Comptia (N10-007) Exam Questions And Answers page 30
A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?
Open
EAP-TLS
WPA2
Networking Concepts
Network Operations
A technician wants to physically connect two office buildings networks. The office buildings are located 600ft (183m) apart. Which of the following cable types is the BEST choice?
Cat 5e
Cat 6a
Multimode
Coaxial
Networking Concepts
Network Operations
Which OSI layer do ATM cells operate under?
Single Choice
Under which of the following layers of the OSI model do ATM cells operate?
Data link
Network
Session
Transport
Presentation
Network Operations
Network Security
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?
Straight-through
Console
Rollover
Crossover
Network Operations
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
Move the UTM onto the LAN side of the network
Enable TLS inspection on the UTM
Enable stateful inspection on the UTM
Configure the UTM to deny encrypted files from being transferred
Network Security
A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?
Load balancer
IDS
Proxy server
Wireless controller
Networking Concepts
Network Security
A company has moved to a building with a large number of WLANs. All clients are 802.11b/g/n capable. Which of the following can be performed to reduce the chance of interference with the nearby APs and maintain or improve the performance of the wireless clients?
Migrate the clients to 802.11a NICs.
Disable 802.11n.
Disable the 2.4GHz radio.
Use omnidirectional antennas.
Network Operations
Network Security
Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?
Conducting daily vulnerability scans
Performing daily port scans
Utilizing a protocol analyzer
Using a SIEM
Reviewing daily logs
Network Security
A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?
Because secure protocols would reject malicious packets
Because SCP is not a secure service
Because FTP is not a secure service
Because a secure firewall will protect the device
Network Security
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?
Access control lists
Captive portal
WPA2
Port security
Network Security
Comments