N10-007 Premium Bundle

N10-007 Premium Bundle

CompTIA Network+ N10-007 Certification Exam

4.5 
(46425 ratings)
0 QuestionsPractice Tests
0 PDFPrint version
November 23, 2024Last update

CompTIA N10-007 Free Practice Questions

Your success in N10-007 Dumps Questions is our sole target and we develop all our N10-007 Braindumps in a way that facilitates the attainment of this target. Not only is our N10-007 Dumps material the best you can find, it is also the most detailed and the most updated. N10-007 Exam Questions for CompTIA N10-007 are written to the highest standards of technical accuracy.

Free N10-007 Demo Online For Microsoft Certifitcation:

NEW QUESTION 1
Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?

  • A. Enable mixed mode
  • B. Disable SSID
  • C. Disable encryption
  • D. Enable `n' only mode

Answer: A

NEW QUESTION 2
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?

  • A. Access control lists
  • B. Captive portal
  • C. WPA2
  • D. Port security

Answer: D

NEW QUESTION 3
A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

  • A. Loopback IP
  • B. Virtual IP
  • C. Reserved IP
  • D. Public

Answer: B

NEW QUESTION 4
A technician is configuring a default route with IPv6. Which of the following is the correct setting for an IPV6 default rout?

  • A. : : 1
  • B. : : /0
  • C. 2001: :0/64
  • D. FE80 : :0/64

Answer: C

NEW QUESTION 5
802.11 n clients currently have no way to connect to the network. Which of the following devices should be implemented to let the clients connect?

  • A. Router
  • B. Range extender
  • C. VoIP endpoint
  • D. Access point

Answer: D

NEW QUESTION 6
Which of the following is characterized by an attacker attempting to map out an organization's staff hierarchy in order to send targeted emails?

  • A. Whaling
  • B. Impersonation
  • C. Privilege escalation
  • D. Spear phishing

Answer: A

NEW QUESTION 7
A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector?

  • A. Wire tester
  • B. Punch down
  • C. Crimper
  • D. Multimeter

Answer: C

NEW QUESTION 8
AChief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?

  • A. IaaS
  • B. PaaS
  • C. SaaS
  • D. DaaS

Answer: B

NEW QUESTION 9
Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to.
Which of the following would allow him to test basic functionality of the NIC?

  • A. Loopback plug
  • B. Protocol analyzer
  • C. Smart jack
  • D. Coupler

Answer: A

NEW QUESTION 10
A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased traffic?

  • A. STP blocking
  • B. IP addresses
  • C. MTU mismatch
  • D. Switching loop

Answer: D

NEW QUESTION 11
Which of the following provides two factor authentication?

  • A. Username+ password
  • B. Smartcard +PIN
  • C. Fingerprint +retina scan
  • D. Key fob +ID card

Answer: B

NEW QUESTION 12
A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the MOST likely cause?

  • A. A missing route on the alarm device.
  • B. Incorrect VLAN assignment on the router.
  • C. A missing route on the network routers.
  • D. Incorrect speed/duplex setting on the alarm device.

Answer: D

NEW QUESTION 13
A technician is assigned to secure a basic wireless network. Which of the following authentication protocol should the technician use to performed this task (select TWO).

  • A. RDP
  • B. SNMP
  • C. WPA2
  • D. EAP SSL

Answer: CD

NEW QUESTION 14
A technician is responsible for configuring a new firewall. The hardware team has already installed, powered, and connected the system. Which of the following types of documentation should the technician utilize to complete the task?

  • A. Rack diagram
  • B. IDF/MDF documentation
  • C. Network performance baseline
  • D. Logical and physical diagrams

Answer: D

NEW QUESTION 15
An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users' connection issues?

  • A. Limit the devices to 802.11n only.
  • B. Enable the SSID broadcast.
  • C. Enable MAC filtering.
  • D. Use a WEP 128-bit key.

Answer: B

NEW QUESTION 16
A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST likely issue with the cable?

  • A. The cable is a crossover cable
  • B. The cable is rollover cable
  • C. The cable has bent pins
  • D. The cable is a Cat 5 cable

Answer: A

NEW QUESTION 17
Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment?

  • A. packet capturing
  • B. port scanning
  • C. Log scanning
  • D. Baseline review

Answer: B

NEW QUESTION 18
Which of the following physical security controls is MOST likely to be susceptible to a false positive?

  • A. Identification card
  • B. Biometric device
  • C. Proximity reader
  • D. Video camera

Answer: C

100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader, Get Full Dumps HERE: https://www.certleader.com/N10-007-dumps.html (New 532 Q&As)


START N10-007 EXAM