Last Updated on July 8, 2021 by Admin 2

N10-007 : CompTIA Network+ : Part 15

  1. While logged into a financial application, a user gets errors when trying to write to the database. The network administrator is not familiar with the application and how it communicates with the database. Which of the following documentation types should the network administrator use to troubleshoot the data flow?

    • Logical diagram
    • Physical diagram
    • Network baseline
    • Change management log
  2. Joe, a network engineer, is attempting to install wireless in a large work area. He installs the access point in the middle of the work space. When testing, he notices a -60dB reading on one side of the room and a -92dB reading on the other side. Which of the following is MOST likely the issue?

    • External interference
    • Distance limitations
    • Channel overlap
    • Incorrect antenna type
  3. A network technician wants to address PCs on a subnet with IPv6 in addition to IPv4. The subnet currently uses a DHCP server that only supports IPv4. Which of the following should the technician use to assign IPv6 addresses automatically without DHCP?

    • APIPA
    • MAC reservations
    • EUI-64
    • IPv4 to IPv6 tunnel
  4. A technician is establishing connectivity through a VPN for remote server access. Which of the following protocols should be utilized to configure this VPN connection securely?

    • IPSec
    • IGRP
    • L2TP
    • PPTP
  5. A network technician receives a request for a disaster recovery solution. Management has requested no downtime in the event of a disaster. Which of the following disaster recovery solutions is the appropriate choice?

    • Hot site
    • Business continuity
    • File backups
    • Virtual snapshot
  6. A network technician receives a new firmware update for a network device. The technician wants to ensure the file has not been tampered with. Which of the following techniques should the technician use to ensure the integrity of the file?

    • Cyclic redundancy check
    • System integrity check
    • Hash comparison
    • Root guard
  7. An AP is configured to authenticate clients by using their Active Directory username and password. The AP uses UDP to connect to the authentication service, which then queries Active Directory. Which of the following authentication services is being used by the AP in this scenario?

    • RADIUS
    • TACACS+
    • LDAP
    • Kerberos
  8. Which of the following should be configured on the network to achieve performance for the FCoE storage traffic?

    • PoE
    • DHCP snooping
    • Jumbo frames
    • Virtual IP
  9. A network administrator wants to narrow the scope of a subnet to two usable IP addresses within a class C network. Which of the following is the correct CIDR notation?

  10. A network technician notices that most of the nodes in the address space return either 1 or 2 node hop after running a tracert; however, some of the new servers are showing a hop count larger than 10. Which of the following is the MOST likely reason for this?

    • New servers are being provisioned in the cloud.
    • Those servers have host-based firewalls.
    • Some of the servers are configured to use different gateways.
    • Part of the subnet is configured to use different VLANs.
  11. A technician has a remote site that often has congestion issues. When this happens, the remote router cannot be managed using SSH because the session drops. Which of the following is a possible solution to the issue?

    • Out-of-band management
    • HTTPS management URL
    • Client-to-site VPN
    • Router ACL
  12. A technician has installed multiple new PC clients and is connecting them to the network. Only one client is receiving IP addressing information. Which of the following should the technician verify as the NEXT troubleshooting step?

    • DHCP scope
    • DHCP lease
    • Default gateway
    • DNS zone
  13. Which of the following WAN technologies swaps the header on a packet when internally switching from one provider router to another?

    • ATM
    • Frame relay
    • MPLS
    • PPP
  14. A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone?

    • CDMA
    • GSM
    • TDMA
    • CSMA
  15. A network administrator is downloading a large patch that will be uploaded to several enterprise switches simultaneously during the day’s upgrade cycle. Which of the following should the administrator do to help ensure the upgrade process will be less likely to cause problems with the switches?

    • Confirm the patch’s MD5 hash prior to the upgrade.
    • Schedule the switches to reboot after an appropriate amount of time.
    • Download each switch’s current configuration before the upgrade.
    • Utilize FTP rather than TFTP to upload the patch.
  16. A network technician is segmenting network traffic into various broadcast domains. Which of the following should the network technician utilize?

    • VLAN
    • STP
    • ACL
    • BPDU
  17. After rebooting a PC, a user is no longer able to connect to the corporate network. As a test, the technician plugs a different laptop into the same network jack and receives an IP address of Which of the following is MOST likely causing the issue?

    • DHCP scope exhaustion
    • Improper DNS setting
    • Incorrect ACL setting
    • Port-security violation
  18. A network administrator is concerned about clients being able to access the local Internet while connected to the corporate VPN. Which of the following should be disabled on the client to prevent this?

    • TLS
    • Remote file access
    • Split tunneling
    • HTTPS
  19. A network technician travels to a remote office to set up a new SOHO for the company. Wireless networking should be used at the remote office. The network technician sets up all the related wireless network equipment, and the last step is to connect the users’ devices to the company network. To complete this step, which of the following should be used to secure the remote network location?

    • Host-based firewalls
    • WPA2/WPA
    • Open access
    • Port filtering
  20. The length of an IPv6 address is:

    • 32 bits
    • 64 bits
    • 128 bits
    • 256 bits