Exam Logo

Comptia (N10-007) Exam Questions And Answers page 30

A company will be hosting a large workshop for local business leaders, and management wants to provide an easy-to-connect-to guest wireless network for them to access while on site. The network will be disabled after the workshop. The current wireless network has the option to enable a segmented guest network that has not been implemented. Which of the following authentication methods should be used to make the network EASIEST for guests to access?
Networking Concepts Network Operations
A technician wants to physically connect two office buildings networks. The office buildings are located 600ft (183m) apart. Which of the following cable types is the BEST choice?
Networking Concepts Network Operations
Under which of the following layers of the OSI model do ATM cells operate?
Network Operations Network Security
A technician is connecting a router directly to a PC using the G1/0/1 interface. Without the use of auto-sensing ports, which of the following cables should be used?
Network Operations
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
Network Security
A server in a LAN was configured to act as a gateway between all company computers and an external network. Which of the following networking devices offers the ability to increase both performance and security?
Networking Concepts Network Security
A company has moved to a building with a large number of WLANs. All clients are 802.11b/g/n capable. Which of the following can be performed to reduce the chance of interference with the nearby APs and maintain or improve the performance of the wireless clients?
Network Operations Network Security
Which of the following would be BEST for continually monitoring and alerting of possible attacks on a network?
Network Security
A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?
Network Security
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?
Network Security