VerifiedDumps http://www.verifieddumps.com Get the Valid and Verified Exam Questions & Answers Dump for 100% Pass
Exam : N10-007 Title : CompTIA Network+ N10-007 Vendor : CompTIA Version : DEMO Get Latest & Valid N10-007 Exam's Question and Answers 1 from Verifieddumps.com. 1
NO.1 Which of the following is the BEST way to mitigate security threats on a network? A. User training B. Incident response C. Man-in-the- middle D. Social engineering Answer: A NO.2 A network technician needs to set up an access method for Ann, a manager, to work from home. Ann needs to locally mapped corporate resources to perform her job. Which of the following would provide secure access to the corporate resources? A. Allow RDP through an external firewall. B. Utilize an SSH connection to the corporate server. C. Connect utilizing client-to-site VPN. D. Use TFTP to transfer files to corporate resources. NO.3 When querying a DNS server for an AAAA record, which of the following is an appropriate response? A. 61.23.168.192.in-addr.arpa B. 192.168.2.1 C. 3ffe:1900:4545:3:200:f8ff:fe21:67cf D. 00:f3:82:99:a2:b8 NO.4 A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices? A. Security guards B. Motion detectors C. Asset tracking tags D. Computer locks NO.5 Jeff, a network technician, is installing a wireless router. Which of the following should Jeff consider to get the BEST signal strength? A. MAC filtering B. PoE devices C. WAP placement D. Encryption type NO.6 Jeff, a technician, is charged with setting up network monitoring for critical devices in the network. It is important the information be sent securely to the monitoring station. Which of the following protocols will support secure transmission of the data? Get Latest & Valid N10-007 Exam's Question and Answers 2 from Verifieddumps.com. 2
A. VPN B. SMTP C. SNMP v2 D. SYSLOG NO.7 A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection? A. Serial B. Parallel C. Telephone D. CAT6 NO.8 In which of the following scenarios should a technician use a cross-over cable to provide connectivity? A. Switch to AP B. Router to modem C. Router to switch D. PC to switch E. PC to PC Answer: E NO.9 Lisa, a consultant, is inspecting an office that reports frequent wireless issues. Upon scanning the network broadcasting in the vicinity of the office, seven SSIDs are found. The company's Wi-Fi network and three others all share channel six. Which of the following is MOST likely causing the issue? A. Standard mismatch B. Frequency interference C. Incorrect channel D. Low signal strength Answer: B NO.10 A network engineer is designing a new IDF in an old building. The engineer determines the equipment will fit in a two-post rack, and there is power available for this equipment. Which of the following would be the FIRST issue to remediate? A. Circuit labeling B. UPS capability C. Power redundancy D. Air flow and cooling NO.11 A network administrator frequency needs to assist users with troubleshooting network Get Latest & Valid N10-007 Exam's Question and Answers 3 from Verifieddumps.com. 3
hardware remotely, but the users are non-technical and unfamiliar with network devices. Which of the following would BEST help the administrator and users during hands-on troubleshooting? A. Standard operating procedures B. MDF documentation C. Equipment labeling D. Logical diagrams Answer: A NO.12 A company is experiencing accessibility issues reaching services on a cloud-based system. Which of the following monitoring tools should be used to locate possible outages? A. Network sniffer B. Packet analyzer C. Network analyzer D. Protocol analyzer Explanation A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network. NO.13 Which of the following default services uses TCP/UDP port 88? A. HTTP B. Kerberos C. LDAP D. IGMP Answer: B NO.14 Privilege creep among long-term employees can be mitigated by which of the following procedures? A. User permission reviews B. Mandatory vacations C. Separation of duties D. Job function rotation Answer: A NO.15 The process of attempting to exploit a weakness in a network after being given permission by the company is known as: A. reconnaissance B. social engineering C. penetration testing D. vulnerability scanning NO.16 Lisa, a network technician, needs to introduce a few more cables to the existing patch panel. Get Latest & Valid N10-007 Exam's Question and Answers 4 from Verifieddumps.com. 4
Which of the following tools would she use? A. Temperature monitor B. Multimeter C. Punch down tool D. OTDR NO.17 Which of the following security mechanisms dynamically assigns a Layer 2 address and restricts traffic only to that Layer 2 address? A. ACL B. 802.1x C. NAC D. Sticky MAC NO.18 Which of the following ports is the default telnet port? A. 21 B. 20 C. 23 D. 22 Get Latest & Valid N10-007 Exam's Question and Answers 5 from Verifieddumps.com. 5