Last Updated on July 8, 2021 by InfraExam

N10-007 : CompTIA Network+ : Part 22

NS – Modules 20 – 22

  1. Which of the following BEST describes the functionality of the root guard feature on a switch?

    • BPDUs entering the root bridge are ignored.
    • The STP root bridge cannot be changed.
    • Broadcast storms entering from a root port are blocked.
    • Loop protection is enabled on the root port of a switch.
  2. A network administrator is adding a new WAN circuit from the ISP to a new building. In which of the following locations would the network administrator find the utility entry point?

    • DMZ
    • Data tier
    • IDF
    • Demarc
  3. The help desk is receiving reports of intermittent connections to a server. A help desk technician suspects the server is unable to establish a three-way handshake due to a DoS attack. Which of the following commands should a network administrator use to confirm the help desk technician’s claim?

    • nmap
    • arp
    • tcpdump
    • dig
  4. A technician discovered a company computer had a virus but was unable to remove it. The technician decided to erase the hard drive to eliminate the threat. Which of the following policies did the technician violate?

    • Data loss prevention
    • Incident response
    • Asset disposal
    • Acceptable use
  5. A company hires another firm to test the integrity of its information security controls. This is an example of:

    • role separation
    • device hardening
    • risk assessment
    • penetration testing
  6. A network technician is troubleshooting an issue routing TCP packets to an email server. At which of the following OSI layers is the issue occurring?

    • Layer 1 – Physical
    • Layer 3 – Network
    • Layer 4 – Transport
    • Layer 7 – Application
  7. A vendor is installing an Ethernet network in a new hospital wing. The cabling is primarily run above the celling grid near air conditioning ducts and sprinkler pipes. Which of the following cable types is required for this installation?

    • Plenum
    • PVC
    • Single-mode
    • Cat 7
  8. A network technician works in a large environment with several thousand users. Due to the needs of the organization, the network manager has asked the technician to design a solution that accommodates the data needs of all the users, while keeping all data on site. Which of the following solutions should the technician implement?

    • SaaS
    • SAN
    • NAS
    • IaaS
  9. Which of the following can be used to prevent unauthorized employees from entering restricted areas?

    • Sign-in sheets
    • Video cameras
    • Motion sensors
    • Swipe badges
  10. A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization’s certificate authority. Which of the following authentication methods would meet this requirement?

    • PEAP
    • WP2-PSK
    • Captive portal
    • EAP-TLS
  11. A bookstore uses a Faraday cage to comply with credit card regulations. Customers report that their cellular phones have no signal when they are in the bookstore. Which of the following is the MOST likely cause?

    • The Faraday cage is creating interference within the bookstore.
    • The Faraday cage prevents access by redirecting signals.
    • The Faraday cage is creating latency on the cellular network.
    • The Faraday cage is creating attenuation of the cellular network.
  12. An administrator is redesigning a company’s network and wants to reduce the amount of hardware needed. Currently, all VLAN routing goes out a single switch interface to a router.

    Which of the following would reduce the number of devices in this configuration?

    • Bridge
    • Multilayer switch
    • Switch
    • Next-generation firewall
  13. A network technician needs to distribute an updated OS for all network switches at company locations throughout the world. The technician wants to ensure file integrity since several locations do not have high-quality connectivity to the Internet.

    Which of the following methods should be used to distribute the images while ensuring integrity?

    • Use a TFTP server and UDP protocol.
    • Use an FTP server and provide the file hash.
    • Use an HTTP server to share the file.
    • Use a modem and dial-up connection.
  14. Which of the following OSI layers do TCP and UDP operate within?

    • Data link
    • Network
    • Session
    • Transport
    • Presentation
    • Application
  15. A company has decided to allow certain users to work remotely by opening up a VPN connection through the firewall. The security policy has been updated to allow VPN connections only from certain users and to specific areas on the network. Along with configuring the correct policies on the firewall, which of the following also needs to be configured on users’ mobile devices to allow these VPN connections?

    • VNC application
    • Kerberos
    • Geotagging application
    • Credentials
  16. A network engineer is working on a network connectivity problem between a site in California and a site in New York. The connection went down overnight, and the engineer is unsure where the connection failed. The technician is logged into the primary switch in the customer’s network, which is also the company’s connection to the WAN.

    Which of the following tools should the technician use to determine the last available network hop?

    • netstat
    • Nmap
    • traceroute
    • pathping
  17. A network manager is concerned about visitors taking advantage of open cubicies at a company’s facilities. Which of the following would mitigate this issue?

    • Create a VLAN for all unused switchports.
    • Implement a DMZ for all external services.
    • Implement root guard on all switches.
    • Create a honeypot to attract attackers.
  18. Joe, a user, is having issues when trying to access certain web pages. Upon navigating to a web page, it seems like it connects, but then presents the following message:

    The security certificate presented by this website was not trusted by a trusted certificate authority.

    Joe has cleared his cache and cookies, rebooted his machine, and attempted to browse to the website from a coworker’s desktop, but it still presented with this error.

    Which of the following is the MOST likely cause of this error?

    • The web server is missing an intermediate certificate.
    • The website is missing an HTTPS certificate.
    • TLS is not enabled in the browser.
    • The SSL certificate has expired.
  19. Which of the following is used to define the duration during which a client can use an IP address?

    • MAC reservation
    • IP helper
    • Pool
    • Lease time
  20. A small company is requesting a quote to refresh its wireless network. The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future. The requirements state that the chosen solution should significantly decrease the management overhead of the current wireless network.

    Which of the following should the vendors recommend in response to the quote request?

    • The use of lightweight APs with a load balancer
    • The use of autonomous APs with a wireless controller
    • The use of autonomous APs with a load balancer
    • The use of lightweight APs with a wireless controller

NS – Modules 20 – 22