Last Updated on July 8, 2021 by InfraExam

N10-007 : CompTIA Network+ : Part 18

NS – Modules 20 – 22

  1. A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

    • Open wireless
    • Geofencing
    • Pre-shared key
    • MAC filtering
  2. A network engineer for a manufacturing company is implementing a wireless network that provides reliable coverage throughout the facility. There are several large, electric, motorized machines installed on the shop floor for automating the manufacturing process. These machines are known to be significant sources of RF interference. Which of the following frequencies should the wireless network use to MINIMIZE this interference?

    • 2.4 GHz
    • 56MHz
    • 5GHz
    • 900MHz
  3. A company has procured a new office building and started the process of assigning employees to work at that location. The company has also purchased equipment for the new location. There are 5033 laptops, 6000 monitors, and 857 printers. Which of the following steps is the technician most likely to complete FIRST?

    • Create a rack diagram
    • Create a network baseline
    • Create an inventory database
    • Create a port location diagram
  4. Which of the following is created on a 48-port switch with five active VLANs?

    • 48 networks, five segments
    • 48 collision domains, five broadcast domains
    • 240 private networks
    • 240 usable IP addresses
  5. A corporate manager says wireless phones do not work properly inside the main building. After a troubleshooting process, the network administrator detects that the voice packets are arriving on the wireless phones with different delay times. Which of the following performance issues is the company facing?

    • Jitter
    • Latency
    • Attenuation
    • Frequency mismatch
  6. Which of the following technologies is used to attach multiple guest operating systems to a single physical network port?

    • Virtual switch
    • FCoE
    • VPC
    • vSAN
    • Fibre Channel
  7. When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation?

    • Incident response policy
    • International export controls
    • Data loss prevention
    • Remote access policies
    • Licensing restrictions
  8. A network technician is installing a new network switch in the MDF. The technician is using fiber to connect the switch back to the core. Which of the following transceiver types should the technician use?

    • MT-RJ
    • BNC
    • GBIC
    • F-type
  9. A network technician notices a router that repeatedly reboots. When contacting technical support, the technician discovers this is a known problem in which an attacker can craft packets and send them to the router through an obsolete protocol port, causing the router to reboot. Which of the following did the network technician fail to do? (Choose two.)

    • Generate new crypto keys.
    • Keep patches updated.
    • Disable unnecessary services.
    • Shut down unused interfaces.
    • Avoid using common passwords.
    • Implement file hashing.
  10. A technician has replaced a customer’s desktop with a known-good model from storage. However, the replacement desktop will not connect to network resources. The technician suspects the desktop has not been kept up to date with security patches. Which of the following is MOST likely in place?

    • ACL
    • NAC
    • Traffic shaping
    • SDN
    • NTP
  11. A network technician wants to gain a better understanding of network trends to determine if they are over capacity. Which of the following processes should the technician use?

    • Log review
    • Port scanning
    • Vulnerability scanning
    • Traffic analysis
  12. A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?

    • Transport
    • Network
    • Session
    • Application
  13. An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Choose two.)

    • DNS poisoning
    • ARP poisoning
    • Man-in-the-middle
    • Ransomware
    • Evil twin
    • Reflective
  14. A remote user is required to upload weekly reports to a server at the main office. Both the remote user and the server are using a Windows-based OS. Which of the following represents the BEST method for the remote user to connect to the server?

    • RDP
    • Telnet
    • SSH
    • VNC
  15. At which of the following layers of the OSI model would TCP/UDP operate?

    • Layer 3
    • Layer 4
    • Layer 5
    • Layer 6
  16. A technician is troubleshooting a server in the finance office that hosts an internal accounting program. The ticketing desk has received several calls from users reporting that access to the accounting program is degraded, and they are experiencing severe delays, sometimes timing out entirely. The problem has been isolated to the server. Which of the following tools should the technician use on the server to narrow down the issue?

    • nslookup
    • iptables
    • pathping
    • netstat
  17. A technician is reviewing network device logs in an attempt to trace an attack that occurred on the network. Which of the following protocols would affect whether or not the technician can properly trace the attack through the network using the logs?

    • HTTP
    • SMTP
    • NTP
    • RDP
  18. Which of the following is BEST for providing real-time equipment theft alerts to the security staff?

    • Biometric locks
    • Smart card reader
    • Asset tracking tags
    • Motion detection
  19. A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)

    • Disable the HTTP port in the host firewall.
    • Upgrade the firmware on the firewall.
    • Generate new SSH host keys.
    • Remove unnecessary testing accounts.
    • Issue a new self-signed certificate.
  20. A wireless client is having issues staying connected to the wireless network even though the client is less than 20ft (6m) from the access point. Which of the following is MOST likely the cause?

    • Distance limitations
    • Latency
    • Security type mismatch
    • Absorption

NS – Modules 20 – 22