Over 500 CompTIA Network+ N10-007 Exam Questions and Answers

Question 431: Wireless users have been experiencing connectivity problems. Investigation shows neighboring wireless appliances, which are not connected to the network, have been on the same 5GHz frequency to communicate. Which of the following wireless performance problem concepts defines this issue?

A. Interference
B. Distance limitation
C. Signal-to-noise ratio
D. Absorption

Question 432: A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP?

B. MAC reservations
C. EUI-64
D. IPv4 to IPv6 tunnel

Question 433: A network administrator wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?


Question 434: A network technician is segmenting network traffic into various broadcast domains. Which of the following should the network technician utilize?


Question 435: A technician is troubleshooting intermittent connectivity on a line-of-sight wireless bridge. Which of the following tools should the technician use to determine the cause of the packet loss?

A. Spectrum analyzer
C. Packet sniffer
D. Multimeter

Question 436: A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

A. Partial mesh
B. Ad hoc
C. Ring
D. Bus

Question 437: Joe, a network technician, wants to locally back up several router and switch configurations. He wants to store them on a server that can be accessed easily for recovery without authentication. Which of the following servers should Joe use?

A. Telnet
D. Samba

Question 438: A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

A. Open wireless
B. Geofencing
C. Pre-shared key
D. MAC filtering

Question 439: An attacker has flooded the hardware tables of a switch to forward traffic to the attacker’s IP address rather than the default router. The traffic received is copied in real time, and then forwarded to the default router transparently from the end-user perspective. Which of the following attacks are occurring in this scenario? (Choose two.)

A. DNS poisoning
B. ARP poisoning
C. Man-in-the-middle
D. Ransomware
E. Evil twin
F. Reflective

Question 440: A network extension needs to be run to a location 500ft (152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.)

A. Cat 6 with a repeater placed in the middle of the run
B. Cat 7
C. Crossover cable
D. Fiber-optic cabling
E. Cat 7 with a patch panel placed in the middle of the run

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.