Exam N10-007 :CompTIA Network+ N10-007, exam N10-007 learning materials and study guide materials

DESCRIPTION:
CompTIA Network+ N10-007, provides the basic knowledge needed to plan, install, maintain, and troubleshoot modern networks in a vendor-neutral format; this includes physical network components and technologies, logical structures, common protocols, and network security. This course maps to the CompTIA Network+ N10-007 certification exam. Exam objective coverage is marked throughout the course. 

 

N10-007 Questions & Answer:

535 Questions & Answers
Includes questions types found on actual exam .

Three versions are available by us, PDF wersion, Soft test engine and App version. 

Here are some free demo:

NEW QUESTION: 1
A device operating at Layer 3 of the OSI model uses which of the following protocols to
determine the path to a different network?
A. RTP
B. NTP
C. RIP
D. SIP
E. STP
Answer: C

NEW QUESTION: 2
A technician is connecting a PC to a switchport. At the wiring closet, the technician is identify
which cable goes from patch panel a connected to the switch to patch panel B connected to the PC.
Which of the following tools should the technician use to resolve the issue?
A. Cable tester
B. Multimeter
C. Tone generator
D. OTDR
Answer: C

NEW QUESTION: 3
CORRECT TEXT
Your company recently purchased a new building down the street from the existing office.
For each of the tasks below, select the appropriate antenna type and encryption object for all
wireless access point (AP).
1. Create an encrypted wireless connection between the two buildings that BEST controls signal
propagation, while maximizing security.
2. Restrict the wireless signal generated by the access points (APs) inside Building 1, so that it
minimizes broadcast beyond the building.
3. Maximize wireless coverage inside Building 1.
4. Building 1's internal wireless network is for visitors only and must not require any special
configuration on the visitor's device to connect.
Instructions: When you have completed the simulation, select the Done button to submit.
Answer:
See explanation below.
Explanation:
Answer is as below in image.

NEW QUESTION: 4
Which of the following layers of the OSI model is between the Data Link and Transport layers?
A. Network
B. Session
C. Physical
D. Application
Answer: A

NEW QUESTION: 5
Which of the following devices exist as either hardware or software to assist in routing
traffic? (Select TWO).
A. Cable modern
B. Layer 2 switch
C. Router
D. Layer 3 switch
E. NIDS
Answer: C,D

NEW QUESTION: 6
A typical cell tower will have microwave and cellular antennas. Which of the following
network topologies do these represent? (Choose two.)
A. Peer-peer
B. Bus
C. Point-to-multipoint
D. Ring
E. Point-to-point
F. Mesh
Answer: E,F

NEW QUESTION: 7
Which of the following network devices restricts traffic based on words, signatures, and URLs?
A. Traffic analyzer
B. Content filter
C. Load balancer
D. Layer 2 switch
Answer: B

NEW QUESTION: 8
After a server outage, a technician discovers that a physically damaged fiber cable appears to
be the problem.
After replacing the cable, the server will still not connect to the network.
Upon inspecting the cable at the server end, the technician discovers light can be seen through one
of the two fiber strands.
Which of the following should the technician do FIRST to reconnect the server to the network?
A. Move the fiber cable to different port on the switch where both strands function
B. Reverse the fiber strands of the cable and reconnect them to the server
C. Replace the server's single-mode fiber cable with multimode fiber
D. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
Answer: B

NEW QUESTION: 9
Which of the following should current network performance be compared against to
determine network anomalies?
A. Traffic analysis
B. Logs
C. Baseline
D. Packet capture
Answer: C

NEW QUESTION: 10
A network technician has just configured NAC for connections using Cat 6 cables.
However, none of the Windows clients can connect to the network.
Which of the following components should the technician check on the Windows workstations?
(Choose two.)
A. Enable IEEE 802.1x Authentication in Network Interface Card Properties
B. Enable IEEE 802.3 Ethernet IPv6 in Network Interface Card Properties
C. Enable IEEE 802.1q Authentication in Network Interface Card Properties
D. Start the Wireless AutoConfig service in the Services console
E. Start the Wired AutoConfig service in the Services console
Answer: A,E

NEW QUESTION: 11
Which of the following MUST be implemented to share metrics between routing protocols
within the same router?
A. Routing loop
B. Routing table
C. Dynamic routes
D. Route redistribution
Answer: B

NEW QUESTION: 12
A network technician receives a call from a branch office about a problem with its wireless
connectivity.
The user states the office hosting a large meeting that includes some online training with local
businesses.
The guest users have all brought devices to connect to the guest network at the branch office.
All users are connected to a single WAP and are reporting that connections dropping and network
speeds are unusable.
Which of the following is the MOST likely cause of this issue?
A. DCHP exhaustion
B. Interference
C. Chanel overlapping
D. Overcapacity
Answer: B

NEW QUESTION: 13
Which of the following describes a DNS server?
A. Caches commonly viewed web pages
B. Translates an IP address to a name
C. Provides port security for a network
D. Assigns IP addresses to network devices
Answer: B

NEW QUESTION: 14
A single PRI can deliver multiple voice calls simultaneously using which of the following Layer
1 technologies?
A. Analog circuit switching
B. Time division multiplexing
C. CSMA/CD
D. Time division spread spectrum
Answer: B

NEW QUESTION: 15
A network technician is deploying mobile phones for a company's sales staff.
Salespeople frequently travel nationally and internationally to meet with clients, and often have to
roam or switch cellular providers. Which of the following standards is the BEST option to fit the
requirements?
A. CDMA
B. PSTN
C. TDM
D. GSM
E. MIMO
Answer: D

NEW QUESTION: 16
A systems administrator has recently purchased and installed a large electronic signage screen
for the company's parking garage. The screen's management software was installed on a server with
public IP address to allow remote management. The systems administrator is now troubleshooting an
issue with the screen displaying unknown, random, and inappropriate messages. Which of the
following is MOST effective in resolving this issue?
A. Disabling unnecessary services from the server and management software
B. Changing the management software's default credentials
C. Changing the management software's default port
D. Replacing the management software's self-signed certificate with a valid certificate
Answer: B

NEW QUESTION: 17
Which of the following default ports would need to be open on a firewall to allow remote
desktop access?
A. 143
B. 8080
C. 3389
D. 443
Answer: C

NEW QUESTION: 18
Which of the following devices are MOST often responsible for 1q tagging? (Select TWO).
A. Router
B. Hub
C. IPS
D. Switch
E. IDS
F. Network tap
Answer: A,D

NEW QUESTION: 19
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in
the parking lot.
Management requests that the wireless network be changed so it is no longer accessible in public
areas, without affecting the availability inside the building. Which of the following should be changed
on the network?
A. Overcapacity
B. Distance limitations
C. Power levels
D. Channel overlap
Answer: C

NEW QUESTION: 20
Which of the following can be done to implement network device hardening (Select TWO).
A. Perform backups
B. Patch and update
C. Implement spanning tree
D. Enable port mirroring
E. Perform VLAN hopping
F. Change default admin password
Answer: B,F
Explanation:
Network devices come with default credentials, the username and password that enables you to log
into the device for configuration. Changing default credentials should be the first step in hardening a
new device. As with any other system, avoiding common passwords adds security.
Keep network devices up to date. That means upgrading firmware, patching and updating as
necessary to close any security gaps exposed over time.
Services on network devices like routers include common things, like Telnet and HTTP access; and
also things you don't normally see, like TCP and UDP small services, debugging and testing tools that
primarily use ports 20 and lower. If enabled, these services can be used to launch DoS and other
attacks. All modern Cisco devices have these disabled; Cisco's hardening rules insist on disabling
unnecessary services.
Using secure protocols hardens network devices. Don't use Telnet to access a managed switch or
router, for example, but use SSH so that the communication is encrypted.
Disabling unused ports on network devices enhances port security for access control.
This includes standard IP ports and device ports, both physical and virtual for the latter.

More relating information about exam N10-007, you can scan: 

https://www.testsimulate.com/N10-007-study-materials.html