kk Flashcards
11. A network technician is working on a proposal for email migration from an on-premises email system to a vendor-hosted email in the cloud. The technician needs to explain to management what type of cloud model will be utilized with the cloud-hosted email. Which of the following cloud models should the technician identify in the proposal? A. IaaS B. PaaS C. SaaS D. MaaS
C. SaaS
12. Which of the following is the correct port number for NTP? A. 25 B. 69 C. 123 D. 161
C. 123
A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?
A. Bridge
B. Access point
C. Router
D. Range extender
C. Router
1. A network technician receives a call from a user who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced to the network? A. Rogue DHCP server B. Evil twin C. VLAN mismatch D. Honeypot
A. Rogue DHCP server
- A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?
A. Reverse the wires leading to pins 1 and 2
B. Reverse the wires leading to pins 1 and 3
C. Reverse the wires leading to pins 2 and 3
D. Reverse the wires leading to pins 2 and 4
D. Reverse the wires leading to pins 2 and 4
3. An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domain that exist? A. 3 B. 12 C. 13 D. 14 E. 15
D. 14
4. A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection? A. SSH in tunnel mode B. RDP set to console connection C. EAP-PEAP D. SFTP
A. SSH in tunnel mode
5. Which of the following should current network performance be compared against to determine network anomalies? A. Baseline B. Traffic analysis C. Packet capture D. Logs
A. Baseline
6. A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.) A. TCP 25 B. TCP 110 C. TCP 143 D. TCP 389 E. TCP 587 F. TCP 993 G. TCP 995
E. TCP 587
F. TCP 993
G. TCP 995
- After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do FIRST to reconnect the server to the network?
A. Reverse the fiber strands of the cable and reconnect them to the server
B. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
C. Replace the server’s single-mode fiber cable with multimode fiber
D. Move the fiber cable to a different port on the switch where both strands function
A. Reverse the fiber strands of the cable and reconnect them to the server
- The backups server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician suspects the performance issues are network related. Which of the following should the technician do to improve performance?
A. Utilize UDP to eliminate packet overhead
B. Turn off MDIX settings on the NAS and server switchports
C. Enable jumbo frames on the NAS and server
D. Encapsulate the storage traffic in a GRE tunnel
C. Enable jumbo frames on the NAS and server
9. A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router? A. 192.168.0.55 B. 192.168.1.0 C. 192.168.1.1 D. 192.168.5.5 E. 255.255.255.0
C. 192.168.1.1
10. A network technician is able to connect the switches between to offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication? A. Bridge B. Access point C. Router D. Range extender
C. Router
13. A technician is upgrading the firmware on an older KVM switch. The specifications call for a serial port to connect to the computer on one side, and an Ethernet jack to connect to the switch on the other side. Which of the following connectors does the technician need for this cable? (Choose two.) A. RG-9 B. DB-9 C. RJ-11 D. DB-25 E. RJ-45 F. BNC
B. DB-9
E. RJ-45
14. An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy? A. DHCP relay B. DHCP exclusion C. DHCP option D. DHCP reservation
D. DHCP reservation
15. A technician is planning a remote-access strategy to manage routers and switches on a dedicated management network. The management network is segregated from the production network and uses site-to-site VPN connections. Some of the equipment does not support encryption. Which of the following should the technician choose that all the equipment would support? A. Telnet B. SSL C. SSH D. IPSec
A. Telnet
16. Which of the following protocols do MOST MITM attacks utilize? A. ARP B. SIP C. FTP D. SCP
A. ARP
17. An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on the ISP switch, and there is no corresponding MAC address present. Instead, the entry is “Incomplete”. Which of the following could cause this condition? A. VLAN mismatch B. Duplex/Speed mismatch C. Duplicate IP address D. TX/RX reverse
B. Duplex/Speed mismatch
- A systems administrator has recently purchased and installed a large electronic signage screen for the company’s parking garage. The screen’s management software was installed on a server with public IP address to allow remote management. The systems administrator is now troubleshooting an issue with the screen displaying unknown, random, and inappropriate messages. Which of the following is MOST effective in resolving this issue?
A. Changing the management software’s default credentials
B. Disabling unnecessary services from the server and management software
C. Changing the management software’s default port
D. Replacing the management software’s self-signed certificate with a valid certificate
A. Changing the management software’s default credentials
19. A technician is investigating a server performance issue. The technician has gathered the server utilization statistics. Which of the following should the technician use to determine which statistics are not in the normal range? A. Baseline review B. Vulnerability scan C. System life-cycle report D. Archiving logs
A. Baseline review
20. Which of the following devices, if implemented, would result in decreased administration time of an 802.11 network running centralized authentication services? (Choose two.) A. VPN concentrator B. Proxy server C. Wireless controller D. RADIUS server E. Multilayer switch
C. Wireless controller
D. RADIUS server
21. A technician must determine if a web page user’s visits are connecting to a suspicious website’s IP address in the background. Which of the following tools would provide the information on TCP connections? A. netstat B. tracert C. arp D. ipconfig E. route
A. netstat
22. An administrator is moving to a new office. There will be several network runs through the ceiling area of the office. Which of the following is the BEST to utilize in these areas? A. Single-mode fiber-optic cabling B. Cat 5e-rated cabling C. Cat 6-rated cabling D. Plenum-rated cabling
D. Plenum-rated cabling
23. A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs between devices. Which of the following tools are MOST likely needed to complete the task? (Choose three.) A. Wire stripper B. Cable crimper C. RJ-11 connectors D. RJ-45 connectors E. Multimeter F. Punchdown tool G. Tone generator
A. Wire stripper
B. Cable crimper
D. RJ-45 connectors
24. As part of a transition from a static to a dynamic routing protocol on an organization’s internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.) A. OSPF B. IS-IS C. RIPv1 D. BGP E. VRRP
A. OSPF
B. IS-IS
- A telecommunications provider has just deployed a new OC-12 circuit at a customer site. While the circuit showed no errors from the provider end to the customer’s demarcation point, a network administrator is trying to determine the cause of dropped packets and errors on the circuit. Which of the following should the network administrator do to rule out any problems at Layer 1? (Choose two.)
A. Use a loopback at the demark and router, and check for a link light
B. Use an OTDR to validate the cable integrity
C. Use a pinout tester to validate the cable integrity
D. Use a multimeter to validate the cable integrity
E. Check for any devices that may be causing EMI on the cable
F. Clean the cables to be sure they are free of dust and debris
A. Use a loopback at the demark and router, and check for a link light
B. Use an OTDR to validate the cable integrity
26. A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies? A. Time division multiplexing B. Analog circuit switching C. CSMA/CD D. Time division spread spectrum
A. Time division multiplexing
27. A network technician is diagnosing a time-out issue generated from an end user’s web browser. The web browser issues standard HTTP get and post commands to interact with the website. Given this information, the technician would like to analyze the entire TCP handshake of the HTTP requests offline. Which of the following tools would allow the technician to view the handshake? A. Packet analyzer B. Port analyzer C. SNMP traps D. Spectrum analyzer
A. Packet analyzer
- A customer cannot access a company’s secure website. The company’s network security is reviewing the firewall for the server and finds the following output:
CompTIA Network Certification Exam N10-007 Questions and Answers 1
Which of the following changes should be made to allow all customers to access the company’s secure website? A. Allow any any 10.5.0.10 443 B. Allow any any 12.73.15.5 443 C. Allow 10.5.0.10 443 any any D. Allow 10.5.0.10 any 10.5.0.10 80
C. Allow 10.5.0.10 443 any any
29. Which of the following MUST be implemented to share metrics between routing protocols within the same router? A. Routing loop B. Routing table C. Route redistribution D. Dynamic routes
B. Routing table
- An engineer is reviewing the implementation requirements for an upcoming project. The basic requirements identified by the customer include the following:
WLAN architecture supporting speeds in excess of 150 Mbps
Clientless remote network access
Port-based network access control
Which of the following solution sets properly addresses all of the identified requirements? A. 802.11a, IPSec VPN, 802.1x B. 802.11ac, MPLS, 802.3 C. 802.11b, PPTP, 802.1x D. 802.11g, MS-CHAP, 802.16 E. 802.11n, SSL-VPN, 802.1x
E. 802.11n, SSL-VPN, 802.1x
31. Which of the following would be the MOST efficient subnet mask for a point-to-point link? A. /28 B. /29 C. /31 D. /32
C. /31
- An office user cannot access local network drives but has full access to the Internet. A technician troubleshoots the issue and observes the following output of the ipconfig command:
CompTIA Network Certification Exam N10-007 Questions and Answers 2
Which of the following would MOST likely allow the network drives to be accessed? A. Update the WLAN adapter driver B. Disable the WLAN adapter C. Check the wireless DHCP configuration D. Disable the LAN adapter
B. Disable the WLAN adapter
33. Ann, a network technician, has just installed a fiber switch in a datacenter. To run the fiber cabling, Ann plans the cable route over the top of the rack using the cable trays, down to the switch, coiling up any excess cable. As Ann configures the switch, she notices several messages in the logging buffer stating the receive signal of the SFP is too weak. Which of the following is MOST likely the cause of the errors in the logging buffer? A. Bend radius exceeded B. Fiber cable mismatch C. Fiber type mismatch D. Bad fiber switch
A. Bend radius exceeded
34. Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.) A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n
B. 802.11ac
E. 802.11n
35. A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements? A. 10.5.4.0/22 B. 10.233.2.0/23 C. 172.16.0.0/22 D. 172.18.0.0/23 E. 192.168.25.0/24
D. 172.18.0.0/23
36. A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate? A. Air flow and cooling B. UPS capability C. Circuit labeling D. Power redundancy
A. Air flow and cooling
37. Which of the following DNS records needs to be configured for SMTP traffic? A. MX B. CNAME C. AAAA D. PTR
A. MX
- In which of the following ways does a DDoS attack differ from a spoofing attack?
A. DDoS attacks target multiple networks
B. Spoofing attacks originate from a single host
C. DDoS attacks are launched from multiple hosts
D. Spoofing attacks require physical presence
C. DDoS attacks are launched from multiple hosts
39. A user checks an IP address using an external website. The address is different than the one the user sees when opening a command prompt and typing in ipconfig/all. The user does not understand why the two tools show different IP addresses. This is BEST explained by the interworking of: A. network devices B. packet flow C. public/private networks D. traffic-routing protocols
C. public/private networks
40. Which of the following communication media can carry many voice, data, and video channels simultaneously over multiple frequencies? A. Broadband B. Baseband C. Analog modem D. CSMA
A. Broadband
- To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?
A. Add a redundant power supply to the switch
B. Implement stacking on the switches in the rack
C. Add a second UPS into the rack
D. Install a power converter for the switch
A. Add a redundant power supply to the switch
42. A forensic first responder arrives at the scene where an employee is suspected to have committed a computer-based crime. Which of the following should the first responder do FIRST? A. Document the scene B. Take pictures upon arrival C. Secure the area D. Implement chain of custody
C. Secure the area
43. A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement? A. LAN B. PAN C. MAN D. WAN
C. MAN
- An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?
A. An NDA ensuring work data stored on the personal phone remains confidential
B. An AUP covering how a personal phone may be used for work matters
C. A consent to monitoring policy covering company audits of the personal phone
D. Real-time remote monitoring of the phone’s activity and usage
D. Real-time remote monitoring of the phone’s activity and usage
45. Which of the following protocols can be both connection-oriented and connectionless? A. 20 FTP B. 53 DNS C. 67 DHCP D. 80 HTTP
B. 53 DNS
- Which of the following BEST describes the differences between VLAN hopping and session hijacking?
A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access.
Session hijacking involves overriding a user’s web connection to execute commands
B. VLAN hopping is a brute force attack executed to gain additional access.
Session hijacking involves physically disrupting a network connection
C. VLAN hopping involves overriding a user network connection to execute malicious commands.
Session hijacking involves compromising a host to elevate privileges
D. VLAN hopping is the act of exploiting poor VLAN tagging.
Session hijacking is a web-based attack aimed at privilege escalation
A. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access.
Session hijacking involves overriding a user’s web connection to execute commands
47. An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization’s network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization’s guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario? A. Bluesnarfing B. Session hijacking C. MAC spoofing D. VLAN hopping E. Man-in-the-middle
E. Man-in-the-middle
- A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)
A. Document the reason for the request
B. Scan the file for malware to protect the sales department’s computers
C. Follow the company’s approval process for the implementation
D. Install a TFTP server for the customers to use for the transfer
E. Create a honeypot to store the file on for the customers to use
F. Write the SLA for the sales department authorizing the change
A. Document the reason for the request
C. Follow the company’s approval process for the implementation
49. A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users’ laptops. Which of the following issues should be reviewed to help the user to connect to the wireless network? A. Wireless switch toggled off B. WAP settings C. WLAN IP address out of scope D. Wireless controller misconfiguration
A. Wireless switch toggled off
- A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?
A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
B. Adding a fingerprint reader and retina scanner
C. Using a smart card and RSA token
D. Enforcing a stronger password policy and using a hand geometry scan
A. Adding a fingerprint reader to each workstation and providing a RSA authentication token
51. A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements? A. DOCSIS modem B. Wireless router C. DSL modem D. Access point
A. DOCSIS modem
52. A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company network shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem? A. Network maps B. Cable management C. Release notes D. Change management
D. Change management
53. Which of the following VPN protocols establishes a secure session that can be initiated using a browser? A. IPSec B. SSL VPN C. PTP D. PPTP
B. SSL VPN
- A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the BEST steps for the technician to take with minimum overhead configuration? (Choose two.)
A. Enable SSID broadcasting to identify the guest network
B. Configure visitor devices to use static IP addresses
C. Enable two-factor authentication on visitor devices
D. Configure the access point to use WPA2-AES encryption
E. Ensure the access point is not running in mixed mode
A. Enable SSID broadcasting to identify the guest network
B. Configure visitor devices to use static IP addresses
55. When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement? A. iSCSI B. Fibre Channel C. NAS D. DAS
C. NAS
56. A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have? A. LC B. ST C. SC D. MTRJ E. MTP
B. ST
57. Which of the following WAN technologies utilizes the concept of virtual circuits and pointmultipoint connections? A. ISDN B. MPLS C. PRI D. Broadband cable E. Frame relay
E. Frame relay
- A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed. Which of the following BEST explains this response?
A. The ports belong to an active system and are denying requests
B. The ports are associated with deprecated services
C. The ports do not belong to a live system
D. The ports replied with a SYN/ACK response
B. The ports are associated with deprecated services
- Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to occur most often around midday. Which of the following is the MOST likely cause?
A. There is interference from small appliances
B. The signal coverage area is too small
C. Not enough DHCP addresses have been allotted
D. The DNS cache on the users’ computers has become corrupt
C. Not enough DHCP addresses have been allotted
60. A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located? A. Network B. Physical C. Transport D. Application
A. Network
61. Which of the following physical security controls is MOST likely to be susceptible to a false positive? A. Identification card B. Biometric device C. Proximity reader D. Video camera
C. Proximity reader
- An assistant systems analyst reports the following findings of an investigation of slow Internet connections in a remote office to the senior systems analyst:
CompTIA Network Certification Exam N10-007 Questions and Answers 3
Which of the following devices is causing the issue? A. Router B. Firewall C. Switch 1 D. Switch 2
B. Firewall
- A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the application. Which of the following would be the MOST cost effective for the administrator to recommend?
A. Create Ethernet VLANs
B. Disable autonegotiation on the servers
C. Install 10Gb Ethernet NICs in the servers
D. Install Fibre Channel for the server network
C. Install 10Gb Ethernet NICs in the servers
64. A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web browser. Only secure protocols should be used, and only the necessary ports should be open. Which of the following ACL rules should be configured in the firewall’s WAN port? (Choose two.) A. Permit 192.168.1.143.25 B. Permit 192.168.1.143.80 C. Permit 192.168.1.143.110 D. Permit 192.168.1.143.143 E. Permit 192.168.1.143.443 F. Permit 192.168.1.143.587
E. Permit 192.168.1.143.443
F. Permit 192.168.1.143.587
65. A network administrator needs to transmit traffic to geographically diverse sites to improve performance. Which of the following devices would BEST direct traffic to the remote sites? A. Hub B. Bridge C. Switch D. Router
D. Router
- Which of the following should a technician investigate when using a network baseline to troubleshoot?
A. Tracing a network wire connectivity issue from the datacenter to a host.
B. Determining if the server performance is degraded.
C. Changes that have been made to the network configuration.
D. Location of networking equipment in a rack.
B. Determining if the server performance is degraded.
- A technician needs to upgrade a SOHO wireless router’s firmware. The technician resets the router to factory settings and installs the new firmware. The technician enters the DHCP information and sets the SSID. Which of the following configurations would provide the MOST protection from advanced hackers?
A. Disable the broadcasting of the SSID.
B. Enable WPA2 authentication for all hosts.
C. Use private addressing for the DHCP scope.
D. Install unidirectional antennas.
B. Enable WPA2 authentication for all hosts.
68. A technician notices clients are receiving a 169.254.x.x IP address following the upgrade of a server. Which of the following ports should the technician check on the local server firewall? A. ports 20 and 21 B. ports 67 and 68 C. ports 80 and 443 D. port 123 and 8080
B. ports 67 and 68
69. Which of the following datacenter security methodologies is MOST likely to remain usable during a network outage? A. biometric scanners B. door locks C. video surveillance D. motion detectors
B. door locks
70. A network technician is implementing a solution on the network to hide the workstation internal IP addresses across a WAN. Which of the following is the technician configuring? A. QoS B. DMZ C. RIP D. NAT
D. NAT
71. Employees want the ability to use personal devices on the guest network while working out at the company gym. In order to meet the request, which of the following policies requires employee adherence? A. AUP B. SLA C. NDA D. MOU
A. AUP
72. Which of the following BEST describes the BGP routing protocol? A. distance vector B. hybrid C. static D. link state
B. hybrid
73. A customer is reporting difficulty connecting some devices after replacing a wireless router with a new wireless 802.11ac router. The SSID, encryption and password are the same as the previous router. A technician goes on-site and notices the devices that are no longer connecting appear to be several years ago. Which of the following is MOST likely the problem? A. the password needs to be re-entered. B. there is a security type mismatch. C. there is insufficient antenna power. D. there is a frequency mismatch. E. the channel has changed.
D. there is a frequency mismatch.
74. Which of the following functions would be used to securely monitor and actively manage external connections? A. VPN concentrator B. HIDS C. Load balancer D. Packet shaper
A. VPN concentrator
75. A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP’s router IP address. Which of the following is the MOST likely problem? A. Faulty crossover cable B. DNS server is down C. Switching loop D. Outside interface shutdown
D. Outside interface shutdown
76. Which of the following commands will display the associated IP address of a network adapter in Windows and Linux environments? (Select TWO). A. dig B. nslookup C. nbstat D. ifconfig E. ipconfig
D. ifconfig
E. ipconfig
77. When querying a DNS server for an AAAA record, which of the following is an appropriate response? A. 192.168.2.1 B. 00:f3:82:99:a2:b8 C. 61.23.168.192.in-addr.arpa D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
D. 3ffe:1900:4545:3:200:f8ff:fe21:67cf
- A computer on VLAN 10 with the IP address of 192.168.1.45/27 cannot ping a computer on VLAN 20 with the IP address of 192.168.1.65/27. Which configuration change will allow the PING to be successful?
A. Replace the router with a Layer 2 switch that supports VLANs
B. Change VLAN 20 computers Default Gateway to 192.168.1.127/27
C. Change VLAN 10 computers Default Gateway to 192.168.1.32/27
D. AllowICMP to pass through the Router
D. AllowICMP to pass through the Router
79. Which of the following network devices restricts traffic based on words, signatures, and URLs? A. Layer 2 switch B. Content filter C. Load balancer D. Traffic analyzer
B. Content filter
- A new firewall was recently installed blocking SMTP traffic. As a result, no one has Internet access.
Which of the following has MOST likely occurred?
A. Port security is blocking all traffic.
B. An IDS is blocking all traffic.
C. Implicit deny is blocking all traffic.
D. SMTP is blocking all traffic.
C. Implicit deny is blocking all traffic.
- Please refer to the attached exhibit.
Which of the following types of configuration management documentation is represented?
CompTIA Network Certification Exam N10-007 Questions and Answers 4
A. Network security policy
B. Network baseline
C. Logical network diagram
D. Wiring schematic
C. Logical network diagram
82. A user is unable to open up websites on the Internet from a browser. The administrator determines that the workstation can ping its local gateway, but not the remote web server. At which of the following layers of the OSI model does the problem MOST likely exist? A. Data link B. Network C. Session D. Physical
B. Network
83. Which of the following uses types and codes rather than ports? A. EIGRP B. ICMP C. UDP D. IPv6
B. ICMP
- A technician, Joe, visits a site that has reported a network down emergency. He immediately reboots the switches and the router since the network is down. Which of the following network troubleshooting methodology steps should Joe have performed FIRST?
A. Determine if anything has changed
B. Once a theory is confirmed determine the next step is to resolve the problem
C. Implement the solution or escalate as necessary
D. the obvious
A. Determine if anything has changed
85. Which of the following defines an IP address that is NOT routed on the Internet? A. Multicast B. Public C. Private D. Classful
C. Private
86. Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue? A. Spam filter B. Protocol analyzer C. Web application firewall D. Load balancer
B. Protocol analyzer
87. Which of the following specifications would Sara, an administrator, implement as a network access control? A. 802.1q B. 802.3 C. 802.11n D. 802.1x
D. 802.1x
88. Which of the following is characterized by an attacker attempting to map out an organization’s staff hierarchy in order to send targeted emails? A. Whaling B. Impersonation C. Privilege escalation D. Spear phishing
A. Whaling
89. Which of the following defines when Pete, an attacker, attempts to monitor wireless traffic in order to perform malicious activities? A. XSS B. SQL injection C. Directory traversal D. Packet sniffing
D. Packet sniffing
90. Which of the following provides the MOST protection against zero day attacks via email attachments? A. Anti-spam B. Anti-virus C. Host-based firewalls D. Patch management
A. Anti-spam
- Which of the following access controls enforces permissions based on data labeling at specific levels?
A. Mandatory access control
B. Separation of duties access control
C. Discretionary access control
D. Role based access control
A. Mandatory access control
- A username provides which of the following?
A. Biometrics
B. Identification
C. Authorization
D. Authentication
B. Identification
- Use of group accounts should be minimized to ensure which of the following?
A. Password security
B. Regular auditing
C. Baseline management
D. Individual accountability
D. Individual accountability
- Privilege creep among long-term employees can be mitigated by which of the following procedures?
A. User permission reviews
B. Mandatory vacations
C. Separation of duties
D. Job function rotation
A. User permission reviews
- Which of the following wireless standards is capable of ONLY operating on 5.8GHz?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A. 802.11a
- Which of the following protocols are used to connect devices in a secure manner? (Select TWO).
A. TELNET B. SSH C. RDP D. HTTP E. DNS F. FTP
B. SSH
C. RDP
- Which of the following provides the use of a secure tunnel for telecommuting without manually installing and configuring encryption software?
A. RDP
B. SSL VPN
C. ISAKMP
D. TLS 2.0
B. SSL VPN
- Which of the following is based ENTIRELY on using ICMP packets?
A. Social engineering
B. NMAP
C. Buffer overflow attack
D. Smurf attack
D. Smurf attack
- Which of the following could be used to stop unknown threats?
A. DMZ
B. Signature based IPS
C. Behavior based IPS
D. Honeypots
C. Behavior based IPS
- Which of the following describes a DNS server?
A. Translates an IP address to a name
B. Caches commonly viewed web pages
C. Assigns IP addresses to network devices
D. Provides port security for a network
A. Translates an IP address to a name
- A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem?
IP address: 172.16.204.12 Subnet Mask: 255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1 Broadcast address: 172.16.255.255
A. DNS address B. Subnet mask C. Default gateway D. Broadcast address E. IP address
C. Default gateway
- A technician recently fixed a computer with several viruses and spyware programs on it and notices the Internet settings were set to redirect all traffic through an unknown proxy. This type of attack is known as which of the following?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Shoulder surfing
C. Man-in-the-middle
- Which of the following is the BEST way to mitigate security threats on a network?
A. Social engineering
B. User training
C. Incident response
D. Man-in-the- middle
B. User training
- Which of the following devices should be installed on a network to monitor the presence of and actively defend against attacks?
A. An IPS
B. A protocol analyzer
C. A traffic shaper
D. An IDS
A. An IPS
- Which of the following is an IPv6 address?
A. 00:14:38:05:7B:E5
B. 10.10.1.1
C. 192.168.1.1
D. 2001:cdba::3257:9652
D. 2001:cdba::3257:9652
- A company has a large number of employees that need VPN access from home. Which of the following is the BEST solution for deploying and managing the remote access?
A. Site-to-site VPN
B. Network-based firewall
C. SSL VPN
D. Host-based firewall
C. SSL VPN
- Which of the following is a routed protocol that functions at layer 3 of the OSI model?
A. IP
B. Frame relay
C. PPP
D. ADSL
A. IP
- Something you have, something you are, and something you know are the three tenets of:
A. Social engineering
B. Change management
C. Remote access
D. Access control
D. Access control
- A firewall that operates at Layer 7 of the OSI model is known as a(n):
A. Circuit gateway
B. Packet filter
C. Application level
D. Redundant firewall
C. Application level
- Which of the following allows a central point to simultaneously address other points without addressing all of them?
A. Multicast
B. Subnetting
C. Unicast
D. Broadcast
A. Multicast
- Which of the following connector types would Sandy, a network technician, use to connect a serial cable?
A. RJ-11
B. BNC
C. LC
D. DB-9
D. DB-9
- Which of the following are network topologies? (Select TWO).
A. Ethernet B. Duplex C. Star D. Circular E. Bus
C. Star
E. Bus
- Which of the following MUST be kept synchronized in order for Kerberos to work?
A. Certificate
B. Ticket
C. Time
D. Token
C. Time
- Which of the following MUST be used when securing a VoIP network consisting of private IP addresses?
A. IPS
B. Application layer firewall
C. IDS
D. An unmanaged switch
B. Application layer firewall
- Which of the following uses certificates as a form of security?
A. Kerberos
B. LDAP
C. PKI
D. CHAP
C. PKI
- Which of the following cables will MOST likely be used to connect to a satellite dish?
A. RG-6
B. CAT5e
C. Fiber
D. CAT6
A. RG-6
- A VoIP line will MOST likely have which of the following connectors?
A. RJ-11
B. DB-25
C. BNC
D. RJ-45
D. RJ-45
- Which of the following is a proprietary routing protocol?
A. RIP
B. EIGRP
C. OSPF
D. BGP
B. EIGRP
- Which of the following is an invalid MAC address?
A. AA:CE:58:FD:90:08
B. 44:98:3E:F8:33:23
C. 56:AD:BX:89:55:54
D. 94:9E:FE:EE:8C:DF
C. 56:AD:BX:89:55:54
- Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?
A. Star
B. Mesh
C. Bus
D. Ring
D. Ring
- A technician discovers that a malware infection has damaged part of the Windows TCP/IP stack.
Which of the following commands can help repair the damage?
A. netsh lan
B. netsh interface
C. netsh wlan
D. netsh winsock
D. netsh winsock
- Which of the following devices exist as either hardware or software to assist in routing traffic? (Select TWO).
A. Cable modern B. Layer 2 switch C. Router D. NIDS E. Layer 3 switch
C. Router
E. Layer 3 switch
- Which of the following operates at OSI layer 2 to forward traffic based on the MAC address?
A. Switch
B. Proxy Server
C. Router
D. VPN Concetnrator
A. Switch
- The Transport Layer of the TCP/IP model corresponds to which of the following layers of the OSI model?
A. 1
B. 3
C. 4
D. 5
C. 4
- Which of the following is used to provide hot standby capabilities using paired routers?
A. CARP
B. L2TP
C. PPTP
D. ISAKMP
A. CARP
- Which of the following is used to assign an IP address to a device?
A. DHCP
B. NTP
C. DNS
D. RADIUS
A. DHCP
- Which of the following protocols is used to transmit outgoing email?
A. RDP
B. NTP
C. POP3
D. SMTP
D. SMTP
- A network technician is configuring a wireless network. To avoid interference from other wireless networks in the area, the technician should change which setting?
A. Channel
B. SSID
C. Firewall rule
D. Encryption
A. Channel
- A user is unable to print to a network printer. Which of following is the FIRST step that a technician should take to troubleshoot the issue?
A. Identify the problem.
B. Establish a plan of action to resolve the problem.
C. Establish a theory of probable cause.
D. Implement preventative measures.
A. Identify the problem.
- Which of the following is a purpose of a VLAN?
A. Decreases bandwidth on a network
B. Segments broadcast traffic
C. Increases port speed
D. Allows another connection to the router
B. Segments broadcast traffic
- Which of the following would Sandy, a technician, find in a network map?
A. QoS standards
B. MDF/IDFs
C. System logs
D. Firewall rules
B. MDF/IDFs
- Which of the following protocols would be used to send email to an email server?
A. NTP
B. FTP
C. SNMP
D. SMTP
D. SMTP
- Which of the following default ports would need to be open on a firewall to allow remote desktop access?
A. 143
B. 443
C. 3389
D. 8080
C. 3389
- After plugging a cable into a computer, a user reports there is no network access. Which of the following tools would the technician MOST likely check to verify that the cable was crimped correctly?
A. Punch down tool
B. Cable certifier
C. Loopback plug
D. Toner probe
B. Cable certifier
- Which of the following DNS records would allow for a website to have more than one FQDN?
A. TXT
B. PTR
C. MX
D. CNAME
D. CNAME
- A small office home office (SOHO) customer is going to be replacing their switch. The customer also wants to add a WAP in a dropped ceiling; however, there are no power outlets above the drop ceiling, but there is a CAT5e network jack. Which of the following technologies should the new switch have to allow this WAP to be placed where the customer requests, without any other major changes to the environment?
A. PoE
B. Layer 3 switching
C. STP
D. VLAN
A. PoE
- Tenants access multiple wireless networks in a building. Users report intermittent connectivity.
Which of the following is the MOST likely cause of the problem?
A. The channels are overlapping with other wireless networks and should be changed.
B. The SSIDs are incompatible and should be renamed.
C. The users have incompatible wireless network cards and should upgrade.
D. The default idle period for logoff is too short and should be changed to a longer limit.
A. The channels are overlapping with other wireless networks and should be changed.
- Which of the following BEST describes how a layer 2 switch functions?
A. Switches packets within the same subnet based on MAC addresses
B. Switches packets between different subnets based on IP addresses
C. Switches packets between different subnets based on MAC addresses
D. Switches packets between different subnets based on MAC addresses
A. Switches packets within the same subnet based on MAC addresses
- Jeff, a technician, has been asked to add a subnet to the company’s LAN. Which of the following interfaces on the router will be modified?
A. FastEthernet 0/0
B. AUX 0
C. Console 0
D. Serial 0/0/0
A. FastEthernet 0/0
- Jeff, a network engineer, is troubleshooting an issue where clients are not receiving IP addresses from a new, properly configured DHCP server on another subnet. Statically addressed clients can get onto the same network with no issues. Which of the following is causing the issue?
A. Incorrect VLAN tagging
B. Missing helper addresses
C. Wrong default gateway
D. Improper routing protocols
B. Missing helper addresses
- Which of the following subnet masks would allow for 192.168.0.3 and 192.168.0.240 to be in the same subnet?
A. 255.255.255.0
B. 255 255.255.128
C. 255.255.255.192
D. 255.255.255.248
A. 255.255.255.0
- Jeff, an administrator, has just finished installing a new switch and connected two servers with IPs of 192.168.105.20 and .30. The servers are able to communicate with each other, but are unable to reach the Internet. Jeff sees the following information in the switch configuration:
interface VLAN 105
IP address 192.168.105.5 255.255.255.0
Jeff is able to ping the router at 192.168.105.1 from the switch.
Which of the following is the MOST likely cause of the problem?
D. The server is missing default-gateway information.
- Kim, a user, took a laptop on vacation and made changes to the configuration in order to use the device at the hotel. She can reach the Internet, but cannot access any internal network resources.
Which of the following is the MOST likely reason?
A. Incorrect DNS
B. Incorrect subnet mask
C. Duplicate IP address
D. Incorrect SSID
A. Incorrect DNS
- Which of the following is the default subnet mask for a Class B address?
A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255
B. 255.255.0.0
- Which of the following default ports would need to be disabled to block TFTP traffic?
A. 20
B. 21
C. 69
D. 123
C. 69
- Which of the following ports would Zach, a technician, need to open on a firewall to allow SSH on the default port?
A. 20
B. 21
C. 22
D. 23
C. 22
- Which of the following ports is the default telnet port?
A. 20
B. 21
C. 22
D. 23
D. 23
- Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
A. 22 B. 23 C. 143 D. 161 E. 162 F. 8080
D. 161
E. 162
- Which of the following has a maximum transfer rate of 54Mbps and operates at the 5GHz frequency?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
A. 802.11a
- Kim, a network technician, is installing an 802.11n network. Which of the following should Kim enable to ensure that the network only allows 802.11n clients?
A. Name the SSID on the 802.11n network only
B. Limit the DHCP address pool
C. Disable 802.11b and 802.11g
D. Only use WPA encryption
C. Disable 802.11b and 802.11g
- Zach, a technician, is installing an 802.11n network. Which of the following should he disable to stop broadcasting the network name?
A. Channel
B. WEP
C. SSID
D. WPA
C. SSID
- Which of the following default services uses TCP/UDP port 88?
A. LDAP
B. IGMP
C. HTTP
D. Kerberos
D. Kerberos
- Which of the following ports should be allowed through a firewall to allow DNS resolution to occur to an outside DNS server?
A. 20
B. 53
C. 80
D. 3389
B. 53
- Which of the following uses port 53 by default?
A. RDP
B. QoS
C. DHCP
D. DNS
D. DNS
- Which of the following ports does DHCP use? (Select TWO).
A. 22 B. 23 C. 67 D. 68 E. 69
C. 67
D. 68
- Lisa, a network administrator, needs to allow all websites to be accessible by the sales team for business purposes. Which of the following ports need to be enabled on the firewall? (Select TWO).
A. 23 B. 25 C. 53 D. 80 E. 443
D. 80
E. 443
- Lisa, a technician, is asked to not allow FTP traffic on a network. Which of the following ports should be blocked on the firewall to achieve this?
A. 21
B. 22
C. 23
D. 25
A. 21
- Which of the following ports are MOST commonly used to interactively configure a networking device? (Select TWO).
A. 21 B. 22 C. 23 D. 53 E. 67
B. 22
C. 23
- A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?
A. Loopback adapter
B. Cable tester
C. Tone generator
D. Multimeter
A. Loopback adapter
- In order to reduce spam email, Kim, a network administrator, changes the standard SMTP port from which of the following port numbers to port number 587?
A. 20
B. 21
C. 23
D. 25
D. 25
- A company would like all HTTP traffic to filter through a proxy server on port 8080. Which of the following port numbers needs to be redirected through the proxy server to accomplish this?
A. 20
B. 80
C. 143
D. 443
B. 80
- A company wants to only allow incoming HTTP and HTTPS traffic on their public wireless network. Which of the following port numbers should be the only allowed open ports on the firewall to accomplish this? (Select TWO).
A. 20 B. 80 C. 143 D. 443 E. 8080
B. 80
D. 443
- An organization has installed a new firewall. Users need to have access to remote websites and must be able to use SSH to retrieve files from remote locations. Which of the following actions should be taken on the new firewall? (Select TWO).
A. Allow UDP port 21 outbound B. Allow UDP port 22 outbound C. Allow UDP port 80 outbound D. Allow TCP port 21 outbound E. Allow TCP port 22 outbound
E. Allow TCP port 22 outbound
F. Allow TCP port 80 outbound
- An organization recently installed a firewall on the network. Employees must have access to their work computer from their home computer. In which of the following ways should the firewall be configured?
A. Allow TCP port 3389 outbound
B. Allow UDP port 3389 inbound
C. Allow UDP port 3389 outbound
D. Allow TCP port 3389 inbound
D. Allow TCP port 3389 inbound
- An organization recently installed a firewall on the network. Employees must be able to send and receive email from a POP3 server. In which of the following ways should the firewall be configured? (Select TWO).
A. Allow TCP port 23 B. Allow TCP port 25 C. Allow TCP port 110 D. Allow UDP port 25 E. Allow UDP port 110
B. Allow TCP port 25
C. Allow TCP port 110
- Which of the following protocols uses port 3389?
A. IMAP
B. DHCP
C. SSH
D. RDP
D. RDP
- Kurt, a network technician, has configured a new firewall on the network. Users are reporting errors when attempting to access several websites. Kurt attempts to access several popular websites with no errors, however, he does receive an error when attempting to access a bank website. Which of the following rules would BEST allow access to the bank website?
A. Allow UDP port 53
B. Allow TCP port 80
C. Allow UDP port 340
D. Allow TCP port 443
D. Allow TCP port 443
- attempting to access a popular website. Which of the following will MOST likely correct the error?
A. HTTP uses UDP
B. DNS port 23 needs to be allowed
C. HTTP needs port 443 allowed
D. UDP port 53 needs to be allowed
D. UDP port 53 needs to be allowed
- A network technician needs to address bandwidth issues on the wireless network. There are currently four 802.11n access points. The technician would like to increase the bandwidth. Which of the following would be the BEST solution?
A. Disable SSID
B. Channel bonding
C. MIMO
D. Increase the signal
B. Channel bonding
- An administrator is receiving reports from an executive that the executive’s wireless access point loses the signal frequently, even though the WAP is on the executive’s desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive’s office?
A. Turn off SSID broadcasting for the executive’s access point
B. Replace the 802.11n access point in the office with an 802.11a access point.
C. Change the channel on the access point to channel 11.
D. Turn off as many lights in the executive’s office as possible to reduce interference.
C. Change the channel on the access point to channel 11.
- A network technician needs to install an additional access point to the company’s wireless network. The network has two 802.11b access points. Which of the following channels should be used to allow the access point’s coverage areas to overlap?
A. 1, 6, 11
B. 2, 5, 10
C. 3, 13, 23
D. 4, 8, 16
A. 1, 6, 11
- Kim, a network administrator, is seeing workstations in building C authenticate to the building A wireless access point. Which of the following would resolve this issue?
A. Change the security method
B. Reduce the transmission power
C. Change the SSID
D. Change the frequency
B. Reduce the transmission power
- An 801.11g wireless access point was configured as follows:
- AP encryption forced to WPA2-AES mode only
- MAC address filtering enabled with the following MAC address in the allow list: 00-ab-29-da-c3-40
Which is true about the above configuration?
C. An 802.11n compatible client can connect to the wireless network only if its MAC address is 00- ab-29-da-c3-40 and the encryption key is known by the client.
- Jeff, a business owner, has discovered that several of the nearby businesses have wireless networks. Jeff wants to implement a unique wireless network inside the business. Which of the following should be configured on the wireless access point to reduce interference from the other wireless networks?
A. PPPoE authentication
B. MAC filtering
C. WPA encryption
D. Wireless channel
D. Wireless channel
- A company only wants preapproved laptops to be able to connect to a wireless access point.
Which of the following should be configured?
A. SSID disable
B. ACL rules
C. WPA encryption
D. MAC filtering
D. MAC filtering
- company wants the public to be able to connect to the wireless network with minimal security, but not be able to connect to the private internal network. Which of the following firewall rules would BEST accomplish this?
A. Content filtering on the wireless access point
B. Allow traffic from the wireless access point
C. Block traffic from the wireless access point
D. Packet filtering on the wireless access point
C. Block traffic from the wireless access point
- Which of the following occurs when antenna gain is increased on an access point?
A. Connection speeds decrease
B. Throughput decreases
C. Cell size increases
D. Attenuation increases
C. Cell size increases
- Which of the following technologies allows more than two transceivers with an access point?
A. MIMO
B. FIFO
C. 802.1x
D. WPA
A. MIMO
- Jeff, a customer, has a wireless network and has reported that the network traffic from the wireless access points seems high compared to the limited number of wireless devices used. Jeff believes that other non-employees are using the wireless network to access the Internet. Which of the following could be used to limit the access to the wireless network? (Select TWO).
A. WPA encryption B. Changing wireless channels C. MAC filtering D. Changing wireless speed standards E. SSID disable
A. WPA encryption
C. MAC filtering
- Kim, a technician, is configuring an 802.11n access point. Other WAPs on the network use 802.11b. Which of the following will Kim have to setup to make sure these WAPs will be able to communicate?
A. Enable mixed mode
B. Disable SSID
C. Disable encryption
D. Enable `n’ only mode
A. Enable mixed mode
- Lisa, an administrator, has set up an 802.11n wireless network. Users with 802.11n laptops have reported that speeds are slow. After testing, Lisa determines that users max out at 802.11g speeds. Which of the following would MOST likely fix this issue?
A. Enable wireless multimedia (WMM) for QoS
B. Use the 40MHz channels in the 2.4GHz band
C. Enable access point antenna isolation
D. Limit the clients to 802.11g compatible laptops
A. Enable wireless multimedia (WMM) for QoS
- Zach, a network administrator, needs to purchase a new switch to support VoIP phones and wireless access points in a new building. Which of the following features are the MOST important for the new switch to support?
A. PoE and QoS
B. LACP and OSPF
C. 802.1x and 802.11n
D. NAT and VTP
A. PoE and QoS
- Which of the following would Kim, a technician, do to monitor remote traffic through an access point?
A. Enable an SNMP agent
B. Enable network mapping
C. Set monitoring SSID
D. Select WPA2
A. Enable an SNMP agent
- Which of the following solutions will detect and disable a rogue access point?
A. Port scan
B. Packet sniffer
C. IPS
D. IDS
C. IPS
- When configuring a wireless access point, Zach, a network administrator, needs to determine the MAC address of a local printer. Which of the following commands would be MOST helpful in determining the MAC address?
A. ping
B. arp
C. route
D. dig
B. arp
- Kim, the client, has requested a cost-effective network solution to accommodate the ability to reconfigure the office space as needed. Which networking solution would provide the BEST solution?
A. Private IP Addressing
B. Wireless Access Points
C. Wide Area Networking
D. Virtual Local Area Networks
B. Wireless Access Points
- A SOHO office recently installed a wireless network for employees to use during lunch breaks. As such, the access point was placed in the kitchen area by the microwave. Employees have been reporting intermittent connectivity when using the wireless network. Which of the following would BEST improve connectivity?
A. Disable SSID broadcast
B. Increase the signal strength
C. Move the access point
D. Change the broadcast channel
C. Move the access point
187. A SOHO with ten Wi-Fi equipped laptops needs a new network installed. Which of the following items would be used to setup the office using a new DSL line? (Select TWO). A. Router B. Wi-Fi Access point C. Cable modem D. Ten WiMAX adapters E. Ten CAT6 patch cables
A. Router B. Wi-Fi Access point C. Cable modem D. Ten WiMAX adapters E. Ten CAT6 patch cables
- Which of the following security threats relies primarily on user deception and misinformation?
A. Rogue access points
B. DoS attacks
C. Man-in-the-middle attacks
D. Phishing
D. Phishing
- Which of the following is the prefix for a link-local IPv6 address?
A. FE80::/10
B. FF00::/8
C. 2FFE::/16
D. FEEF:/12
A. FE80::/10
- Which of the following could be used to estimate RTT across a router?
A. Dig
B. Traceroute
C. Arp
D. Uptime
B. Traceroute
- Which of the following does the IP address 169.254.222.10 indicate?
A. No DHCP server connectivity
B. The DNS server is unavailable
C. Firewall issue
D. Duplicate IP addresses are found
A. No DHCP server connectivity
- A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?
A. Wire tap
B. Network sniffer
C. Load balancing appliance
D. NIPS
B. Network sniffer
- A supervisor requests that a technician downloads a MIB for a particular server.
Which of the following protocols requires MIBs?
A. IPSec
B. SSL
C. ISAKMP
D. SNMP
D. SNMP
- When configuring a WAP for a SOHO, which parameter will BEST limit access to the office area?
A. Signal strength
B. SSID enable
C. Encryption
D. Password hardening
A. Signal strength
- Which of the following should be implemented in a networked environment carrying teleconferencing packets?
A. L2TP
B. SSH
C. QoS
D. SNMP
C. QoS
- Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Which of the following tools would she use?
A. OTDR
B. Multimeter
C. Punch down tool
D. Temperature monitor
C. Punch down tool
- A network technician is installing a simple SOHO router with wireless functionality. Which of the following wireless encryption standards would be BEST suited for the HIGHEST level of security?
A. WPA2
B. WPA
C. WEP64
D. WEP128
A. WPA2
- A technician notices that network access is becoming increasingly slow. All of the activity lights, on the only network layer 2 switch, are blinking at steadily increasing rates. Which of the following is the MOST likely cause of the increased traffic?
A. STP blocking
B. IP addresses
C. MTU mismatch
D. Switching loop
D. Switching loop
- A user wants a SOHO network to be protected from unauthorized users hacking their network. Which of the following should be implemented to aide in this matter?
A. VPN
B. Throughput tester
C. Firewall
D. OC3
C. Firewall
- Zach, a technician, suspects a duplicate IP address assignment on the network. Which of the following resources can be used to verify this problem?
A. Network map
B. Environmental monitor
C. Placement map
D. Syslog
D. Syslog
- Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).
A. Telnet B. FTP C. SNMP D. SSH E. RDP
A. Telnet
D. SSH
- A user is getting very weak signals while trying to connect to the wireless. Which of the following should the user do to help with signal strength?
A. Call the wireless provider and ask for a T3 circuit.
B. Move the wireless router to a better location where line of sight is obtained.
C. Reinstall the operating system to the PC to ensure the newest patches are installed.
D. Install a hub to ensure there is a clear path for the cables to run.
B. Move the wireless router to a better location where line of sight is obtained.
- Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company’s Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue?
A. Frequency interference
B. Low signal strength
C. Standard mismatch
D. Incorrect channel
A. Frequency interference
- Kim, a user, cannot access the network using wireless.
Which of the following is MOST likely the cause?
A. TXRX is reversed
B. Faulty crossover cable
C. Incorrect WEP key
D. A short in the cable pairs
C. Incorrect WEP key
- A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used?
A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP
D. SNMP
- Kim, a technician, is installing a switch that does not feature auto-negotiation. Which of the following characteristics would need to be manually configured? (Select TWO).
A. MAC addressing B. IP addressing C. Port speed D. IPv6 addressing E. Duplex
C. Port speed
E. Duplex
- Zach, a technician, discovers a switch is not communicating with the other switches in a stack. Which of the following is the MOST likely cause?
A. Both T568A and T568B standards are being used.
B. STP is disabled.
C. The cable is not a crossover.
D. The port is not trunked.
C. The cable is not a crossover.
- Which of the following technologies allows for redundant links within a Layer 2 segment?
A. OSPF
B. RIP
C. Port Mirroring
D. Spanning Tree
D. Spanning Tree
- A company has attempted to introduce a new major network segment to allow growth in capacity. On the core switch, a GBIC was used to interconnect with a newly placed downstream distribution switch for the first time. Soon after this implementation, a network flood and an outage occurred between the core and new distribution network modules. Which of the following should the network administrator troubleshoot FIRST in order to rectify the issue?
A. Check for switching loops between core and distribution switches.
B. Check whether an incorrect VLAN has been assigned to the new distribution switch.
C. Check for inconsistent or missing routes between the core and distribution switches.
D. Check whether the GBIC was set to multi-mode instead of single-mode SFP.
A. Check for switching loops between core and distribution switches.
210. Which of the following is used to create a secure connection between a client and a host? A. VLAN B. Proxy server C. IIS server D. VPN
D. VPN
- A user reports a network failure on a computer. The technician determines that the computer and NIC are operating properly. Which of the following tools can the technician use to trace the network cabling back to the punch down block?
A. Protocol analyzer
B. Multimeter
C. Punch down tool
D. Toner probe
D. Toner probe
- Several users from the same building are reporting connectivity issues. The SFP at that building’s IDF switch is showing a link light, but there is no link light to the corresponding switch’s SFP at the MDF.
Which of the following is the MOST likely cause?
A. A crossover cable is being used.
B. DB loss is too high on all strands.
C. Only TX or RX strand is working.
D. TX and RX are reversed.
C. Only TX or RX strand is working.
- Which of the following is the correct representation of an IPv6 address?
A. ::
B. 0:0:0:0:0:0:0:0:1
C. 1:2:3:4:AB:CD:EF
D. 2001::4860:800f::
A. ::
- Which of the following 802.11n features allows for the use of multiple simultaneous frequencies in order to increase usable bandwidth?
A. Channel bonding
B. MIMO
C. Spartial reuse
D. 20MHz channel spacing
A. Channel bonding
- Kim, a network administrator, should consult which documentation sources FIRST to determine the cause of recent network issues?
A. Network map
B. Cable management
C. Change management
D. Asset management
C. Change management
- The network optimization process used to allow reasonable use of data, voice, and video on the same network infrastructure is called:
A. CARP
B. QoS
C. Traffic shaping.
D. Fault tolerance.
B. QoS
- A network administrator is troubleshooting an intermittent network issue between devices that have a particularly long cable run. The issue was escalated to a network designer who alluded to potential attenuation issues. Which of the following BEST describes what the network designer was referring to?
A. Bad connectors
B. Cross-talk
C. EMI / Interference
D. dB loss
D. dB loss
- An analog POTS voice line is no longer working and Kim, the technician, is tasked to verify if a dial tone is present at the IDF. Which of the following tools would be used?
A. Protocol analyzer
B. Butt set
C. OTDR
D. Toner probe
B. Butt set
- A network technician is troubleshooting intermittent issues with VoIP call quality. A throughput tester can help assess the functionality of which of the following?
A. LLDP
B. VLAN tagging
C. QoS
D. SIP trunking
C. QoS
- Lisa, a user, reports increased delays and timeouts when trying to reach several Internet sites. Which of the following would MOST likely be used when investigating the problem at Lisa’s workstation?
A. nslookup
B. route
C. nbtstat
D. arp
A. nslookup
- Which of the following utilities would a technician use to determine the location of lost packets on a routed network?
A. ping
B. nslookup
C. route
D. tracert
D. tracert
- A DSL modem connects to the provider’s network using which of the following authentication techniques?
A. PoE
B. MS-CHAP
C. PPPoE
D. EAP
C. PPPoE
- Jeff, a user, is having a problem with a POTS line. Which of the following tools would Jeff use to make sure the phone lines have a dial tone?
A. Loopback plugs
B. Butt set
C. Cable certifier
D. Toner probe
B. Butt set
- 169.254.0.100 is an IP address which would MOST likely come from which of the following?
A. CIDR
B. DHCP
C. APIPA
D. DNS
C. APIPA
- Zach, a technician, is checking newly installed CAT5e cabling, and suspects that some of the ends were not properly terminated. Which of the following tools will verify this?
A. Cable tester
B. Toner probe
C. OTDR
D. Loopback plug
A. Cable tester
- Which of the following DNS records allows for reverse lookup of a domain?
A. PTR
B. AAAA
C. A
D. MX
A. PTR
- Which of the following is an example of two factor authentication?
A. Password, device certificate and PIN
B. SSL web server certificate and password
C. User password and administrator password
D. Password and hardware token OTP
D. Password and hardware token OTP
- Which of the following IP addresses would be classified as private?
A. 10.100.200.0
B. 169.253.10.20
C. 172.168.5.0
D. 200.100.25.0
A. 10.100.200.0
- A network technician wants to baseline traffic flows on a specific network. Which of the following will provide the GREATEST level of detail?
A. Network flow information
B. SNMP traps
C. Debug level syslog
D. Protocol analyzer
D. Protocol analyzer
- Which of the following will prevent switching loops by selectively shutting down switch ports?
A. RIP
B. IGP
C. STP
D. VLAN
C. STP
- When using high bandwidth applications over multiple WAN connections, which of the following should be used?
A. Static IP addressing
B. Half-duplex
C. PoE devices
D. Load balancing
D. Load balancing
- A network technician is trying to terminate CAT5 modular jacks. Which of the following tools would be MOST appropriate for this scenario?
A. Crimper
B. OTDR
C. Throughput tester
D. Punch down tool
D. Punch down tool
- Which of the following media types can carry a standard Ethernet signal for network connectivity?
A. USB
B. PArallel
C. Serial
D. CAT6
D. CAT6
- There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?
A. Protocol analyzer
B. Cable tester
C. Cable certifier
D. Environmental monitor
A. Protocol analyzer
- Zach, a network technician, is configuring several switches to be managed remotely. Which of the following must be configured to connect via SSH to each of those devices, as well as to retrieve various parameters?
A. PoE settings and VTP configuration
B. SNMP configuration only
C. IP address and SNMP configuration
D. QoS and PoE settings
C. IP address and SNMP configuration
- A Windows server has a problem after booting up. Kim, a technician, should immediately check the:
A. history logs.
B. cron logs.
C. application logs.
D. system logs.
D. system logs.
- A user has no network connectivity. Jeff, the network technician, is unable to locate the CAT5e cable from the user at the IDF. Which of the following tools would be used to assist Jeff in locating the CAT5e cable?
A. Butt set
B. Punch down tool
C. Toner probe
D. D. Protocol analyzer
C. Toner probe
- An administrator is setting up a secure wireless network. The administrator decides to support 802.11n and 802.11g with a WPA2 pre-shared key. Users are given the SSID with the pre-shared key, but the administrator has disabled the SSID broadcast and MAC filtering. Some users have reported connection issues. Which of the following would MOST likely resolve the users’ connection issues?
A. Limit the devices to 802.11n only.
B. Enable the SSID broadcast.
C. Enable MAC filtering.
D. Use a WEP 128-bit key.
B. Enable the SSID broadcast.
- Which of the following protocols is used to securely connect to a multi-layer switch?
A. HTTP
B. SMTP
C. SSH
D. Telnet
C. SSH
- The software in a virtualized environment that controls resource allocation and allows multiple operating system guests to run on the same physical platform is known as the:
A. hypervisor.
B. LPAR.
C. broker.
D. VDI.
A. hypervisor.
- A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users.
Which of the following is the MOST likely cause?
A. A missing route on the alarm device.
B. Incorrect VLAN assignment on the router.
C. A missing route on the network routers.
D. Incorrect speed/duplex setting on the alarm device.
D. Incorrect speed/duplex setting on the alarm device.
- A customer wishes to network several computers throughout a large warehouse containing numerous metal shelves and concrete walls. The computers are at least 175 meters (574 feet) apart. Which of the following media types should be recommended for the customer using only a single switch?
A. Fiber optic
B. Wireless
C. CAT5e
D. CAT3
A. Fiber optic
- A network administrator suspects an employee of using the company’s Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
A. Syslog server
B. Toner probe
C. OTDR
D. Packet sniffer
D. Packet sniffer
- A technician is setting up a firewall on the network that would show a public IP address out to the Internet and assign private IP addresses to users inside the network. Which of the following processes should be set up?
A. Port security
B. MAC filtering
C. ACL
D. NAT
D. NAT
- Two WAPs are positioned with overlapping coverage, but seamless roaming across them is not working. Which of the following should be checked?
A. WPA should be enabled
B. PKI should be turned off
C. WAP SSIDs are matching
D. WAPs are transmitting on same channel
C. WAP SSIDs are matching
- No link lights on a switch’s SFP are functioning, so the network technician re-terminates the end. After testing the cable, the tester is showing a db loss of-9. Which of the following types of cable is MOST likely being tested?
A. Fiber
B. CAT3
C. CAT5e
D. CAT6a
A. Fiber
- An administrator has received a recommendation against deploying WEP as a wireless encryption protection scheme. Which of the following is MOST likely the reason?
A. WEP’s IV is too small.
B. WEP uses RC4 which is easily accessible and not secure.
C. WEP uses plain text.
D. WEP is not well supported.
A. WEP’s IV is too small.
- Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength?
A. WAP placement
B. PoE devices
C. MAC filtering
D. Encryption type
A. WAP placement
- Which of the following devices can be used to offload outbound web server SSL encryption overhead?
A. NIPS
B. Proxy server
C. Content filter
D. VPN connectator
B. Proxy server
- A user snapped the retention tab off of a network cable. Which of the following tools would Jeff, a technician, use to replace the RJ-45 connector?
A. Wire tester
B. Punch down
C. Crimper
D. Multimeter
C. Crimper
- Which of the following methods for network performance optimization is used to distribute traffic among similar devices?
A. Fault tolerance
B. QoS
C. Proxy server
D. Load balancing
D. Load balancing
- A user is unable to connect to a server in another building. A technician is troubleshooting the issue and determines the following:
1) Client PC 1 has an IP address if 192.168.10.25/25
2) PC 1 can successfully ping its gateway of 192.168.10.1/25 which is an interface of router A
3) Server A is named ‘BLDGBFILESRVR01’ and has an IP address of 192.168.10.145/25
4) PC 2 with an IP address of 192.168.10.200/25 can successfully ping server A
However, when PC 1 pings server A, it receives a destination host unreachable responds. Which of the following is the MOST likely cause?
A. Link from touter A to PC 1 are on different subnets
B. Link from router A to server A is down
C. Link from PC 1 to router A has duplex issues
D. Link from server A top PC 2 is down
A. Link from touter A to PC 1 are on different subnets
- A technician needs to limit the amount of broadcast traffic on a network and allow different segments to communicate with each other. Which of the following options would satisfy these requirements?
A. Add a router and enable OSPF.
B. Add a layer 3 switch and create a VLAN.
C. Add a bridge between two switches.
D. Add a firewall and implement proper ACL.
B. Add a layer 3 switch and create a VLAN.
Explanation:
We can limit the amount of broadcast traffic on a switched network by dividing the computers into logical network segments called VLANs.
A virtual local area network (VLAN) is a logical group of computers that appear to be on the same LAN even if they are on separate IP subnets. These logical subnets are configured in the network switches. Each VLAN is a broadcast domain meaning that only computers within the same VLAN will receive broadcast traffic.
To allow different segments (VLAN) to communicate with each other, a router is required to establish a connection between the systems. We can use a network router to route between the VLANs or we can use a `Layer 3′ switch. Unlike layer 2 switches that can only read the contents of the data-link layer protocol header in the packets they process, layer 3 switches can read the (IP) addresses in the network layer protocol header as well.
- A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?
A. Straight-through
B. Console
C. Rollover
D. Crossover
D. Crossover
- A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?
A. Asset tracking tags
B. Motion detectors
C. Security guards
D. Computer locks
D. Computer locks
- A company is experiencing accessibility issues reaching services on a cloud-based system.
Which of the following monitoring tools should be used to locate possible outages?
A. Network analyzer
B. Packet analyzer
C. Protocol analyzer
D. Network sniffer
A. Network analyzer
Explanation:
A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network.
- A network administrator has created a virtual machine in the cloud. The technician would like to connect to the server remotely using RDP.
Which of the following default ports needs to be opened?
A. 445
B. 3389
C. 5004
D. 5060
B. 3389
- Which of the following cloud infrastructure designs includes on premise servers utilizing a centralized syslog server that is hosted at a third party organization for review?
A. Hybrid
B. Public
C. Community
D. Private
A. Hybrid
- An administrator hosts all of the company’s virtual servers internally. In the event of total server failure, the server images can be restored on a cloud provider and accessed through the VPN. Which of the following cloud services is the administrator using?
A. Community PaaS
B. Public Iaas
C. Hybrid Saas
D. Private Iaas
B. Public Iaas
- Which of the following should be performed to verify that unnecessary services are disabled on all switches in an environment?
A. packet capturing
B. port scanning
C. Log scanning
D. Baseline review
B. port scanning
- A technician is assigned to secure a basic wireless network. Which of the following authentication protocol should the technician use to performed this task (select TWO).
A. RDP
B. SNMP
C. WPA2
D. EAP SSL
C. WPA2
- A technician is sent to a remote office to set up a device to connect to the internet. The company Standard document requires stateful inspection. Which of the following should the technician install?
A. ROUTER
B. Multilayer switch
C. Firewall
D. Bridge
C. Firewall
- A system administrator receives report from users of odd behavior in regard to recently installed server. While reviewing the server network configuration, the systems administrator does both a forward and a reverse DNS lookup on the host, along with the network adapter configuration.
CompTIA Network Certification Exam N10-007 Questions and Answers 5
Which of the following is the problem identified in the output above?
A. There is no reverse DNS entry for this host.
B. The server IP address is incorrectly configured.
C. The DNS lookup entry is incorrectly configured.
C. The DNS lookup entry is incorrectly configured.
- A technician is investigating the cause of a network outage. Which of the following documents should be checked to rule out configuration issues?
A. charge management records
B. inventory management
C. Network log files
D. Logical diagrams
D. Logical diagrams
- A junior network technician receives a help desk ticket from an end user who is having trouble accessing a web application that was working the previous day. After talking with the end user and gathering information about issue, which of the following would be the most likely course of action for the technician to perform next?
A. Establish a theory of probable cause.
B. Escalate the ticket to a senior technician.
C. Implement the solution.
D. Document the findings and outcomes.
A. Establish a theory of probable cause.
- Which of the following storage network technologies inherently leverages block-level storage?
A. NAS B. SAN C. FCoE D. iSCSI E. FTP
A. NAS
- A network administrator wants to employ a username and password authentication system for guest WiFi. Which of the following is the BEST option to provide this type of authentication?
A. port security
B. MAC filtering
C. Network access control
D. Captive portal
D. Captive portal
- Multiple users are reporting that they are unable to access the network. The ENTIRE network is shown in the diagram. PCs are not statically assigned IP addresses. The following devices will display settings:
WorkstationA WorkstationB WorkstationC WorkstationD WorkstationE WorkstationF WorkstationG Laptop1 Laptop2 DHCP server1 DHCP server2
Review the settings and select the box in the diagram that identifies the device causing the issue. Only one device can be selected at a time.
After checking the device that is causing the issue, select the second tab in the lower left hand corner. Identify the reason as to why some users are unable to access the network.
Instructions:
When the simulation is complete, select the Done button to submit.
A. Workstation(s) are plugged into switch ports configured with half duplex
B. The site-to-site router was configured with the incorrect ACL
C. DHCP server scope is full and is not providing IP addresses
D. WAN and LAN ports are reversed on the router
E. STP has disabled some of the ports on the switch
F. The NIC driver is not installed
G. A wireless client is unable to associate to the AP
G. A wireless client is unable to associate to the AP
- A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
A. Move the UTM onto the LAN side of the network
B. Enable TLS inspection on the UTM
C. Enable stateful inspection on the UTM
D. Configure the UTM to deny encrypted files from being transferred
C. Enable stateful inspection on the UTM
- A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?
A. Swap the fiber pairs in one of the SFPs
B. Replace the jumpers with single-mode fiber
C. Set the correct MTU on the new interface
D. Install an optic that matches the fiber type
B. Replace the jumpers with single-mode fiber
- A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?
A. DLP B. IDS C. WAF D. WPA E. TPM
C. WAF
- A network technician receives a call from a user in the accounting department stating that Internet connectivity has been lost after receiving a new workstation. No other users in accounting are reporting similar issues. The network technician is able to ping the machine from the accounting department’s router, but is not able to ping the machine from the IT network. Which of the following is MOST likely the cause?
A. Incorrect default gateway
B. Duplicate IP address
C. Misconfigured OSPF
D. Improper VLAN assignment
A. Incorrect default gateway
- A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. Which of the following types of rules is the administrator implementing?
A. NAT B. PAT C. STP D. SNAT E. ARP
B. PAT
- A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?
A. Install additional WAPs
B. Install external antennas
C. Move the WAPs closer to the more populated area
D. Change the antenna types
A. Install additional WAPs
- A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
A. Damaged fiber
B. Corrupted operating system
C. VLAN mismatch
D. Bad port
B. Corrupted operating system
- A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?
A. It segments broadcast domains in the network infrastructure
B. It provides a faster port to all servers
C. It provides multiple collision domains on one switchport
D. It provides multiple broadcast domains within a single collision domain
A. It segments broadcast domains in the network infrastructure
- Which of the following uses eight groups of characters for addressing?
A. MAC
B. IPv4
C. IPv6
D. DHCP
C. IPv6
- A pest control contractor attempts to gain access to the datacenter; however, the manager on duty notes that a pest control inspection was not on the schedule. Which of the following attacks is in progress?
A. Phishing
B. Social engineering
C. Man-in-the-middle
D. Smurfing
B. Social engineering
- Which of the following is the MOST economical way for Sandy, a technician, to implement 10- Gigabit Ethernet at a datacenter?
A. 10GBaseLR
B. 10GBaseSR
C. 10GBaseX
D. 10GBaseT
D. 10GBaseT
- Which of the following is the network topology in which computers connect in a closed circle?
A. Bus
B. Mesh
C. Ring
D. Star
C. Ring
- Which of the following protocols would Kurt, a technician, use to synchronize local date and time of a client workstation to that of a server?
A. RTP
B. NTP
C. TFTP
D. ARP
B. NTP
- An administrator is replacing an existing WAP because the customer is reporting that the connection speeds are too slow. Which of the following should be installed?
A. 802.11a
B. 802.11b
C. 802.11g
D. 802.11n
D. 802.11n