Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008

N10-007 Exam Dumps - CompTIA Network+ N10-007

Go to page:
Question # 41

Due to regulatory requirements, a college bookstore prohibits customers from accessing the wireless network in the building. Which of the following would be the BEST method to prevent customers from accessing the wireless network while in the bookstore?

A.

Use MAC filtering for authorization to the wireless network.

B.

Require PEAP for authentication to the wireless network.

C.

Implement a Faraday cage within the bookstore premises.

D.

Require a pre-shared key for authentication to the wireless network.

Full Access
Question # 42

Joe, a user, reports intermittent connectivity issues, but a technician notices that the only time Joe has issues is when he is logged into the database. Losing connection after authenticating to a database, but still having access to network resources such as file/print services and email, would MOST likely be caused by:

A.

an incorrect DHCP gateway setting

B.

a duplicate IP address

C.

NTP synchronization

D.

ACL configuration

Full Access
Question # 43

A human resources manager notifies the IT manager the night before an employee will be terminated so the employee's access rights can be removed. Which of the following policies is being exercised?

A.

Privileged user agreement

B.

AUP

C.

Non-disclosure agreement

D.

Offboarding

Full Access
Question # 44

Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?

A.

Offboarding

B.

Remote access

C.

AUP

D.

Incident response

E.

DLP

Full Access
Question # 45

A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?

A.

Port enumeration

B.

Baseline review

C.

Vulnerability scanning

D.

Packet analysis

Full Access
Question # 46

A network engineer is planning to connect a legacy network switch to a core switch for redundancy. The proposed cable will run in the celling above high-voltage industrial equipment and fluorescent lights. The legacy

switch has 1000BASE-T ports with no expansion slots. The engineer has decided to use multimode cable to make this connection. Which of the following will be needed to connect the two switches?

A.

RG-6 connectors

B.

A patch panel

C.

A GBIC transceiver

D.

A media converter

Full Access
Question # 47

A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?

A.

Because secure protocols would reject malicious packets

B.

Because SCP is not a secure service

C.

Because FTP is not a secure service

D.

Because a secure firewall will protect the device

Full Access
Question # 48

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

A.

Spam

B.

Ransomware

C.

Man-in-the-middle

D.

Phishing

Full Access
Go to page: