Over 500 CompTIA Network+ N10-007 Exam Questions and Answers

Question 491: A technician is asked to provide centralized SSID management across the entire WAN. The BEST solution would be to:

A. use a configuration management server
B. configure a multilayer switch
C. install a wireless controller
D. use a proxy server

Question 492: A network technician is coordinating the upgrade of the company’s WAP firmware with all the remote locations. The company has occasionally experienced errors when transferring large files to some of the remote offices. Which of the following should be used to ensure files arrive without modifications?

A. File hash
B. Encryption
C. FCS
D. Compression

Question 493: A network administrator needs to implement a new IP subnet containing 29 hosts. It is possible that the number of hosts in that subnet could eventually double. The company only has a single, unused public IP network left to work with: 164.10.12.0/24. Which of the following would be the BEST way to divide this network without wasting addresses?

A. 164.10.12.0/24
B. 164.10.12.64/29
C. 164.10.12.128/26
D. 164.10.12.191/28

Question 494: Which of the following BEST describe the differences between an IDS and an IPS? (Choose two.)

A. An IDS will detect traffic anomalies and a predefined signature pattern, alert and log them, and allow them through the network.
B. An IDS will detect traffic anomalies, alert and log them, and block the traffic.
C. An IDS will detect previously unknown traffic anomalies, alert and log them, and block the traffic.
D. An IPS will detect traffic anomalies, alert and log them, and allow them through the network.
E. An IPS will detect previously unknown traffic signatures, and alert and log them.
F. An IPS will detect traffic anomalies and a predefined signature pattern, alert and log them, and block the traffic.

Question 495: A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?

A. WPA2
B. EAP-FAST
C. MAC filtering
D. 802.1X

Question 496: Which of the following routing conventions is known as a link-state protocol?

A. RIP
B. BGP
C. EIGRP
D. OSPF

Question 497: A technician is installing six PCs and six VoIP telephones on a small office LAN. The VoIP telephones require QoS to be configured for proper operation. The customer router does not have QoS capability. Which of the following network devices should the technician purchase and install at this office?

A. Managed PoE switch
B. Load balancer
C. Layer 3 switch
D. Unmanaged PoE switch

Question 498: A network administrator has signed up for service with a new ISP. The administrator was given the IP address of 172.17.10.254/30 to use on the external interface of the Internet-facing router. However, the network administrator cannot reach the Internet using that address. Which of the following is the MOST likely explanation?

A. The address provided by the ISP has a mask that is too small to be used and needs a larger mask.
B. The address provided by the ISP is a private IP address space and is not routable on the Internet.
C. The address provided by the ISP is the wrong one; they should be using 172.17.10.252/30.
D. The address provided by the ISP is part of the reserved loopback address space and cannot be used.

Question 499: A manufacturing company has signed an agreement with another company to collaborate on an upcoming project. Both companies require secure and persistent access to resources on each others’ networks. Which of the following remote access technologies should the companies implement to satisfy their requirements?

A. Out-of-band management
B. Site-to-site VPN
C. DMZ networks
D. SFTP site

Question 500: A security administrator wants to implement the ability to prevent an unauthorized user from tailgating into the office building. Which of the following should be implemented?

A. Badge reader
B. Bluetooth reader
C. Cipher lock
D. Mantrap

Published by Thomas Apel

, a dynamic and self-motivated information technology architect, with a thorough knowledge of all facets pertaining to system and network infrastructure design, implementation and administration. I enjoy the technical writing process and answering readers' comments included.