N10-007 : CompTIA Network+ : Part 27

NS – Modules 20 – 22

  1. A network technician is investigating reports of blocked downloads from a firewall. Which of the following should be used to determine which protocols are being blocked?

    • Ping
    • Log review
    • Vulnerability scans
    • Alerts
  2. Which of the following IPv6 transition methods requires all network devices to support IPv4 and IPv6?

    • 6to4
    • Teredo
    • ISATAP
    • Dual stack
  3. A network administrator is configuring a new Internet connection. The ISP provided a fiber-optic handoff, but the company’s firewall only supports copper Ethernet interfaces. The administrator wants to connect the devices as easily as possible. Which of the following would be the BEST way to provide the connectivity needed?

    • Bridge
    • Router
    • Multilayer switch
    • Media converter
  4. A network technician is responding to a user’s trouble ticket. After replacing the network patch cable with a longer cable, the user is no longer connecting to the network. The network administrator tests the patch cable with a tester and confirms the cable is not faulty. Which of the following is the issue with the newly installed cable?

    • The user ordered Cat5e cable instead of Cat3.
    • A crossover cable was installed.
    • The total cable run exceeds the maximum distance.
    • There is a network speed mismatch between the computer and the switch.
  5. A brokerage firm requires high-speed network connectivity between several buildings in the financial district. Which of the following topologies would BEST meet this requirement?

    • PAN
    • WLAN
    • SAN
    • MAN
  6. Which of the following is a policy that communicates the guidelines for connecting personal employee devices to the corporate network?

    • Remote access
    • NDA
    • SLA
    • BYOD
    • Incident response
  7. A security administrator wants to implement the ability to prevent an authorized user from tailgating into the office building. Which of the following should be implemented?

    • Badge reader
    • Bluetooth reader
    • Cipher lock
    • Mantrap
  8. A network manager notices several outages have occurred due to modifications that were made without being properly tested. Which of the following will the network manager MOST likely implement to prevent future occurrences?

    • Logical diagram
    • Change management
    • IDF documentation
    • Configuration baseline
  9. Due to an increase in wireless demand, 50 additional access points were installed as part of an expansion project. Each device was configured and managed separately, working with its own configuration. Which of the following network devices would assist the network team with reducing complexity and enforcing policies on the WLAN?

    • Wireless controller
    • Wireless range extender
    • Wireless load balancer
    • Wireless analyzer
  10. Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

    • an incorrect DHCP gateway setting
    • a duplicate IP address
    • NTP synchronization
    • ACL configuration
  11. A server rack was moved from one floor to another. The network engineer needs to determine what physical changes to make on the network to ensure the server rack has connectivity. Which of the following should the network engineer consult?

    • Standard operating procedures
    • Wiring diagram
    • Inventory documentation
    • Network baseline
  12. An email server, which is called “Frederick,” has an IPv6 address of 2001::5689:23:ABCD:6A, but most users call it “Fred” for short. Which of the following DNS entries is needed so the alias “Fred” can also be used?

    • MX
    • AAAA
    • SRV
    • CNAME
    • TXT
    • NS
  13. A network administrator needs to be able to burst datacenter capacity during peak times, but does not want to pay for on-premises hardware that is not used during off-peak times. Which of the following would aid in this scenario?

    • Public cloud
    • SaaS
    • PaaS
    • Hybrid cloud
  14. A user wants to secure a network closet and be able to tell if anyone makes changes in the closet. Which of the following would be the BEST detective physical security devices in this situation? (Choose two.)

    • Anti-tampering
    • Badges
    • Door locks
    • Key fob
    • Motion detection
    • Video surveillance
  15. A network technician needs to subnet the network. The marketing department has 28 devices. Which of the following private IP address spaces should be used to ensure the MINIMUM number of unused IP addresses?

    • Gateway:
    • Gateway:
    • Gateway:
    • Gateway:
  16. A company has experienced a major security breach. Which of the following should the network administrator reference to determine the next steps?

    • Non-disclosure policy
    • Data loss prevention policy
    • Acceptable use policy
    • Incident response policy
  17. A technician restored network connectivity on a user’s laptop. After validating full system functionality, which of the following steps should the technician take NEXT?

    • Duplicate the problem, if possible
    • Determine if anything has changed
    • Test the theory to determine the cause
    • Document the findings, actions, and outcomes
  18. Which of the following is an IPv6 transition mechanism in which network devices utilize IPv4 and IPv6 at the same time?

    • 6to4
    • ISATAP
    • Teredo
    • Dual stack
  19. Which of the following protocols operates at Layer 4 of the OSI model?

    • TCP
    • ARP
    • IMAP
    • POP3
  20. In the past, users brought personal laptops to the office to bypass some of the security protocols on their desktops. Due to new security initiatives, management has asked that users not be allowed to attach personal devices to the network. Which of the following should a technician use to BEST meet this goal?

    • Shut down unused ports on switches
    • Upgrade firmware on network devices
    • Allow only secure protocols on the network
    • Disable unnecessary services

NS – Modules 20 – 22