitors to establish a connection.

B.

The SSID suggests there is a rogue access point masquerading as the guest network.

C.

The visiting clients are trying to connect to the corporate network without the proper credentials.

D.

The network Is overlapping with the internal corporate wireless network and causing signal loss.

Buy Now
Questions 43

A network administrator is responding to a help desk ticket, which states an unknown wireless access point is broadcasting in a specific area. Upon investigation, the administrator finds that a user brought a wireless access point from home and plugged it into the corporate network. This resulted in an attacker using the unsecured wireless LAN to gain access to the network. Which of the following should the network administrator have done to BEST prevent this problem?

Options:

A.

Changed the default credentials on the network switches

B.

Installed a Layer 7 firewall

C.

Implemented port security

D.

Disabled unnecessary services on the network switches

Buy Now
Questions 44

A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Select TWO).

Options:

A.

RJ45

B.

DB-9

C.

LC

D.

SFTP

E.

GBIC

F.

SC

Buy Now
Questions 45

A company is contracting a new third-party organization that will handle storage of the company’s critical data. Which of the following policies would ensure the data remains confidential?

Options:

A.

SLA

B.

NDA

C.

MOU

D.

BYOD

Buy Now
Questions 46

A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing?

Options:

A.

Jitter

B.

Latency

C.

Attenuation

D.

Frequency mismatch

Buy Now
Questions 47

A network administrator is securing the wireless network in a multitenant building. The network uses a passphrase for authentication so it is easy to allow guests onto the wireless network, but management would like to prevent users from outside the office space from accessing the network. Which of the following security mechanisms would BEST meet this requirement?

Options:

A.

MAC filtering

B.

WPA-PSK

C.

802.1X

D.

Geofencing

Buy Now
Questions 48

A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely?

Options:

A.

The address provided by the ISP has a mask that is too small to be used and needs a larger mask.

B.

The address provided by the ISP is a private IP address space and is not routable on the Internet.

C.

The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30.

D.

The address provided by the ISP is part of the reserved loopback address space and cannot be used.

Buy Now
Questions 49

Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?

Options:

A.

Remote access

B.

NDA

C.

SLA

D.

BYOD

E.

Incident response

Buy Now
Questions 50

Which of the following storage connection types should be used to allow the consolidation of the physical connections for SAN and LAN in just one Layer 2 protocol?

Options:

A.

Fibre Channel

B.

SCSI

C.

T1/E1

D.

FCoE

Buy Now
Questions 51

A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner needs to initiate a secure connection to the company's router. Which of the following would BEST meet the requirements? (Choose two.)

Options:

A.

Site-to-site VPN

B.

Client-to-site VPN

C.

RDP

D.

SSH

E.

SFTP

F.

Captive portal

Buy Now
Questions 52

Multiple users are experiencing slow performance when downloading large files from a specific site. Which of the following should the technician do to check the connection to the external site?

Options:

A.

Check the latency by running a continuous ping to the site.

B.

Perform the ipconfig/flushdns command on the affected users’ PCs.

C.

Run a speedtest from a user’s PC to a site on the Internet.

D.

Verify if there is MTU mismatch in the path to the site.

Buy Now
Questions 53

Joe, a technician, was able to copy data at a site with no network equipment between two new laptops, featuring gigabit Ethernet ports, by using a regular straight-through patch cable. Joe then unsuccessfully tried to accomplish the same thing at a different site from his laptop with a gigabit Ethernet port to an older customer unit, which had a 10/100 network port. Which of the following is the cause of this?

Options:

A.

The customer's laptop does not support auto-MDIX.

B.

Joe's laptop does not support auto-MDIX.

C.

Straight-through patch cables are prone to crosstalk.

D.

The customer's laptop NIC does not support full duplex.

Buy Now
Questions 54

Corporate headquarters provided your office a portion of their class B subnet to use at a new office location.

Range Given: 172.30.232.0/24

  • Sales 57 devices
  • HR 23 devices
  • IT 12 devices
  • Finance 32 devices
  • Marketing 9 devices

INSTRUCTIONS

Allocate the minimum number of addresses (using CIDR notation) needed to accommodate each department.

After accommodating each department, identify the unused portion of the subnet by responding to the question on the graphic.

All drop downs must be filled.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 55

A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?

Options:

A.

VLSM

B.

Class B private network

C.

EUI-64

D.

IPv6

Buy Now
Questions 56

A technician installed a new fiber optic cable to connect two sites. Although there is a link light on the port at each site, the customer reports traffic is dropping intermittently. Which of the following should the technician do NEXT to troubleshoot the issue?

Options:

A.

Check the interfaces for CRC errors.

B.

Check for a VLAN mismatch.

C.

Check for a TX/RX reverse on the connector.

D.

Check that the pinout is correct.

Buy Now
Questions 57

Which of the following allows for file-level network storage?

Options:

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Buy Now
Questions 58

Which of the following should a network administrator deploy to control all preventive security measures?

Options:

A.

UTM

B.

Firewall

C.

IDS

D.

Proxy

Buy Now
Questions 59

Which of the following OSI layers contains the LLC function?

Options:

A.

Network

B.

Data link

C.

Session

D.

Transport

Buy Now
Questions 60

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

Options:

A.

Cat6a

B.

RG-6

C.

UTP

D.

Multimode

E.

Single mode

Buy Now
Questions 61

A developer has asked a network engineer for a small network segment of five computers connected via a Layer 1 device, configured in a star topology, and segregated from the corporate network. Which of the following would BEST fulfill the developer’s request?

Options:

A.

Connect the five PCs to a hub that is not connected to the corporate network.

B.

Connect the five PCs to a switching router and assign the PCs to a separate VLAN.

C.

Connect the five PCs to a hardware firewall that is connected to the router.

D.

Connect the five PCs to a switch and configure the ports with implicit deny ACLs for outbound traffic.

Buy Now
Questions 62

A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?

Options:

A.

Router

B.

Layer 3 switch

C.

Proxy server

D.

Firewall

E.

Intrusion detection system

Buy Now
Questions 63

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?

Options:

A.

Brute force

B.

VLAN hopping

C.

Evil twin

D.

DNS poisoning

Buy Now
Questions 64

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

Options:

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Buy Now
Questions 65

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?

Options:

A.

Replace the omnidirectional antennas with unidirectional antennas.

B.

Put protective enclosures around the omnidirectional antennas to prevent damage from golf balls.

C.

Replace the 802.11 wireless standard and use GSM instead.

D.

Replace the wireless bridges with wireless routers.

Buy Now
Questions 66

A switch is being configured for installation into a new building. The network design is such that the only DHCP server resides in the datacenter. A traditional three-layer network hierarchy is being used, and all

buildings have a Layer 3 connection back to the core. Which of the following should the technician configure to get DHCP working properly in the new building?

Options:

A.

The SMTP relays in the datacenter

B.

The MAC address reservations

C.

The IP helper address on the switch

D.

The ARP forwarding on the switch

Buy Now
Questions 67

When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST QUESTION NO: to ask to determine the scope of the issue?

Options:

A.

What has been changed on the web server since the previous day?

B.

Is the application online for the end user to access?

C.

Does the user have access to the application?

D.

Is this a system-wide issue or just a certain user’s issue?

Buy Now
Questions 68

Which of the following services describes a distribution model in which applications are hosted by a service provider and made available to users?

Options:

A.

PaaS

B.

SaaS

C.

IaaS

D.

MaaS

Buy Now
Questions 69

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

Options:

A.

22

B.

69

C.

80

D.

389

E.

443

Buy Now
Questions 70

Which of the following manages the delegation of physical equipment to the virtual components?

Options:

A.

Virtual router

B.

Hypervisor

C.

Virtual switch

D.

Network card

Buy Now
Questions 71

A company’s Chief Information Security Officer (CISO) has decided to increase overall network security by implementing two-factor authentication. All users already have username/password combinations and require an additional factor of authentication. Which of the following would satisfy the requirements?

Options:

A.

Additional PIN

B.

Security questions

C.

RSA token

D.

Access control lists

Buy Now
Questions 72

While reviewing switch logs, a network analyst notices many failed logon attempts followed by a successful logon from an unknown IP address. Which of the following hardening techniques should be utilized to prevent unauthorized access?

Options:

A.

Avoiding common passwords

B.

File hashing

C.

Disabling unused IP ports

D.

Using secure protocols

Buy Now
Questions 73

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.

INSTRUCTIONS

Verify the settings by using the command prompt, after making any system changes.

Next, restore connectivity by making the appropriate changes to the infrastructure.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 74

Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

Options:

A.

an incorrect DHCP gateway setting

B.

a duplicate IP address

C.

NTP synchronization

D.

ACL configuration

Buy Now
Questions 75

A school is implementing a wireless network and wants to ensure there is adequate coverage. The gymnasium has thick cinder-block walls, and there are several offices adjacent to it. Which of the following should the network technician recommend to ensure full coverage while minimizing the total number of APs purchased?

Options:

A.

Deploy two APs to the gymnasium with the maximum power level transmitting to cover the adjacent offices.

B.

Deploy a single AP to each adjacent office set to transmit at maximum power.

C.

Use a high-gain antenna on the AP in the gymnasium and install an AP in every other adjacent office.

D.

Use a spectrum analyzer to generate a heat map of the gymnasium to pinpoint AP placement.

Buy Now
Questions 76

A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

Options:

A.

Configure MIMO.

B.

Remove the channel overlap.

C.

Add another AP.

D.

Adjust the security type.

Buy Now
Questions 77

A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?

Options:

A.

International export controls policy

B.

Remote access policy

C.

Privileged user agreement

D.

Data loss policy

E.

Service-level agreement

Buy Now
Questions 78

A technician is installing six PCs and six VoIP telephones on a small office LAN. The VoIP telephones require QoS to be configured for proper operation. The customer router does not have QoS capability. Which of the following network devices should the technician purchase and install at this office?

Options:

A.

Managed PoE switch

B.

Load balancer

C.

Layer 3 switch

D.

Unmanaged PoE switch

Buy Now
Questions 79

Which of the following protocols operates at Layer 4 of the OSI model?

Options:

A.

TCP

B.

ARP

C.

IMAP

D.

POP3

Buy Now
Questions 80

A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses?

Options:

A.

164.10.12.0/24

B.

164.10.12.64/29

C.

164.10.12.128/26

D.

164.10.12.191/28

Buy Now
Questions 81

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?

Options:

A.

A network tap

B.

A proxy server

C.

A UTM appliance

D.

A content filter

Buy Now
Questions 82

Several network changes were made to a company’s firewall, and users have no longer been able to access websites by name. A technician suspects there is a port misconfiguration. Which of the following ports was

misconfigured?

Options:

A.

23

B.

53

C.

69

D.

161

E.

445

Buy Now
Questions 83

The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?

Options:

A.

SaaS

B.

PaaS

C.

CaaS

D.

laaS

Buy Now
Questions 84

A network technician is implementing a new IPv6 addressing scheme al a local office. This is a large office, and the network manager would like a solution that saves time and allows for automatic addressing of nodes. Which of the following would BEST accomplish this?

Options:

A.

APIPA

B.

6 to 4 tunnel

C.

NAT64

D.

EUI-64

Buy Now
Questions 85

Given the table below:

Which of the following addresses can Host E send a packet to that will reach Hosts C and D, but not Hosts A and B?

Options:

A.

192.168.5.1

B.

192.168.11.0

C.

192.168.11.255

D.

192.168.255.255

Buy Now
Questions 86

Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?

Options:

A.

BYOD

B.

NDA

C.

SLA

D.

AUP

Buy Now
Questions 87

In which of the following layers of the OSI model is checksum added to the end of an Ethernet frame?

Options:

A.

Layer 2

B.

Layer 3

C.

Layer 4

D.

Layer 5

Buy Now
Questions 88

New endpoint protection software was recently deployed to various clients on a campus network. The system manager notices the internal endpoint server is unable to get heartbeat data from any clients but is able to ping each client from that server. Upon further investigation, the systems manager notices the following:

* Certificates have been installed and published successfully.

* NTP is working properly on the network.

* The port used to communicate to and from the clients is 2126

* Software was installed correctly on each client

* No other network issues have been reported.

Which of the following is MOST likely preventing the server from getting its data from the clients?

A Untrusted SSL certificate

B. Perimeter firewall settings blocking incoming traffic

C. Unresponsive service on each client

D. Host-based firewall settings on the server

E. Incorrect ACL settings on the routers connected to the ISPs

Options:

Buy Now
Questions 89

A network administrator needs to keep track of the locations of installed network equipment. Which of the following would be the BEST method to accomplish this task?

Options:

A.

Tamper detection

B.

Asset tags

C.

Video surveillance

D.

Motion detection

Buy Now
Questions 90

Which of the following BEST explains why a firewall would be subject to international export controls?

Options:

A.

Protected industry

B.

IP version incompatibility

C.

Differing power standards

D.

Encryption technology

Buy Now
Questions 91

A network technician has been deployed to a remote office where WiFi functionality was lost after some recent remodeling. Upon arrival the technician finds the sole access point In the office is powered on via a Cat6 port, which is PoE+ enabled. All necessary SSIDs are broadcasting property However after connecting, authentication falls. Rebooting the WAP does not remediate the situation, nor does replacing the paten cable between the switch and the patch panel. Which of the following is MOST likely the root cause of this issue?

Options:

A.

The WAP is causing a packet storm on the network.

B.

Some of the leads on the male end going into the WAP were damaged

C.

The switchport In question Is using 802. 3at instead of 802.3at.

D.

The Cat6 uplink to the WAP was plugged into the AUX pot instead of the Gigabit PoE port.

Buy Now
Questions 92

A company wants to inspect secure web traffic from users within the network. All the company's internal devices have trusted certificates installed. Which of the following should the company implement?

Options:

A.

A load balancer

B.

ADNS server

C.

A proxy server

D.

A Layer 3 switch

Buy Now
Questions 93

A network engineer configured new Firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

Options:

A.

Ensure an implicit permit rule is enabled.

B.

Configure the log settings on the firewalls to the central syslog server.

C.

Update the firewalls with current firmware and software.

D.

Use the same complex passwords on all firewalls.

Buy Now
Questions 94

Options:

A.

install bidirectional transceivers.

B.

Install SFP+ transceivers.

C.

install media converters.

D.

Install duplex transceivers.

Buy Now
Questions 95

A network analyzer captures traffic from a host that is sending 802.1q traffic to a Layer 3 switch Which of the following attacks is occurring?

Options:

A.

MTM

B.

VLAN hopping

C.

ARP poisoning

D.

Spoofing

Buy Now
Questions 96

A company has a DNS a record for the following address: products.companyXYZ. The company wuld to like to add another record,sales.companyXYZ.com, which continually points to the same IP address as product.companyXYZ.com. Which of the following DNS record types would BEST accomplish this?

Options:

A.

MX

B.

CNAME

C.

SRV

D.

A

E.

AAAA

F.

PTR

Buy Now
Questions 97

A network administrator is setting up several loT devices on a new VLAN and wants to accomplish the following

1. Reduce manual configuration on each system

2. Assign a specific IP address to each system

3. Allow devices to move to different switchports on the same VLAN

Which of the following should the network administrator do to accomplish these requirements?

Options:

A.

Set up a reservation for each device

B.

Configure a static IP on each device

C.

Implement private VLANs for each device

D.

Use DHCP exclusions to address each device

Buy Now
Questions 98

A local firm has hired a consulting company to clean up its IT infrastructure. The consulting company notices remote printing is accomplished by port forwarding via publicly accessible IPs through the firm's firewall Which of the following would be the MOST appropriate way to enable secure remote printing?

Options:

A.

SSH

B.

VPN

C.

Telnet

D.

SSL

Buy Now
Questions 99

A network team has reopened multiple outages caused by unauthorized access to the IDF. Which of the following would BEST prevent this issue from reoccurring?

Options:

A.

Video surveillance

B.

Badge readers

C.

Motion sensors

D.

Tamper switches

Buy Now
Questions 100

Which of the following DNS records would a technician need to update after migrating an organization's email server to a cloud-hosting provider?

Options:

A.

TXT

B.

CNAME

C.

AAAA

D.

Mx

Buy Now
Questions 101

A host has an IP address of 172.28.57.144 and is on the 172.28.57.128 subnet. Which of the following is a correct subnet mask of the host?

Options:

A.

265.255.265.0

B.

255.255.255.192

C.

255.255.255.240

D.

255.255.255.248

Buy Now
Questions 102

A network technician has discovered malicious traffic exiting the network on a specific port. The technician is working with the security team to modify the ACL on the company's firewall. Which of the following should be updated immediately?

Options:

A.

Change management documentation

B.

IDP documentation

C.

Standard operating procedures

D.

Incident response policy

E.

Data loss prevention policy

Buy Now
Questions 103

A technician is installing and configuring a SOHO network from a DOCSIS compliant ISP. Which of the following requires installation at the customer’s site?

Options:

A.

Access point

B.

Bridge

C.

Firewall

D.

Modern

Buy Now
Exam Code: N10-007
Exam Name: CompTIA Network+ N10-007
Last Update: Jan 17, 2022
Questions: 688
$72  $159.99
$54  $119.99
$45  $99.99
buy now N10-007