Black Friday Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Note! The N10-007 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the N10-008 Exam.

N10-007 CompTIA Network+ N10-007 Questions and Answers

Questions 4

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

Options:

A.

22

B.

69

C.

80

D.

389

E.

443

Buy Now
Questions 5

A user has reported an issue with wireless VoIP phones dropping calls during business hours. When working late or in the evenings, the user does not experience call drops. When the network technician investigates the issue, all WAPs have balanced the number of connections evenly and are not dropping off the network. The network technician connects to the wireless network in the user’s office and starts a continuous ping to an external server. The results show a drastic and varied response time for each packet. Which of the following is the MOST likely cause of the dropped calls?

Options:

A.

No QoS configured on the network

B.

Signal-to-noise ratio

C.

Interference from the microwave in the breakroom

D.

Rogue AP installed in the office

Buy Now
Questions 6

Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?

Options:

A.

Multicast

B.

Spanning tree

C.

ICMP

D.

SNMP

Buy Now
Questions 7

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

Options:

A.

Cat6a

B.

RG-6

C.

UTP

D.

Multimode

E.

Single mode

Buy Now
Questions 8

A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely?

Options:

A.

The address provided by the ISP has a mask that is too small to be used and needs a larger mask.

B.

The address provided by the ISP is a private IP address space and is not routable on the Internet.

C.

The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30.

D.

The address provided by the ISP is part of the reserved loopback address space and cannot be used.

Buy Now
Questions 9

A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

Options:

A.

PAN

B.

WLAN

C.

SAN

D.

MAN

Buy Now
Questions 10

Which of the following components acts as an intermediary device between the internal user’s PC and external web servers to provide caching services that save on Internet bandwidth resources?

Options:

A.

Firewall

B.

Proxy server

C.

IDS

D.

Load balancer

Buy Now
Questions 11

A network technician needs to create separate networks for several classrooms and administrative offices. They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?

Options:

A.

VLSM

B.

Class B private network

C.

EUI-64

D.

IPv6

Buy Now
Questions 12

A company requires a network storage solution that allows for the use of OS-specific credentials and permissions. The company purchases a SOHO solution, which includes support for SMB, iSCSI, FTP, Telnet, and NFS natively out of the box. Which of the following should be done FIRST?

Options:

A.

Verify user credentials.

B.

Generate new keys and certificates.

C.

Disable unnecessary services.

D.

Hash files that will be stored.

Buy Now
Questions 13

When trying to determine why users are unable to access a web-based application that was working the previous day, which of the following should be the FIRST QUESTION NO: to ask to determine the scope of the issue?

Options:

A.

What has been changed on the web server since the previous day?

B.

Is the application online for the end user to access?

C.

Does the user have access to the application?

D.

Is this a system-wide issue or just a certain user’s issue?

Buy Now
Questions 14

You have been tasked with setting up a wireless network in an office. The network will consist of 3 Access Points and a single switch. The network must meet the following parameters:

N10-007 Question 14The SSIDs need to be configured as CorpNet with a key of S3cr3t!

N10-007 Question 14The wireless signals should not interfere with each other.

N10-007 Question 14The subnet the Access Points and switch are on should only support 30 devices maximum.

N10-007 Question 14The Access Points should be configured to only support TKIP clients at a maximum speed.

INSTRUCTIONS

Click on the devices to review their information and adjust the settings of the APs to meet the given requirements.

If any time you would like to bring back the initial state of the simulation, please click the Reset All button.

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

N10-007 Question 14

Options:

Buy Now
Questions 15

Which of the following manages the delegation of physical equipment to the virtual components?

Options:

A.

Virtual router

B.

Hypervisor

C.

Virtual switch

D.

Network card

Buy Now
Questions 16

Which of the following is used to purposely attack a system to exploit vulnerabilities?

Options:

A.

Honeypot

B.

Vulnerability scan

C.

Device hardening

D.

Penetration testing

Buy Now
Questions 17

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

Options:

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Buy Now
Questions 18

A technician is installing six PCs and six VoIP telephones on a small office LAN. The VoIP telephones require QoS to be configured for proper operation. The customer router does not have QoS capability. Which of the following network devices should the technician purchase and install at this office?

Options:

A.

Managed PoE switch

B.

Load balancer

C.

Layer 3 switch

D.

Unmanaged PoE switch

Buy Now
Questions 19

A network technician is reviewing the following output from a router:

N10-007 Question 19

Which of the following is this an example of?

Options:

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Buy Now
Questions 20

A technician is troubleshooting a host that is having intermittent issues connecting to internal network resources and the company servers. Using a packet sniffer, the technician notices there are several TCP communications that are missing packets in sequence and need to be retransmitted. The technician receives several SYN-ACK packets with incorrect addressing. Which of the following is the MOST likely cause of these issues?

Options:

A.

DNS poisoning attack

B.

Evil twin on the company network

C.

ARP poisoning attack

D.

Misconfigured VLAN on the local switch

Buy Now
Questions 21

A network technician is segmenting a network to allow for unauthenticated public connections to a server. Which of the following devices would BEST safeguard the internal network from the public-facing server?

Options:

A.

Router

B.

Layer 3 switch

C.

Proxy server

D.

Firewall

E.

Intrusion detection system

Buy Now
Questions 22

Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

Options:

A.

an incorrect DHCP gateway setting

B.

a duplicate IP address

C.

NTP synchronization

D.

ACL configuration

Buy Now
Questions 23

A technician is installing a SOHO router. Which of the following should be performed on every installation and periodically maintained to prevent unauthorized access? (Choose two.)

Options:

A.

Disable remote management

B.

Update the router firmware

C.

Disable port forwarding

D.

Use complex passwords

E.

Disable the SSID broadcast

Buy Now
Questions 24

A system administrator reports that one of the two domain name servers does not seem to be responding to DNS requests from clients. The servers are both up and running, name service is running on them, and DNS requests appear in the logs. Both servers respond to queries made at the console. Which of the following tools should the systems administrator use to gather more information?

Options:

A.

Run a port scanner on each name server to ensure TCP port 53 is open and listening.

B.

Run tracert from a desktop client to query each name server and see what answers are sent back from each server.

C.

Ping the name servers by IP address to make sure they are up, and then ping each name server by name in case name resolution is not working for the server names.

D.

Generate DNS queries and use a packet sniffer to capture DNS traffic to/from both name servers and look for differences.

Buy Now
Questions 25

A technician must install and configure a network device in a building with 20 classrooms. Each room must be on a separate subnet and should not be able to see traffic from other subnets. Which of the following is the MOST cost-effective solution?

Options:

A.

A switch with VLANs created for each segment

B.

A router with interfaces connected to a switch in each room

C.

A VoIP endpoint connected to a hub for each network

D.

A firewall with DHCP pools for each subnet

Buy Now
Questions 26

A technician needs to connect several computers in close proximity to control manufacturing equipment in a factory. The medium to connect the computers most be cost effective and suitable for short distances Which of the following mediums should the technician use?

Options:

A.

RJ11 connector and Cal6 cable

B.

ST connector and UTP cable

C.

DB-9 connector and plenum cable

D.

BNC connector and RG-59 cable

Buy Now
Questions 27

A Chief Information Security Officer (CISO) has learned of a zero-day exploit that is being used against a vendor product that is currently deployed within the organization. The network team needs to provide a list of potentially vulnerable assets for the network security team to scan. Which of the following will the network learn MOST likely use?

Options:

A.

IDF documentation

B.

Change management process

C.

Physical network diagram

D.

Inventory management database

Buy Now
Questions 28

Which of the following are reasons for enabling jumbo frames? (Select TWO)

Options:

A.

To increase payload size

B.

To increase bandwidth

C.

To provide additional SANs storage capacity

D.

To implement larger SQL queries

E.

To reduce CPU overhead

Buy Now
Questions 29

Accompany has multiple access points installed inside a warehouse. Users are reporting intermittent coverage and a low signal when in certain parts of the building. When using a spectrum analyzer, a technician notices one specific access point is not functioning. The technician sees the sable that connects the PoE to the AP looks like it was recently replaced. Which of the following describes the MOST likely cause?

Options:

A.

Electromagnetic interference

B.

Open or short in the cable

C.

PoE requiring a shielded cable

D.

Incorrect antennas

Buy Now
Questions 30

A network administrator is configuring a link-state routing protocol for traffic. Which of the following routing protocols should be implemented?

Options:

A.

BGP

B.

EIGRP

C.

OSPF

D.

RIPv2

Buy Now
Questions 31

A network technician is working to bring a new workstation onto the network. No lights come on when the technician plugs the Ethernet cable into the workstation. The technician checks the connection in the IDF and discovers the data jack is not labeled. Which of the following tools should the technician use to trace the network connection back to the IDF?

Options:

A.

A port scanner

B.

A loopback adapter

C.

An OTDR

D.

A tone generator

Buy Now
Questions 32

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

Options:

A.

VLAN mismatch

B.

Transceiver mismatch

C.

Latency

D.

DHCP exhaustion

Buy Now
Questions 33

Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?

Options:

A.

BYOD

B.

NDA

C.

SLA

D.

AUP

Buy Now
Questions 34

Which of the following can be used to enable and translate the communication between legacy non-IP phone systems with solutions for voice communications that can run over the Internet?

Options:

A.

Media converter

B.

RTP

C.

ISDN service

D.

VoIP gateway

E.

SIP trunk

Buy Now
Questions 35

A flood disables the equipment in a company’s server room. When implementing the disaster recovery plan, all operations are immediately transitioned to another location with momentary downtime. This is an example of a:

Options:

A.

warm site.

B.

cold site.

C.

snapshot.

D.

hot site.

Buy Now
Questions 36

Which of the following DNS record types can help limit spam?

Options:

A.

SPF

B.

SRV

C.

A

D.

MX

Buy Now
Questions 37

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?

Options:

A.

Transceiver mismatch

B.

VLAN mismatch

C.

Port security

D.

Damaged cable

E.

Duplex mismatch

Buy Now
Questions 38

A user has called the help desk with a problem reaching certain servers within the organization. The organization is using RFC 1819 for internal networks. The servers having trouble are configured with the following IP addresses: 192. 130.135.5 and 192.130.135.6. The user cannot connect to the correct servers. Which of the following explain why this is happening to the user?

Options:

A.

The network has been configured with an inappropriate scheme

B.

The serves are periodical/ going offline and rejecting the connection.

C.

The default route in the user's computer points to the wrong upstream device.

D.

The IPS system is flagging the traffic as suspicious and terminating the connection.

Buy Now
Questions 39

When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?

Options:

A.

SFTP

B.

SSH

C.

SNMPv1

D.

LDAPS

Buy Now
Questions 40

A company plans to deploy a web server securely on the network to be accessible from the Internet. In which of the following locations should the web server be placed?

Options:

A.

IDF

B.

WAN

C.

LAN

D.

DMZ

Buy Now
Questions 41

A wireless technician needs to deploy a single 802.11 standard that supports both 2.4GHz and 5GHz frequencies with up to 40MHz channel widths. Which of the following wireless standards should the technician configure?

Options:

A.

ac

B.

b

C.

g

D.

n

Buy Now
Questions 42

A recent vulnerability was discovered in the code a company is running on its network devices. The vendor has released a security patch to address the vulnerability. To ensure an unaltered version of the patch is

downloaded, which of the following should the network technician validate before installing the patch?

Options:

A.

Date the patch was created

B.

Version of the patch

C.

Hash values of the patch

D.

Change log for the patch

Buy Now
Questions 43

Which of the following protocol types describes secure communication on port 443?

Options:

A.

ICMP

B.

UDP

C.

TCP

D.

IP

Buy Now
Questions 44

A network administrator has discovered a low-end managed switch connoted to the company LAN. While reading about the device's specifications on the manufacturer's website, the administrator discovers the switch does not support a command line interface for administration. Which of the following remote access methods should the administrator use to log in the switch?

Options:

A.

install a VNC plugin on the web Browser

B.

Connect to the HTTPS management interface

C.

Replace the managed switch with an unmanaged switch.

D.

Establish an SSH session.

Buy Now
Questions 45

A network engineer is reviewing a construction proposal for improving the roadways on a campus. The engineer needs to determine if any of the fiber infrastructure between the buildings will need to be relocated. Which of the following will the engineer MOST likely use to make the determination?

Options:

A.

Logical network topology

B.

Network rack diagrams

C.

A physical network diagram

D.

An MDF diagram

Buy Now
Questions 46

A network engineer configured new Firewalls with the correct configuration to be deployed to each remote branch. Unneeded services were disabled, and all firewall rules were applied successfully. Which of the following should the network engineer perform NEXT to ensure all the firewalls are hardened successfully?

Options:

A.

Ensure an implicit permit rule is enabled.

B.

Configure the log settings on the firewalls to the central syslog server.

C.

Update the firewalls with current firmware and software.

D.

Use the same complex passwords on all firewalls.

Buy Now
Questions 47

A network technician is setting up a newly installed Internet connection at a SOHO that will support up to ten devices on the network. The company is required to provide its own router to connect to the internet. The ISP has assigned an IP address of 173.28.199.67/32 to the office. Which of the following does the network technician need to perform to ensure all devices on the network can access the Interne

Options:

A.

Configure the local machines to get an IP address from the ISP automatically.

B.

Configure each host with a static IP address within the 173.28.199.0 block.

C.

Configure the router's static IP and create a NAT for the local network address of 10.10.10.0/24,

D.

Configure each host to use its link local addresses for network discovery.

Buy Now
Questions 48

Which of the following BEST describes a VLAN hopping attack?

Options:

A.

An attacker gains unauthorized access to a network by overflowing the CAM table.

B.

An attacker gains unauthorized access to a network by placing a rogue AP on the network.

C.

An attacker gains unauthorized access to a network by using double-tagged packets.

D.

An attacker gains unauthorized access to a network by scanning and mapping it.

Buy Now
Questions 49

A technician has completed configuration on a new satellite location. The location has a new firewall and a small internal network. The technician has been asked to perform basic vulnerability testing. Which of the following tools would BEST assist the technician in verifying the security of the site?

Options:

A.

Packet sniffer

B.

Bandwidth tester

C.

Port scanner

D.

Protocol analyzer

Buy Now
Questions 50

Employees at a company report that they are unable to access the Internet. A network technician notices the workstations are receiving IP addresses that do not follow the IP addressing scheme of the corporate network. Upon further inspection, the technician finds an employee has plugged a rogue wireless router Into the corporate network. Which of the following settings would have prevented this situation?

Options:

A.

DHCP snooping

B.

DHCP relay

C.

DHCP leasing

D.

DHCP options

Buy Now
Questions 51

A customer warns to be able to separate traffic on a local network without using a router. Which of the following should a technician install?

Options:

A.

A multilayer switch

B.

A wireless controller

C.

A load balancer

D.

A VPN concentrator

E.

A UTM appliance

Buy Now
Questions 52

A workstation is configured with the following network details:

N10-007 Question 52

Software on the workstation needs to send a query to the local subnet broadcast address. To which of the following addresses should the software be configured to send the query?

Options:

A.

10.1.2.0

B.

10.1.2.1

C.

10.1.2.23

D.

10.1.2.255

E.

10.1.2.31

Buy Now
Questions 53

Which of the following would MOST likely provide continuous power during a short brownout?

Options:

A.

Uninterruptible power supply

B.

Hot site

C.

Cold site

D.

Generator

E.

Redundant power supplies

Buy Now
Questions 54

hich of the following can be used to prevent devices from handing out IP addresses?

Options:

A.

DHCP snooping

B.

Dynamic ARP inspection

C.

MAC filtering

D.

BPDU guard

Buy Now
Questions 55

A technician is troubleshooting a previously encountered issue. Which of the following should the technician reference to find what solution was implemented to resolve the issue?

Options:

A.

Standard operating procedures

B.

Configuration baseline documents

C.

Work instructions

D.

Change management documentation

Buy Now
Questions 56

A Chief Information Officer (CIO) is reviewing a proposal to provide access security for the IT department’s restricted area. Which of the following is a preventive measure that should be implemented?

Options:

A.

Motion detection

B.

Cameras

C.

Biometric lock

D.

Asset tags

Buy Now
Questions 57

A server administrator needs to perform a backup of all files on the server but does not have enough time overnight. The administrator can perform a backup of all files on weekends and wants to choose another backup for during the week that will provide the fastest restore if there is a need. Which of the following will provide the FASTEST restoration of files?

Options:

A.

Incremental backups every day, with full backups on the first of each month

B.

Differential backups on weekends and incremental backups on weekdays

C.

Full backups on Saturdays and differential backups on the remaining days of the week

D.

Full backups on Saturdays and incremental backups on the remaining days

E.

Incremental backups on Saturdays and differential backups on the remaining days

Buy Now
Questions 58

A senior technician is reconfiguring the company’s firewall because a number of additional devices have been added to the network. The company has acquired a new VoIP phone system, and a group of junior technicians has set up an experimental lab with access to the Internet. Management has given the team latitude for research and development, but would like the company network to be secure and the performance to remain consistent with existing baselines. Which of the following would be the BEST method to reconfigure the network?

Options:

A.

The technician should put the junior team’s lab in a VLAN and the phone system in the DMZ.

B.

The technician should put the junior team’s lab in a DMZ and the phone system in a VLAN.

C.

The technician should put the junior team’s lab in the LAN and the phone system in the WAN.

D.

The technician should put the junior team’s lab in the WAN and the phone system in a WLAN

Buy Now
Questions 59

A consultant is designing a new network for a company that will be hosting its own email and web servers. The company wants to ensure there are separate devices to protect the internal network from the DMZ and the DMZ from the Internet. Which of the following would provide this protection?

Options:

A.

The installation of a firewall with multiple interfaces for the Internet to the DMZ and the LAN

B.

The in-line installation of two firewalls to divide the Internet to the DMZ and the DMZ to the LAN

C.

The installation of two switches to divide the Internet from the LAN and the LAN to the DMZ

D.

The installation of a switch from the Internet to the DMZ and a firewall between the DMZ and the LAN

Buy Now
Questions 60

A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat .Which of the following policies did the technician violate'?

Options:

A.

Data loss prevention

B.

Incident response

C.

Asset disposal

D.

Acceptable use

Buy Now
Questions 61

An IDS was installed behind the edge firewall after a network was breached. The network was then breached again even though the IDS logged the attack. Which of the following should be used in place of these devices to prevent future attacks?

Options:

A.

A network tap

B.

A proxy server

C.

A UTM appliance

D.

A content filter

Buy Now
Questions 62

A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

Options:

A.

VLAN routing

B.

Server-based firewall configuration issue

C.

Patch cable type

D.

DHCP scope availability

Buy Now
Questions 63

A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices?

Options:

A.

Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility.

B.

Configure modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices.

C.

Connect the legacy devices with a PSK while the modern devices should use the more secure EAP.

D.

Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.

Buy Now
Questions 64

A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?

Options:

A.

Transport

B.

Network

C.

Session

D.

Application

Buy Now
Questions 65

After deployment of a second network link to load balance the network traffic, the quality of voice calls degrades. The network administrator discovers the voice packets are arriving at uneven intervals that cannot be handled by the voice application buffer. Which of the following actions will improve the quality of the voice calls?

Options:

A.

Control the attenuation of the non-voice traffic across the network links

B.

Control the latency of traffic across the network links

C.

Control the EMI of the multimedia traffic across the network links

D.

Control the jitter of the affected traffic across the network links

Buy Now
Questions 66

Which of the following allow for higher fault tolerance, availability, and performance across multiple systems? (Select TWO).

Options:

A.

Load balancer

B.

Jumbo frames

C.

Clustering

D.

Round robin

E.

TCP offloading

Buy Now
Questions 67

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

Options:

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Buy Now
Questions 68

A network engineer is working on a network connectivity problem between a site in California and a site in New York The connection went down overnight and the engineer is unsure where the connection failed The technician is logged into the primary switch in the customer's network, which is also the company's connection to the WAN. Which of the following toots should the technician use to determine the last available network hop?

Options:

A.

netstat

B.

Nmap

C.

traceroute

D.

pathping

Buy Now
Questions 69

A network administrator reviews the following command output while troubleshooting a system that is unable to connect to the www.comptia.com website:

N10-007 Question 69

Which of the following is the reason the system cannot connect?

Options:

A.

The DNS server is under maintenance.

B.

A cable is not connected to the NIC.

C.

The domain complia.com is having network issues.

D.

The interface eth0 Is using an APIPA address.

Buy Now
Questions 70

A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Which of the following are MOST likley the causes of this issue? (Select TWO).

Options:

A.

Damaged cables

B.

Crosstalk

C.

Bent pins

D.

TX/RX reverse

E.

VLAN mismatch

F.

Duplex mismatch

Buy Now
Questions 71

A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Select TWO).

Options:

A.

Cat 6 with a repeater placed in the middle of the run

B.

Cat 7

C.

Crossover cable

D.

Fiber-optic cabling

E.

Cat 7 with a patch panel placed in the middle of the run

Buy Now
Questions 72

Which of the following protocols is used by Active Directory for authentication?

Options:

A.

SSH

B.

SFTP

C.

LDAP

D.

TLS

Buy Now
Questions 73

When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring system to describe these object identifiers?

Options:

A.

SNMPv3

B.

SIEM

C.

MIB

D.

SYSLOG

Buy Now
Questions 74

A user in the marketing department reports the email server is down. The user has not received email for more than 24 hours. Which of the following should the network technician do to investigate this issue?

Options:

A.

other users in the marketing department to see if they are also having connectivity issues.

B.

Reboot the email server and verify connectivity once it is up again.

C.

Check the router and firewall to see if ACLs or firmware have changed in the last 24 hours.

D.

Check for network connectivity on the user’s PC and reinstall the email client.

Buy Now
Questions 75

A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?

Options:

A.

Change the default credentials.

B.

Verify the firmware file hash.

C.

Disable unused switchports.

D.

Apply patches and updates.

Buy Now
Questions 76

Joe, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message:

N10-007 Question 76

Joe has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error.

Which of the following is the MOST likely cause of this error?

Options:

A.

The web server is missing an intermediate certificate.

B.

The website is missing an HTTPS certificate.

C.

TLS is not enabled in the browser.

D.

The SSL certificate has expired.

Buy Now
Questions 77

Allowing data to be centrally stored and accessed by multiple devices on an isolated subnet is BEST understood as:

Options:

A.

NAS

B.

iSCSI

C.

SAN

D.

FCoE

Buy Now
Questions 78

A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

Options:

A.

Configure MIMO.

B.

Remove the channel overlap.

C.

Add another AP.

D.

Adjust the security type.

Buy Now
Questions 79

A company must create a way for partners to access a web portal to update documents for a project. This should be done only via web browser in a transparent way for the users. Which of the following should be used?

Options:

A.

Site-to-site connection

B.

SSL VPN

C.

GRE tunnel

D.

VNC

Buy Now
Questions 80

Which of the following statements about the OSI model is true?

Options:

A.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

B.

The network layer deals with the network cabling and network device interface compatibility.

C.

The transport layer deals with how the data is transported from one router to another based on the IP header.

D.

The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

Buy Now
Questions 81

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

Options:

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Buy Now
Questions 82

The help desk is receiving erase the hard drive to eliminate to a server. A help desk technician suspects the server Is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician's claim?

Options:

A.

nmap

B.

arp

C.

tcpdump

D.

dig

Buy Now
Questions 83

A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered?

Options:

A.

Evil twin

B.

ARP poisoning

C.

DHCP exhaustion

D.

Social engineering

Buy Now
Questions 84

A network technician is troubleshooting a connectivity issue and determines the cause is related to the VLAN assignment on one of the access switches in the network. After resolving the issue, the network technician decides to update the documentation to refer to the correct VLAN. Which of the following should the technician update?

Options:

A.

Physical diagram

B.

Logical diagram

C.

IDF documentation

D.

Change management documentation

E.

Incident réponse plan

Buy Now
Questions 85

A network technician receives a report that the company’s intranet web server is not responding. The technician verifies successful connectivity to the server via the ping and tracert commands. The technician also verifies the routers and switches are online and operational, and then runs Telnet to port 80 and receives

a response. Which of the following troubleshooting steps should the technician perform NEXT?

Options:

A.

Establish a plan to reset the company router.

B.

Escalate the issue to the server administrator.

C.

Duplicate the issue and continue testing.

D.

Report that an issue was not identified.

Buy Now
Questions 86

Joe, a technician, is attempting to resolve an issue with an off-site router remotely. Joe needs to reset the WAN connection settings and wants to ensure he will have access to the router at all times to monitor the changes.

Which of the following solutions would BEST meet this goal?

Options:

A.

Use a secure SSH connection over the WAN link.

B.

Telnet into the router over the company VPN.

C.

Implement a modem on the AUX port.

D.

Configure a DSL router to the console port.

Buy Now
Questions 87

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

Options:

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Buy Now
Questions 88

A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?

Options:

A.

3

B.

4

C.

5

D.

6

E.

7

Buy Now
Questions 89

A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?

Options:

A.

Remote desktop gateway

B.

Transport mode IPSec

C.

SSH tunneling

D.

TLS VPN

Buy Now
Questions 90

A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?

Options:

A.

Spanning tree

B.

Trunking

C.

Port aggregation

D.

Port mirroring

Buy Now
Questions 91

Which of the following is created on a 48-port switch with five active VLANs?

Options:

A.

48 networks, five segments

B.

48 collision domains, five broadcast domains

C.

240 private networks

D.

240 usable IP addresses

Buy Now
Questions 92

A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the ceiling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation'?

Options:

A.

Plenum

B.

PVC

C.

Single-mode

D.

Cat 7

Buy Now
Questions 93

A network technician is setting up a WiFi network in a multi-tenant building. When trying to determine the best channel, which of the following is the BEST tool to use?

Options:

A.

Protocol analyzer

B.

Tone generator

C.

Spectrum analyzer

D.

Multimeter

Buy Now
Questions 94

A technician has been asked to install biometric controls at the entrance of a new datacenter. Which of the following would be appropriate authentication methods to meet this requirement? (Choose two.)

Options:

A.

Badge reader

B.

Retina scanner

C.

Random number-generating token

D.

Device proximity sensor

E.

Challenge question

F.

Combination lock

G.

Fingerprint reader

Buy Now
Questions 95

A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?

Options:

A.

Change the default credentials.

B.

Verify the firmware file hash.

C.

Disable unused switch ports.

D.

Apply patches and updates.

Buy Now
Questions 96

A request is made to open an additional port on a firewall. The request is approved, and the port is opened. Which of the following BEST describes this process?

Options:

A.

Standard operating procedure

B.

Process management

C.

Project management

D.

Change management

Buy Now
Questions 97

A network engineer created a guest wireless network named "Visitor" for clients to use when they are on site. After a couple of months, visiting clients state they cannot access the Internet after connecting to the "Visitor" wireless network, even though configuration changes have not been made. Which of the following is the MOST likely cause of this issue?

Options:

A.

The access point's antenna is not powerful enough to allow all the visitors to establish a connection.

B.

The SSID suggests there is a rogue access point masquerading as the guest network.

C.

The visiting clients are trying to connect to the corporate network without the proper credentials.

D.

The network Is overlapping with the internal corporate wireless network and causing signal loss.

Buy Now
Questions 98

Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains?

Options:

A.

Layer 2 switch

B.

Layer 3 switch

C.

Signal repeater

D.

Bridge

E.

Domain server

Buy Now
Questions 99

A network technician needs to install the latest firmware on the switch to address a recently discovered vulnerability. Which of the following should the technician do to have a rollback plan in case of issues with the new firmware? (Choose two.)

Options:

A.

Label the switch with IP address and firmware version

B.

Draw the switchport diagram

C.

Create a change management document

D.

Draw the network rack logical diagram

E.

Confirm standard operating procedures documentation

F.

Create a performance baseline of the switch

Buy Now
Questions 100

A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

Options:

A.

UTM appliance

B.

IDS appliance

C.

Proxy server

D.

RADIUS server

Buy Now
Questions 101

A company’s receptionist hands out slips of paper with access codes to visitors each day. A recent internal audit revealed the current method of guest access needs to be improved. Which of the following would improve the security of the guest network?

Options:

A.

Implement WPA2-PSK.

B.

Implement a captive portal.

C.

Implement certificate-based 802.1X.

D.

Implement MAC filtering.

Buy Now
Questions 102

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

Options:

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Buy Now
Questions 103

A network technician is reviewing the company phone system to make the necessary changes to a firewall configuration. Which of the following protocols are used in VoIP communication? (Choose two.)

Options:

A.

SIP

B.

NTP

C.

H.323

D.

SNMP

E.

IMAP

F.

SMB

G.

CSMA

Buy Now
Exam Code: N10-007
Exam Name: CompTIA Network+ N10-007
Last Update: Nov 28, 2023
Questions: 688
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 24 Nov 2024