Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following N10-007 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is N10-008

N10-007 Exam Dumps - CompTIA Network+ N10-007

Go to page:
Question # 4

A network engineer is reviewing a construction proposal for improving the roadways on a campus. The engineer needs to determine if any of the fiber infrastructure between the buildings will need to be relocated. Which of the following will the engineer MOST likely use to make the determination?

A.

Logical network topology

B.

Network rack diagrams

C.

A physical network diagram

D.

An MDF diagram

Full Access
Question # 5

A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

A.

HTTP

B.

Telnet

C.

SSH

D.

TFTP

Full Access
Question # 6

A network administrator wants to ensure all traffic is inspected and abides by the AUP, and that malicious traffic is stopped. Which of the following features should be enabled on a firewall to meet this requirement?

A.

Intrusion detection

B.

Proxy service

C.

Dynamic DNS

D.

Content filtering

Full Access
Question # 7

Which of the following BEST describes the characteristics of a differential backup solution?

A.

Backs up files with the creation or modified date as the current date.

B.

Backs up all files and sets the archive bit.

C.

Backs up files with a date earlier than today’s date with a clear archive bit.

D.

Backs up files with the archive bit set but does not clear the bit.

Full Access
Question # 8

Log files show the admin user has logged into a public-facing device on several occasions in the evening. None of the technicians admit to doing any after-hours work, and the password has been changed several times but failed to prevent the logins. Which of the following should be the NEXT step to attempt to harden the device?

A.

Disable unused ports.

B.

Reset the two-factor token.

C.

Disable virtual ports.

D.

Upgrade the firmware.

Full Access
Go to page: