Last Updated on July 9, 2021 by Admin 2

N10-007 : CompTIA Network+ : Part 35

  1. A network technician needs to install new network cables. The technician will be running the cables in the air return space above the drop ceiling. Which of the following cable types should be installed?

    • Plenum
    • Coaxial
    • Shielded twisted pair
    • Fiber optic
  2. Which of the following can be used to provide connectivity to a network storage server without the need for dedicated switches and cabling? (Choose two.)

    • Fibre Channel
    • FCoE
    • InfiniBand
    • iSCSI
    • SATA
  3. A network administrator is creating a new WLAN that should only be used by legacy devices that do not support a secure method of authentication. Which of the following should be configured to provide connectivity and minimal security to the new network? (Choose two.)

    • Pre-shared key
    • Open authentication
    • PEAP
    • MAC filtering
    • EAP-FAST
    • EAP-TLS
  4. A new employee is unable to access any network resources. All other users are able to access the network at 100Mbps. No IP address, subnet mask, or default gateway is displayed on the new employee’s workstation. The network administrator reterminates all connectors using the correct standard. Upon further investigation, the network administrator also notices the following:

    Wire map results from the user patch cable to the patch cable connecting to the switch:

    – Pins 5 and 7 are short.
    – The distance is 200ft (61m).

    Additional observations on the switch:

    – The VLAN is set correctly.
    – The port is not disabled.
    – The duplex/speed settings are correct.
    – Port LEDs are off for that port.
    – The port is set to untagged.

    Which of the following is the MOST likely reason the new employee is having network issues?

    • Bad switchport
    • Incorrect pinout
    • Open/short
    • VLAN mismatch
    • Distance limitation
  5. Which of the following would MOST likely contain information about credential reuse?

    • Acceptable use policy
    • Password policy
    • Non-disclosure agreement
    • Remote access policy
  6. An ARP request is broadcasted and sends the following request:

    "Who is Tell"

    At which of the following layers of the OSI model does this request operate?

    • Application
    • Data link
    • Transport
    • Network
      E: Session
  7. A network technician needs to replace a failed hard drive on a server at the company’s large, remote datacenter. Which of the following types of documentation should be reviewed to locate this server easily?

    • Logical diagrams
    • Rack diagrams
    • Change management
    • Standard operating procedures
  8. A VoIP device is not getting power at a new user’s desk. The technician tests the components with a PoE injector at the switch and resolves the issue. Which of the following is the MOST likely cause of the issue?

    • VLAN mismatch
    • Bad switchport
    • TX/RX reverse
    • Latency
    • Damaged cable
  9. A network manager is drafting a document that outlines what employees can and cannot do when using personal tablets that are connected to the network. Which of the following is the manager drafting?

    • An AUP policy
    • A BYOD policy
    • A DLP policy
    • An NDA policy
  10. A network technician is asked to perform an unfamiliar task. Which of the following would the technician MOST likely reference?

    • Network configuration
    • Change management documentation
    • Work instructions
    • Performance baseline
  11. A user is reporting poor network performance. A network technician starts by looking at port statistics on that user’s connected switchport. The technician notices there is a high level of collisions on the port. Which of the following is the MOST likely cause?

    • The port or user’s NIC is set to auto-MDIX.
    • The port and/or user’s NIC is set to half-duplex.
    • The port and/or user’s NIC is set to the wrong MTU.
    • The port and user’s NIC are set to different speeds.
  12. Which of the following is a purpose of a syslog server?

    • Aggregates switch logs for easier review and correlation
    • Polls SNMP-enabled server logs for current status
    • Distributes logging applications to monitoring servers
    • Purges switch logs when they reach capacity
  13. Which of the following devices will intelligently attempt to relieve the network of an assumed threat after sampling a packet stream?

    • IDS
    • Content filter
    • Firewall
    • IPS
  14. The lack of which of the following components might make a virtual router less efficient than a physical router?

    • ASIC
    • Hardware MAC
    • Jumbo frame
    • MPLS
  15. A company has a DNS record for the following address: The company would like to add another record,, which continually points to the same IP address as Which of the following DNS record types would BEST accomplish this?

    • MX
    • CNAME
    • SRV
    • A
    • AAAA
    • PTR
  16. A wireless network is set up in a mesh configuration that has experienced recent growth. Some of the access points are four hops away in the mesh network. Users at these access points are reporting slow download speeds despite being the sole users on the access point. Which of the following would BEST resolve this issue?

    • Add more access points to the mesh network.
    • Increase transmit power levels on the access points.
    • Physically connect more access points.
    • Change the antenna type on the WAPs.
  17. A network administrator needs to access a remote site and log into the site switch using secure methods. The administrator first has to gain access to the server GUI. Which of the following access control methods will be used?

    • RDP
    • VPN
    • Telnet
    • SSH
  18. A company wants to provide its sales representatives with an easy-to-use method of securely connecting to the corporate network from any client network. Which of the following methods should the network technician implement?

    • Allow RDP connections through the firewall.
    • Install VNC clients on the sales representatives’ machines.
    • Create an SSL VPN for remote access to the network.
    • Place all servers in the publicly available DMZ.
  19. A network administrator is attempting to limit the installation of malware on company workstations. The administrator wants to remove root access from the user accounts. Which of the following is this an example of?

    • Changing default credentials
    • Limiting spoofing
    • Role separation
    • Port security
  20. Which of the following represents where the ISP’s WAN connection is handed off to the local network?

    • Demilitarized zone
    • Intermediate distribution frame
    • Extranet
    • Demarcation point