The latest CompTIA Network+ N10-007 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Network+ N10-007 exam and earn CompTIA Network+ certification.
Exam Question 511
Which of the following are DNS record types? (Choose three.)
A. CNAME
B. NTP
C. PTR
D. LDAP
E. DHCP
F. TTL
G. SRV
H. SSH
Correct Answer:
A. CNAME
C. PTR
G. SRV
Exam Question 512
A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer’s requirements?
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.
Correct Answer:
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
Exam Question 513
A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?
A. DHCP scope
B. DHCP lease
C. Default gateway
D. DNS zone
Correct Answer:
A. DHCP scope
Exam Question 514
When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation?
A. Incident response policy
B. International export controls
C. Data loss prevention
D. Remote access policies
E. Licensing restrictions
Correct Answer:
B. International export controls
Exam Question 515
A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)
A. Disable the HTTP port in the host firewall.
B. Upgrade the firmware on the firewall.
C. Generate new SSH host keys.
D. Remove unnecessary testing accounts.
E. Issue a new self-signed certificate.
Correct Answer:
C. Generate new SSH host keys.
E. Issue a new self-signed certificate.
Exam Question 516
A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?
A. Expired IP address
B. Exhausted dynamic scope
C. Misconfigured VLSM
D. Rogue DHCP server
Correct Answer:
B. Exhausted dynamic scope
Exam Question 517
A network technician is setting up the wireless network for a company’s new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?
A. Channel 6
B. Channel 7
C. Channel 9
D. Channel 10
Correct Answer:
A. Channel 6
Exam Question 518
A company hires another firm to test the integrity of its information security controls. This is an example of:
A. role separation
B. device hardening
C. risk assessment
D. penetration testing
Correct Answer:
D. penetration testing
Exam Question 519
A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization’s certificate authority. Which of the following authentication methods would meet this requirement?
A. PEAP
B. WP2-PSK
C. Captive portal
D. EAP-TLS
Correct Answer:
D. EAP-TLS
Exam Question 520
Management at a company wants to increase the bandwidth available to users after receiving several complaints. A technician reports to management that 50% of the company bandwidth is being utilized by wireless devices outside the company’s property. Given budget constraints, which of the following solutions should the technician propose to management?
A. Have the ISP double the bandwidth
B. Move from WPA2 to WEP
C. Enable WPA and change the SSID
D. Configure geofencing
Correct Answer:
D. Configure geofencing