option

CompTIA Network+ 2018 v1.0 (N10-007)

INFO STADISTICS RECORDS
TAKE THE TEST
Title of test:
CompTIA Network+ 2018 v1.0 (N10-007)

Description:
Part Sixth

Author:
Miwita
(Other tests from this author)

Creation Date:
20/11/2020

Category:
Others

Number of questions: 74
Share the Test:
Facebook
Twitter
Whatsapp
TAKE THE TEST
Last comments
No comments about this test.
Content:
After setting up in a temporary office, Joe tries to access the company’s wireless network. Following several attempts, Joe is able to get an IP, but cannot access network resources. Which of the following is the MOST likely cause of this error when trying to connect to the company’s wireless network? Incorrect passphrase Incorrect power levels Incorrect workstation certificate Incorrect encryption.
A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company’s firewall. Which of the following should the technician use to troubleshoot? WiFi analyzer Bandwidth speed tester Dig Packet sniffer.
Which of the following protocols are used to configure an email client to receive email? (Choose two.) IMAP SMTP POP SFTP TFTP.
A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.) Cat 6 with a repeater placed in the middle of the run Cat 7 Crossover cable Fiber-optic cabling Cat 7 with a patch panel placed in the middle of the run.
A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using? 3 4 5 6 7.
A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report? Port enumeration Baseline review Vulnerability scanning Packet analysis.
A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed? IPS Firewall SIEM UTM Content filter.
Which of the following devices would allow a network administrator to block an application at Layer 7 on the network? Firewall NGFW Router Spam filter.
A client requests a new dynamic address and receives a response from two DHCP servers. Which of the following addressing information would the client use? The IP addressing information received last The IP addressing information from the highest server MAC address The IP addressing information from the highest server IP address The IP addressing information received first.
A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment? System life-cycle procedures Off-boarding procedures Safety procedures Appropriate use policy.
Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a nonrouted VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method? Inventory management Wiring and port location Configuration baseline Standard operating procedure.
A network technician does not have access to the GUI of a server and needs to adjust some network properties. Given the command: Which of the following is the technician attempting to alter? The technician is clearing the route table. The technician is adding a static IP address. The technician is clearing the subnet mask setting. The technician is setting the default gateway.
A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT? VLAN routing Server-based firewall configuration issue Patch cable type DHCP scope availability.
A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is making to the company network? Change management Network diagrams Inventory report Labeling report.
A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause? Expired IP address Exhausted dynamic scope Misconfigured VLSM Rogue DHCP server.
A customer has submitted a request for a new wireless connection in the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration? The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules. The LAN and WLAN should be configured in the DMZ so traffic is denied automatically. The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours. The LAN and WLAN should be configured in separate zones with a firewall in between.
An employee, who is using a laptop connected to the wireless network, is able to connect to the Internet but not to internal company resources. A systems administrator reviews the following information from the laptop: The administrator was expecting to see a network address within 10.100.0.0/23, which is consistent with the company’s wireless network. The network administrator verifies the company’s wireless network is configured and working properly. Which of the following is the MOST likely cause of this issue? Interference Security type mismatch Wrong SSID Channel overlap.
Which of the following technologies should be used in high-throughput networks to reduce network overhead? iSCSI QoS tags Port aggregation Jumbo frames.
A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.) Disabling unused ports Upgrading firmware Using secure protocols File hashing MAC filtering Configuring a honeypot.
A network technician is assisting a user who has relocated to a newly constructed office space. The user has no network connectivity. A cable tester was used on the port and is reporting that the pairs are open. Which of the following should be used to remedy this problem? Loopback adapter Tone generator Multimeter Punchdown tool.
A technician needs to add ten additional Ethernet ports to a small office network. A new basic function switch is added. Hosts connected to the new switch are unable to see any computers on the network other than those connected to the new switch. Which of the following should the technician perform to ensure the hosts on the new switch can communicate with the existing network? Replace the new switch with a hub to ensure Layer 1 connectivity on the new network segment. Move the straight-through Ethernet cable connecting the switches to the first port on both switches. Connect the switches with a cable that has a TIA/EIA 586A wired connector end and a TIA/EIA 586B wired end. Add a second cable connecting the switches for redundancy and disabling STP on both switches.
Before upgrading the firmware on several routers, a technician must verify the firmware file received is the same one the vendor provided. Which of the following should the technician use? 3DES encryption SSL certificate Digital signatures MD5 hash.
Which of the following is the MOST secure type of remote administration? SSH over IPsec client-to-site VPN RDP over SSLv2 HTTPS terminal services gateway HTTP over WPA2-TKIP WiFi Telnet over PSTN.
A wireless access point that was working in a large warehouse last week is now offline. The technician observes there is no power to the device. The technician verifies PoE is working on the switchport, and then confirms the wireless access point is still not powering up. Which of the following is the MOST likely issue? Attenuation Incorrect pin-out Damaged cable Switch misconfiguration.
A network engineer is trying to determine where to place a firewall based on the flow of traffic. Which of the following types of documentation would assist the engineer in doing this? Change management Rack diagram Network configuration Network diagram.
A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user’s bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario? Spam Ransomware Man-in-the-middle Phishing.
A customer wants to set up a guest wireless network for visitors. The customer prefers to not have a password on the network. Which of the following should a technician set up to force guests to provide information before using the network? Single sign-on RADIUS TACACS+ Captive portal.
A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure? Because secure protocols would reject malicious packets Because SCP is not a secure service Because FTP is not a secure service Because a secure firewall will protect the device.
Which of the following protocols is used by Active Directory for authentication? SSH SFTP LDAP TLS.
When deploying UTP cables in a networking environment, which of the following are acceptable standards? (Choose two.) 10Base2 10Base5 10GBaseT 1000BaseLX 1000BaseSX 1000BaseT.
Which of the following is the physical location where the customer-premise equipment comes together with the ISP or third-party telecommunications equipment? Server room Equipment closet Demarcation point Intermediate distribution frame.
A vulnerability that would allow an unauthenticated, remote attacker to originate a DoS attack was found in a DHCP client implementation of a switch. Which of the following would BEST resolve the issue? Verify the default passwords have been changed. Upgrade to the latest firmware Generate new SSH keys. Review and modify the firewall rules.
A human resources manager notifies the IT manager the night before an employee will be terminated so the employee’s access rights can be removed. Which of the following policies is being exercised? Privileged user agreement AUP Non-disclosure agreement Offboarding.
Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device? Disable unused ports. Reset the two-factor token. Disable virtual ports. Upgrade the firmware.
A network technician is setting up the wireless network for a company’s new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs? Channel 6 Channel 7 Channel 9 Channel 10.
A network technician has deployed a new 802.11ac network and discovers some of the legacy POS equipment only supports WPA and 802.11a. Which of the following is the MOST secure method of connecting all devices while avoiding a performance impact to modern wireless devices? Configure the APs to use LEAP authentication to support WPA rather than WPA2 for full compatibility. Connect modern devices under the 5GHz band while dedicating the 2.4GHz band to legacy devices. Connect the legacy devices with a PSK while the modern devices should use the more secure EAP. Create two SSIDs, one to support CCMP-AES encryption and one with TKIP-RC4 encryption.
Which of the following BEST describes the characteristics of a differential backup solution? Backs up all files and sets the archive bit Backs up files with a date earlier than today’s date with a clear archive bit. Backs up files with the creation or modified date as the current date. Backs up files with the archive bit set but does not clear the bit.
A technician has been asked to diagnose problems with DHCP addressing on a VLAN. The DHCP server responds to pings from the technician’s machine. Which of the following should the technician use to help diagnose the problem? Packet sniffer netstat nslookup Spectrum analyzer.
Which of the following allow for higher fault tolerance, availability, and performance across multiple systems? (Choose two.) Load balancer Jumbo frames Clustering Round robin.
A technician is investigating an issue related to a single host that is unable to access the Internet. The technician records the following information: Host IP 169.254.1.10. The network IP address range on the DHCP server is 10.10.5.2-10.10.5.250 with a default gateway 10.10.5.1 and a DNS of 8.8.8.8. Which of the following should the technician perform to troubleshoot the issue? Change the IP scope on the DHCP server to a public IP address range. Perform a traceroute command to identify the router that is not functioning. Verify the host has physical connectivity and is on the correct VLAN. Configure the DNS address in the DHCP scope to a 10.10.5.0/24 address.
A network administrator wants to reduce the amount of time each user takes to log in to different systems in the network. Which of the following would reduce the time spent authenticating? Kerberos RADIUS Certificate SSO MFA NAC.
A network technician arrives at a remote office and is unable to connect a laptop to corporate resources using the wireless network. After checking the IP address, the network technician notices the assigned IP address does not belong to the corporate network IP scheme. Which of the following has the network technician discovered? Evil twin ARP poisoning DHCP exhaustion Social engineering.
Which of the following is an object held within an MIB? OUI OTDR OID SNMP host SNMP agent SNMP trap.
Which of the following storage network technologies has the HIGHEST throughput? FCoE InfiniBand iSCSI OC3.
The corporate head office has assigned the subnet of 10.1.100.0/24 to a network technician. The technician wants to create subnets for the finance department, human resources, and IT. Given the following device counts: Which of the following outlines how the technician should allocate the address space given? Finance : 10 . 1 . 100 . 0/21 Human resources : 10 . 1 . 100 . 128/22 IT : 10 . 1 . 100 . 192/23 Finance : 10 . 1 .100 . 0/23 Human resources : 10 . 1 . 100 . 128/22 IT : 10 . 1 .100 . 192/21 Finance : 10 . 1 . 100 . 0/25 Human resources : 10 . 1 . 100 . 128/26 IT : 10 . 1 .100 .192/27 Finance : 10 . 1 . 100 . 0/26 Human resources : 10 . 1 . 100 . 128/27 IT : 10 . 1 . 100 . 192/28 .
A network administrator is configuring the 172.16.40.0/22 network for a new building. Which of the following is the number of hosts that will be supported on this network? 510 512 1022 1024 2046 2048.
At which of the following layers of the OSI model does compression occur? Session Transport Data link Presentation.
Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet. Which of the following devices should be used to break up broadcast domains? Layer 2 switch Layer 3 switch Signal repeater Bridge Domain server.
Ann, a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause? Transceiver mismatch Crosstalk Jitter Open/short on the cable.
A network technician has been asked to create secure private networks between a company’s headquarters and several branch locations. The company has provided the on-premises equipment, but each branch has a different ISP. Which of the following technologies should the technician consider using to accomplish this? Site-to-site Client-to-site Point-to-point Point-to-multipoint.
A department is reporting network issues. Users can ping each other and the switch, but not the default gateway. When looking at a wiring diagram and a physical blueprint, a technician notices the 1000BaseLX SFP connects to a distribution switch via a cable that runs behind a large industrial refrigerator. The technician also notices both switches have been worked on recently. Which of the following is MOST likely the issue? EMI TX/RX reverse Open/short Attenuation.
You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 1: Select the tool that was used to create the cable test results. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Cable Certifier Punch Down Tool Crimper Toner Probe OTDR Multimeter Protocol Analyxer.
You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 2: Interpret the test results and select the option that explains the results. After you are done with your analysis, click the ‘Submit’ button. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Correctly crimped cable Incorrectly crimped cable.
You have been tasked with testing a CAT5e cable. A summary of the test results can be found on the screen. Step 3: You have determined that the original crimp is faulty. Re-crimp the cable connector using the T568B cabling standard. Choose the correct cable for each pin in the connector by clicking on the pin and selecting a cable color. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button. Blue Blue with white Brown Brown and White Green Green and White Orange Orange and White.
A shop owner wants to ensure that only a specified group of devices can access the wireless network. Which of the following methodologies will BEST ensure unauthorized devices cannot consume the shop owner’s limited Internet bandwidth? Disable the SSID broadcast. Implement WEP authentication. Change the WiFi password. Activate MAC address filtering.
A large company uses an AAA server to manage network device access. The engineers can use their domain credentials to access all other servers. Currently, the network engineers cannot access the AAA server using domain credentials, but they can access it using a local account. Which of the following should the engineers update? Host-based firewall settings TACAS+ server time Server IP address DNS SRV record.
A network technician has been asked to install an additional switch in an IDF, but all of the single-mode fiber is in use between the IDF and MDF. The technician has deployed new transceivers that allow for the use of a single fiber stand, providing the additional fiber needed for the new switch. Which of the following has the technician deployed? 1000BaseLX SFP Duplex GBIC Duplex SFP+ Bidirectional SFP.
A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement? Intrusion detection Proxy service Dynamic DNS Content filtering.
A network technician has purchased a 10GBase-T switch and wishes to connect it to 30 computers with 10GB network cards. The computers are 225ft (69m) away, and all need to establish a 10 Gbps connection to meet business requirements. To minimize costs while still meeting these requirements, which of the following cable types should the technician choose? Cat 5e Cat 6 Cat 6a Cat 7.
A technician is configuring a new email server and needs to modify DNS records. Which of the following records should the technician update to ensure email functions as expected? MX CNAME AAAA SRV.
Which of the following BEST describes the functionality of the root guard feature on a switch? BPDUs entering the root bridge are ignored. The STP root bridge cannot be changed. Broadcast storms entering from a root port are blocked. Loop protection is enabled on the root port of a switch.
A network administrator is adding a new WAN circuit from the ISP to a new building. In which of the following locations would the network administrator find the utility entry point? DMZ Data tier IDF Demarc.
The help desk is receiving reports of intermittent connections to a server. A help desk technician suspects the server is unable to establish a threeway handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician’s claim? nmap arp tcpdump dig.
A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat. Which of the following policies did the technician violate? Data loss prevention Incident response Asset disposal Acceptable use.
A company hires another firm to test the integrity of its information security controls. This is an example of: role separation device hardening risk assessment penetration testing.
A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring? Layer 1 â€" Physical Layer 3 â€" Network Layer 4 â€" Transport Layer 7 â€" Application.
A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the celling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation? Plenum PVC Single-mode Cat 7.
A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on site. Which of the following solutions should the technician implement? SaaS SAN NAS IaaS.
Which of the following can be used to prevent unauthorized employees from entering restricted areas? Sign-in sheets Video cameras Motion sensors Swipe badges.
A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization’s certificate authority. Which of the following authentication methods would meet this requirement? PEAP WP2-PSK Captive portal EAP-TLS.
A bookstore uses a Faraday cage to comply with credit card regulations. Customers report that their cellular phones have no signal when they are in the bookstore. Which of the following is the MOST likely cause? The Faraday cage is creating interference within the bookstore. The Faraday cage prevents access by redirecting signals. The Faraday cage is creating latency on the cellular network. The Faraday cage is creating attenuation of the cellular network.
An administrator is redesigning a company’s network and wants to reduce the amount of hardware needed. Currently, all VLAN routing goes out a single switch interface to a router. Which of the following would reduce the number of devices in this configuration? Bridge Multilayer switch Switch Next-generation firewall.
A network technician needs to distribute an updated OS for all network switches at company locations throughout the world. The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet. Which of the following methods should be used to distribute the images while ensuring integrity? Use a TFTP server and UDP protocol. Use an FTP server and provide the file hash. Use an HTTP server to share the file. Use a modem and dial-up connection.
Which of the following OSI layers do TCP and UDP operate within? Data link Network Session Transport.
Report abuse Terms of use
HOME
CREATE TEST
INFO
STADISTICS
RECORDS
Author's Tests