Over 500 CompTIA Network+ N10-007 Exam Questions and Answers

Question 461: A technician is trying to identify the cause of an issue several wireless users are experiencing at an office. The office is in a square-shaped building, with four 802.11b WAPs with omnidirectional antennas located in the four corners of the building. Users near the center of the building report sporadic issues connecting to resources. The technician checks the signal strength in the middle of the building and determines it is adequate. Which of the following is causing the reported issue?

A. The antenna types are incorrect, and unidirectional should be used.
B. MAC filtering has not been updated.
C. There is channel overlap of the access points.
D. The power levels are set too low on the WAPs.

Question 462: A network technician is performing an initial configuration of a new network switch. Per company policy, the only authorized manner for remotely administering the switch is through a command line. Which of the following protocols should the technician disable to adhere to the company policy?

B. Telnet

Question 463: A network technician is troubleshooting a connectivity issue with Joe, a user. Joe has reported that when he attempts to RDP to machine1 ( by name, he is connected to machine3 ( When the network technician runs the command nslookup machine1, it returns the IP address; but when the ping –a command is run, the results return the hostname machine3. Which of the following DNS records should be updated to allow RDP connections to machine1 by hostname?

A. A

Question 464: Company policy dictates that full backups are taken every Sunday evening, and incremental backups occur Monday through Saturday in the evening. If data loss were to occur on a Thursday before the backup window, which of the following is the number of backup sets that would be needed to retrieve the lost data come Friday morning?

A. 1
B. 2
C. 3
D. 4
E. 5

Question 465: A company’s server-naming convention is overly complicated. The systems administrator wants to change the naming convention to make it easier for users to remember which hosts they should log into. However, renaming servers is complicated and requires some downtime. Which of the following DNS record types would accomplish this goal without requiring servers to be renamed?

B. A

Question 466: A network technician is working on a way to set up a new branch office securely. The network manager confirms the company does not have any plans to expand to any other new sites and wants to implement the most cost-effective solution. Which of the following would be the BEST type of VPN to implement?

A. Client-to-site VPN
C. Site-to-site VPN

Question 467: A network technician is reviewing the following output from a router:

Which of the following is this an example of?

A. A vulnerability scan
B. A port scan
C. A traffic log
D. A packet capture

Question 468: A network engineer wants to implement a technology that allows for an all-in-one approach to incoming and outgoing traffic from the Internet. This device should be able to filter content and scan for malicious information in each packet. Which of the following types of devices would be necessary?

A. UTM appliance
B. IDS appliance
C. Proxy server
D. RADIUS server

Question 469: Which of the following technologies allows network traffic to come into the network on a certain port and go to a destination server with a different port?

A. Spanning port
B. Port forwarding
C. Port mirroring
D. Port tagging

Question 470: An attacker has inserted a hub into a trunk link on the local network in an attempt to access the management subnet to attack the networking devices. Which of the following attacks can be used on a trunk link to provide access to the management subnet?

A. Brute force
B. VLAN hopping
C. Evil twin
D. DNS poisoning

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.