Comptia Network Plus N10-007 PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 36

100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader

https://www.certleader.com/N10-007-dumps.html (532 Q&As)

N10-007 Dumps

CompTIA Network+ N10-007

https://www.certleader.com/N10-007-dumps.html

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 1
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following
indicates the correct IP address range?

A. 172.16.80.0-172.16.85.254
B. 172.16.80.0-172.16.88.255
C. 172.16.80.1-172.16.87.254
D. 172.16.80.1-172.16.85.255

Answer: C

NEW QUESTION 2
Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)

A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
E. 802.11n

Answer: BE

NEW QUESTION 3
Which of the following backup techniques is used to capture all the data that has changed since the least full backup?

A. Incremental
B. Replica
C. Different
D. Snapshot

Answer: C

NEW QUESTION 4
A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without
giving access to the inside network?

A. VLAN
B. DMZ
C. SNMP
D. NTP

Answer: B

NEW QUESTION 5
A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches wishes to set up a new storage area network but must use existing
infrastructure. Which of the following storage standards should the technician use?

A. iSCSI
B. Fibre Channel
C. NAS
D. InfinBand

Answer: C

NEW QUESTION 6
A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the
firewall’s deployment, users are still unable to retrieve their
emails. Which of the following would BEST resolve this issue?

A. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389
B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
C. Set the firewall to operate in transparent mode
D. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123

Answer: B

NEW QUESTION 7
A home user has purchased a new smart TV to stream online video services. The smart TV is unable to connect to the wireless network after several attempts.
After from vacation, the home user tries again and can connect the TV to wireless network. However, the user notice a laptop is no longer able to connect to the
network. Which of the following is the MOST likely cause?

A. The DHCP scope has been exhausted.


B. The security passcode has been changed
C. The SSID is hidden.
D. The AP configuration was reset.

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Answer: A

NEW QUESTION 8
AChief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the
company’s network devices. Which of the following is the MOST secure way to prevent this?

A. ACL allowing only HTTP


B. ACL allowing only Telnet
C. Out-of-band modem
D. Out-of-band console router

Answer: D

NEW QUESTION 9
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before
installing the firmware update, which of the following
steps should the technician perform to ensure file integrity?

A. Perform antivirus and anti-malware scans of the file.


B. Perform a hash on the file for comparison with the vendor’s hash.
C. Download the file a second time and compare the version numbers.
D. Compare the hash of the file to the previous firmware update.

Answer: B

NEW QUESTION 10
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the
following policies requires employee adherence?

A. AUP
B. SLA
C. NDA
D. MOU

Answer: A

NEW QUESTION 10
A new building needs to be joined to an existing network, but management has decided that running fiber is too expensive. Since the buildings are bout 1000ft
(305m) apart, the IT department has been asked to propose alternatives. Which of the following is the BEST device to add to each building to facilitate the
extension of the network while meeting budgetary demands?

A. Switch
B. Router
C. Media converter
D. PTP wireless

Answer: D

NEW QUESTION 14
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take
NEXT?

A. Test the possible solution


B. Question the users
C. Determine what has changed
D. Document the theory

Answer: A

NEW QUESTION 19
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low
power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?

A. Install additional WAPs


B. Install external antennas
C. Move the WAPs closer to the more populated area
D. Change the antenna types

Answer: A

NEW QUESTION 22
A technician is sent to a remote office to set up a device to connect to the internet. The company Standard
document requires stateful inspection.
Which of the following should the technician install?

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

A. ROUTER
B. Multilayer switch
C. Firewall
D. Bridge

Answer: C

NEW QUESTION 26
A critical vulnerable is discovered on a network device. The vendor state it has already patched this vulnerable in its current release. Which of the following actions
should an administrator take?

A. Change the default password.


B. Use a firewall in front of the device.
C. Update the firmware.
D. Upgrade the configuration.

Answer: B

NEW QUESTION 27
A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the
BEST steps for the technician to take with minimum overhead configuration? (Choose two.)

A. Enable SSID broadcasting to identify the guest network


B. Configure visitor devices to use static IP addresses
C. Enable two-factor authentication on visitor devices
D. Configure the access point to use WPA2-AES encryption
E. Ensure the access point is not running in mixed mode

Answer: AB

NEW QUESTION 29
A network technician is setting up a new router. Since it is exposed to the public, which of the following are the BEST steps the technician should take when setting
up this device? (Choose two.)

A. Disable unnecessary services.


B. Use private IP addresses.
C. Allow remote management access.
D. Disable the console port.
E. Enable encryption.
F. Upgrade to the latest firmware.

Answer: AF

NEW QUESTION 31
Which of the following should current network performance be compared against to determine network anomalies?

A. Baseline
B. Traffic analysis
C. Packet capture
D. Logs

Answer: A

NEW QUESTION 36
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician
confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the
technician use to reveal the location of the fault?

A. OTDR
B. Light meter
C. Tone generator
D. CSU/DSU

Answer: A

NEW QUESTION 38
A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve
a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

A. Document the reason for the request


B. Scan the file for malware to protect the sales department’s computers
C. Follow the company’s approval process for the implementation
D. Install a TFTP server for the customers to use for the transfer
E. Create a honeypot to store the file on for the customers to use
F. Write the SLA for the sales department authorizing the change

Answer: AC

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 40
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?

A. Change management policy


B. Remote access policy
C. Acceptable use policy
D. Memorandum of understanding

Answer: A

NEW QUESTION 45
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No
other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is not able
to ping the machine from the IT network. Which of the following is MOST likely the cause?

A. Incorrect default gateway


B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment

Answer: A

NEW QUESTION 48
A network engineer planning for wireless connectivity in large office building. Currently, the office building contains both legacy and newer devices.
Which of the following wireless network routers should engineer select for the fastest throughput for all wireless devices in the office building?

A. 802.11ac
B. 802.11b
C. 802.11g
D. 802.11n

Answer: A

Explanation: https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/gordonkelly/2014/12/30/802-11

NEW QUESTION 52
A network technician is repurposing a switch that has been in storage for some time. The device has been wiped to factory defaults. Which of the following should
be done FIRST to ensure the device has been hardened before configuration?

A. Generate new keys.


B. Disable unused ports.
C. Check for updated firmware.
D. Configure the default VLAN.

Answer: C

NEW QUESTION 55
A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file
is correct and complete?

A. File hash
B. File date
C. File type
D. File size

Answer: A

NEW QUESTION 60
Management has requested that services be available within 72 hours of disaster, Budget is a major concern. A contract is signed with a company that has plenty
space, and the technician will have the option of putting infrastructure equipment in place. Which of the following BEST describes this business continuity strategy?

A. Cold site
B. Differentiate backup
C. Hot site
D. Incremental backup
E. Warm site
F. Full backup

Answer: A

NEW QUESTION 61
Which of the following is the correct port number for NTP?

A. 25

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

B. 69
C. 123
D. 161

Answer: C

NEW QUESTION 65
A network technician has unable to make a from a datacenter. The technician attempts to use the cables to connect desktops to the network without success.
Which of the following is MOST likely the issue?

A. The cables have an incorrect pin out


B. The cables UTP instead of STP.
C. The cables are 6 instead of Cat 5.
D. The cables plenum rated.

Answer: D

NEW QUESTION 66
A network technician is installing a new wireless network in a small office. Due to environment concerns, The customer wants the network to run exclusively on the
%GHz frequency. Which of the following wireless technologies should the technician install meet this requirement? (Select TWO).

A. 802.11ac
B. 802 11b
C. 802 11g
D. 802.11n
E. Bluetooth
F. z-Ware

Answer: AD

NEW QUESTION 69
A network technician is implementing a solution on the network to hide the workstation internal IP addresses across a WAN. Which of the following is the
technician configuring?

A. QoS
B. DMZ
C. RIP
D. NAT

Answer: D

NEW QUESTION 74
A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first
responder do FIRST?

A. Document the scene


B. Take pictures upon arrival
C. Secure the area
D. Implement chain of custody

Answer: C

NEW QUESTION 79
Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?

A. biometric scanners
B. door locks
C. video surveillance
D. motion detectors

Answer: B

NEW QUESTION 82
A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network
administrator use to ensure the data transferred is confidential?

A. authpriv
B. SHA
C. MD5
D. Authentication passphrase

Answer: A

NEW QUESTION 87
A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements?

A. 10.5.4.0/22
B. 10.233.2.0/23
C. 172.16.0.0/22
D. 172.18.0.0/23
E. 192.168.25.0/24

Answer: D

NEW QUESTION 90
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)

A. Point-to-multipoint
B. Bus
C. Point-to-point
D. Mesh
E. Peer-peer
F. Ring

Answer: CD

NEW QUESTION 91
At which of the following OSI model layers would a router operate?

A. Physical
B. Network
C. Transport
D. Data link

Answer: B

NEW QUESTION 94
A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector.
The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?

A. LC
B. ST
C. SC
D. MTRJ
E. MTP

Answer: B

NEW QUESTION 95
A technician set up a new SOHO network recently. The installed router has four Ethernet ports; however the customer has seven devices that wired connections.
Which of the following should the technician do to BEST meet the customer’s requirements?

A. Install a six-port switch


B. Configure port forwarding on the router
C. Install WAPs near the devices.
D. Configure the switchports as EtherChannel ports.

Answer: A

NEW QUESTION 97
A technician is configuring a printer for a client. The which of the following types to the network, But is unsure how to determine its switch port. Which of the
following should the technician do FIRST to locate switch port?

A. perform a DNS lookup on the server.


B. Set up a SSH session to the desktop
C. Reference the ARP table in the router
D. Configure port security on the switch.

Answer: D

NEW QUESTION 99
A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet
jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)

A. RG-9
B. DB-9
C. RJ-11
D. DB-25
E. RJ-45
F. BNC

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Answer: BE

NEW QUESTION 102


A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?

A. It segments broadcast domains in the network infrastructure


B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain

Answer: A

NEW QUESTION 104


AContent filter is set to analyze XML and JSON that users access from the internet. At which of the following layer’s is this analysis taking place?

A. 1
B. 3
C. 5
D. 7
E. 6

Answer: E

NEW QUESTION 107


A network technician is working on a new switch implementation to expand the network. Which of the following is the BEST option to ensure the implementation
goes according to business requirements?

A. AUP
B. NDA
C. SOP
D. SLA

Answer: C

NEW QUESTION 112


A system administrator receives report from users of odd behavior in regard to recently installed server. While reviewing the server network configuration, the
systems administrator does both a forward and a reverse DNS lookup on the host, along with the network adapter configuration.

Which of the following is the problem identified in the output above?

A. There is no reverse DNS entry for this host.


B. The server IP address is incorrectly configured.
C. The DNS lookup entry is incorrectly configured.
D. The reverse DNS entry is pointing to a different host.

Answer: C

NEW QUESTION 115


A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks.
Which of the following should the technician perform to discover possible interference?

A. Site survey
B. Vulnerability scanning
C. Wardriving
D. Checking logical diagram
E. Bandwidth test

Answer: A

NEW QUESTION 119

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Which of the following physical security devices is used to detect unauthorized server room access?

A. Access badge
B. Biometrics
C. Smart card
D. Video surveillance

Answer: D

NEW QUESTION 120


Which of the following can be done to implement network device hardening (Select TWO).

A. Implement spanning tree


B. Perform VLAN hopping
C. Patch and update
D. Perform backups
E. Enable port mirroring
F. Change default admin password

Answer: CF

Explanation: Network devices come with default credentials, the username and password that enables you to log into the device for configuration. Changing
default credentials should be the first step in hardening a new device. As with any other system, avoiding common passwords adds security.
Keep network devices up to date. That means upgrading firmware, patching and updating as necessary to close any security gaps exposed over time.
Services on network devices like routers include common things, like Telnet and HTTP access; and also things you don’t normally see, like TCP and UDP small
services, debugging and testing tools that primarily use ports 20 and lower. If enabled, these services can be used to launch DoS and other attacks. All modern
Cisco devices have these disabled; Cisco’s hardening rules insist on disabling unnecessary services.
Using secure protocols hardens network devices. Don’t use Telnet to access a managed switch or router, for example, but use SSH so that the communication is
encrypted.
Disabling unused ports on network devices enhances port security for access control. This includes standard IP ports and device ports, both physical and virtual
for the latter.

NEW QUESTION 125


Under which of the following layers of the OSI do ATM cells operate?

A. Data link
B. Network
C. Session
D. Transport
E. Presentation

Answer: A

NEW QUESTION 130


In which of the following scenarios should a technician use a cross-over cable to provide connectivity?

A. PC to switch
B. Switch to AP
C. Router to switch
D. Router to modem
E. PC to PC

Answer: E

NEW QUESTION 135


Which of the following protocols authenticates a PC to the server using a ticket issued to it by the authentication service?

A. Kerberos
B. RADIUS
C. TACACS+
D. LDAP

Answer: A

NEW QUESTION 138


A network administrator gets a call regarding intermittent network outages across the country. Which of the following should be used to connect to the network so
the administrator can troubleshoot this issue from home? (Choose two.)

A. FTP
B. SMTP
C. VPN
D. SSH
E. SNMP

Answer: CD

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 142


A network technician is adding workstation to the enterprise network. After bringing the PCs online. The technician receives reports from random users that they
cannot log on. The technician checks and finds everything is functioning for most users. Which of the following is MOST likely causing the problem?

A. Exhausted DHCP scope


B. DNS resolving
C. Duplicate Mac address
D. Incorrect ACL entry

Answer: C

NEW QUESTION 143


A network technician notices the site-to-site VPN and Internet connection have not come back up at a branch office after a recent power outage. Which of the
following is an out-of-band method the technician would MOST likely utilize to check the branch office’s router status?

A. Use a modem to console into the router


B. Walk a user through troubleshooting the connection
C. Travel to the branch office
D. Hire a contractor to go on-site

Answer: A

NEW QUESTION 148


A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?

A. Asset tracking tags


B. Motion detectors
C. Security guards
D. Computer locks

Answer: D

NEW QUESTION 152


A junior technician is setting up a voice control device so the Chief Execute Officer (CEO) will be to control various things in the office. Of which of the following
types of lot technologies is this an example?

A. LAN
B. WAN
C. SAN
D. PAN

Answer: D

NEW QUESTION 156


Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?

A. 1
B. 2
C. 6
D. 12

Answer: B

NEW QUESTION 158


A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands
to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the
following tools would allow the technician to view the handshake?

A. Packet analyzer
B. Port analyzer
C. SNMP traps
D. Spectrum analyzer

Answer: A

NEW QUESTION 159


Which of the following ports should a network technician open on a firewall to back up the configuration and operating system files of a router to a remote server
using the FASTES method possible?

A. UDP port 22
B. TCP port 22
C. TCP port 25
D. UDP port 53
E. UDP port 69

Answer: E

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 162


A network administrator is setting up a web-based application that needs to be continually accessible to the end users. Which of the following concepts would
BEST ensure this requirement?

A. High availability
B. Snapshots
C. NIC teaming
D. Cold site

Answer: A

NEW QUESTION 165


A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The
network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician
refer to determine what potentially caused the connectivity problem?

A. Network maps
B. Cable management
C. Release notes
D. Change management

Answer: D

NEW QUESTION 167


A junior network technician is setting up a new email server on the company network. Which of the following default ports should the technician ensure is open on
the firewall so the new email server can relay email?

A. 23
B. 25
C. 110
D. 143

Answer: B

NEW QUESTION 170


A technician is configuring a printer for a client. The technician connects the printer to the network, but is unsure how to determine its switchport. Which of the
following should the technician do FIRST to locate the
switchport?

A. Perform a DNS lookup on the server.


B. Set up an SSH session to the desktop.
C. Reference the ARP table in the router.
D. Configure port security on the switch.

Answer: C

NEW QUESTION 171


A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules
is the administrator implementing?

A. NAT
B. PAT
C. STP
D. SNAT
E. ARP

Answer: B

NEW QUESTION 175


A network technician receives a call branch office about problem with its wireless connectivity. The user states the office is hosting a ….metting that includes some
online training with local businesses. The guest users have all brought devices to connect to the guest network at ….Branch office. All users sre connected to a
single WAP and are reporting that connections keep drooping and network speeds are unusable. Which of the following is the MOST likely cause of this issue?

A. DHCP exhaustion
B. Channel overlapping
C. interference
D. Overcapacity

Answer: D

NEW QUESTION 176


The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be
changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the
network?

A. Power levels

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

B. Overcapacity
C. Distance limitations
D. Channel overlap

Answer: A

NEW QUESTION 181


A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet
access going to individual tables. The contractor measured the distance between the hotel’s patch panel to the jack, and the distance is within Cat 5e
specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following
actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?

A. Place a switch at the hotel’s patch panel for connecting each room’s cables
B. Place a switch on each table to ensure strong connectivity
C. Place repeaters between the patch panel and the rooms
D. place a switch at the wall jack and run the cables in the room from there

Answer: A

NEW QUESTION 182


Ann, a new employees within a department, cannot print to any of the printers in the department or access any of the resources that other can. However, she can
access the internet. The network engineer has confirmed that Ann’s has been set up same as the others. There are no access lists restricting Ann’s access.
Which of the following cloud be the issue for this lack of access?

A. Duplex/speed mismatch
B. VLAN mismatch
C. DNS server issue
D. DHCP server issue
E. Spanning tree blocked ports

Answer: B

NEW QUESTION 185


After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not
connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the
following should the technician do FIRST to reconnect the server to the network?

A. Reverse the fiber strands of the cable and reconnect them to the server
B. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
C. Replace the server’s single-mode fiber cable with multimode fiber
D. Move the fiber cable to different port on the switch where both strands function

Answer: A

NEW QUESTION 187


A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the
address of the customer’s router?

A. 192.168.0.55
B. 192.168.1.0
C. 192.168.1.1
D. 192.168.5.5
E. 255.255.255.0

Answer: C

NEW QUESTION 190


An office user cannot access local network drives but has full access to the Internet. A technician
troubleshoots the issue and observes the following output of the ipconfig command:

Which of the following would MOST likely allow the network drives to be accessed?

A. Update the WLAN adapter driver


B. Disable the WLAN adapter

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

C. Check the wireless DHCP configuration


D. Disable the LAN adapter

Answer: B

NEW QUESTION 191


Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?

A. 10.8.0.0/16
B. 10.8.0.0/19
C. 10.8.0.0/20
D. 10.0.0.0/24

Answer: A

NEW QUESTION 195


A recently constructed building makes use of glass and natural light. Users in the building are reporting poor cellular connectivity and speeds. Which of the
following is MOST likely the cause?

A. Absorption
B. Channel overlap
C. Reflection
D. Frequency mismatch

Answer: C

NEW QUESTION 200


A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames
and passwords to access the system. Which of the following will increase the authentication factor to three?

A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
B. Adding a fingerprint reader and retina scanner
C. Using a smart card and RSA token
D. Enforcing a stronger password policy and using a hand geometry scan

Answer: A

NEW QUESTION 205


A technician is downloading an ISO from a vendor’s website. To ensure the integrity of the download, which of the following should be verified?

A. File size
B. Vendor URL
C. File hashing
D. Encryption

Answer: C

NEW QUESTION 208


A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician
use to determine which statistics are not in the normal range?

A. Baseline review
B. Vulnerability scan
C. System life-cycle report
D. Archiving logs

Answer: A

NEW QUESTION 211


A network technician notices the site-to site VPN and internet connection have back up at a branch office’ after a recent power outage. Which of the following is an
out-of-band method the technician the would MOST likely utilize to check the branch office’s router status?

A. Use a modern to console into router.


B. Walk to the branch troubleshooting the connection.
C. Travel to the branch office.
D. Hire a contractor to go on-site.

Answer: B

NEW QUESTION 214


A network technician needs to install a new access switch. After installing the new switch, the technician beings to move connections from the old switch to the
new switch. The old switch used a GBIC connectors, and the new switch uses an SEF LC with LC connectors. After connecting the SC connector to the SC-to-LC
adapter abd plugging it to the switch, the link does not come up as expected. Which of the following should a network technician perform NEXT?

A. Replace SEP with a new one.

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

B. Fall back to the switch.


C. Transpose the fiber pairs.
D. Replace multimode with single-mode cable

Answer: C

NEW QUESTION 218


A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for
this equipment. Which of the following would be the FIRST issue to remediate?

A. Air flow and cooling


B. UPS capability
C. Circuit labeling
D. Power redundancy

Answer: A

NEW QUESTION 219


A technician is replacing a failed SOHO router for a customer who has an existing, cable modern, and static IP address. The user has a web server that faces the
Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer’s requirements?

A. The modern is placed in bridge mode, the router is placed behind the modern, and the web server is placed behind the router.
B. The router is place in bridge in mode, the modern is placed behind the router, and the web server ids placed behind the modern.
C. the web server is placed in bridge mode, the router is placed behind the server, and the modern is placed behind the router.
D. The switch is placed in bridge mode, the modern is placed behind the switch, and the router is placed behind the modern.

Answer: A

NEW QUESTION 223


Which of the following VPN protocols establishes a secure session that can be initiated using a browser?

A. IPSec
B. SSL VPN
C. PTP
D. PPTP

Answer: B

NEW QUESTION 224


Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to
occur most often around midday. Which of the following is the MOST likely cause?

A. There is interference from small appliances


B. The signal coverage area is too small
C. Not enough DHCP addresses have been allotted
D. The DNS cache on the users’ computers has become corrupt

Answer: C

NEW QUESTION 225


A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the
server quickly. Which of the following 802.11 standards provides the MOST bandwidth?

A. a
B. ac
C. g
D. n

Answer: B

NEW QUESTION 226


A network administrator is assigned to run and connect a Cat 6e Ethernet cable between two nodes in a datacenter. Which of the following connector types should
the network administrator use to terminate this cable?

A. DB-9
B. RS-232
C. DB-25
D. RJ-45

Answer: D

NEW QUESTION 231


A network technician is installing a new SOHO branch office that requires the use of a DOCSIS-compatible. The modern needs to be connected to the ISP’s
network at the demark. Which of the following cable type should be used?

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

A. UTP
B. Multimode
C. Coaxial
D. Serial

Answer: C

NEW QUESTION 235


A building is equipped with light sensors that turn off the fluorescent lights when natural light is above a certain brightness. Users report experiencing network
connection issues only during certain hours. The west side of the building experiences connectivity issues in the morning hours and the east side near the end of
the day. At night the connectivity issues affect the entire building. Which of the following could be the cause of the connectivity issues?

A. Light sensors are interfering with the network


B. EMI from the lights is interfering with the network cables
C. Network wiring is run perpendicular to electrical conduit
D. Temperature changes are causing attenuation in copper cabling

Answer: C

NEW QUESTION 240


Which of the following DNS record types allows IPv6 records to be resolved to DNS names?

A. PTR
B. A
C. AAAA
D. SRV

Answer: C

NEW QUESTION 241


A technician is connecting a PC to a switchport. At the wiring closet, the technician is identify which cable goes from patch panel a connected to the switch to patch
panel B connected to the PC. Which of the following tools should the technician use to resolve the issue?

A. Cable tester
B. Multimeter
C. Tone generator
D. OTDR

Answer: C

NEW QUESTION 245


A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management
software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen
displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?

A. Changing the management software’s default credentials


B. Disabling unnecessary services from the server and management software
C. Changing the management software’s default port
D. Replacing the management software’s self-signed certificate with a valid certificate

Answer: A

NEW QUESTION 248


A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that
other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located?

A. Network
B. Physical
C. Transport
D. Application

Answer: A

NEW QUESTION 250


A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address
on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?

A. The WAP antenna is damaged


B. The WAP transmitter light is dim
C. The terminal emulation software is misconfigured
D. The LWAPP image is installed on the WAP

Answer: C

NEW QUESTION 251

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router
and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will
collect traffic. Which of the following should the technician install to BEST meet the goal?

A. Bridge
B. Crossover cable
C. Hub
D. Media converter

Answer: C

NEW QUESTION 256


A chief information Officer (CIO) tasks the network engineer with protecting the network from outside attacks. Placing which of the following devices on the network
perimeter would provide the MOST security for the system?

A. Firewall
B. NGFW
C. Content filter
D. IDS/PS

Answer: B

NEW QUESTION 258


A company has a web-based application that is used by many different departments. The company has experienced some overload of resources on the database
server. The network administrator implements a network device in between the servers and the database. Which of the following BEST describes the purpose of
this device?

A. Content filtering and network analysis


B. Load balancing and providing high availability
C. Port sniffing and protocol analysis
D. Clustering and NIC teaming

Answer: B

NEW QUESTION 259


Which of the following is networking stand-alone hardware that will permit any WIFI-compliant to connect to a wired network?

A. Wireless hub
B. Wireless firewall
C. Wireless access point
D. Wireless bridge

Answer: C

NEW QUESTION 263


A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The
technician discovers a critical step was missed. Which of the following would allow SSH to function properly?

A. Perform file hashing


B. Generate new keys
C. Update firmware
D. Change default credentials

Answer: B

NEW QUESTION 264


A network administrator is performing a major to the upgrade to the network. Which of the following should the administrator use in a case of a failure?

A. Baseline report
B. Vulnerability report
C. Rollback plan
D. Business continuity plan

Answer: A

NEW QUESTION 265


An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:
WLAN architecture supporting speeds in excess of 150 Mbps
Clientless remote network access
Port-based network access control
Which of the following solution sets properly addresses all of the identified requirements?

A. 802.11a, IPSec VPN, 802.1x


B. 802.11ac, MPLS, 802.3
C. 802.11b, PPTP, 802.1x
D. 802.11g, MS-CHAP, 802.16

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

E. 802.11n, SSL-VPN, 802.1x

Answer: E

NEW QUESTION 266


A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of
the router, which of the following tools should the technician use?

A. Loopback adapter
B. Cable tester
C. Tone generator
D. Multimeter

Answer: A

NEW QUESTION 271


Which of the following BEST describes an exploit?

A. A router with default credentials


B. An open mail relay server
C. A SNMPv1 private community
D. A privilege escalation script

Answer: D

NEW QUESTION 273


A network technician needs to connect to a remote router to modify the configuration, Which of the following method should the technician use to connected to the
device security? (Select TWO)

A. Telnet
B. VNC
C. SSH
D. RDP
E. HTTPS
F. TFTP

Answer: BC

NEW QUESTION 277


A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop
in any way, and the wireless Internet is functional on other users’ laptops. Which of the following issues should be reviewed to help the user to connect to the
wireless network?

A. Wireless switch toggled off


B. WAP settings
C. WLAN IP address out of scope
D. Wireless controller misconfiguration

Answer: A

NEW QUESTION 279


Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is
connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use.
The school wants to double the connection speed between the lab and the servers without running new cables. Which of the following would be the BEST
solution?

A. Plug in a second spare cable at each end to double the speed.


B. Replace the switches with ones that utilize port bonding and use the spare cables.
C. Replace the switches with 10Gb switches and utilize the existing cabling.
D. Plug in a second cable and set one port to TX and one port to RX.

Answer: B

NEW QUESTION 283


A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be
configured to allow for connectivity? (Choose three.)

A. TCP 25
B. TCP 110
C. TCP 143
D. TCP 389
E. TCP 587
F. TCP 993
G. TCP 995

Answer: EFG

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 284


The Chief Executive Officer’s (CEO’s) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to
the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between.
Which of the following is the MOST likely cause of the tablet not connecting?

A. Absorption
B. Reflection
C. Distance
D. Refraction
E. Attenuation

Answer: C

NEW QUESTION 287


A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated
from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the
technician choose that all the equipment would support?

A. Telnet
B. SSL
C. SSH
D. IPSec

Answer: A

NEW QUESTION 289


A computer lab on a campus network was recently reconfigured using recycled network cables. One of the 24 computers in the lab is unable to connect to the
network after the upgrade. A network technician successfully uses the cable in question to connect directly to another computer. Which of the following is MOST
likely issue with the cable?

A. The cable is a crossover cable


B. The cable is rollover cable
C. The cable has bent pins
D. The cable is a Cat 5 cable

Answer: A

NEW QUESTION 293


A network administrator has had difficulty keeping track of IP address assignments on networking devices and clients recently. Which of the following is the BEST
technology to aid in this scenario?

A. DNS
B. DHCP
C. IPAM
D. NTP

Answer: C

NEW QUESTION 294


Which of the following concepts would BEST describe when a company chooses to use a third-party vendor to host and administer critical application?

A. SaaS
B. Iaas
C. PaaS
D. CASB

Answer: C

NEW QUESTION 295


Which of the following physical security controls is MOST likely to be susceptible to a false positive?

A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera

Answer: C

NEW QUESTION 298


A network technician has recently installed new VoiP phones at all employees’ desks to support a new SIP cloud solution. However, the technician is unable to
make a call from the device after testing. Which of the following should the technician verify?

A. TCP 433 is allowed.


B. UDP 1720 is allowed.
C. UDP 50860 is allowed.
D. UDP 5061 is allowed.
E. TCP 8080 is allowed.

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

F. TCP 8181 is allowed.

Answer: CD

NEW QUESTION 299


A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to
change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

A. Loopback IP
B. Virtual IP
C. Reserved IP
D. Public

Answer: B

NEW QUESTION 300


Which of the following will listen on the line to ensure there is no traffic transmitting and implement a back-off timer if a collision occurs?

A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF

Answer: A

NEW QUESTION 303


A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling
other than what is already in place. Which of the following solutions should the technician install to meet these requirements?

A. DOCSIS modem
B. Wireless router
C. DSL modem
D. Access point

Answer: A

NEW QUESTION 304


A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs between devices. Which of the following
tools are MOST likely needed to complete the task? (Choose three.)

A. Wire stripper
B. Cable crimper
C. RJ-11 connectors
D. RJ-45 connectors
E. Multimeter
F. Punchdown tool
G. Tone generator

Answer: ABD

NEW QUESTION 308


Which of the following default ports would need to be disabled to block TFTP traffic?

A. 20
B. 21
C. 69
D. 123

Answer: C

NEW QUESTION 309


Which of the following uses port 53 by default?

A. RDP
B. QoS
C. DHCP
D. DNS

Answer: D

NEW QUESTION 311


The software that allows a machine to run multiple operating systems at once is called the:

A. Server manager
B. Hypervisor

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

C. Boot loader
D. Partition manager

Answer: B

NEW QUESTION 314


Which of the following ports is the default telnet port?

A. 20
B. 21
C. 22
D. 23

Answer: D

NEW QUESTION 317


Which of the following uses types and codes rather than ports?

A. EIGRP
B. ICMP
C. UDP
D. IPv6

Answer: B

NEW QUESTION 318


Which of the following cable types have a rated MAXIMUM bandwidth of 100Mbps?

A. CAT3
B. CAT5
C. CAT5e
D. CAT6

Answer: B

NEW QUESTION 323


Which of the following is true about tunneling and encryption?

A. SIP encrypts all data going through the tunnel.


B. PPTP creates a secure tunnel.
C. SSL VPN provides a secure tunnel.
D. RAS is a secure way to create a tunnel.

Answer: C

NEW QUESTION 327


A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?

A. Channel
B. SSID
C. Firewall rule
D. Encryption

Answer: A

NEW QUESTION 329


Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Answer: A

NEW QUESTION 331


Which of the following default ports would need to be open on a firewall to allow remote desktop access?

A. 143
B. 443
C. 3389
D. 8080

Answer: C

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 334


Which of the following is a secure way to connect to a device?

A. RSH
B. TFTP
C. SNMPv2
D. SFTP

Answer: D

NEW QUESTION 336


A company has installed an access point and configured it to broadcast at 802.11n only. Some users are stating that they cannot connect to this access point.
Which of the following is the MOST likely reason some users cannot connect?

A. Incorrect channel
B. Weak encryption
C. Incompatible NICs
D. Incorrect SSID

Answer: C

NEW QUESTION 341


Which of the following are network topologies? (Select TWO).

A. Ethernet
B. Duplex
C. Star
D. Circular
E. Bus

Answer: CE

NEW QUESTION 344


Which of the following cables will MOST likely be used to connect to a satellite dish?

A. RG-6
B. CAT5e
C. Fiber
D. CAT6

Answer: A

NEW QUESTION 347


Which of the following BEST describes how a layer 2 switch functions?

A. Switches packets within the same subnet based on MAC addresses


B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets between different subnets based on MAC addresses

Answer: A

NEW QUESTION 348


Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).

A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080

Answer: DE

NEW QUESTION 352


Which of the following cables has the MOST twists per inch?

A. CAT3
B. CAT5
C. CAY5e
D. CAT6

Answer: D

NEW QUESTION 356

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Which of the following uses certificates as a form of security?

A. Kerberos
B. LDAP
C. PKI
D. CHAP

Answer: C

NEW QUESTION 361


A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration
change will allow the PING to be successful?

A. Replace the router with a Layer 2 switch that supports VLANs


B. Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D. AllowICMP to pass through the Router

Answer: D

NEW QUESTION 363


Which of the following is a purpose of a VLAN?

A. Decreases bandwidth on a network


B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router

Answer: B

NEW QUESTION 368


Which of the following is a proprietary routing protocol?

A. RIP
B. EIGRP
C. OSPF
D. BGP

Answer: B

NEW QUESTION 371


Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?

A. Switch
B. Proxy Server
C. Router
D. VPN Concetnrator

Answer: A

NEW QUESTION 372


Which of the following protocols are used to connect devices in a secure manner? (Select TWO).

A. TELNET
B. SSH
C. RDP
D. HTTP
E. DNS
F. FTP

Answer: BC

NEW QUESTION 377


An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the
following ways should the firewall be configured?

A. Allow TCP port 3389 outbound


B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound

Answer: D

NEW QUESTION 382


A technician is troubleshooting a problem with a network printer. The technician thinks the network printer is out of paper and ink. Which of the following should the

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

technician do NEXT?

A. Implement the solution


B. Question users
C. Test the theory
D. Escalate the problem

Answer: C

NEW QUESTION 385


A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy
server to accomplish this?

A. 20
B. 80
C. 143
D. 443

Answer: B

NEW QUESTION 389


Which of the following routing protocols relies on hop count as its ONLY metric?

A. BGP
B. EIGRP
C. OSPF
D. RIP

Answer: D

NEW QUESTION 390


Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?

A. IPS
B. Application layer firewall
C. IDS
D. An unmanaged switch

Answer: B

NEW QUESTION 393


Jeff, a technician, has been asked to add a subnet to the company's LAN. Which of the following interfaces on the router will be modified?

A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0

Answer: A

NEW QUESTION 396


Which of the following wireless standards is capable of ONLY operating on 5.8GHz?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Answer: A

NEW QUESTION 397


Which of the following is the network topology in which computers connect in a closed circle?

A. Bus
B. Mesh
C. Ring
D. Star

Answer: C

NEW QUESTION 398


After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that
the cable was crimped correctly?

A. Punch down tool

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

B. Cable certifier
C. Loopback plug
D. Toner probe

Answer: B

NEW QUESTION 401


A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the
remote access?

A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall

Answer: C

NEW QUESTION 405


When querying a DNS server for an AAAA record, which of the following is an appropriate response?

A. 192.168.2.1
B. 00:f3:82:99:a2:b8
C. 61.23.168.192.in-addr.arpa
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf

Answer: D

NEW QUESTION 409


An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways
should the firewall be configured? (Select TWO).

A. Allow TCP port 23


B. Allow TCP port 25
C. Allow TCP port 110
D. Allow UDP port 25
E. Allow UDP port 110

Answer: BC

NEW QUESTION 411


Which of the following is the default subnet mask for a Class B address?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

Answer: B

NEW QUESTION 413


Which of the following access controls enforces permissions based on data labeling at specific levels?

A. Mandatory access control


B. Separation of duties access control
C. Discretionary access control
D. Role based access control

Answer: A

NEW QUESTION 418


Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access
any internal network resources.
Which of the following is the MOST likely reason?

A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID

Answer: A

NEW QUESTION 419


A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack. Which of the following commands can help repair the damage?

A. netsh lan

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

B. netsh interface
C. netsh wlan
D. netsh winsock

Answer: D

NEW QUESTION 423


Which of the following is used to provide hot standby capabilities using paired routers?

A. CARP
B. L2TP
C. PPTP
D. ISAKMP

Answer: A

NEW QUESTION 426


Please refer to the attached exhibit. Which of the following types of configuration management documentation is represented?

A. Network security policy


B. Network baseline
C. Logical network diagram
D. Wiring schematic

Answer: C

NEW QUESTION 428


Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?

A. 255.255.255.0
B. 255 255.255.128
C. 255.255.255.192
D. 255.255.255.248

Answer: A

NEW QUESTION 431


Which of the following MUST be kept synchronized in order for Kerberos to work?

A. Certificate
B. Ticket
C. Time
D. Token

Answer: C

NEW QUESTION 435


Which of the following allows a central point to simultaneously address other points without addressing all of them?

A. Multicast

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

B. Subnetting
C. Unicast
D. Broadcast

Answer: A

NEW QUESTION 440


Which of the following WAP security features offers the STRONGEST encryption?

A. WPA
B. WPA2
C. WEP
D. Hidden SSID

Answer: B

NEW QUESTION 441


Which of the following specifications would Sara, an administrator, implement as a network access control?

A. 802.1q
B. 802.3
C. 802.11n
D. 802.1x

Answer: D

NEW QUESTION 443


A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access. Which of the following has MOST likely occurred?

A. Port security is blocking all traffic.


B. An IDS is blocking all traffic.
C. Implicit deny is blocking all traffic.
D. SMTP is blocking all traffic.

Answer: C

NEW QUESTION 447


A VoIP line will MOST likely have which of the following connectors?

A. RJ-11
B. DB-25
C. BNC
D. RJ-45

Answer: D

NEW QUESTION 451


Which of the following is a routed protocol that functions at layer 3 of the OSI model?

A. IP
B. Frame relay
C. PPP
D. ADSL

Answer: A

NEW QUESTION 456


Which of the following is based ENTIRELY on using ICMP packets?

A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack

Answer: D

NEW QUESTION 458


A firewall that operates at Layer 7 of the OSI model is known as a(n):

A. Circuit gateway
B. Packet filter
C. Application level
D. Redundant firewall

Answer: C

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

NEW QUESTION 459


An administrator is replacing an existing WAP because the customer is reporting that the connection speeds are too slow. Which of the following should be
installed?

A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n

Answer: D

NEW QUESTION 460


Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).

A. 21
B. 22
C. 23
D. 53
E. 67

Answer: BC

NEW QUESTION 463


The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?

A. 1
B. 3
C. 4
D. 5

Answer: C

NEW QUESTION 466


Which of the following could be used to stop unknown threats?

A. DMZ
B. Signature based IPS
C. Behavior based IPS
D. Honeypots

Answer: C

NEW QUESTION 469


Which of the following would Sandy, a technician, find in a network map?

A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules

Answer: B

NEW QUESTION 472


Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?

A. NAT
B. RIP
C. PAT
D. ACL

Answer: C

NEW QUESTION 475


Which of the following protocols uses port 3389?

A. IMAP
B. DHCP
C. SSH
D. RDP

Answer: D

NEW QUESTION 480


Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO).

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

A. dig
B. nslookup
C. nbstat
D. ifconfig
E. ipconfig

Answer: DE

NEW QUESTION 485


Which of the following protocols is used to securely connect to a multi-layer switch?

A. HTTP
B. SMTP
C. SSH
D. Telnet

Answer: C

NEW QUESTION 487


A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm
reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of the following is the
MOST likely cause?

A. A missing route on the alarm device.


B. Incorrect VLAN assignment on the router.
C. A missing route on the network routers.
D. Incorrect speed/duplex setting on the alarm device.

Answer: D

NEW QUESTION 490


When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands
would be MOST helpful in determining the MAC address?

A. ping
B. arp
C. route
D. dig

Answer: B

NEW QUESTION 492


Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?

A. Network map
B. Environmental monitor
C. Placement map
D. Syslog

Answer: D

NEW QUESTION 493


A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would
be used to assist Jeff in locating the CAT5e cable?

A. Butt set
B. Punch down tool
C. Toner probe
D. Protocol analyzer

Answer: C

NEW QUESTION 498


A company only wants preapproved laptops to be able to connect to a wireless access point. Which of the following should be configured?

A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering

Answer: D

NEW QUESTION 499


A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate
possible outages?

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer

Answer: A

Explanation: A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network.

NEW QUESTION 500


Which of the following methods for network performance optimization is used to distribute traffic among similar devices?

A. Fault tolerance
B. QoS
C. Proxy server
D. Load balancing

Answer: D

NEW QUESTION 504


An administrator hosts all of the company's virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and
accessed through the VPN.
Which of the following cloud services is the administrator using?

A. Community PaaS
B. Public Iaas
C. Hybrid Saas
D. Private Iaas

Answer: B

NEW QUESTION 506


Workstations are unable to access the Internet after a recent power outage. Configure the appropriate devices to ensure ALL workstations have Internet
connectivity.
Instructions: All ports can be enabled (green) or disabled (red). When you have completed the simulation please select the Done button.

Answer:

Explanation: All ports should be enabled.

NEW QUESTION 511


A customer has not been using security on a wireless network and has recently received many attacks through this vector.
Which of the following would be the MOST secure way to harden this wireless network?

A. Disable the SSID


B. WPA encryption
C. VLAN implementation
D. WEP encryption

Answer: B

NEW QUESTION 513


Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?

A. WAP placement
B. PoE devices
C. MAC filtering

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

D. Encryption type

Answer: A

NEW QUESTION 518


A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited for
the HIGHEST level of security?

A. WPA2
B. WPA
C. WEP64
D. WEP128

Answer: A

NEW QUESTION 519


Which of the following layers of the OSI model is between the Data Link and Transport layers?

A. Application
B. Session
C. Network
D. Physical

Answer: C

NEW QUESTION 524


An organization wants to perform maintenance on any of its web servers without affecting the service availability during a scheduled change window. Which of the
following network devices would be required to provide this functionality?

A. Router
B. Forward proxy
C. Load balancer
D. Firewall

Answer: C

NEW QUESTION 525


Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will
verify this?

A. Cable tester
B. Toner probe
C. OTDR
D. Loopback plug

Answer: A

NEW QUESTION 527


Which of the following methods limits access to a network based on characteristics of the network card?

A. IP filtering
B. MAC filtering
C. Port filtering
D. Encryption

Answer: B

NEW QUESTION 531


Zach, a technician, needs to terminate a CAT5e Ethernet cable to a 110 block. Which of the following tools should he use?

A. Toner probe
B. Punch down
C. Wire tester
D. Crimper

Answer: B

NEW QUESTION 535


A technician needs to verify an Ethernet run is functioning properly. Which of the following tools should be used?

A. Protocol analyzer
B. Crimper
C. Cable tester
D. Punch down tool

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Answer: C

NEW QUESTION 536


A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following:
1) Client PC 1 has an IP address if 192.168.10.25/25
2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A
3) Server A is named 'BLDGBFILESRVR01' and has an IP address of 192.168.10.145/25
4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A
However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause?

A. Link from touter A to PC 1 are on different subnets


B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down

Answer: A

NEW QUESTION 541


An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the
reason?

A. WEP's IV is too small.


B. WEP uses RC4 which is easily accessible and not secure.
C. WEP uses plain text.
D. WEP is not well supported.

Answer: A

NEW QUESTION 543


An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given
the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which
of the following would MOST likely resolve the users' connection issues?

A. Limit the devices to 802.11n only.


B. Enable the SSID broadcast.
C. Enable MAC filtering.
D. Use a WEP 128-bit key.

Answer: B

NEW QUESTION 547


Which of the following IP addresses would be classified as private?

A. 10.100.200.0
B. 169.253.10.20
C. 172.168.5.0
D. 200.100.25.0

Answer: A

NEW QUESTION 551


A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily
increasing rates. Which of the following is the MOST likely cause of the increased traffic?

A. STP blocking
B. IP addresses
C. MTU mismatch
D. Switching loop

Answer: D

NEW QUESTION 554


Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that
users max out at 802.11g speeds. Which of the following would MOST likely fix this issue?

A. Enable wireless multimedia (WMM) for QoS


B. Use the 40MHz channels in the 2.4GHz band
C. Enable access point antenna isolation
D. Limit the clients to 802.11g compatible laptops

Answer: A

NEW QUESTION 559


A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line?
(Select TWO).

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

A. Router
B. Wi-Fi Access point
C. Cable modem
D. Ten WiMAX adapters
E. Ten CAT6 patch cables

Answer: AB

NEW QUESTION 564


Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

A. Telnet
B. FTP
C. SNMP
D. SSH
E. RDP

Answer: AD

NEW QUESTION 567


When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?

A. Signal strength
B. SSID enable
C. Encryption
D. Password hardening

Answer: A

NEW QUESTION 569


A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the
microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity?

A. Disable SSID broadcast


B. Increase the signal strength
C. Move the access point
D. Change the broadcast channel

Answer: C

NEW QUESTION 572


An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be
used?

A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe

Answer: B

NEW QUESTION 577


A technician looks at an ARP table in an attempt to resolve a connectivity issue. After table of the switch is a cleared, a different MAC in the output, Which of the
following does this indicate?

A. ARP flooding
B. VLAN mismatch
C. Duplicate IP address
D. Faulty NIC

Answer: A

NEW QUESTION 578


A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration
changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot
the connectivity issues?

A. Router logs
B. History logs
C. Startup/bootup config logs
D. Event Viewer logs

Answer: B

NEW QUESTION 583

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of
the following firewall rules would BEST accomplish this?

A. Content filtering on the wireless access point


B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point

Answer: C

NEW QUESTION 586


Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when
investigating the problem at Lisa's workstation?

A. nslookup
B. route
C. nbtstat
D. arp

Answer: A

NEW QUESTION 587


Which of the following media types can carry a standard Ethernet signal for network connectivity?

A. USB
B. PArallel
C. Serial
D. CAT6

Answer: D

NEW QUESTION 588


The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:

A. CARP
B. QoS
C. Traffic shaping.
D. Fault tolerance.

Answer: B

NEW QUESTION 593


Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select
TWO).

A. MAC addressing
B. IP addressing
C. Port speed
D. IPv6 addressing
E. Duplex

Answer: CE

NEW QUESTION 597


A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at
least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?

A. Fiber optic
B. Wireless
C. CAT5e
D. CAT3

Answer: A

NEW QUESTION 599


A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the
technician use to trace the network cabling back to the punch down block?

A. Protocol analyzer
B. Multimeter
C. Punch down tool
D. Toner probe

Answer: D

NEW QUESTION 604

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Which of the following is used to create a secure connection between a client and a host?

A. VLAN
B. Proxy server
C. IIS server
D. VPN

Answer: D

NEW QUESTION 605


A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the
Internet.
Which of the following is the MOST likely reason?

A. Incorrectly configured ACL


B. Implicit allow statement
C. SMTP requests are being denied
D. All protocols are being allowed in

Answer: A

NEW QUESTION 610


The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is
known as the:

A. hypervisor.
B. LPAR.
C. broker.
D. VDI.

Answer: A

NEW QUESTION 615


Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring
station. Which of the following protocols will support secure transmission of the data?

A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP

Answer: A

NEW QUESTION 617


A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following
commands would MOST likely be used on that workstation to verify its current network settings?

A. net share
B. hostname
C. ipconfig
D. tracert

Answer: C

NEW QUESTION 619


Which of the following utilities would a technician use to determine the location of lost packets on a routed network?

A. ping
B. nslookup
C. route
D. tracert

Answer: D

NEW QUESTION 620


Kim, a user, cannot access the network using wireless. Which of the following is MOST likely the cause?

A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in the cable pairs

Answer: C

NEW QUESTION 623

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

ADSL modem connects to the provider's network using which of the following authentication techniques?

A. PoE
B. MS-CHAP
C. PPPoE
D. EAP

Answer: C

NEW QUESTION 625


A network technician at a small office upgrades the VLAN switch. After the upgrade, a user reports being unable to access network resources. When the
technician checks the switchport, the LED light is not lit. Which of the following should technician check FIRST?

A. The device is using the correct cable type.


B. The switchport is functioning properly.
C. The device is connected to the switch.
D. The switch is connected to the router.

Answer: C

NEW QUESTION 626


Which of the following devices is used to distribute network traffic equally over multiple links?

A. Content filter
B. DNS server
C. Load balancer
D. Proxy server

Answer: C

NEW QUESTION 628


......

The Leader of IT Certification visit - https://www.certleader.com


100% Valid and Newest Version N10-007 Questions & Answers shared by Certleader
https://www.certleader.com/N10-007-dumps.html (532 Q&As)

Thank You for Trying Our Product

* 100% Pass or Money Back


All our products come with a 90-day Money Back Guarantee.
* One year free update
You can enjoy free update one year. 24x7 online support.
* Trusted by Millions
We currently serve more than 30,000,000 customers.
* Shop Securely
All transactions are protected by VeriSign!

100% Pass Your N10-007 Exam with Our Prep Materials Via below:

https://www.certleader.com/N10-007-dumps.html

The Leader of IT Certification visit - https://www.certleader.com


Powered by TCPDF (www.tcpdf.org)

You might also like