aiotestking uk

N10-007 Exam Questions - Online Test


N10-007 Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Pinpoint of N10-007 exam engine materials and bootcamp for CompTIA certification for client, Real Success Guaranteed with Updated N10-007 pdf dumps vce Materials. 100% PASS CompTIA Network+ N10-007 exam Today!

CompTIA N10-007 Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1

A network technician is implementing a solution on the network to hide the workstation internal IP addresses across a WAN. Which of the following is the technician configuring?

  • A. QoS
  • B. DMZ
  • C. RIP
  • D. NAT

Answer: D

NEW QUESTION 2

A network technician is considering opening ports on the firewall for an upcoming VoIP PBX implementation. Which of the following protocols is the technician MOST likely to consider? (Choose three.)

  • A. SIP
  • B. NTP
  • C. H.323
  • D. SMB
  • E. ICMP
  • F. RTP
  • G. IPSec
  • H. RDP

Answer: ACF

NEW QUESTION 3

A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output:
N10-007 dumps exhibit
Which of the following changes should be made to allow all customers to access the company’s secure website?

  • A. Allow any any 10.5.0.10 443
  • B. Allow any any 12.73.15.5 443
  • C. Allow 10.5.0.10 443 any any
  • D. Allow 10.5.0.10 any 10.5.0.10 80

Answer: C

NEW QUESTION 4

A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?

  • A. Add a router and enable OSPF.
  • B. Add a layer 3 switch and create a VLAN.
  • C. Add a bridge between two switches.
  • D. Add a firewall and implement proper ACL.

Answer: B

Explanation:
We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs.
A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.
To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a ‘Layer 3’ switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.

NEW QUESTION 5

Which of the following backup techniques is used to capture all the data that has changed since the least full backup?

  • A. Incremental
  • B. Replica
  • C. Different
  • D. Snapshot

Answer: C

NEW QUESTION 6

A network administrator suspects an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?

  • A. Syslog server
  • B. Toner probe
  • C. OTDR
  • D. Packet sniffer

Answer: D

NEW QUESTION 7

Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?

  • A. 10GBaseLR
  • B. 10GBaseSR
  • C. 10GBaseX
  • D. 10GBaseT

Answer: D

NEW QUESTION 8

Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa's workstation?

  • A. nslookup
  • B. route
  • C. nbtstat
  • D. arp

Answer: A

NEW QUESTION 9

An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the following network devices would be required to provide this functionality?

  • A. Router
  • B. Forward proxy
  • C. Load balancer
  • D. Firewall

Answer: C

NEW QUESTION 10

The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?

  • A. Power levels
  • B. Overcapacity
  • C. Distance limitations
  • D. Channel overlap

Answer: A

NEW QUESTION 11

A network technician is installing a new wireless network in a small office. Due to environment concerns, The customer wants the network to run exclusively on the %GHz frequency. Which of the following wireless technologies should the technician install meet this requirement? (Select TWO).

  • A. 802.11ac
  • B. 802 11b
  • C. 802 11g
  • D. 802.11n
  • E. Bluetooth
  • F. z-Ware

Answer: AD

NEW QUESTION 12

A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?

  • A. LAN
  • B. PAN
  • C. MAN
  • D. WAN

Answer: C

NEW QUESTION 13

Which of the following specifications would Sara, an administrator, implement as a network access control?

  • A. 802.1q
  • B. 802.3
  • C. 802.11n
  • D. 802.1x

Answer: D

NEW QUESTION 14

Which of the following solutions will detect and disable a rogue access point?

  • A. Port scan
  • B. Packet sniffer
  • C. IPS
  • D. IDS

Answer: C

NEW QUESTION 15

An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users' connection issues?

  • A. Limit the devices to 802.11n only.
  • B. Enable the SSID broadcast.
  • C. Enable MAC filtering.
  • D. Use a WEP 128-bit key.

Answer: B

NEW QUESTION 16

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

  • A. Telnet
  • B. FTP
  • C. SNMP
  • D. SSH
  • E. RDP

Answer: AD

NEW QUESTION 17

Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

  • A. Network map
  • B. Environmental monitor
  • C. Placement map
  • D. Syslog

Answer: D

NEW QUESTION 18

Which of the following is the default subnet mask for a Class B address?

  • A. 255.0.0.0
  • B. 255.255.0.0
  • C. 255.255.255.0
  • D. 255.255.255.255

Answer: B

NEW QUESTION 19

A technician is assigned to secure a basic wireless network. Which of the following authentication protocol should the technician use to performed this task (select TWO).

  • A. RDP
  • B. SNMP
  • C. WPA2
  • D. EAP SSL

Answer: CD

NEW QUESTION 20

A network technician at a small office upgrades the VLAN switch. After the upgrade, a user reports being unable to access network resources. When the technician checks the switchport, the LED light is not lit. Which of the following should technician check FIRST?

  • A. The device is using the correct cable type.
  • B. The switchport is functioning properly.
  • C. The device is connected to the switch.
  • D. The switch is connected to the router.

Answer: C

NEW QUESTION 21

Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

  • A. MAC address reservation
  • B. Static IP address
  • C. IP address exclusion
  • D. Custom DNS server entry

Answer: A

NEW QUESTION 22

A network engineer is designing a new network for a remote site. The remote site consists of ten desktop computers, ten VoIP phones, and two network printers. In addition, two of the desktop computers at the remote site will be used by managers who should be on a separate network from the other eight computers. Which of the following represents the BEST configuration for the remote site?

  • A. One router connected to one 24-port switch configured with three VLANS: one for the manager’s computers and printer, one for the other computers and printer, and one for the VoIP phones
  • B. Two routers with each router connected to a 12-port switch, with a firewall connected to the switch connected to the manager’s desktop computers, VoIP phones, and printer
  • C. One router connected to one 12-port switch configured for the manager’s computers, phones, and printer, and one 12-port switch configured for the other computers, VoIP phones, and printer
  • D. One router connected to one 24-port switch configured with two VLANS: one for the manager’s computers, VoIP phones, and printer, and one for the other computers, VoIP phones, and printer

Answer: A

NEW QUESTION 23

Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO).

  • A. MAC addressing
  • B. IP addressing
  • C. Port speed
  • D. IPv6 addressing
  • E. Duplex

Answer: CE

NEW QUESTION 24

Which of the following is the correct port number for NTP?

  • A. 25
  • B. 69
  • C. 123
  • D. 161

Answer: C

NEW QUESTION 25

The process of attempting to exploit a weakness in a network after being given permission by the company is known as:

  • A. penetration testing
  • B. vulnerability scanning
  • C. reconnaissance
  • D. social engineering

Answer: A

NEW QUESTION 26

A network administrator has a monitoring system in place that is currently polling hundreds of network devices at regular intervals. The continuous polling is causing high CPU utilization on the server. Which of the following tasks should the administrator perform to resolve the CPU issue while maintaining full monitoring capabilities?

  • A. Remove SNMP polling and configure SNMP traps on each network device
  • B. Remove SNMP polling and implement snmpwalk on each network device
  • C. Upgrade SNMP to the latest version to mitigate vulnerabilities
  • D. Modify SNMP polling to poll only during business hours

Answer: A

NEW QUESTION 27

Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet connectivity.
Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select the Done button.
N10-007 dumps exhibit

  • A. Mastered
  • B. Not Mastered

Answer: A

Explanation:
All ports should be enabled.

NEW QUESTION 28

When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?

  • A. iSCSI
  • B. Fibre Channel
  • C. NAS
  • D. DAS

Answer: C

NEW QUESTION 29
......

Thanks for reading the newest N10-007 exam dumps! We recommend you to try the PREMIUM Certifytools N10-007 dumps in VCE and PDF here: https://www.certifytools.com/N10-007-exam.html (414 Q&As Dumps)