CompTIA+ N10-007

216 Questions | Total Attempts: 191

SettingsSettingsSettings
CompTIA+ N10-007 - Quiz

.


Questions and Answers
  • 1. 
    A file server deployed on the company perimeter network is used to store reference materials and templates for forms. All of the files are stored on the same disk. Files are downloaded from the server using FTP. The company needs to able to determine whether a file is changed while stored on the server. What should the company do?
    • A. 

      Create a hash for the disk partition.

    • B. 

      Require secure authentication for access.

    • C. 

      Run a full backup daily.

    • D. 

      Create a hash for each file.

  • 2. 
    The network team is tasked with hardening the L2 infrastructure. Which two actions should the team perform?
    • A. 

      Implement SPI

    • B. 

      Change RSTP to STP.

    • C. 

      Shut down unused ports.

    • D. 

      Change the native VLAN.

    • E. 

      Disable all trunking.

  • 3. 
    The nslookup command fails and shows the error in the exhibit. What should the support team create to fix the problem? 
    • A. 

      APIPA address

    • B. 

      TXT record

    • C. 

      Static route entry

    • D. 

      Reverse lookup zone

    • E. 

      CNAME record

  • 4. 
    Against which type of attack is end user training most effective?
    • A. 

      Man-in-the-middle attack

    • B. 

      Phishing

    • C. 

      War driving

    • D. 

      Evil twin

  • 5. 
    A company deploys a server on its perimeter network. The server will be used for transferring files. Specific requirements include:
    • Users authentication with a user ID and password.
    • all communication between the server and client is encrypted.
    • Open ports on the perimeter firewall are kept to a minimum.
    • No certificate is required at the server or client.
    What should the company select as a solution?
    • A. 

      FTP

    • B. 

      TFTP

    • C. 

      SFTP

    • D. 

      FTPS

  • 6. 
    A medium-sized company is moving into a new office space. The office is being prewired with Cat 6 cabling. Employees will be moving their own equipment and will need to connect into the network. Technical Services wants to help ensure that the move goes as smoothly as possible. What should Technical Services use to ensure this?
    • A. 

      Labling

    • B. 

      Physical network diagram

    • C. 

      Logical network diagram

    • D. 

      Work instructions

  • 7. 
    A server on the internal network is determined to be at risk for potential attack. The Technical Services team is directed to harden the server to minimize this risk. The network supports wired and wireless access. The server is connected through a wired connection. The computer is backed up to a network location once a week, over the weekend. The computer is rebooted after the backup. Which two actions should hardening include? (Choose two)
    • A. 

      Disabled unused ports

    • B. 

      Add wireless access

    • C. 

      Stop unnecessary services

    • D. 

      Schedule more frequent backups

    • E. 

      Bring patches up-to-date

  • 8. 
    A company wants to deploy a new WLAN topology without running new electrical wiring. The solution has to support the 5Ghz band, MU-MIMO, and offer speeds of at least 2100 Mbps. The company wants to use a PoE solution providing at least 25W of power for a connected device. Which two components should be used? (Choose two)
    • A. 

      A switch supporting the 802.3at standard

    • B. 

      An access point supporting the 802.11ac Wave 2 standard

    • C. 

      An access point supporting the 802.11n standard

    • D. 

      A switch supporting the 802.3af standard

    • E. 

      An access point supporting the 802.11ac Wave 1 standard

    • F. 

      A switch supporting the 801.x standard

  • 9. 
    Which network device uses ASICs to handle the packet switching for inter-VLAN communication?
    • A. 

      L7 firewall

    • B. 

      L3 switch

    • C. 

      L2 switch

    • D. 

      L4 router

  • 10. 
    A network consultant determines that company can improve its performance by implementing jumbo frames. The network is configured with 10/100/1000 switches, and all hosts are configured with Gigabit Ethernet network adapters. The network si wired with Cat 5e UTP cable. What must the company do to support jumbo frames?
    • A. 

      Enable STP on all switches

    • B. 

      Replace the cable with Cat 6 UTP cable.

    • C. 

      Increase the MTU to 9000

    • D. 

      Configure each switch port in dynamic auto mode.

  • 11. 
    A technician determines there is a break in the fiber optic cable routed between two buildings. The technician needs to determine the distance to the break.  What should the technician do?
    • A. 

      Spectrum analyzer

    • B. 

      Light Meter

    • C. 

      OTDR

    • D. 

      Multimeter

  • 12. 
    A company is upgrading its network security.It want to consolidate content filtering and intrusion detection in a single device and add additional security functionality, including data loss prevention (DLP).  What type of device should the company use?
    • A. 

      VIOP gateway

    • B. 

      Multilayer switch

    • C. 

      Proxy server

    • D. 

      UTM appliance

  • 13. 
    A company wants to create a site-to-site VPN. maximum security is required. Which set of protocols should the company use?
    • A. 

      AES for encryption and SHA512 for hashing

    • B. 

      3DES for encryption and MD5 for hashing

    • C. 

      DES for encryption and SHA512 for hashing

    • D. 

      SSL for encryption and MD5 for hashing

  • 14. 
    Which media access method is used with 802.11 RTS/CTS network configurations and is NOT able to detect collisions during transmissions?
    • A. 

      CSMA/CA

    • B. 

      GSM

    • C. 

      CDMA

    • D. 

      CSMA/CD

  • 15. 
    A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ. Which two documents does the company need to update? (Choose two)
    • A. 

      Rack diagram

    • B. 

      Logical network diagram

    • C. 

      Change management document

    • D. 

      Standard operating procedure

    • E. 

      Physical network diagram

  • 16. 
    A company deploys six new computers that are configured for automatic address assignment to the 192.168.4/26 subnet. The DHCP server that hosts the scope for the subnet is deployed on the same subnet. Four of the new computers are able to lease valid IP addresses. The remaining two computers have the following addresses: 169.245.12.7 169.254.14.2 What is most likely wrong?
    • A. 

      The TCP/IP stack did not load correctly on the two computers

    • B. 

      The two computers are initially assigned duplicate addresses.

    • C. 

      The DHCP server is failing.

    • D. 

      The DHCP scope is exhausted.

  • 17. 
    A company deploys a new computer. When the cable to the computer is plugged in at the with, the network link LED does not light. When the cable is plugged in to a different open port, the LED lights up. When plugged back in to the original port, the LED does not light. What is the most likely problem? 
    • A. 

      VLAN mismatch

    • B. 

      Duplicate IP address

    • C. 

      Bad port

    • D. 

      Incorrect cable type

    • E. 

      Bad computer network adapter

  • 18. 
    A company needs to tighten its network security. This includes restricting access based on operating system and version, current patch versions, and antimalware updates. Devices failing to meet access requirements should be quarantined, user access restricted, and automated remediation initiated. What should the company implement?
    • A. 

      NAC

    • B. 

      Switchport security

    • C. 

      LDAP

    • D. 

      Kerberos

  • 19. 
    A company wants to support multiple client computers running and application installed on a computer that runs Windows Server 2016. The clients should be able to take advantage of the memory and processor resources on the server. Each client will have a unique data set. Which technology should the company use?
    • A. 

      SSH

    • B. 

      VPN

    • C. 

      RDP

    • D. 

      VNC

  • 20. 
    A company's network is shown in the exhibit. the DHCP server is configured with a scope for each network. Clients in the 192.168.4.0 and 192.168.4.128 subnets are unable to lease addresses for he DHCP server. Clients in the 192.168.20 subnet are able to lease addresses. What should the company do?
    • A. 

      Deploy a DHCP relay agent in the 192.168.2.0 subnet.

    • B. 

      Open UDP port 53 on each of the routers.

    • C. 

      Deploy DHCP relay agents in the 192.168.4.0 and 192.168.4.128 subnets.

    • D. 

      Configure IP exclusions for the 192.168.4.0 and 192.168.4.128 subnets.

  • 21. 
    A small company subscribes to a popular productivity application suite. All employees access the applications through a web browser interface. Employees store their data locally on their own computers. Which cloud delivery model does this describe?
    • A. 

      Private

    • B. 

      Community

    • C. 

      Public

    • D. 

      Hybrid

  • 22. 
    A network administrator implements a change on a switch to fix a network issue. According to the troubleshooting methodology, what should the network administrator do next?
    • A. 

      Identify potential effects of the change.

    • B. 

      Document all findings in a final report.

    • C. 

      Implement preventative measures.

    • D. 

      Duplicate the problem, if possible in a lab environment.

  • 23. 
    A network team has deployed a new SIP trunk. What will MOST likely be used by users in this network?
    • A. 

      Softphone

    • B. 

      SIEM plug-in

    • C. 

      HIPS agent

    • D. 

      Dianl-up modems

  • 24. 
    A company wants to open a new office. A wireless survey reveals that there are 12 access points in the area immediately around the office and that they use channels 1, 6, 11. What should the company do to address the interference problem?
    • A. 

      Install on omnidirectional antenna.

    • B. 

      Implement 802.1x.

    • C. 

      Use the 5GHz band.

    • D. 

      Configure channel bonding at 2.4 GHz.

  • 25. 
    A company collects network traffic data from multiple subnets. Detailed analysis indicates that packets are being dropped by on of the routers. Technicians suspect this is due to misconfigured firewall ACLs. Where should technicians look for more detailed information?
    • A. 

      Event logs

    • B. 

      Port scans

    • C. 

      Firewall logs

    • D. 

      Vulnerability scans

Related Topics
Back to Top Back to top