Proper study guides for Abreast of the times CompTIA CompTIA Network+ N10-007 certified begins with CompTIA N10-007 preparation products which designed to deliver the Simulation N10-007 questions by making you pass the N10-007 test at your first time. Try the free N10-007 demo right now.

Free N10-007 Demo Online For CompTIA Certifitcation:

NEW QUESTION 1

Which of the following should a technician investigate when using a network baseline to troubleshoot?

  • A. Tracing a network wire connectivity issue from the datacenter to a host.
  • B. Determining if the server performance is degraded.
  • C. Changes that have been made to the network configuration.
  • D. Location of networking equipment in a rack.

Answer: B

NEW QUESTION 2

To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?

  • A. Add a redundant power supply to the switch
  • B. Implement stacking on the switches in the rack
  • C. Add a second UPS into the rack
  • D. Install a power converter for the switch

Answer: A

NEW QUESTION 3

A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)

  • A. Network scan
  • B. Banner grab
  • C. Tracert
  • D. DHCP server check
  • E. Brute-force attack

Answer: AC

NEW QUESTION 4

Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?

  • A. 20
  • B. 53
  • C. 80
  • D. 3389

Answer: B

NEW QUESTION 5

A technician is sent to a remote office to set up a device to connect to the internet. The company Standard
document requires stateful inspection.
Which of the following should the technician install?

  • A. ROUTER
  • B. Multilayer switch
  • C. Firewall
  • D. Bridge

Answer: C

NEW QUESTION 6

Which of the following is used to assign an IP address to a device?

  • A. DHCP
  • B. NTP
  • C. DNS
  • D. RADIUS

Answer: A

NEW QUESTION 7

A network technician has discovered a rogue access point under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?

  • A. Disable unused ports on switches
  • B. Enable DHCP guard to detect rogue servers
  • C. Configure WPA2 on all access points
  • D. Use TACACS+ authentication

Answer: B

NEW QUESTION 8

Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).

  • A. 21
  • B. 22
  • C. 23
  • D. 53
  • E. 67

Answer: BC

NEW QUESTION 9

A critical vulnerable is discovered on a network device. The vendor state it has already patched this vulnerable in its current release. Which of the following actions should an administrator take?

  • A. Change the default password.
  • B. Use a firewall in front of the device.
  • C. Update the firmware.
  • D. Upgrade the configuration.

Answer: B

NEW QUESTION 10

A mobile user is no longer able to access network resources. Jeff, the network technician, is unable to ping the user's workstation. Which of the following commands would MOST likely be used on that workstation to verify its current network settings?

  • A. net share
  • B. hostname
  • C. ipconfig
  • D. tracert

Answer: C

NEW QUESTION 11

Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?

  • A. 21
  • B. 22
  • C. 23
  • D. 25

Answer: A

NEW QUESTION 12

Which of the following is a secure way to connect to a device?

  • A. RSH
  • B. TFTP
  • C. SNMPv2
  • D. SFTP

Answer: D

NEW QUESTION 13

A network technician downloaded new firmware for the company firewall. Which of the following should the network technician verify to ensure the downloaded file is correct and complete?

  • A. File hash
  • B. File date
  • C. File type
  • D. File size

Answer: A

NEW QUESTION 14

A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?

  • A. SSH in tunnel mode
  • B. RDP set to console connection
  • C. EAP-PEAP
  • D. SFTP

Answer: A

NEW QUESTION 15

169.254.1.100 is an IP address which would MOST likely come from which of the following?

  • A. CIDR
  • B. DHCP
  • C. APIPA
  • D. DNS

Answer: C

NEW QUESTION 16

Which of the following is an example of two factor authentication?

  • A. Password, device certificate and PIN
  • B. SSL web server certificate and password
  • C. User password and administrator password
  • D. Password and hardware token OTP

Answer: D

NEW QUESTION 17

Which of the following wireless standards is capable of ONLY operating on 5.8GHz?

  • A. 802.11a
  • B. 802.11b
  • C. 802.11g
  • D. 802.11n

Answer: A

NEW QUESTION 18

A technician is surveying college’s network equipment room and connectivity. Which of the following types of documentation does the technician need perform a detailed site survey? (Select THREE).

  • A. IDF/MDF documentation
  • B. Cable run label documentation
  • C. network configuration documentation
  • D. Performance baseline documentation
  • E. Standard operating procedure documentation
  • F. Change management documentation
  • G. Rack diagram documentation

Answer: ACG

NEW QUESTION 19

A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist?

  • A. Data link
  • B. Network
  • C. Session
  • D. Physical

Answer: B

NEW QUESTION 20

Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?

  • A. Butt set
  • B. Toner probe
  • C. Wire mapper
  • D. Cable certifier

Answer: A

NEW QUESTION 21

Zach, a network technician, is unable to remotely manage or ping certain layer 2 switches. To manage those devices remotely, which of the following will MOST likely need to be configured?

  • A. IP address on the native VLAN interface
  • B. Port security
  • C. Port forwarding
  • D. IP addres on the fiber interface

Answer: A

NEW QUESTION 22

Which of the following DNS record types is an alias?

  • A. CNAME
  • B. PTR
  • C. NS
  • D. SRV

Answer: A

NEW QUESTION 23

After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?

  • A. Punch down tool
  • B. Cable certifier
  • C. Loopback plug
  • D. Toner probe

Answer: B

NEW QUESTION 24

A second router was installed on a network to be used as a backup for the primary router that works as a gateway. The infrastructure team does not want to change the IP address of the gateway on the devices. Which of the following network components should be used in this scenario?

  • A. Loopback IP
  • B. Virtual IP
  • C. Reserved IP
  • D. Public

Answer: B

NEW QUESTION 25

Which of the following connector types would Sandy, a network technician, use to connect a serial cable?

  • A. RJ-11
  • B. BNC
  • C. LC
  • D. DB-9

Answer: D

NEW QUESTION 26

A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?

  • A. LLDP
  • B. VLAN tagging
  • C. QoS
  • D. SIP trunking

Answer: C

NEW QUESTION 27

An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?

  • A. Protocol analyzer
  • B. Butt set
  • C. OTDR
  • D. Toner probe

Answer: B

NEW QUESTION 28

A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?

  • A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
  • B. Adding a fingerprint reader and retina scanner
  • C. Using a smart card and RSA token
  • D. Enforcing a stronger password policy and using a hand geometry scan

Answer: A

NEW QUESTION 29

A technician needs to order cable that meets 10GBaseT and safety requirements for an installation between a drop ceiling and a standard ceiling.
Which of the following should the technician order to ensure compliance with the requirements?

  • A. PVC Cat 5
  • B. Plenum Cat 5e
  • C. Plenum Cat 6a
  • D. PVC Cat 7

Answer: C

Explanation:
10GBaseT A 10 GbE standard designed to run on Cat 6a UTP cabling. Maximum cable length of 100 m.

NEW QUESTION 30

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

  • A. DLP
  • B. AUP
  • C. NDA
  • D. SLA

Answer: A

NEW QUESTION 31
......

P.S. Easily pass N10-007 Exam with 414 Q&As Dumpscollection Dumps & pdf Version, Welcome to Download the Newest Dumpscollection N10-007 Dumps: http://www.dumpscollection.net/dumps/N10-007/ (414 New Questions)