Comptia (N10-007) Exam Questions And Answers page 50
A network engineer wants to segment the network into multiple broadcast domains. Which of the following devices would allow for communication between the segments?
Layer 3 switch
Bridge
Load balancer
Network Operations
Network Security
A network topology requires a switch to be placed in an unsecured location. Which of the following techniques should be used to prevent unauthorized access? (Choose two.)
Disabling unused ports
Upgrading firmware
Using secure protocols
File hashing
MAC filtering
Configuring a honeypot
Network Security
Network Troubleshooting and Tools
A large metropolitan city is looking to standardize the ability for police department laptops to connect to the city government's VPN. The city would like a wireless solution that provides the largest coverage across the city with a minimal number of transmission towers. Latency and overall bandwidth needs are not high priorities. Which of the following would BEST meet the city's needs?
5G
LTE
WiFi 4
WiFi 5
WiFi 6
Network Operations
Network Security
A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?
Swap the fiber pairs in one of the SFPs
Replace the jumpers with single-mode fiber
Set the correct MTU on the new interface
Install an optic that matches the fiber type
Network Operations
Network Troubleshooting and Tools
Which of the following is the physical location where the customer-premise equipment comes together with the ISP or third-party telecommunications equipment?
Server room
Equipment closet
Demarcation point
Intermediate distribution frame
Networking Concepts
Network Operations
A network administrator is investigating an issue with VoIP calls that are not establishing properly. After troubleshooting, the administrator is able to determine the SIP responses are not being received by the gateway. Which of the following did the administrator use to determine this information?
netstat
A spectrum analyzer
tracert
A packet analyzer
Network Operations
Network Security
A network technician wants to ensure the backup configuration files for the network devices are not being altered after they are stored. Which of the following tasks should the network technician perform to achieve this goal?
Compute the checksum of the backup file and document it separately.
Store the backup files on a thumb drive and keep it in a desk drawer.
Encrypt the drive the files are stored on using AES-256.
Upload the backup files to a cloud storage service.
Network Security
The Chief Executive Officer s (CEO s) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?
Absorption
Reflection
Distance
Refraction
Attenuation
Network Operations
Network Security
A technician has been asked to install biometric controls at the entrance of a new datacenter. Which of the following would be appropriate authentication methods to meet this requirement? (Choose two.)
Badge reader
Retina scanner
Random number-generating token
Device proximity sensor
Challenge question
Combination lock
Fingerprint reader
Network Operations
Network Security
A router is set up to utilize RIPv2 to route traffic throughout the network. Which of the following routing metrics is used to determine the path?
Distance
Bandwidth
Speed
Hop count
Networking Concepts
Network Operations
Comments