Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

N10-007 Sample Questions Answers

Questions 4

A technician recently ran a new cable over fluorescent lighting. Assuming the technician used the appropriate cables, which of the following connectors should be used to terminate it?

Options:

A.

RJ11

B.

LC

C.

BNC

D.

F-type

Buy Now
Questions 5

A network technician is reviewing the following output from a router:

Which of the following is this an example of?

Options:

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Buy Now
Questions 6

A consulting company was hired to project and deploy a new datacenter in a different city. This new facility must have the same components installed as the current datacenter to be ready to take over all the network services as soon as the primary site becomes unavailable. Which of the following describes what will be deployed in the new location?

Options:

A.

Cold site

B.

Hot site

C.

Warm site

D.

Off-site backup

E.

Infrastructure as a service

Buy Now
Questions 7

Some users are reporting a high response time to access network resources after a new network router was installed. Which of the following documents should be updated every time a change is implemented on the network to have information about the metrics that represents how the network behaves during the normal scenarios?

Options:

A.

Logical diagram

B.

Performance baseline

C.

Change management documentation

D.

IDF/MDF documentation

Buy Now
Questions 8

A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?

Options:

A.

No QoS configured on the network

B.

Signal-to-noise ratio

C.

Interference from the microwave in the breakroom

D.

Rogue AP installed in the office

Buy Now
Questions 9

A company is contracting a new third-party organization that will handle storage of the company’s critical data. Which of the following policies would ensure the data remains confidential?

Options:

A.

SLA

B.

NDA

C.

MOU

D.

BYOD

Buy Now
Questions 10

A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

Options:

A.

PAN

B.

WLAN

C.

SAN

D.

MAN

Buy Now
Questions 11

A network technician is installing a wireless solution. The solution needs to support new and legacy wireless network clients at the maximum possible speed. Which of the following wireless standards should the technician install?

Options:

A.

802.11a

B.

802.11ac

C.

802.11b

D.

802.11g

E.

802.11n

Buy Now
Questions 12

A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?

Options:

A.

Router

B.

Layer 3 switch

C.

Proxy server

D.

Firewall

E.

Intrusion detection system

Buy Now
Questions 13

A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?

Options:

A.

Standard operating procedures

B.

Wiring diagram

C.

Inventory documentation

D.

Network baseline

Buy Now
Questions 14

Which of the following MUST be installed on an employee’s computer if the remote access VPN implements an SSL VPN with PKI authentication?

Options:

A.

Shared secret

B.

HTTPS server

C.

Soft spoken

D.

Private certificate

Buy Now
Questions 15

A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company's firewall. Which of the following should the technician use to troubleshoot?

Options:

A.

WiFi analyzer

B.

Bandwidth speed tester

C.

Dig

D.

Packet sniffer

Buy Now
Questions 16

A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician's machine. Which of the following should the technician use to help diagnose the problem?

Options:

A.

Packet sniffer

B.

netstat

C.

nslookup

D.

Spectrum analyzer

Buy Now
Questions 17

The corporate head office has assigned the subnet of 10.1.100.0/24 to a network technician. The technician wants to create subnets for the finance department, human resources, and IT. Given the following device counts:

Finance: 70 devices

Human resources: 38 devices

IT: 16 devices

Which of the following outlines how the technician should allocate the address space given?

Options:

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Buy Now
Questions 18

A company has decided to allow certain users lo work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and lo specific areas on the network Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users' mobile devices to allow these VPN connections?

Options:

A.

VNC application

B.

Kerberos

C.

Geotagging application

D.

Credentials

Buy Now
Questions 19

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

Options:

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Buy Now
Questions 20

Which of the following is created on a 48-port switch with five active VLANs?

Options:

A.

48 networks, five segments

B.

48 collision domains, five broadcast domains

C.

240 private networks

D.

240 usable IP addresses

Buy Now
Questions 21

Management at a company wants to increase the bandwidth available to users after receiving several complaints. A technician reports to management that 50% of the company bandwidth is being utilized by wireless devices outside the company’s property. Given budget constraints, which of the following solutions should the technician propose to management?

Options:

A.

Have the ISP double the bandwidth

B.

Move from WPA2 to WEP

C.

Enable WPA and change the SSID

D.

Configure geofencing

Buy Now
Questions 22

A network technician is assisting a user who is experiencing connectivity problems with the VPN. The technician has confirmed the VPN is functioning and other users at the site cannot access the Internet. Which of the following commands would MOST likely be used to further troubleshoot?

Options:

A.

tracert

B.

netstat

C.

arp

D.

dig

Buy Now
Questions 23

A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Which of the following are MOST likley the causes of this issue? (Select TWO).

Options:

A.

Damaged cables

B.

Crosstalk

C.

Bent pins

D.

TX/RX reverse

E.

VLAN mismatch

F.

Duplex mismatch

Buy Now
Questions 24

A bookstore uses a Faraday cage to comply with credit card regulations Customers report that their cellular phones have no signal when they are in the bookstore Which of the following is the MOST likely cause?

Options:

A.

The Faraday cage is creating interference within the bookstore

B.

The Faraday cage prevents access by redirecting signals

C.

The Faraday cage is creating latency on the cellular network

D.

The Faraday cage is creating attenuation of the cellular network

Buy Now
Questions 25

A user no longer has access to network resources after a recent office move, but all other users in the building are able to connect at 100MB connections. After further investigation, a network technician notices the following information:

Which of the following is causing the network connection issues?

Options:

A.

Open/short pins

B.

VLAN mismatch

C.

Distance limitation

D.

Crosstalk

E.

Port configuration

Buy Now
Questions 26

A network technician has installed multiple new lightweight access points across the network. Which of the following devices should the technician use to manage the new access points?

Options:

A.

Wireless controller

B.

SSH

C.

DHCP server

D.

Content filter

E.

WiFi analyzer

Buy Now
Questions 27

Which of the following network topologies typically has all devices on a network directly connected to every other network device?

Options:

A.

Mesh

B.

Star

C.

Ad hoc

D.

Ring

Buy Now
Questions 28

When deploying UTP cables In a networking environment, which of the following are acceptable standards? (Select TWO).

Options:

A.

10Base2

B.

10Base5

C.

10GBaseT

D.

1000BaseLX

E.

1000BaseSX

F.

1000BaseT

Buy Now
Questions 29

A company runs Linux servers In its own datacenter and also on a popular public cloud service provider. The servers hosted by the cloud provider can only be accessed with proper authorization and are only accessed by the company’s datacenter. Which of the following BEST describes the type of cloud architecture being used? (Select TWO).

Options:

A.

Private

B.

Hybrid

C.

Public

D.

laaS

E.

PaaS

F.

SaaS

Buy Now
Questions 30

A network technician Is segmenting network traffic Into various broadcast domains. Which of the following should the network technician utilize?

Options:

A.

VLAN

B.

STP

C.

ACL

D.

BPDU

Buy Now
Questions 31

A technician is troubleshooting a server In the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?

Options:

A.

nslookup

B.

iptables

C.

pathping

D.

netstat

Buy Now
Questions 32

A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing?

Options:

A.

Jitter

B.

Latency

C.

Attenuation

D.

Frequency mismatch

Buy Now
Questions 33

Ann a customer was using a coffee shop's public WiFi and had her connection briefly interrupted, but It reconnected again Unbeknownst to Ann. the disconnection was intentional and was connected to a malicious user's device. Which of the following attacks did Ann experience? (Select TWO).

Options:

A.

Evil twin

B.

DNS poisoning

C.

Denial of service

D.

Brule force

E.

Deauthentication

F.

Phishing

Buy Now
Questions 34

A technician is setting up a surveillance system at a small office. The customer would like to have the network controlled by the office's firewall/router device. The office has a coaxial ISP connection with an ISP provided cable modem. Which of the following should the technician configure on the cable modem to meet the customer requirements?

A Route with NAT

B. PPP

C. PPPoE

D. Bridge mode

Options:

Buy Now
Questions 35

A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?

Options:

A.

Spanning tree

B.

Trunking

C.

Port aggregation

D.

Port mirroring

Buy Now
Questions 36

A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

Options:

A.

HTTP

B.

Telnet

C.

SSH

D.

TFTP

Buy Now
Questions 37

A user does not have access to network services but has Internet access. The technician notices the

computer has an IP address of 192.168.1.144 when the network is 10.10.10.0. Which of the following is MOST likely the issue?

Options:

A.

Rogue DHCP server

B.

Duplicate IP addresses

C.

Incorrect gateway

D.

Server permission changes

Buy Now
Questions 38

A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered?

Options:

A.

Evil twin

B.

ARP poisoning

C.

DHCP exhaustion

D.

Social engineering

Buy Now
Questions 39

A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)

Options:

A.

Disabling unused ports

B.

Upgrading firmware

C.

Using secure protocols

D.

File hashing

E.

MAC filtering

F.

Configuring a honeypot

Buy Now
Questions 40

A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue?

Options:

A.

Attenuation

B.

Incorrect pin-out

C.

Damaged cable

D.

Switch configuration

Buy Now
Questions 41

A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is MOST likely the issue?

Options:

A.

One of the wireless access points is on the wrong frequency

B.

The students are attempting to connect 802.11g devices

C.

The students are using more than one wireless device port seat.

D.

Distance limitations are preventing the students from connecting.

Buy Now
Questions 42

A network technician installed a new host on the network. The host is not connecting to the company’s cloud servers. The technician attemtps to ping a server using the AP address with no success. Checking the IP address using ipconfing displays:

Which of the following should the technician perform NEXT to determine where the issue is located?

Options:

A.

Modify the default gateway address and ping the server to test connectivity.

B.

Change the DNS servers to be on the same subnet as the host.

C.

Modify the router’s ACL to allow port 80 to exit the network.

D.

Perform a tracert command to locate where the packet is dropped.

Buy Now
Questions 43

Which of the following is used to define the duration during which a client can use an IP address?

Options:

A.

MAC reservation

B.

IP helper

C.

Pool

D.

Lease time

Buy Now
Questions 44

Two buildings used to be connected by a wireless bridge, but they are upgrading to fiber. Which of the following new devices would be required at the demarcation points?

Options:

A.

Wireless access point

B.

Router

C.

Media converter

D.

Firewall

Buy Now
Questions 45

Which of the following technologies should be used in high-throughput networks to reduce network overhead?

Options:

A.

iscsi

B.

QoStags

C.

Port aggregation

D.

Jumbo frames

Buy Now
Questions 46

A technician Is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

Options:

A.

HTTP

B.

SMTP

C.

NTP

D.

RDP

Buy Now
Questions 47

A network technician has finished configuring a new DHCP for a network. To ensure proper functionality, which of the following ports should be allowed on the server’s local firewall? (Select TWO).

Options:

A.

20

B.

21

C.

53

D.

67

E.

68

F.

389

Buy Now
Questions 48

Joe, a technician, is attempting to resolve an issue with an off-site router remotely. Joe needs to reset the WAN connection settings and wants to ensure he will have access to the router at all times to monitor the changes.

Which of the following solutions would BEST meet this goal?

Options:

A.

Use a secure SSH connection over the WAN link.

B.

Telnet into the router over the company VPN.

C.

Implement a modem on the AUX port.

D.

Configure a DSL router to the console port.

Buy Now
Questions 49

A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Select TWO).

Options:

A.

Cat 6 with a repeater placed in the middle of the run

B.

Cat 7

C.

Crossover cable

D.

Fiber-optic cabling

E.

Cat 7 with a patch panel placed in the middle of the run

Buy Now
Questions 50

A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?

Options:

A.

MT-RJ

B.

BNC

C.

GBIC

D.

F-type

Buy Now
Questions 51

A technician is wiring a new digital subscriber line in the corporate MDF. Which of the following marks the termination point?

Options:

A.

GBIC

B.

RG-6

C.

110 block

D.

MT-RJ

Buy Now
Questions 52

A user recently made changes to a PC that caused it to be unable to access websites by both FQDN and IP Local resources, such as the file server remain accessible. Which of the following settings did the user MOST likely misconfigure?

Options:

A.

Static IP

B.

Default gateway

C.

DNS entries

D.

Local host file

Buy Now
Questions 53

A store owner would like to have secure wireless access available for both equipment and patron use. Which of the following features should be configured to allow different wireless access through the same

equipment?

Options:

A.

MIMO

B.

TKIP

C.

LTE

D.

SSID

Buy Now
Questions 54

Which of the following would MOST likely provide continuous power during a short brownout?

Options:

A.

Uninterruptible power supply

B.

Hot site

C.

Cold site

D.

Generator

E.

Redundant power supplies

Buy Now
Questions 55

Which of the following BEST describes a VLAN hopping attack?

Options:

A.

An attacker gains unauthorized access to a network by overflowing the CAM table.

B.

An attacker gains unauthorized access to a network by placing a rogue AP on the network.

C.

An attacker gains unauthorized access to a network by using double-tagged packets.

D.

An attacker gains unauthorized access to a network by scanning and mapping it.

Buy Now
Questions 56

Given the following output:

Which of the following attacks is this MOST likely an example of?

Options:

A.

ARP poisoning

B.

VLAN hopping

C.

Rogue access point

D.

Amplified DoS

Buy Now
Questions 57

A workstation is configured with the following network details:

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

Options:

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Buy Now
Questions 58

The lack of which of the following components might make a virtual router less efficient than a physical router?

Options:

A.

ASIC

B.

Hardware MAC

C.

Jumbo frame

D.

MPLS

Buy Now
Questions 59

A Chief Information Security Officer (CISO) has learned of a zero-day exploit that is being used against a vendor product that is currently deployed within the organization. The network team needs to provide a list of potentially vulnerable assets for the network security team to scan. Which of the following will the network learn MOST likely use?

Options:

A.

IDF documentation

B.

Change management process

C.

Physical network diagram

D.

Inventory management database

Buy Now
Questions 60

A company has a DNS a record for the following address: products.companyXYZ. The company wuld to like to add another record,sales.companyXYZ.com, which continually points to the same IP address as product.companyXYZ.com. Which of the following DNS record types would BEST accomplish this?

Options:

A.

MX

B.

CNAME

C.

SRV

D.

A

E.

AAAA

F.

PTR

Buy Now
Questions 61

A technician needs to manage equipment using either an IP address or a serial port. There is a pair of copper wires from the management center to the location of the equipment. Which of the following networking devices should be used to successfully communicate to the equipment?

Options:

A.

Modem

B.

Wireless access point

C.

Bridge

D.

Switch

Buy Now
Questions 62

A network engineer utilizes a box of Cat5e cable in a datacenter for use between 10Gbps switches in a single rack. After the engineer finishes the installation, switch administrators notice random speed drops and

intermittent connection issues. Which of the following is this an example of?

Options:

A.

Incorrect cable type

B.

Attenuation

C.

Incorrect pinout

D.

Bad ports

Buy Now
Questions 63

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?

Options:

A.

WPA2

B.

EAP-FAST

C.

MAC filtering

D.

802.1X

Buy Now
Questions 64

When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST QUESTION NO: to ask to determine the scope of the issue?

Options:

A.

What has been changed on the web server since the previous day?

B.

Is the application online for the end user to access?

C.

Does the user have access to the application?

D.

Is this a system-wide issue or just a certain user’s issue?

Buy Now
Questions 65

Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?

Options:

A.

Switching loop

B.

ARP cache poisoning

C.

Improperly tagged ports

D.

Wrong VLAN assignment

E.

Duplicate IP addresses

Buy Now
Questions 66

Management asks a network technician to install a new connection between two main locations. Management requests that the connection be the fastest possible for data replication. Which of the following would be the MOST appropriate type?

Options:

A.

PRI

B.

ADSL

C.

T3/E3

D.

ISDN

Buy Now
Questions 67

A technician is connecting multiple switches to create a large network for a new office. The switches are unmanaged Layer 2 switches with multiple connections between each pair. The network is experiencing an extreme amount of latency. Which of the following is MOST likely occurring?

Options:

A.

Ethernet collisions

B.

A DDoS attack

C.

A broadcast storm

D.

Routing loops

Buy Now
Questions 68

A network support team needs to install a wireless network at a new branch office. The team must provide the strongest security to prevent unauthenticated users from viewing the traffic on the wireless network Which of the following solutions would BEST meet these needs?

Options:

A.

Enable WPA.TKIP encryption.

B.

Disable the DHCP server

C.

Disable the S3ID broadcast

D.

Enable AP isolation

Buy Now
Questions 69

A network analyst is providing access to an FTP server that stores files that are needed by external contractors who are working on a project. In which of the following network locations should the FTP server be placed to achieve the MOST secure environment?

Options:

A.

DMZ network

B.

Server network

C.

External network

D.

Internal network

Buy Now
Questions 70

In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

Options:

A.

Shut down unused ports on switches

B.

Upgrade firmware on network devices

C.

Allow only secure protocols on the network

D.

Disable unnecessary services

Buy Now
Questions 71

A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

Options:

A.

UTM appliance

B.

IDS appliance

C.

Proxy server

D.

RADIUS server

Buy Now
Questions 72

Which of the following would block access to an untagged port when connected to a Layer 2 device?

Options:

A.

BPDU guard

B.

Spanning tree

C.

Flood guard

D.

Root guard

Buy Now
Questions 73

A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)

Options:

A.

Add a login banner.

B.

Disable unused services.

C.

Upgrade the firmware.

D.

Disable Telnet.

E.

Implement AAA.

F.

Disable SSH.

Buy Now
Questions 74

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

Options:

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Buy Now
Questions 75

A new DSL circuit was installed to replace the cable service and is not functioning. A network administrator needs to create a cable to connect the circuit. Which of the following connector types should the network administrator use on the cable?

Options:

A.

RJ11

B.

RJ45

C.

DB-25

D.

BNC

Buy Now
Questions 76

A network technician attempts to limit access to a wireless network by using WPA2 and a pre-shared key; however, employees have been sharing this key with others. Which of the following methods should the technician configure on the wireless access point to ensure only corporate systems can connect using the least amount of effort?

Options:

A.

RADIUS

B.

EAP-TLS

C.

Port security

D.

MAC filtering

Buy Now
Questions 77

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

Options:

A.

Run a port scanner on each name server to ensure TCP port 53 is open and listening.

B.

Run tracert from a desktop client to query each name server and see what answers are sent back from each server.

C.

Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

D.

Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Buy Now
Questions 78

A network technician needs to upgrade a production Windows server to the latest service pack. In which of the following should the work plan and recovery procedure be documented?

Options:

A.

IDF/MDF

B.

Change management

C.

SOPs

D.

Inventory management

Buy Now
Questions 79

A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?

Options:

A.

Logical diagram

B.

Change management

C.

IDF documentation

D.

Configuration baseline

Buy Now
Questions 80

A company needs a secure way to provide building blueprints to an engineering partner frequently. The Chief Information Officer (CIO) states that a secure protocol must be used for transfer, and the partner needs to initiate a secure connection to the company's router. Which of the following would BEST meet the requirements? (Choose two.)

Options:

A.

Site-to-site VPN

B.

Client-to-site VPN

C.

RDP

D.

SSH

E.

SFTP

F.

Captive portal

Buy Now
Questions 81

Which of the following additional capabilities does a next generation firewall provide beyond a standard network firewall? (Choose two.)

Options:

A.

Application control

B.

User identification

C.

Network address translation

D.

Virtual private networking

E.

High availability

F.

Access control rules

Buy Now
Questions 82

Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)

Options:

A.

Change the default credentials.

B.

Disable unnecessary services.

C.

Secure the physical access.

D.

Generate new encryption keys.

E.

Enable HTTPS access.

F.

Turn on WPS.

Buy Now
Questions 83

After recent changes to the pictured network, several users are unable to access the servers. Only PC1, PC2, PC3, and PC4 are clickable and will give you access to the command prompt and the adapter configuration tabs.

INSTRUCTIONS

Verify the settings by using the command prompt, after making any system changes.

Next, restore connectivity by making the appropriate changes to the infrastructure.

If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.

Options:

Buy Now
Questions 84

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

Options:

A.

Straight-through

B.

Console

C.

Rollover

D.

Crossover

Buy Now
Questions 85

A company must create a way for partners to access a web portal to update documents for a project. This should be done only via web browser in a transparent way for the users. Which of the following should be used?

Options:

A.

Site-to-site connection

B.

SSL VPN

C.

GRE tunnel

D.

VNC

Buy Now
Questions 86

Which of the following manages the delegation of physical equipment to the virtual components?

Options:

A.

Virtual router

B.

Hypervisor

C.

Virtual switch

D.

Network card

Buy Now
Questions 87

A switch is being configured for installation into a new building. The network design is such that the only DHCP server resides in the datacenter. A traditional three-layer network hierarchy is being used, and all

buildings have a Layer 3 connection back to the core. Which of the following should the technician configure to get DHCP working properly in the new building?

Options:

A.

The SMTP relays in the datacenter

B.

The MAC address reservations

C.

The IP helper address on the switch

D.

The ARP forwarding on the switch

Buy Now
Questions 88

A network technician is installing a network printer in a factory setting. The connection from the switch contains an LC connector, yet the printer only supports an RJ45 connector. Which of the following should the technician use?

Options:

A.

Range extender

B.

Media converter

C.

Multilayer switch

D.

Load balancer

Buy Now
Questions 89

A network administrator is configuring a link-state routing protocol for traffic. Which of the following routing protocols should be implemented?

Options:

A.

BGP

B.

EIGRP

C.

OSPF

D.

RIPv2

Buy Now
Questions 90

A network technician built a wireless network in a ten-story office building but has found it does not perform well. The technician performed the following steps during the installation:

* Researched and decided that 802.11ac would be the best technology

* Ensured the switch supports PoE+

* Purchased an AP for each floor and spare APs in case of failure

* Put each AP into non-overlapping channels

Which of the following is the MOST likely reason users are experiencing poor performance?

Options:

A.

802.11ac is not the proper wireless technology for a multistory building.

B.

A comprehensive site survey of each floor was not conducted.

C.

Users were not consulted to find out what type of wireless cards they had.

D.

APs in non-overlapping channels are not able to provide proper redundancy.

Buy Now
Questions 91

A new network Technician is responsible for bringing a building onto the corporate network. The technician is not aware of the proper settings for the new switches. Which of the following should the technician reference to find these settings?

Options:

A.

iDF/MDF documentation

B.

Change management plan

C.

Configuration baseline

D.

Standard operating procedures

Buy Now
Questions 92

Which of the following would an organization MOST likely have users sign before granting administrative access?

Options:

A.

An NDA

B.

A PUA

C.

An AUP

D.

A DLP

Buy Now
Questions 93

Users at an office site notice the wireless network is unavailable for a short period after a brownout. Which of the following technologies is MOST cost effective to sustain network equipment during a brief power event?

Options:

A.

UPS

B.

Dual power supplies

C.

Generator

D.

Redundant circuits

Buy Now
Questions 94

A network technician is implementing a new IPv6 addressing scheme al a local office. This is a large office, and the network manager would like a solution that saves time and allows for automatic addressing of nodes. Which of the following would BEST accomplish this?

Options:

A.

APIPA

B.

6 to 4 tunnel

C.

NAT64

D.

EUI-64

Buy Now
Questions 95

A network administrator needs to extend an organization's network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

Options:

A.

10BASE-T

B.

100BASE-T

C.

1000BASE-LX

D.

1000BASE-SX

Buy Now
Questions 96

A network administrator is installing the company first external-facing web server and examining where to place it on the network. In which of the following zones should the server be configured?

Options:

A.

DMZ

B.

WAN

C.

LAN

D.

VPN

E.

VLAN

Buy Now
Questions 97

Which of the following relies on metrics such as total number of connections or CPU'RAM usage to help maintain performance and availability?

Options:

A.

Round robin

B.

Distributed file system

C.

NIC teaming

D.

Load balancing

Buy Now
Questions 98

A OLP system configured on a network's point of egress captured sensitive company documents going out to the Internet from an Internal workstation. The user o that workstation left to work for a competitor the next day. Which of the following attacks is lib MOST likely an example of?

Options:

A.

Ransomware

B.

Evil twin

C.

insider threat

D.

Social engineering

Buy Now
Questions 99

While attempting to add a new computer to the company network the network technician is unable to connect automatically. The technician runs a command and is presented with the following output:

The technician assigns a static IP address and is able to connect to the network. Which of the following BEST describes the cause of the issue?

Options:

A.

Poor network connectivity

B.

A missing default gateway

C.

No more addresses in the DHCP pool

D.

A malfunctioning NIC

Buy Now
Questions 100

Which of the following describes the function of Layer 3 of the OSI model?

Options:

A.

It provides sequencing and acknowledgments tot connection-oriented communication.

B.

It provides connectionless communication using logical addressing.

C.

It provides error detection through the FCS for frames transmitted.

D.

It provides encryption and compression for data received

Buy Now
Questions 101

A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?

Options:

A.

Allow RDP connections through the firewall.

B.

Install VNC clients on the sales representatives' machines.

C.

Create an SSL VPN for remote access to the network

D.

Place all servers in the publicly available DMZ

Buy Now
Questions 102

Several network changes were made to a company’s firewall, and users have no longer been able to access websites by name. A technician suspects there is a port misconfiguration. Which of the following ports was

misconfigured?

Options:

A.

23

B.

53

C.

69

D.

161

E.

445

Buy Now
Questions 103

A network administrator is configuring a database server and would like to ensure the database engine is listening on a certain port. Which of the following commands should the administrator use to accomplish this goal?

Options:

A.

nslookup

B.

netstate -a

C.

ipconfi / a

D.

arp -a

Buy Now
Status:
Expired , and Replaced By
Exam Code: N10-007
Exam Name: CompTIA Network+ Certification Exam
Last Update: Apr 14, 2023
Questions: 688
$64  $159.99
$48  $119.99
$40  $99.99
buy now N10-007