Last Updated on July 6, 2021 by Admin 2
N10-007 : CompTIA Network+ : Part 03
A network technician receives a call from a user who is experiencing network connectivity issues. The network technician questions the user and learns the user brought in a personal wired router to use multiple computers and connect to the network. Which of the following has the user MOST likely introduced to the network?
- Rogue DHCP server
- Evil twin
- VLAN mismatch
A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?
- Reverse the wires leading to pins 1 and 2
- Reverse the wires leading to pins 1 and 3
- Reverse the wires leading to pins 2 and 3
- Reverse the wires leading to pins 2 and 4
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?
A network engineer wants to segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
- Layer 2 switch
- Layer 3 switch
- Load balancer
The Chief Information Officer (CIO) has noticed the corporate wireless signal is available in the parking lot. Management requests that the wireless network be changed so it is no longer accessible in public areas, without affecting the availability inside the building. Which of the following should be changed on the network?
- Power levels
- Distance limitations
- Channel overlap
A network technician is assisting the security team with some traffic captures. The security team wants to capture all traffic on a single subnet between the router and the core switch. To do so, the team must ensure there is only a single collision and broadcast domain between the router and the switch from which they will collect traffic. Which of the following should the technician install to BEST meet the goal?
- Crossover cable
- Media converter
Based on networks 10.8.16.0/22 and 10.8.31.0/21, which of the following is the BEST summarized CIDR notation?
A technician discovers that multiple switches require a major update. Which of the following policies should be followed?
- Change management policy
- Remote access policy
- Acceptable use policy
- Memorandum of understanding
A technician is troubleshooting a point-to-point fiber-optic connection. The technician is at a remote site and has no connectivity to the main site. The technician confirms the switch and the send-and-receive light levels are within acceptable range. Both fiber SFPs are confirmed as working. Which of the following should the technician use to reveal the location of the fault?
- Light meter
- Tone generator
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service’s networking components. Which of the following should be leveraged to complete this task?
Client PCs are unable to receive addressing information from a newly configured interface on a router. Which of the following should be added to allow the clients to connect?
- DHCP lease time
- IP helper
- DNS record type
When enabling jumbo frames on a network device, which of the following parameters is being adjusted?
A technician logs onto a system using Telnet because SSH is unavailable. SSH is enabled on the target device, and access is allowed from all subnets. The technician discovers a critical step was missed. Which of the following would allow SSH to function properly?
- Perform file hashing
- Generate new keys
- Update firmware
- Change default credentials
A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?
An office network consists of one two-port router connected to a 12-port switch. A four-port hub is also connected to the switch. On this particular network, which of the following is the number of collision domains that exist?
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
- SSH in tunnel mode
- RDP set to console connection
Which of the following should current network performance be compared against to determine network anomalies?
- Traffic analysis
- Packet capture
A network administrator configures an email server to use secure protocols. When the upgrade is completed, which of the following ports on the firewall should be configured to allow for connectivity? (Choose three.)
- TCP 25
- TCP 110
- TCP 143
- TCP 389
- TCP 587
- TCP 993
- TCP 995
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do FIRST to reconnect the server to the network?
- Reverse the fiber strands of the cable and reconnect them to the server
- Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
- Replace the server’s single-mode fiber cable with multimode fiber
- Move the fiber cable to different port on the switch where both strands function
The backup server connects to a NAS device using block-level storage over Ethernet. The performance is very slow, however, and the network technician suspects the performance issues are network related. Which of the following should the technician do to improve performance?
- Utilize UDP to eliminate packet overhead
- Turn off MDIX settings on the NAS and server switchports
- Enable jumbo frames on the NAS and server
- Encapsulate the storage traffic in a GRE tunnel