Skip to Content

CompTIA Network+ N10-007 Exam Questions and Answers – Page 6

The latest CompTIA Network+ N10-007 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Network+ N10-007 exam and earn CompTIA Network+ certification.

Exam Question 511

Which of the following are DNS record types? (Choose three.)

A. CNAME
B. NTP
C. PTR
D. LDAP
E. DHCP
F. TTL
G. SRV
H. SSH

Correct Answer:
A. CNAME
C. PTR
G. SRV

Exam Question 512

A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer’s requirements?

A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.
B. The router is placed in bridge mode, the modem is placed behind the router, and the web server is placed behind the modem.
C. The web server is placed in bridge mode, the router is placed behind the web server, and the modem is placed behind the router.
D. The switch is placed in bridge mode, the modem is placed behind the router, and the router is placed behind the modem.

Correct Answer:
A. The modem is placed in bridge mode, the router is placed behind the modem, and the web server is placed behind the router.

Exam Question 513

A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?

A. DHCP scope
B. DHCP lease
C. Default gateway
D. DNS zone

Correct Answer:
A. DHCP scope

Exam Question 514

When speaking with a client, an employee realizes a proposed solution may contain a specific cryptographic technology that is prohibited for non-domestic use. Which of the following documents or regulations should be consulted for confirmation?

A. Incident response policy
B. International export controls
C. Data loss prevention
D. Remote access policies
E. Licensing restrictions

Correct Answer:
B. International export controls

Exam Question 515

A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)

A. Disable the HTTP port in the host firewall.
B. Upgrade the firmware on the firewall.
C. Generate new SSH host keys.
D. Remove unnecessary testing accounts.
E. Issue a new self-signed certificate.

Correct Answer:
C. Generate new SSH host keys.
E. Issue a new self-signed certificate.

Exam Question 516

A network technician receives reports indicating some users are unable to gain access to any network resources. During troubleshooting, the technician discovers the workstations have an IP address of 169.254.x.x. Which of the following is the MOST likely cause?

A. Expired IP address
B. Exhausted dynamic scope
C. Misconfigured VLSM
D. Rogue DHCP server

Correct Answer:
B. Exhausted dynamic scope

Exam Question 517

A network technician is setting up the wireless network for a company’s new branch office. After doing a site survey, the technician discovers there is a lot of interference from 2.4GHz devices at the location on channel 11. Which of the following would be the BEST channel on which to set up the WAPs?

A. Channel 6
B. Channel 7
C. Channel 9
D. Channel 10

Correct Answer:
A. Channel 6

Exam Question 518

A company hires another firm to test the integrity of its information security controls. This is an example of:

A. role separation
B. device hardening
C. risk assessment
D. penetration testing

Correct Answer:
D. penetration testing

Exam Question 519

A Chief Information Security Officer (CISO) has decided to implement a secure and user-friendly way to connect to the corporate wireless network. Each workstation will be authenticated individually using a unique certificate that will be deployed to the workstation by the organization’s certificate authority. Which of the following authentication methods would meet this requirement?

A. PEAP
B. WP2-PSK
C. Captive portal
D. EAP-TLS

Correct Answer:
D. EAP-TLS

Exam Question 520

Management at a company wants to increase the bandwidth available to users after receiving several complaints. A technician reports to management that 50% of the company bandwidth is being utilized by wireless devices outside the company’s property. Given budget constraints, which of the following solutions should the technician propose to management?

A. Have the ISP double the bandwidth
B. Move from WPA2 to WEP
C. Enable WPA and change the SSID
D. Configure geofencing

Correct Answer:
D. Configure geofencing