Comptia (N10-007) Exam Questions And Answers page 21
A new technician is connecting an access switch to a distribution switch uplink in a datacenter using fiber cables. Which of the following are transceivers the technician should use to perform this job? (Choose two.)
DB-9
LC
SFP
GBIC
SC
Networking Concepts
Network Operations
An administrator recently implemented new SOHO routers for a company s teleworking employees. Before deploying the routers, the administrator changed the default credentials and disabled unnecessary services. Within a few days of deployment, hackers gained access to the routers. Which of the following is the MOST important thing the administrator forgot to do?
Disable unused physical router ports.
Generate new encryption keys.
Upgrade the router firmware.
Create a database of file hashes on the router.
Network Security
An ARP request is broadcasted and sends the following request:
"Who is 192.168.1.200? Tell 192.168.1.55"
At which of the following layers of the OSI model does this request operate?
"Who is 192.168.1.200? Tell 192.168.1.55"
At which of the following layers of the OSI model does this request operate?
Application
Data link
Transport
Network
E: Session
E: Session
Networking Concepts
A network administrator has set up a corporate network at a branch office. Users are able to log into the wireless network with their network credentials after they accept the company root certificate. Which of the following is the wireless network MOST likely using?
WPA2 Enterprise with PSK
WPA2 Personal with PEAP
WPA2 Enterprise with Kerberos
WPA2 Personal with LEAP
Networking Concepts
Network Operations
An organization wants to implement a method of centrally managing logins to network services. Which of the following protocols should the organization use to allow for authentication, authorization, and auditing?
MS-CHAP
RADIUS
LDAPS
RSTP
Networking Concepts
Network Security
A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is 192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web browser. Only secure protocols should be used, and only the necessary ports should be open. Which of the following ACL rules should be configured in the firewall s WAN port? (Choose two.)
Permit 192.168.1.143.25
Permit 192.168.1.143.80
Permit 192.168.1.143.110
Permit 192.168.1.143.143
Permit 192.168.1.143.443
Permit 192.168.1.143.587
Network Operations
Network Security
A technician is installing two new servers that collect logs. After installing the servers, the technician reviews the logical output from various commands. Which of the following should be included in a logical network diagram?
Rack location
Room number
Media type
Hostname
Networking Concepts
Network Management
A customer has asked a technician to install a single device that can perform firewall and routing functions, act as an early warning system and report breaches, and perform real-time packet inspection using heuristic analysis. Which of the following devices should the technician suggest?
An AAA server
A load balancer
A UTM appliance
A multilayer switch
A proxy server
Network Security
Network Troubleshooting and Tools
Joe, a network technician, has received a report that one of his clients is experiencing an issue connecting to the network. Joe observes two clients are connected to a hub, which is connected to separate wall jacks. Which of the following has MOST likely occurred?
Switching loop
ARP cache poisoning
Improperly tagged ports
Wrong VLAN assignment
Duplicate IP addresses
Network Operations
Network Troubleshooting and Tools
When choosing a type of storage that integrates with the existing network infrastructure, the storage must be easily configurable to share files and can communicate with all existing clients over TCP/IP. Which of the following is the BEST technology for the network administrator to implement?
iSCSI
Fibre Channel
NAS
DAS
Infrastructure
Network Management
Comments