Comptia Network Plus N10-007 PDF
Comptia Network Plus N10-007 PDF
Comptia Network Plus N10-007 PDF
N10-007 Dumps
https://www.certleader.com/N10-007-dumps.html
NEW QUESTION 1
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following
indicates the correct IP address range?
A. 172.16.80.0-172.16.85.254
B. 172.16.80.0-172.16.88.255
C. 172.16.80.1-172.16.87.254
D. 172.16.80.1-172.16.85.255
Answer: C
NEW QUESTION 2
Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
E. 802.11n
Answer: BE
NEW QUESTION 3
Which of the following backup techniques is used to capture all the data that has changed since the least full backup?
A. Incremental
B. Replica
C. Different
D. Snapshot
Answer: C
NEW QUESTION 4
A network technician installs a web server on the firewall. Which of the following methods should the technician implement to allow access to outside users without
giving access to the inside network?
A. VLAN
B. DMZ
C. SNMP
D. NTP
Answer: B
NEW QUESTION 5
A company has just refreshed the hardware in its datacenter with new 10G Ethernet switches wishes to set up a new storage area network but must use existing
infrastructure. Which of the following storage standards should the technician use?
A. iSCSI
B. Fibre Channel
C. NAS
D. InfinBand
Answer: C
NEW QUESTION 6
A network technician configures a firewall’s ACL to allow outgoing traffic for several popular services such as email and web browsing. However, after the
firewall’s deployment, users are still unable to retrieve their
emails. Which of the following would BEST resolve this issue?
A. Allow the firewall to accept inbound traffic to ports 25, 67, 179, and 3389
B. Allow the firewall to accept inbound traffic to ports 80, 110, 143, and 443
C. Set the firewall to operate in transparent mode
D. Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123
Answer: B
NEW QUESTION 7
A home user has purchased a new smart TV to stream online video services. The smart TV is unable to connect to the wireless network after several attempts.
After from vacation, the home user tries again and can connect the TV to wireless network. However, the user notice a laptop is no longer able to connect to the
network. Which of the following is the MOST likely cause?
Answer: A
NEW QUESTION 8
AChief Information Officer (CIO) is concentrated about an attacker gaining administrative access to the
company’s network devices. Which of the following is the MOST secure way to prevent this?
Answer: D
NEW QUESTION 9
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor’s website. Before
installing the firmware update, which of the following
steps should the technician perform to ensure file integrity?
Answer: B
NEW QUESTION 10
Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the
following policies requires employee adherence?
A. AUP
B. SLA
C. NDA
D. MOU
Answer: A
NEW QUESTION 10
A new building needs to be joined to an existing network, but management has decided that running fiber is too expensive. Since the buildings are bout 1000ft
(305m) apart, the IT department has been asked to propose alternatives. Which of the following is the BEST device to add to each building to facilitate the
extension of the network while meeting budgetary demands?
A. Switch
B. Router
C. Media converter
D. PTP wireless
Answer: D
NEW QUESTION 14
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take
NEXT?
Answer: A
NEW QUESTION 19
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low
power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
Answer: A
NEW QUESTION 22
A technician is sent to a remote office to set up a device to connect to the internet. The company Standard
document requires stateful inspection.
Which of the following should the technician install?
A. ROUTER
B. Multilayer switch
C. Firewall
D. Bridge
Answer: C
NEW QUESTION 26
A critical vulnerable is discovered on a network device. The vendor state it has already patched this vulnerable in its current release. Which of the following actions
should an administrator take?
Answer: B
NEW QUESTION 27
A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the
BEST steps for the technician to take with minimum overhead configuration? (Choose two.)
Answer: AB
NEW QUESTION 29
A network technician is setting up a new router. Since it is exposed to the public, which of the following are the BEST steps the technician should take when setting
up this device? (Choose two.)
Answer: AF
NEW QUESTION 31
Which of the following should current network performance be compared against to determine network anomalies?
A. Baseline
B. Traffic analysis
C. Packet capture
D. Logs
Answer: A
NEW QUESTION 36
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician
confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the
technician use to reveal the location of the fault?
A. OTDR
B. Light meter
C. Tone generator
D. CSU/DSU
Answer: A
NEW QUESTION 38
A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve
a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)
Answer: AC
NEW QUESTION 40
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?
Answer: A
NEW QUESTION 45
A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No
other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is not able
to ping the machine from the IT network. Which of the following is MOST likely the cause?
Answer: A
NEW QUESTION 48
A network engineer planning for wireless connectivity in large office building. Currently, the office building contains both legacy and newer devices.
Which of the following wireless network routers should engineer select for the fastest throughput for all wireless devices in the office building?
A. 802.11ac
B. 802.11b
C. 802.11g
D. 802.11n
Answer: A
Explanation: https://www.forbes.com/forbes/welcome/?toURL=https://www.forbes.com/sites/gordonkelly/2014/12/30/802-11
NEW QUESTION 52
A network technician is repurposing a switch that has been in storage for some time. The device has been wiped to factory defaults. Which of the following should
be done FIRST to ensure the device has been hardened before configuration?
Answer: C
NEW QUESTION 55
A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file
is correct and complete?
A. File hash
B. File date
C. File type
D. File size
Answer: A
NEW QUESTION 60
Management has requested that services be available within 72 hours of disaster, Budget is a major concern. A contract is signed with a company that has plenty
space, and the technician will have the option of putting infrastructure equipment in place. Which of the following BEST describes this business continuity strategy?
A. Cold site
B. Differentiate backup
C. Hot site
D. Incremental backup
E. Warm site
F. Full backup
Answer: A
NEW QUESTION 61
Which of the following is the correct port number for NTP?
A. 25
B. 69
C. 123
D. 161
Answer: C
NEW QUESTION 65
A network technician has unable to make a from a datacenter. The technician attempts to use the cables to connect desktops to the network without success.
Which of the following is MOST likely the issue?
Answer: D
NEW QUESTION 66
A network technician is installing a new wireless network in a small office. Due to environment concerns, The customer wants the network to run exclusively on the
%GHz frequency. Which of the following wireless technologies should the technician install meet this requirement? (Select TWO).
A. 802.11ac
B. 802 11b
C. 802 11g
D. 802.11n
E. Bluetooth
F. z-Ware
Answer: AD
NEW QUESTION 69
A network technician is implementing a solution on the network to hide the workstation internal IP addresses across a WAN. Which of the following is the
technician configuring?
A. QoS
B. DMZ
C. RIP
D. NAT
Answer: D
NEW QUESTION 74
A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first
responder do FIRST?
Answer: C
NEW QUESTION 79
Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage?
A. biometric scanners
B. door locks
C. video surveillance
D. motion detectors
Answer: B
NEW QUESTION 82
A network administrator would like to collect information from several networking devices using SNMP. Which of the following SNMP options should a network
administrator use to ensure the data transferred is confidential?
A. authpriv
B. SHA
C. MD5
D. Authentication passphrase
Answer: A
NEW QUESTION 87
A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is
instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements?
A. 10.5.4.0/22
B. 10.233.2.0/23
C. 172.16.0.0/22
D. 172.18.0.0/23
E. 192.168.25.0/24
Answer: D
NEW QUESTION 90
A typical cell tower will have microwave and cellular antennas. Which of the following network topologies do these represent? (Choose two.)
A. Point-to-multipoint
B. Bus
C. Point-to-point
D. Mesh
E. Peer-peer
F. Ring
Answer: CD
NEW QUESTION 91
At which of the following OSI model layers would a router operate?
A. Physical
B. Network
C. Transport
D. Data link
Answer: B
NEW QUESTION 94
A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector.
The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?
A. LC
B. ST
C. SC
D. MTRJ
E. MTP
Answer: B
NEW QUESTION 95
A technician set up a new SOHO network recently. The installed router has four Ethernet ports; however the customer has seven devices that wired connections.
Which of the following should the technician do to BEST meet the customer’s requirements?
Answer: A
NEW QUESTION 97
A technician is configuring a printer for a client. The which of the following types to the network, But is unsure how to determine its switch port. Which of the
following should the technician do FIRST to locate switch port?
Answer: D
NEW QUESTION 99
A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet
jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.)
A. RG-9
B. DB-9
C. RJ-11
D. DB-25
E. RJ-45
F. BNC
Answer: BE
Answer: A
A. 1
B. 3
C. 5
D. 7
E. 6
Answer: E
A. AUP
B. NDA
C. SOP
D. SLA
Answer: C
Answer: C
A. Site survey
B. Vulnerability scanning
C. Wardriving
D. Checking logical diagram
E. Bandwidth test
Answer: A
Which of the following physical security devices is used to detect unauthorized server room access?
A. Access badge
B. Biometrics
C. Smart card
D. Video surveillance
Answer: D
Answer: CF
Explanation: Network devices come with default credentials, the username and password that enables you to log into the device for configuration. Changing
default credentials should be the first step in hardening a new device. As with any other system, avoiding common passwords adds security.
Keep network devices up to date. That means upgrading firmware, patching and updating as necessary to close any security gaps exposed over time.
Services on network devices like routers include common things, like Telnet and HTTP access; and also things you don’t normally see, like TCP and UDP small
services, debugging and testing tools that primarily use ports 20 and lower. If enabled, these services can be used to launch DoS and other attacks. All modern
Cisco devices have these disabled; Cisco’s hardening rules insist on disabling unnecessary services.
Using secure protocols hardens network devices. Don’t use Telnet to access a managed switch or router, for example, but use SSH so that the communication is
encrypted.
Disabling unused ports on network devices enhances port security for access control. This includes standard IP ports and device ports, both physical and virtual
for the latter.
A. Data link
B. Network
C. Session
D. Transport
E. Presentation
Answer: A
A. PC to switch
B. Switch to AP
C. Router to switch
D. Router to modem
E. PC to PC
Answer: E
A. Kerberos
B. RADIUS
C. TACACS+
D. LDAP
Answer: A
A. FTP
B. SMTP
C. VPN
D. SSH
E. SNMP
Answer: CD
Answer: C
Answer: A
Answer: D
A. LAN
B. WAN
C. SAN
D. PAN
Answer: D
A. 1
B. 2
C. 6
D. 12
Answer: B
A. Packet analyzer
B. Port analyzer
C. SNMP traps
D. Spectrum analyzer
Answer: A
A. UDP port 22
B. TCP port 22
C. TCP port 25
D. UDP port 53
E. UDP port 69
Answer: E
A. High availability
B. Snapshots
C. NIC teaming
D. Cold site
Answer: A
A. Network maps
B. Cable management
C. Release notes
D. Change management
Answer: D
A. 23
B. 25
C. 110
D. 143
Answer: B
Answer: C
A. NAT
B. PAT
C. STP
D. SNAT
E. ARP
Answer: B
A. DHCP exhaustion
B. Channel overlapping
C. interference
D. Overcapacity
Answer: D
A. Power levels
B. Overcapacity
C. Distance limitations
D. Channel overlap
Answer: A
A. Place a switch at the hotel’s patch panel for connecting each room’s cables
B. Place a switch on each table to ensure strong connectivity
C. Place repeaters between the patch panel and the rooms
D. place a switch at the wall jack and run the cables in the room from there
Answer: A
A. Duplex/speed mismatch
B. VLAN mismatch
C. DNS server issue
D. DHCP server issue
E. Spanning tree blocked ports
Answer: B
A. Reverse the fiber strands of the cable and reconnect them to the server
B. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
C. Replace the server’s single-mode fiber cable with multimode fiber
D. Move the fiber cable to different port on the switch where both strands function
Answer: A
A. 192.168.0.55
B. 192.168.1.0
C. 192.168.1.1
D. 192.168.5.5
E. 255.255.255.0
Answer: C
Which of the following would MOST likely allow the network drives to be accessed?
Answer: B
A. 10.8.0.0/16
B. 10.8.0.0/19
C. 10.8.0.0/20
D. 10.0.0.0/24
Answer: A
A. Absorption
B. Channel overlap
C. Reflection
D. Frequency mismatch
Answer: C
A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
B. Adding a fingerprint reader and retina scanner
C. Using a smart card and RSA token
D. Enforcing a stronger password policy and using a hand geometry scan
Answer: A
A. File size
B. Vendor URL
C. File hashing
D. Encryption
Answer: C
A. Baseline review
B. Vulnerability scan
C. System life-cycle report
D. Archiving logs
Answer: A
Answer: B
Answer: C
Answer: A
A. The modern is placed in bridge mode, the router is placed behind the modern, and the web server is placed behind the router.
B. The router is place in bridge in mode, the modern is placed behind the router, and the web server ids placed behind the modern.
C. the web server is placed in bridge mode, the router is placed behind the server, and the modern is placed behind the router.
D. The switch is placed in bridge mode, the modern is placed behind the switch, and the router is placed behind the modern.
Answer: A
A. IPSec
B. SSL VPN
C. PTP
D. PPTP
Answer: B
Answer: C
A. a
B. ac
C. g
D. n
Answer: B
A. DB-9
B. RS-232
C. DB-25
D. RJ-45
Answer: D
A. UTP
B. Multimode
C. Coaxial
D. Serial
Answer: C
Answer: C
A. PTR
B. A
C. AAAA
D. SRV
Answer: C
A. Cable tester
B. Multimeter
C. Tone generator
D. OTDR
Answer: C
Answer: A
A. Network
B. Physical
C. Transport
D. Application
Answer: A
Answer: C
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router
and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will
collect traffic. Which of the following should the technician install to BEST meet the goal?
A. Bridge
B. Crossover cable
C. Hub
D. Media converter
Answer: C
A. Firewall
B. NGFW
C. Content filter
D. IDS/PS
Answer: B
Answer: B
A. Wireless hub
B. Wireless firewall
C. Wireless access point
D. Wireless bridge
Answer: C
Answer: B
A. Baseline report
B. Vulnerability report
C. Rollback plan
D. Business continuity plan
Answer: A
Answer: E
A. Loopback adapter
B. Cable tester
C. Tone generator
D. Multimeter
Answer: A
Answer: D
A. Telnet
B. VNC
C. SSH
D. RDP
E. HTTPS
F. TFTP
Answer: BC
Answer: A
Answer: B
A. TCP 25
B. TCP 110
C. TCP 143
D. TCP 389
E. TCP 587
F. TCP 993
G. TCP 995
Answer: EFG
A. Absorption
B. Reflection
C. Distance
D. Refraction
E. Attenuation
Answer: C
A. Telnet
B. SSL
C. SSH
D. IPSec
Answer: A
Answer: A
A. DNS
B. DHCP
C. IPAM
D. NTP
Answer: C
A. SaaS
B. Iaas
C. PaaS
D. CASB
Answer: C
A. Identification card
B. Biometric device
C. Proximity reader
D. Video camera
Answer: C
Answer: CD
A. Loopback IP
B. Virtual IP
C. Reserved IP
D. Public
Answer: B
A. CSMA/CD
B. CSMA/CA
C. MPLS
D. OSPF
Answer: A
A. DOCSIS modem
B. Wireless router
C. DSL modem
D. Access point
Answer: A
A. Wire stripper
B. Cable crimper
C. RJ-11 connectors
D. RJ-45 connectors
E. Multimeter
F. Punchdown tool
G. Tone generator
Answer: ABD
A. 20
B. 21
C. 69
D. 123
Answer: C
A. RDP
B. QoS
C. DHCP
D. DNS
Answer: D
A. Server manager
B. Hypervisor
C. Boot loader
D. Partition manager
Answer: B
A. 20
B. 21
C. 22
D. 23
Answer: D
A. EIGRP
B. ICMP
C. UDP
D. IPv6
Answer: B
A. CAT3
B. CAT5
C. CAT5e
D. CAT6
Answer: B
Answer: C
A. Channel
B. SSID
C. Firewall rule
D. Encryption
Answer: A
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: A
A. 143
B. 443
C. 3389
D. 8080
Answer: C
A. RSH
B. TFTP
C. SNMPv2
D. SFTP
Answer: D
A. Incorrect channel
B. Weak encryption
C. Incompatible NICs
D. Incorrect SSID
Answer: C
A. Ethernet
B. Duplex
C. Star
D. Circular
E. Bus
Answer: CE
A. RG-6
B. CAT5e
C. Fiber
D. CAT6
Answer: A
Answer: A
A. 22
B. 23
C. 143
D. 161
E. 162
F. 8080
Answer: DE
A. CAT3
B. CAT5
C. CAY5e
D. CAT6
Answer: D
A. Kerberos
B. LDAP
C. PKI
D. CHAP
Answer: C
Answer: D
Answer: B
A. RIP
B. EIGRP
C. OSPF
D. BGP
Answer: B
A. Switch
B. Proxy Server
C. Router
D. VPN Concetnrator
Answer: A
A. TELNET
B. SSH
C. RDP
D. HTTP
E. DNS
F. FTP
Answer: BC
Answer: D
technician do NEXT?
Answer: C
A. 20
B. 80
C. 143
D. 443
Answer: B
A. BGP
B. EIGRP
C. OSPF
D. RIP
Answer: D
A. IPS
B. Application layer firewall
C. IDS
D. An unmanaged switch
Answer: B
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0
Answer: A
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: A
A. Bus
B. Mesh
C. Ring
D. Star
Answer: C
B. Cable certifier
C. Loopback plug
D. Toner probe
Answer: B
A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall
Answer: C
A. 192.168.2.1
B. 00:f3:82:99:a2:b8
C. 61.23.168.192.in-addr.arpa
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
Answer: D
Answer: BC
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
Answer: B
Answer: A
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
Answer: A
A. netsh lan
B. netsh interface
C. netsh wlan
D. netsh winsock
Answer: D
A. CARP
B. L2TP
C. PPTP
D. ISAKMP
Answer: A
Answer: C
A. 255.255.255.0
B. 255 255.255.128
C. 255.255.255.192
D. 255.255.255.248
Answer: A
A. Certificate
B. Ticket
C. Time
D. Token
Answer: C
A. Multicast
B. Subnetting
C. Unicast
D. Broadcast
Answer: A
A. WPA
B. WPA2
C. WEP
D. Hidden SSID
Answer: B
A. 802.1q
B. 802.3
C. 802.11n
D. 802.1x
Answer: D
Answer: C
A. RJ-11
B. DB-25
C. BNC
D. RJ-45
Answer: D
A. IP
B. Frame relay
C. PPP
D. ADSL
Answer: A
A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack
Answer: D
A. Circuit gateway
B. Packet filter
C. Application level
D. Redundant firewall
Answer: C
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
Answer: D
A. 21
B. 22
C. 23
D. 53
E. 67
Answer: BC
A. 1
B. 3
C. 4
D. 5
Answer: C
A. DMZ
B. Signature based IPS
C. Behavior based IPS
D. Honeypots
Answer: C
A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules
Answer: B
A. NAT
B. RIP
C. PAT
D. ACL
Answer: C
A. IMAP
B. DHCP
C. SSH
D. RDP
Answer: D
A. dig
B. nslookup
C. nbstat
D. ifconfig
E. ipconfig
Answer: DE
A. HTTP
B. SMTP
C. SSH
D. Telnet
Answer: C
Answer: D
A. ping
B. arp
C. route
D. dig
Answer: B
A. Network map
B. Environmental monitor
C. Placement map
D. Syslog
Answer: D
A. Butt set
B. Punch down tool
C. Toner probe
D. Protocol analyzer
Answer: C
A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering
Answer: D
A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer
Answer: A
Explanation: A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network.
A. Fault tolerance
B. QoS
C. Proxy server
D. Load balancing
Answer: D
A. Community PaaS
B. Public Iaas
C. Hybrid Saas
D. Private Iaas
Answer: B
Answer:
Answer: B
A. WAP placement
B. PoE devices
C. MAC filtering
D. Encryption type
Answer: A
A. WPA2
B. WPA
C. WEP64
D. WEP128
Answer: A
A. Application
B. Session
C. Network
D. Physical
Answer: C
A. Router
B. Forward proxy
C. Load balancer
D. Firewall
Answer: C
A. Cable tester
B. Toner probe
C. OTDR
D. Loopback plug
Answer: A
A. IP filtering
B. MAC filtering
C. Port filtering
D. Encryption
Answer: B
A. Toner probe
B. Punch down
C. Wire tester
D. Crimper
Answer: B
A. Protocol analyzer
B. Crimper
C. Cable tester
D. Punch down tool
Answer: C
Answer: A
Answer: A
Answer: B
A. 10.100.200.0
B. 169.253.10.20
C. 172.168.5.0
D. 200.100.25.0
Answer: A
A. STP blocking
B. IP addresses
C. MTU mismatch
D. Switching loop
Answer: D
Answer: A
A. Router
B. Wi-Fi Access point
C. Cable modem
D. Ten WiMAX adapters
E. Ten CAT6 patch cables
Answer: AB
A. Telnet
B. FTP
C. SNMP
D. SSH
E. RDP
Answer: AD
A. Signal strength
B. SSID enable
C. Encryption
D. Password hardening
Answer: A
Answer: C
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe
Answer: B
A. ARP flooding
B. VLAN mismatch
C. Duplicate IP address
D. Faulty NIC
Answer: A
A. Router logs
B. History logs
C. Startup/bootup config logs
D. Event Viewer logs
Answer: B
company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of
the following firewall rules would BEST accomplish this?
Answer: C
A. nslookup
B. route
C. nbtstat
D. arp
Answer: A
A. USB
B. PArallel
C. Serial
D. CAT6
Answer: D
A. CARP
B. QoS
C. Traffic shaping.
D. Fault tolerance.
Answer: B
A. MAC addressing
B. IP addressing
C. Port speed
D. IPv6 addressing
E. Duplex
Answer: CE
A. Fiber optic
B. Wireless
C. CAT5e
D. CAT3
Answer: A
A. Protocol analyzer
B. Multimeter
C. Punch down tool
D. Toner probe
Answer: D
Which of the following is used to create a secure connection between a client and a host?
A. VLAN
B. Proxy server
C. IIS server
D. VPN
Answer: D
Answer: A
A. hypervisor.
B. LPAR.
C. broker.
D. VDI.
Answer: A
A. SNMP v2
B. VPN
C. SYSLOG
D. SMTP
Answer: A
A. net share
B. hostname
C. ipconfig
D. tracert
Answer: C
A. ping
B. nslookup
C. route
D. tracert
Answer: D
A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in the cable pairs
Answer: C
ADSL modem connects to the provider's network using which of the following authentication techniques?
A. PoE
B. MS-CHAP
C. PPPoE
D. EAP
Answer: C
Answer: C
A. Content filter
B. DNS server
C. Load balancer
D. Proxy server
Answer: C
100% Pass Your N10-007 Exam with Our Prep Materials Via below:
https://www.certleader.com/N10-007-dumps.html