The latest CompTIA Network+ N10-007 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Network+ N10-007 exam and earn CompTIA Network+ certification.
Exam Question 461
A technician is trying to identify the cause of an issue several wireless users are experiencing at an office. The office is in a square-shaped building, with four 802.11b WAPs with omnidirectional antennas located in the four corners of the building. Users near the center of the building report sporadic issues connecting to resources. The technician checks the signal strength in the middle of the building and determines it is adequate. Which of the following is causing the reported issue?
A. The antenna types are incorrect, and unidirectional should be used.
B. MAC filtering has not been updated.
C. There is channel overlap of the access points.
D. The power levels are set too low on the WAPs.
Correct Answer:
C. There is channel overlap of the access points.
Exam Question 462
A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?
A. HTTP
B. Telnet
C. SSH
D. TFTP
Correct Answer:
A. HTTP
Exam Question 463
A network technician is troubleshooting a connectivity issue with Joe, a user. Joe has reported that when he attempts to RDP to machine1 (192.168.21.21) by name, he is connected to machine3 (192.168.21.23). When the network technician runs the command nslookup machine1, it returns the IP address 192.168.21.23; but when the ping –a 192.168.21.23 command is run, the results return the hostname machine3. Which of the following DNS records should be updated to allow RDP connections to machine1 by hostname?
A. A
B. SRV
C. PTR
D. TXT
Correct Answer:
A. A
Exam Question 464
Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?
A. 1
B. 2
C. 3
D. 4
E. 5
Correct Answer:
C. 3
Exam Question 465
A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?
A. TXT
B. A
C. SRV
D. CNAME
Correct Answer:
D. CNAME
Exam Question 466
A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?
A. Client-to-site VPN
B. DMVPN
C. Site-to-site VPN
D. MPLS VPN
Correct Answer:
C. Site-to-site VPN
Exam Question 467
A network technician is reviewing the following output from a router:
Which of the following is this an example of?
A. A vulnerability scan
B. A port scan
C. A traffic log
D. A packet capture
Correct Answer:
C. A traffic log
Exam Question 468
A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?
A. UTM appliance
B. IDS appliance
C. Proxy server
D. RADIUS server
Correct Answer:
A. UTM appliance
Exam Question 469
Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?
A. Spanning port
B. Port forwarding
C. Port mirroring
D. Port tagging
Correct Answer:
B. Port forwarding
Exam Question 470
An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?
A. Brute force
B. VLAN hopping
C. Evil twin
D. DNS poisoning
Correct Answer:
B. VLAN hopping