Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: takeit60

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008

N10-007 CompTIA Network+ N10-007 Questions and Answers

Questions 4

Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

Options:

A.

1

B.

2

C.

3

D.

4

E.

5

Buy Now
Questions 5

A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network?

Options:

A.

Single sign-on

B.

RADIUS

C.

TACACS+

D.

Captive portal

Buy Now
Questions 6

A technician restored network connectivity on a user’s laptop. After validating full system functionality, which of the following steps should the technician take NEXT?

Options:

A.

Duplicate the problem, if possible

B.

Determine if anything has changed

C.

Test the theory to determine the cause

D.

Document the findings, actions, and outcomes

Buy Now
Questions 7

A network administrator has configured the network on each floor of a four-story building to have the following different subnets: 10.0.10.0/24, 127.0.0.0/24, 172.16.0.0/24, and 192.168.255.0/24. After implementing these networks, the administrator realizes there has been a mistake. Which of the following BEST describes the mistake?

Options:

A.

10.0.10.0/24 is not valid because 0 in the second octet cannot be used in the network portion of the IP address.

B.

127.0.0.0/24 is the reserved loopback network and cannot be used for host networks.

C.

172.16.0.0/24 is the reserved multicast network and cannot be used for host networks.

D.

192.168.255.0/24 is not valid because 255 in the third octet cannot be used in the network portion of the IP address.

Buy Now
Questions 8

Which of the following provides information about how often some devices fail so the IT department can take proactive measures?

Options:

A.

MTBF

B.

MTTR

C.

SLA

D.

UPS

Buy Now
Questions 9

A manufacturing company has signed an agreement with another company to collaborate on an upcoming project. Both companies require secure and persistent access to resources on each others' networks. Which of the following remote access technologies should the companies implement to satisfy their requirements?

Options:

A.

Out-of-band management

B.

Site-to-site VPN

C.

DMZ networks

D.

SFTP site

Buy Now
Questions 10

Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?

Options:

A.

Remote access

B.

NDA

C.

SLA

D.

BYOD

E.

Incident response

Buy Now
Questions 11

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper Ethernet ports available to use for the trunk ports. Which of the following cable types should the network administrator deploy?

Options:

A.

Straight-through

B.

Console

C.

Rollover

D.

Crossover

Buy Now
Questions 12

A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?

Options:

A.

Non-disclosure policy

B.

Data loss prevention policy

C.

Acceptable use policy

D.

Incident response policy

Buy Now
Questions 13

A network technician needs to install the latest firmware on the switch to address a recently discovered vulnerability. Which of the following should the technician do to have a rollback plan in case of issues with the new firmware? (Choose two.)

Options:

A.

Label the switch with IP address and firmware version

B.

Draw the switchport diagram

C.

Create a change management document

D.

Draw the network rack logical diagram

E.

Confirm standard operating procedures documentation

F.

Create a performance baseline of the switch

Buy Now
Questions 14

A technician is required to install a new DOCSIS-based Internet connection. Which of the following medium types does this use?

Options:

A.

Cat6a

B.

RG-6

C.

UTP

D.

Multimode

E.

Single mode

Buy Now
Questions 15

Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

Options:

A.

an incorrect DHCP gateway setting

B.

a duplicate IP address

C.

NTP synchronization

D.

ACL configuration

Buy Now
Questions 16

A network team at a large company has received funding for a WiFi refresh. One of the requirements in the RFP is the new WLAN infrastructure must provide APs that support multiple streams of information at the same time. For which of the following WiFi features is the network team looking?

Options:

A.

MU-MIMO

B.

MIMO

C.

Channel bonding

D.

TDM

E.

Automatic channel selection

Buy Now
Questions 17

Which of the following allows for file-level network storage?

Options:

A.

SAN

B.

iSCSI

C.

FCoE

D.

NAS

Buy Now
Questions 18

Which of the following manages the delegation of physical equipment to the virtual components?

Options:

A.

Virtual router

B.

Hypervisor

C.

Virtual switch

D.

Network card

Buy Now
Questions 19

An attacker quickly gains administrative access to a network device. Which of the following MOST likely allowed the attacker to guess the password?

Options:

A.

Man in the middle

B.

A brute-force attack

C.

A hash comparison

D.

Rainbow tables

Buy Now
Questions 20

A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?

Options:

A.

File hash

B.

Encryption

C.

FCS

D.

Compression

Buy Now
Questions 21

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?

Options:

A.

WPA2

B.

EAP-FAST

C.

MAC filtering

D.

802.1X

Buy Now
Questions 22

A corporation has been the target of hackers who exploited TCP port 80. The network administrator is tasked with securing connections to the web server. Which of the following protocols should be implemented to BEST secure the web server? (Choose two.)

Options:

A.

HTTPS

B.

SSH

C.

TLS

D.

VNC

E.

RDP

F.

SFTP

Buy Now
Questions 23

A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?

Options:

A.

Bridge

B.

WAP

C.

Hub

D.

Switch

Buy Now
Questions 24

Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?

Options:

A.

Conducting daily vulnerability scans

B.

Performing daily port scans

C.

Utilizing a protocol analyzer

D.

Using a SIEM

E.

Reviewing daily logs

Buy Now
Questions 25

A network technician is setting up a new web server on the company network. One of the requirements for the web server is to ensure the end users can securely authenticate to the application to perform their job duties. Which of the following ports should the network technician request from the firewall team to comply with this requirement?

Options:

A.

22

B.

69

C.

80

D.

389

E.

443

Buy Now
Questions 26

A network technician is attempting to update firmware on a router but cannot physically locate the router. Which of the following would show where to locate router?

Options:

A.

Diagram symbols

B.

Rack diagram

C.

Logical diagram

D.

Port locations

Buy Now
Questions 27

Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

Options:

A.

An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network.

B.

An IDS will detect traffic anomalies, alert and log them, and block the traffic.

C.

An IDS will detect previously unknown traffic anomalies, alert and log them, and block the traffic.

D.

An IPS will detect traffic anomalies, alert and log them, and allow them through the network.

E.

An IPS will detect previously unknown traffic signatures, and alert and log them.

F.

An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

Buy Now
Questions 28

A network technician is reviewing the following output from a router:

Which of the following is this an example of?

Options:

A.

A vulnerability scan

B.

A port scan

C.

A traffic log

D.

A packet capture

Buy Now
Questions 29

A network technician is reviewing the company phone system to make the necessary changes to a firewall configuration. Which of the following protocols are used in VoIP communication? (Choose two.)

Options:

A.

SIP

B.

NTP

C.

H.323

D.

SNMP

E.

IMAP

F.

SMB

G.

CSMA

Buy Now
Questions 30

A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely?

Options:

A.

The address provided by the ISP has a mask that is too small to be used and needs a larger mask.

B.

The address provided by the ISP is a private IP address space and is not routable on the Internet.

C.

The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30.

D.

The address provided by the ISP is part of the reserved loopback address space and cannot be used.

Buy Now
Questions 31

A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the ceiling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation'?

Options:

A.

Plenum

B.

PVC

C.

Single-mode

D.

Cat 7

Buy Now
Questions 32

A network technician is reviewing switch ACLs to determine if they are causing communication issues with one PC. The PC’s IP address is 192.168.12.66. Which of the following is the network range found in the ACL that could have affected this PC?

Options:

A.

192.168.12.97 255.255.255.192

B.

192.168.12.97 255.255.255.224

C.

192.168.12.97 255.255.255.240

D.

192.168.12.97 255.255.255.248

Buy Now
Questions 33

Which of the following would a network technician MOST likely connect to power wireless access points in drop ceilings?

Options:

A.

Powerline extender

B.

Ethernet-over-power adapter

C.

Power-over-Ethernet switch

D.

Power distribution unit

E.

Ethernet power controller

Buy Now
Questions 34

After several changes to the network, a technician needs to ensure a client is checking for new hostname and IP pairings. Which of the following commands should the technician use to force new lookups?

Options:

A.

ipconfig /flushdns

B.

ipconfig /release

C.

ipconfig /renew

D.

ipconfig /all

Buy Now
Questions 35

A network administrator Is configuring the 172.16.40.0/22 network for a new building. Which of the following is the number of hosts that will be supported on this network?

Options:

A.

510

B.

512

C.

1022

D.

1024

E.

2046

F.

2048

Buy Now
Questions 36

Ann. a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?

Options:

A.

Transceiver mismatch

B.

Crosstalk

C.

Jitter

D.

Open/short on the cable

Buy Now
Questions 37

A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician's machine. Which of the following should the technician use to help diagnose the problem?

Options:

A.

Packet sniffer

B.

netstat

C.

nslookup

D.

Spectrum analyzer

Buy Now
Questions 38

A technician is installing a SOHO router. Which of the following should be performed on every installation and periodically maintained to prevent unauthorized access? (Choose two.)

Options:

A.

Disable remote management

B.

Update the router firmware

C.

Disable port forwarding

D.

Use complex passwords

E.

Disable the SSID broadcast

Buy Now
Questions 39

Which of the following is used to purposely attack a system to exploit vulnerabilities?

Options:

A.

Honeypot

B.

Vulnerability scan

C.

Device hardening

D.

Penetration testing

Buy Now
Questions 40

You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen.

Step 1: Select the tool that was used to create the cable test results.

Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the 'Submit Cable Test Analysis' button.

Options:

Buy Now
Questions 41

The network support team is responsible for managing connections in a large, multipurpose venue where maintaining physical security is difficult. Implementing which of the following standards would BEST help to prevent unauthorized connections to the wired network?

Options:

A.

802.1X

B.

802.1q

C.

802.3at

D.

802.3af

Buy Now
Questions 42

A large company uses an AAA server to manage network device access. The engineers can use their domain credentials to access all other servers. Currently, the network engineers cannot access the AAA server using domain credentials, but they can access it using a local account. Which of the following should the engineers update?

Options:

A.

Host-based firewall settings

B.

TACAS+ server time

C.

Server IP address

D.

DNS SRV record

Buy Now
Questions 43

During a weekend event, several people reported they were unable to get onto the wireless network. On Monday, the technician could not find a problem. Which of the following is the MOST likely cause?

Options:

A.

Cross talk

B.

Overcapacity

C.

Channel overlap

D.

Wrong passphrase

Buy Now
Questions 44

A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?

Options:

A.

WEP

B.

EAP-PEAP

C.

PSK

D.

CCMP-AES

Buy Now
Questions 45

A technician has been assigned to capture packets on a specific switchport. Which of the following switch feature MUST be used to accomplish this?

Options:

A.

Spanning tree

B.

Trunking

C.

Port aggregation

D.

Port mirroring

Buy Now
Questions 46

At which of the following layers of the OSI model does compression occur?

Options:

A.

Session

B.

Transport

C.

Data link

D.

Presentation

Buy Now
Questions 47

An employee reports an error when visiting a website using SSL, and a message is displayed warning of an invalid certificate. Which of the following could be occurring?

Options:

A.

Phishing

B.

DDoS

C.

Evil twin

D.

MITM

E.

OCSP stapling

Buy Now
Questions 48

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

Options:

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Buy Now
Questions 49

A network technician has purchased a 10GBase-T switch and wishes to connect it to 30 computers with 10GB network cards. The computers are 225ft (69m) away, and all need to establish a 10 Gbps connection to meet business requirements. To minimize costs while still meeting these requirements, which of the following cable types should the technician choose?

Options:

A.

Cat 5e

B.

Cat 6

C.

Cat 6a

D.

Cat 7

Buy Now
Questions 50

Which of the following operate only within the UDP protocol?

Options:

A.

Frames

B.

Datagrams

C.

Segments

D.

Packets

Buy Now
Questions 51

A customer has submitted a request for a new wireless connection In the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration?

Options:

A.

The LAN and WLAN should be configured In the same zone with dynamic DENY ALL rules.

B.

The LAN and WLAN should be configured in the DMZ so traffic is denied automatically.

C.

The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours.

D.

The LAN and WLAN should be configured In separate zones with a firewall in between.

Buy Now
Questions 52

A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

Options:

A.

System life-cycle procedures

B.

Off-boarding procedures

C.

Safety procedures

D.

Appropriate use policy

Buy Now
Questions 53

A technician Is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

Options:

A.

HTTP

B.

SMTP

C.

NTP

D.

RDP

Buy Now
Questions 54

Which of the following protocols is used to transport outgoing mail across networks?

Options:

A.

POP

B.

SMTP

C.

IMAP

D.

LDAP

Buy Now
Questions 55

Which of the following policies prohibits a network administrator from using spare servers in the datacenter to mine bitcoins?

Options:

A.

NDA

B.

BYOD

C.

AUP

D.

MOU

Buy Now
Questions 56

A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?

Options:

A.

Snapshots

B.

Incremental

C.

Replica

D.

Differential

Buy Now
Questions 57

A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

Options:

A.

IPS

B.

Firewall

C.

SIEM

D.

UTM

E.

Content filter

Buy Now
Questions 58

Which of the following is the MOST secure type of remote administration?

Options:

A.

SSH over iPSec client-to-site VPN

B.

RDP over SSLv2 HTTPS terminal services gateway

C.

HTTP over WPA2-TKIP WiFi

D.

Telnet over PSTN

Buy Now
Questions 59

A network technician is setting up the wireless network for a company's new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

Options:

A.

Channel 6

B.

Channel 7

C.

Channel 9

D.

Channel 10v

Buy Now
Questions 60

A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization's certificate authority. Which of the following authentication methods would meet this requirement?

Options:

A.

PEAP

B.

WP2-PSK

C.

Captive portal

D.

EAP-TLS

Buy Now
Questions 61

Which of the following technologies should be used in high-throughput networks to reduce network overhead?

Options:

A.

iscsi

B.

QoStags

C.

Port aggregation

D.

Jumbo frames

Buy Now
Questions 62

To achieve a more efficient and secure work environment, a company needs a way to control what is being accessed on the Internet using corporate resources. Which of the following devices should be used to accomplish this task? (Choose two.)

Options:

A.

Proxy server

B.

IDS

C.

Load balancer

D.

Content filter

E.

VPN concentrator

F.

IPS

Buy Now
Questions 63

A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem?

Options:

A.

Loopback adapter

B.

Tone generator

C.

Multimeter

D.

Punchdown tool

Buy Now
Questions 64

A user in the marketing department reports the email server is down. The user has not received email for more than 24 hours. Which of the following should the network technician do to investigate this issue?

Options:

A.

other users in the marketing department to see if they are also having connectivity issues.

B.

Reboot the email server and verify connectivity once it is up again.

C.

Check the router and firewall to see if ACLs or firmware have changed in the last 24 hours.

D.

Check for network connectivity on the user’s PC and reinstall the email client.

Buy Now
Questions 65

Which of the following DNS records would a technician need to update after migrating an organization's email server to a cloud-hosting provider?

Options:

A.

TXT

B.

CNAME

C.

AAAA

D.

Mx

Buy Now
Questions 66

A network administrator is responding to a help desk ticket, which states an unknown wireless access point is broadcasting in a specific area. Upon investigation, the administrator finds that a user brought a wireless access point from home and plugged it into the corporate network. This resulted in an attacker using the unsecured wireless LAN to gain access to the network. Which of the following should the network administrator have done to BEST prevent this problem?

Options:

A.

Changed the default credentials on the network switches

B.

Installed a Layer 7 firewall

C.

Implemented port security

D.

Disabled unnecessary services on the network switches

Buy Now
Questions 67

A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?

Options:

A.

Expired IP address

B.

Exhausted dynamic scope

C.

Misconfigured VLSM

D.

Rogue DHCP server

Buy Now
Questions 68

A Chief Information Officer (CIO) wants to improve the availability of a company's SQL database Which of the following technologies should be utilized to achieve maximum availability?

Options:

A.

Clustering

B.

Port aggregation

C.

NIC teaming

D.

Snapshots

Buy Now
Questions 69

A user's computer is having trouble reaching a certain website Other branch locations do not have any issues reaching this website, and the user can reach all other websites A technician suspects there is a failure at an upstream router under The ISPs control. Which of the following commands should the technician run to confirm this suspicion''

Options:

A.

tepdump

B.

arp

C.

traeert

D.

nmp

E.

route

Buy Now
Questions 70

A network administrator installed a WAP to extend the network. However, the company wants to contain the signal so it does not extend beyond the company's parking structure. Which of the following solutions would work BEST?

Options:

A.

Create MAC filtering.

B.

Change the channel.

C.

Change the encryption.

D.

Install a directional antenna.

Buy Now
Questions 71

A technician has started a major network project to upgrade to a higher throughput standard. The technician will need to install new patch panels and breakout boxes to support this infrastructure. Which of the following layers of the OSI model is the technician addressing at this stage of the upgrade?

Options:

A.

Physical

B.

Transport

C.

Network

D.

Data link

Buy Now
Questions 72

APC cannot reach a server in the same VLAN with IP address 10.10.5.0. The PC has the following information:

IP address: 10,10.0.255

Net mask: 255.255 252.0

Gateway: 10.10.1.1

Which of the following is the reason for this issue?

Options:

A.

The server IP address ends in a network address.

B.

The gateway address is incorrect

C.

The server address is not in the same subnet as the PC address.

D.

The IP address is configured to be the broadcast address.

Buy Now
Questions 73

A technician is planning a network wiring installation and must ensure all cabling meets the installation requirements for air-handling spaces in the celling in case of a fire. Which of the following characteristics does

plenum cabling have to meet this requirement?

Options:

A.

Outer jacket made of PVC

B.

Outer jacket with metal shielding

C.

Low-smoke material jacket

D.

Fiber-optic glass core

Buy Now
Questions 74

Which of the following utilizes a circuit-switched network?

A Satellite

B. PPPoE

C. Wireless

D. MPLS

E. Frame relay

Options:

Buy Now
Questions 75

The Chief Information Officer (CIO) of a large company wants to migrate the ERP system into a cloud provider. Company policy states it is necessary to maintain control over the computer resources that run this software. Which of the following cloud models should be used in this scenario?

Options:

A.

SaaS

B.

PaaS

C.

CaaS

D.

laaS

Buy Now
Questions 76

A network administrator is installing the company first external-facing web server and examining where to place it on the network. In which of the following zones should the server be configured?

Options:

A.

DMZ

B.

WAN

C.

LAN

D.

VPN

E.

VLAN

Buy Now
Questions 77

A network technician needs to visit a datacenter. To be admitted, the security officer requests to see a driver's license, and then directs the technician to a fingerprint scanner. Which of the following authentication factors is the facility requiring for admittance? (Select TWO).

Options:

A.

Something you have

B.

Something you know

C.

Something you do

D.

Something you are

E.

Somewhere you are

Buy Now
Questions 78

A network technician receives a help desk ticket indicating all users at a branch office are having problems connecting to the corporate wireless network, The technician verifies the wireless controller can see the WAPS at this

office and they are configured appropriately. After reviewing recently closed tickets, the network technician discovers a software upgrade was implemented to the wireless network at that branch office overnight. Which of the

following is MOST likely the cause of the issue?

Options:

A.

The office is over capacity.

B.

The power levels were reduced.

C.

The SSID is incorrect.

D.

There Is a security type mismatch.

Buy Now
Questions 79

A new printer was assigned a static IP address within the DHCP scope of a QA subnet. There are 243 workstations on the LAN five servers, and four existing printers on the network. The network administrator configured the network with the following parameters:

192.168.51 -192 168.5 5 static IPs assigned to servers

192.168.5.6 -192 168.5 250 DHCP scope for workstations

192.168.5.251 -192.168.5 254 static IPs assigned to printers

Which of the following should the network administrator perform to minimize the disruption to the users and keep the LAN secure while setting up the new printer?

Options:

A.

Increase the DHCP scope by one address

B.

Create an IP reservation for the printer

C.

Assign a public IP address to the printer.

D.

Reconfigure the subnet mask for the LAN

Buy Now
Questions 80

A network administrator has discovered a low-end managed switch connoted to the company LAN. While reading about the device's specifications on the manufacturer's website, the administrator discovers the switch does not support a command line interface for administration. Which of the following remote access methods should the administrator use to log in the switch?

Options:

A.

install a VNC plugin on the web Browser

B.

Connect to the HTTPS management interface

C.

Replace the managed switch with an unmanaged switch.

D.

Establish an SSH session.

Buy Now
Questions 81

A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?

Options:

A.

Omni

B.

Directional

C.

Yagi

D.

Parabolic

Buy Now
Questions 82

A technician needs a way to allow clients to access a new application server on the network. Which of the following should the technician set up to achieve this objective? (Select TWO)

Options:

A.

DHCP MAC reservation

B.

DNS SRV record

C.

DNS reverse zone

D.

DHCP scope option

E.

DHCP IP reservation

F.

Cloud-hosted DNS

Buy Now
Questions 83

A technician is installing a cable modem In a SOHO. Which of the following cable types will the technician MOST likely use to connect a modem to the ISP?

Options:

A.

Coaxial

B.

Single-mode fiber

C.

Cat 6e

D.

Multimode fiber

Buy Now
Questions 84

A network technician is working to bring a new workstation onto the network. No lights come on when the technician plugs the Ethernet cable into the workstation. The technician checks the connection in the IDF and discovers the data jack is not labeled. Which of the following tools should the technician use to trace the network connection back to the IDF?

Options:

A.

A port scanner

B.

A loopback adapter

C.

An OTDR

D.

A tone generator

Buy Now
Questions 85

A user in the finance department can access the department printer and file server yet is unable to print to the marketing department’s printer. A technician runs ipconfig and sees the following output:

IPv4 Address. . . . . . . . . . . : 192.168.0.101

Subnet Mask . . . . . . . . . . . : 255.255.255.0

Default Gateway . . . . . . . . . : 192.168.1.1

The technician has verified the user’s PC is in the proper VLAN and sees an UP/UP status on the switchport. Which of the following is MOST likely causing the issue?

Options:

A.

The user’s IP is the broadcast address.

B.

The two printers share the same IP address.

C.

There is an incorrect default gateway on the user’s PC.

D.

The ARP table on the switch has not been cleared.

Buy Now
Questions 86

A network technician needs to manage a sensor at an unmanned location without incurring the cost of a dedicated Internet connection. Which of the following will the technician MOST likely implement?

Options:

A.

A dial-up modem

B.

An SSH server

C.

Asite-to-site VPN

D.

An RDP jump box

Buy Now
Questions 87

An ARP request is broadcasted and sends the following request.

''Who is 192.168.1.200? Tell 192.168.1.55''

At which of the following layers of the OSI model does this request operate?

Options:

A.

Application

B.

Data link

C.

Transport

D.

Network

E.

Session

Buy Now
Questions 88

A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?

Options:

A.

Two days

B.

Three days

C.

Six days

D.

Seven days

Buy Now
Questions 89

A technician is making the population of routers more secure. Which of the following are the BEST options for making authentication more secure? (Choose two.)

Options:

A.

Add a login banner.

B.

Disable unused services.

C.

Upgrade the firmware.

D.

Disable Telnet.

E.

Implement AAA.

F.

Disable SSH.

Buy Now
Questions 90

Internal users have been unable to access the web server on a local network that they are to use. qi have been to the help desk, and a technician has decided to apply the following commands to the equipment:

access-list 103 permit tcp any any eq 80

access-list 103 permit tcp any any eq 443

access-list 103 deny ip any any

On which of the following devices would the technician apply these commands?

D. Switch

B. Modem

C. Border router

D. Bridge

E. PDU

Options:

Buy Now
Questions 91

The security department is looking to install a new IP-based camera. Plugging the camera into the available Ethernet jack does not power on the camera. Upon further investigation, the cable tests fine, and it does provide power to a VoIP phone. Which of the following is MOST likely causing the issue?

Options:

A.

The brown pair UTP has a short.

B.

The camera requires 802.3at power

C.

The camera requires Cat 7 cabling.

D.

The switchport has PoE disabled.

Buy Now
Questions 92

A site was hit with ransomware on two occasions in the past month. Which of the following would be the BEST solution for a technician who wants to reduce this frequency?

Options:

A.

Proxy server

B.

UTM appliance

C.

RADIUS server

D.

Content filter

Buy Now
Questions 93

A network administrator is reviewing security logs and notes a strange IP address logging into the management console of a switch. The administrator verifies the switch is not using default credentials. Which of the following steps should the administrator take NEXT?

Options:

A.

Implement restrictions via ACL.

B.

Update firmware to the current version.

C.

Disable unnecessary services.

D.

Check the hash of the running firmware.

Buy Now
Questions 94

A new datacenter is being created, and management is trying to control access to that area. Which of the following are the BEST choices for providing access to the new datacenter? (Choose two.)

Options:

A.

Captive portal

B.

Wireless IP camera

C.

Biometrics

D.

Key fob

E.

Private key infrastructure

F.

Access control list

Buy Now
Questions 95

administrator is reviewing the security logs from switches across the campus and notes multiple failed logon attempts on all the equipment. Which of the following should be implemented to restrict

the networks that can access the management interface on the switches?

Options:

A.

LDAP

B.

ACLs

C.

Port security

D.

Certificates

Buy Now
Questions 96

A technician is performing a maintenance task on a weekly basis and wants to ensure the task is property documented and able to be performed by other technicians. Which of the following types of documentation should the technician complete?

Options:

A.

Standard operating procedure

B.

Work order

C.

Performance baseline D. Logical diagram

D.

Change management

Buy Now
Questions 97

Which of the following BEST explains why a firewall would be subject to international export controls?

Options:

A.

Protected industry

B.

IP version incompatibility

C.

Differing power standards

D.

Encryption technology

Buy Now
Questions 98

A network technician is attempting to resolve an issue for two users. The users unplugged and moved their laptops to a different cubicle to work together. The NIC LED Is lit on both laptops, but the users are not able to access the network resources. Which of the following is MOST likely preventing access?

Options:

A.

Port security

B.

Auto-MDIX

C.

BDPU guard

D.

DHCP snooping

Buy Now
Questions 99

A company wants to implement a large number of WAPs throughout its building and allow users to be able to move around the building without dropping their connections. Which of the following pieces of equipment would be able to handle this requirement?

Options:

A.

A VPN concentrator

B.

A load balancer

C.

A wireless controller

D.

A RADIUS server

Buy Now
Questions 100

A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?

Options:

A.

Allow RDP connections through the firewall.

B.

Install VNC clients on the sales representatives' machines.

C.

Create an SSL VPN for remote access to the network

D.

Place all servers in the publicly available DMZ

Buy Now
Questions 101

Two buildings are connected with 802.11a wireless bridges using omnidirectional antennas However, the connection between the two bridges often drops Which of the following would be the BEST solution?

Options:

A.

Change the antennas to unidirectional.

B.

Conduct a site survey to identify sources of noise

C.

Add a second wireless bridge at each building.

D.

Change the bridges to use 802.11g

Buy Now
Questions 102

A network engineer is designing a new secure wireless network. The engineer has been given the following requirements:

1 Must not use plaintext passwords

2 Must be certificate based

3. Must be vendor neutral

Which of the following methods should the engineer select?

Options:

A.

TWP-RC4

B.

CCMP-AES

C.

EAP-TLS

D.

WPA2

Buy Now
Questions 103

Ann, a network technician, has relocated a rack that contains the networking and server equipment from the third floor to the sixth floor. To connect the rack-mounted router to the media converter in the first-floor MDF, she extended the length of the original 197ft (60m) Cat5e cable to 395ft (120m) by attaching another 197ft (60m) cable with an RJ45 coupler. After the move, users report intermittent connectivity to external websites, although connectivity to internal hosts has not changed. Which of the following is a network performance issue that is MOST likely causing this issue?

Options:

A.

Attenuation

B.

Jitter

C.

Crosstalk

D.

Transceiver mismatch

Buy Now
Exam Code: N10-007
Exam Name: CompTIA Network+ N10-007
Last Update: Apr 14, 2023
Questions: 688