Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008

N10-007 Exam Dumps - CompTIA Network+ N10-007

Go to page:
Question # 17

A network engineer wants to change how employees authenticate to the wireless network. Rather than providing a pre-shared key, the engineer wants employees to be able to authenticate with the same unique company user ID and password they use for accessing other services, such as email and document sharing. The engineer also wants to receive daily reports of login attempts on the wireless network. Which of the following should be installed to achieve this goal?

A.

LDAP server

B.

UTM appliance

C.

Multilayer switch

D.

AAA/RADIUS server

Full Access
Question # 18

A technician purchasing equipment for a company has determined that several new employees will require new wired workstations. Which of the following is the network technician likely to recommend to add the employees to the existing infrastructure?

A.

Bridge

B.

WAP

C.

Hub

D.

Switch

Full Access
Question # 19

Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?

A.

Multicast

B.

Spanning tree

C.

ICMP

D.

SNMP

Full Access
Question # 20

Which of the following statements about the OSI model is true?

A.

The application layer does not need to know what type of network is being used because that is dealt with by a layer below it.

B.

The network layer deals with the network cabling and network device interface compatibility.

C.

The transport layer deals with how the data is transported from one router to another based on the IP header.

D.

The model consists of four layers that describe the requirements a technician follows to troubleshoot and support a network.

Full Access
Question # 21

An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?

A.

Brute force

B.

VLAN hopping

C.

Evil twin

D.

DNS poisoning

Full Access
Question # 22

A network technician receives the following command output from a Linux-based machine:

Which of the following commands did the network technician run?

A.

iptables -f ABCDEG.com

B.

dig -t ANY ABCDEG.com

C.

NMAP -t ABCDEG.com

D.

netstat –a ACDEG.com

Full Access
Question # 23

A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is MOST likely the issue?

A.

One of the wireless access points is on the wrong frequency

B.

The students are attempting to connect 802.11g devices

C.

The students are using more than one wireless device port seat.

D.

Distance limitations are preventing the students from connecting.

Full Access
Question # 24

A company recently completed construction of a new remote office. The network administrator needs to set up new network devices, such as printers and a local file server, at the remote location. The new devices need to be configured on the same Layer 2 network as the main office. Which of the following should the network administrator configure?

A.

Remote desktop gateway

B.

Transport mode IPSec

C.

SSH tunneling

D.

TLS VPN

Full Access
Go to page: