Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008

N10-007 Exam Dumps - CompTIA Network+ N10-007

Go to page:
Question # 73

Which of the following policies is MOST commonly used for guest captive portals?

A.

AUP

B.

DLP

C.

BYOD

D.

NDA

Full Access
Question # 74

Which of the following protocols would enable a company to upgrade its Internet connection by acquiring its own public IP prefixes and autonomous system number?

A.

EIGRP

B.

BGP

C.

IPv6

D.

MPLS

Full Access
Question # 75

A customer needs to submit a report in order to quality for additional cybersecurity insurance coverage. The customer contacts the network administrator the audit, Which of the following should the administrator use to gather the information for the audit?

A.

Bandwidth speed tester

B.

Port scanner

C.

Spectrum analyzer

D.

Vulnerability scanner

E.

Patch management

Full Access
Question # 76

Which of the following describes the function of Layer 3 of the OSI model?

A.

It provides sequencing and acknowledgments tot connection-oriented communication.

B.

It provides connectionless communication using logical addressing.

C.

It provides error detection through the FCS for frames transmitted.

D.

It provides encryption and compression for data received

Full Access
Question # 77

Which of the following utilizes IP spoofing and a third-party service protocol to flood a victim with more data than the attacker is capable of sending alone?

A.

Brute forcing

B.

ARP flooding

C.

DNS poisoning

D.

Amplified DoS

Full Access
Question # 78

A user has received a new machine with The organization's standard baseline with no changes and the DHCP reservation is updated. The user now reports being unable to connect to the partner company's database. The network technician reviews the logs and sees this user was previously able to access the remote database without issue. Which of the following should the network technician check NEXT?

A.

Web proxy

B.

Host-based firewall

C.

B2B router ACL

D.

A and PTR records

Full Access
Question # 79

hich of the following can be used to prevent devices from handing out IP addresses?

A.

DHCP snooping

B.

Dynamic ARP inspection

C.

MAC filtering

D.

BPDU guard

Full Access
Question # 80

Joe an ex-employee from accounting, changed the configurations on several network devices on his last day of work. Which of the following is the MOST likely reason a non-IT employee was able to gain access to network devices?

A.

Left virtual ports open

B.

Allowed unsecure protocols

C.

Left default passwords

D.

Allowed unnecessary services

Full Access
Go to page: