Last Updated on July 8, 2021 by InfraExam

N10-007 : CompTIA Network+ : Part 19

NS – Modules 20 – 22

  1. Which of the following is a network device that is responsible for separating collision domains?

    • Switch
    • Router
    • Hub
    • Modem
  2. Which of the following network topologies is primarily used to connect servers to large network disk arrays?

    • SAN
    • MAN
    • CAN
    • PAN
    • LAN
  3. After setting up in a temporary office, Joe tries to access the company’s wireless network. Following several attempts, Joe is able to get an IP, but cannot access network resources. Which of the following is the MOST likely cause of this error when trying to connect to the company’s wireless network?

    • Incorrect passphrase
    • Incorrect power levels
    • Incorrect workstation certificate
    • Incorrect encryption
  4. A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company’s firewall. Which of the following should the technician use to troubleshoot?

    • WiFi analyzer
    • Bandwidth speed tester
    • Dig
    • Packet sniffer
  5. Which of the following protocols are used to configure an email client to receive email? (Choose two.)

    • IMAP
    • SMTP
    • POP
    • SFTP
    • TFTP
  6. A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.)

    • Cat 6 with a repeater placed in the middle of the run
    • Cat 7
    • Crossover cable
    • Fiber-optic cabling
    • Cat 7 with a patch panel placed in the middle of the run
  7. A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?

    • 3
    • 4
    • 5
    • 6
    • 7
  8. A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?

    • Port enumeration
    • Baseline review
    • Vulnerability scanning
    • Packet analysis
  9. A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?

    • IPS
    • Firewall
    • SIEM
    • UTM
    • Content filter
  10. Which of the following devices would allow a network administrator to block an application at Layer 7 on the network?

    • Firewall
    • NGFW
    • Router
    • Spam filter
  11. A client requests a new dynamic address and receives a response from two DHCP servers. Which of the following addressing information would the client use?

    • The IP addressing information received last
    • The IP addressing information from the highest server MAC address
    • The IP addressing information from the highest server IP address
    • The IP addressing information received first
  12. A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?

    • System life-cycle procedures
    • Off-boarding procedures
    • Safety procedures
    • Appropriate use policy
  13. Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a non-routed VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method?

    • Inventory management
    • Wiring and port location
    • Configuration baseline
    • Standard operating procedure
  14. A network technician does not have access to the GUI of a server and needs to adjust some network properties. Given the command:

    route add mask metric 1

    Which of the following is the technician attempting to alter?

    • The technician is clearing the route table.
    • The technician is adding a static IP address.
    • The technician is clearing the subnet mask setting.
    • The technician is setting the default gateway.
  15. A company is experiencing exponential growth and has hired many new employees. New users are reporting they cannot log into their systems, even though they are on the same network. The technician can see physical connectivity to the network switch along with their MAC addresses. Which of the following should the technician check NEXT?

    • VLAN routing
    • Server-based firewall configuration issue
    • Patch cable type
    • DHCP scope availability
  16. A network technician is installing and configuring a new router for the sales department. Once the task is complete, which of the following needs to be done to record the change the technician is making to the company network?

    • Change management
    • Network diagrams
    • Inventory report
    • Labeling report
  17. A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?

    • Expired IP address
    • Exhausted dynamic scope
    • Misconfigured VLSM
    • Rogue DHCP server
  18. A customer has submitted a request for a new wireless connection in the main office so visitors can reach the Internet to check their email. The customer is concerned about security and does not want visitors to be able to access the internal finance server. Which of the following BEST describes the correct configuration?

    • The LAN and WLAN should be configured in the same zone with dynamic DENY ALL rules.
    • The LAN and WLAN should be configured in the DMZ so traffic is denied automatically.
    • The LAN and WLAN should be marked as trusted during work hours and untrusted during off hours.
    • The LAN and WLAN should be configured in separate zones with a firewall in between.
  19. An employee, who is using a laptop connected to the wireless network, is able to connect to the Internet but not to internal company resources. A systems administrator reviews the following information from the laptop:


    The administrator was expecting to see a network address within, which is consistent with the company’s wireless network. The network administrator verifies the company’s wireless network is configured and working properly. Which of the following is the MOST likely cause of this issue?

    • Interference
    • Security type mismatch
    • Wrong SSID
    • Channel overlap
  20. Which of the following technologies should be used in high-throughput networks to reduce network overhead?

    • iSCSI
    • QoS tags
    • Port aggregation
    • Jumbo frames

NS – Modules 20 – 22