Skip to Content

CompTIA Network+ N10-007 Exam Questions and Answers – Page 6

The latest CompTIA Network+ N10-007 certification actual real practice exam question and answer (Q&A) dumps are available free, which are helpful for you to pass the CompTIA Network+ N10-007 exam and earn CompTIA Network+ certification.

Exam Question 581

A network technician is installing a wireless solution. The solution needs to support new and legacy wireless network clients at the maximum possible speed. Which of the following wireless standards should the technician install?
A. 802.11a
B. 802.11ac
C. 802.11b
D. 802.11g
E. 802.11n

Correct Answer:
E. 802.11n

Exam Question 582

A network technician needs to create separate networks for several classrooms and administrative offices.
They have been provided with the network address 192.168.1.0/24. They will need five classrooms of 25 hosts, two classrooms of 14 hosts, six admin hosts on the network, and three subnets for router connections. Which of the following IP concepts would need to be deployed?
A. VLSM
B. Class B private network
C. EUI-64
D. IPv6

Correct Answer:
A. VLSM

Exam Question 583

Which of the following components acts as an intermediary device between the internal user’s PC and external web servers to provide caching services that save on Internet bandwidth resources?
A. Firewall
B. Proxy server
C. IDS
D. Load balancer

Correct Answer:
B. Proxy server

Exam Question 584

Which of the following steps is a network technician MOST likely to take to secure a new network printer? (Choose two.)
A. Change the default credentials.
B. Disable unnecessary services.
C. Secure the physical access.
D. Generate new encryption keys.
E. Enable HTTPS access.
F. Turn on WPS.

Correct Answer:
A. Change the default credentials.
B. Disable unnecessary services.

Exam Question 585

A network administrator is deploying a new switch in an existing IDF. The current switch has only copper
Ethernet ports available to use for the trunk ports. Which of the following cable types should the network
administrator deploy?
A. Straight-through
B. Console
C. Rollover
D. Crossover

Correct Answer:
X

Exam Question 586

Which of the following types of packets uses the 224.0.0.0/3 address space by routers to exchange routing information?
A. Multicast
B. Spanning tree
C. ICMP
D. SNMP

Correct Answer:
A. Multicast

Exam Question 587

Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks.
Which of the following has MOST likely occurred?
A. Switching loop
B. ARP cache poisoning
C. Improperly tagged ports
D. Wrong VLAN assignment
E. Duplicate IP addresses

Correct Answer:
A. Switching loop

Exam Question 588

A technician is working on a Linux VM in a lab environment to become more familiar with the operating system. The technician has configured a basic website and wants to allow access to it from a different machine on the local network. Which of the following should the technician do so other machines can connect?
A. Allow communication through ifconfig.
B. Use netstat to open necessary ports.
C. Add access rules in iptables.
D. Employ arp to configure a new route.

Correct Answer:
C. Add access rules in iptables.

Exam Question 589

A network administrator notices a wireless network with the SSID HOME-33BC-5G that has a high signal strength and open authentication. When the administrator connects to the SSID, corporate servers can be accessed. Which of the following has the network administrator discovered?
A. Evil twin
B. Man in the middle
C. Spoofing
D. Rogue AP
E. Wardriving

Correct Answer:
D. Rogue AP

Exam Question 590

A company is starting a new process of allowing its employees to have the option of working from anywhere in the world. After some research and approval from the board of directors, it is time to implement the new process. Which of the following policies should be used for this new process?
A. International export controls policy
B. Remote access policy
C. Privileged user agreement
D. Data loss policy
E. Service-level agreement

Correct Answer:
B. Remote access policy