Certification Exam Prep Questions For CompTIA Network + (N10-007)


QuickStart is now offering assessment questions for CompTIA Network + (N10-007). Whether you are deciding which exam to sign up for, or simply want to practice the materials necessary to complete certification for this course, we have provided a practice assessment to better aid in certification. 100% of the questions are real questions; from a recent version of the test you will take for (CompTIA Network + N10-007).


Arrow
 

1

A Company expands its corporate campus and builds new facilities for its warehouse and additional offices The Company needs to run a high bandwidth link between the buildings. The buildings are approximately 4 km about 2.5 miles apart. What kind of cable should the company use ?

A. Cat 5e
Incorrect.
B. Single mode fiber
Correct!
C. Cat 7
Incorrect.
D. Multimode fiber
Incorrect.
2

A company wants to configure a site-to-site VPN link between two offices. Users in each office should have access to resources in the other office, including shared folders and network services. What type of VPN should the company use?

A. IPSec VPN
Correct!
B. TLS VPN
Incorrect.
C. SSL VPN
Incorrect.
D. PPTP VPN
Incorrect.
3

Users report problems connecting to Server A on-site technician suspects a physical fault with a fiber patch coed. Which tool should the technician use to confirm that?

A. Multimeter
Incorrect.
B. TDR
Incorrect.
C. Tone generator
Incorrect.
D. OTDR
Correct!
4

A company is preparing to deploy a wireless LAN (WLAN) in a newly constructed office space. The network design specifies the minimum channel bandwidth requirement as 80 MHz. Which standard should the access points support?

A. 802.11ac
Correct!
B. 802.11a
Incorrect.
C. 802.11b
Incorrect.
D. 802.11g
Incorrect.
5

Which Internet of Things (loT) technology is designed to facilitate touchless payments using passive embedded chips and smart devices?

A. RFID
Incorrect.
B. Bluetooth
Incorrect.
C. Z-Ware
Incorrect.
D. NFC
Correct!
6

In-house technicians plan to emulate a penetration attempt. They want to see if they can learn what services are running on network servers. What should they use?

A. Port scanning
Correct!
B. Traffic analysis
Incorrect.
C. Packet analysis
Incorrect.
D. Vulnerability scanning
Incorrect.
7

A company's wireless network is configured with a single WAP. The number of wireless devices supported has increased rapidly since the company implemented a BYOD policy. Users complain about lagging performance, difficulty connecting, and randomly being kicked off the network. What is the most likely problem?

A. Reflection
Incorrect.
B. Interference
Incorrect.
C. Overcapacity
Correct!
D. Attenuation
Incorrect.
8

A company subscribes to connect all of its offices to the local MAN. The MAN uses a single-mode fiber backbone. The company needs to connect its offices to the backbone. Each office has a wired router with a firewall, a 10/100/1000 switch, and is wired with UTP cable. Each office also has a wireless access point connected to the switch. Which device should the company use to connect to the MAN?

A. Media converter
Correct!
B. Multilayer switch
Incorrect.
C. VPN concentrator
Incorrect.
D. CSU/DSU
Incorrect.
9

An on-site inspection finds that one fiber optic cable exceeds the bend radius that is recommended by the manufacturer. What should be the main concern for the company?

A. Near end crosstalk
Incorrect.
B. Attenuation
Correct!
C. Duplex
Incorrect.
D. EMI
Incorrect.
10

Which type of backup takes the least time and uses the least amount of disk space?

A. Full
Incorrect.
B. Differential
Incorrect.
C. Copy
Incorrect.
D. Incremental
Correct!
11

A company recently implemented a bring your own device (BYOD) policy and is adding security controls over personal devices. The company wants to ensure that some managed apps and most company data will be unavailable when a device leaves the corporate campus. What should the company use to implement this?

A. WPA2
Incorrect.
B. EAP-FAST
Incorrect.
C. Geofencing
Correct!
D. Geotagging
Incorrect.
12

A company's WLAN is configured with one access point (AP) named AP1. AP1 has an SSID of AP1, is configured to use channel 1, and is configured for WPA2-PSK. The company deploys a second AP named AP2 and with an SSID of AP2. The AP is configured to use channel 6 and is configured for WPA2-PSK. It is also configured with a unique IP address range. The remaining configuration settings are left at the defaults. Technical Services discovers that someone has been hacking into AP2 and changing configuration settings. After the settings are corrected, they are changed again in a few days. How should they implement device hardening to prevent this from occurring?

13

A technician has configured a new SSID on an AP using the 5Ghz frequency. He has connected to it with a mobile phone. A test laptop is unable to show the new SSID in the list of available networks. What would be the MOST likely reason for that?

14

Which DNS resource record type is used to identify and locate web servers in a network?

A. CNAME
Incorrect.
B. MX
Incorrect.
C. NS
Incorrect.
D. SRV
Correct!
15

Which mechanism monitors and managers virtual machine intances?

A. Hypervisor
Correct!
B. vNIC
Incorrect.
C. VIP
Incorrect.
D. VLAN
Incorrect.
16

A network administrator has been tasked with deploying a new wireless LAN controller. Which protocol is recommended for integrity checking and encryption?.

A. PSK-TKIP
Incorrect.
B. AES-based CCMP
Correct!
C. TLS
Incorrect.
D. SHA512 with AES
Incorrect.
17

The network team is tasked with hardening the L2 infrastructure. Which two actions should the team perform? (Choose two.)

18

A company is changing its network design as shown in the exhibit. The company plans to deploy a web server and a honeypot in the DMZ. Which two documents does the company need to update? (Choose two.)

19

Most of a company's network administrators are Windows operating system specialists. The company is cross training administrators to help perform periodic management and administrative tasks on Linux servers. This includes as mix of command-line and graphic utilities. Some of the administrators being trained are in remote offices. All trainers are in the company's main office. The administrators being trained log on and work locally from a Linux server. The trainer will connect to the Linux server from a client computer. Both computers need to display the same screen and allow commands and utilities to be used from either computer. Which remote connection technology should the trainers use?

A. Telenet
Incorrect.
B. VNC
Correct!
C. RDP
Incorrect.
D. SSH
Incorrect.
20

A company is upgrading its network security. It wants to consolidate content filtering and intrusion detection in a single device and add additional security functionality, including data loss prevention (DLP). What type of device should the company use?

A. VoIP gateway
Incorrect.
B. UTM appliance
Correct!
C. Multilayer switch
Incorrect.
D. Proxy server
Incorrect.
21

What is the first step when troubleshooting a network problem?

22

Which mechanism is used to elect a root bridge in the network?

A. Root guard
Incorrect.
B. VTP
Incorrect.
C. BPDU
Correct!
D. 802.1x
Incorrect.
23

Network devices in one area of the building experience communication problems. A cable tester shows that the signal on the RX pairs is lower than expected. What is this indication of?

A. EMI
Incorrect.
B. Latency
Incorrect.
C. Crosstalk
Incorrect.
D. Attenuation
Correct!
24

A recent network audit has highlighted the security issues on the access point shown in the exhibit. What should the company do?

25

A security audit highlights some security concerns in a newly deployed SDN process. One of the scripts uses the verify md5 command to check the image integrity, and uploads it to a server using FTP. What should the company do to address the security concerns?

26

A company must implement additional monitoring and analysis to meet compliance requirements relating to work done for new customers. The company needs a solution that can collect log, event. and other security information from a variety of sources and correlate and analyze the data to identify threats. It should provide for long-term storage of the data collected and be able to identify trending threats. What type of device solution should the company use?

A. IDS
Incorrect.
B. SIEM
Correct!
C. Server Log
Incorrect.
D. SNMP
Incorrect.
27

A consultant is setting up a SOHO for a customer. The customer's local cable TV provider will be the network ISP. Which device should be used to connect to the cable signal?

A. Media converter
Incorrect.
B. Bridge
Incorrect.
C. Switch
Incorrect.
D. Modem
Correct!
28

A company wants to create a site-to-site VPN. Maximum security is required. Which set of protocols should the company use?

29

Which policy sets guidelines for allowing employees to use their own personal devices for work-related tasks?

A. AUP
Incorrect.
B. SLA
Incorrect.
C. BYOD
Correct!
D. NDA
Incorrect.
30

A large organization has offices in several locations around the world. Each geographic location has primary responsibility for its network administration and management. The company wants to ensure consistent instructions and management throughout the company. What should the company use to help ensure this?

A. SLA
Incorrect.
B. Standard operating procedures
Correct!
C. Network configuration baselines
Incorrect.
D. AUP
Incorrect.
PDP Url

N10-007 Sample Question - CompTIA Network plus


Beginner

Difficulty

Course Info

Download PDF

Certificate

See Sample

Buy Individually
Courses Offered In This Certification

Outline

More Information

More Information
Lab Access No
Difficulty Beginner
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here