Comptia (N10-007) Exam Questions And Answers page 51
A network manager has received reports that some employees have been using the company s WiFi to log onto their social media accounts from their personal devices. The network manager is looking for a solution to prevent this type of activity. The Chief Information Officer (CIO) wants to continue using a pre-shared key and add an additional layer of security to allow only authorized users to authenticate to the WiFi. Which of the following solutions would address this request? (Choose two.)
MAC filtering
Geofencing
802.1X
Proxy server
SSO
Network Operations
Network Security
Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a wired network?
Wireless hub
Wireless firewall
Wireless access point
Wireless bridge
Networking Concepts
Network Operations
A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?
Change the default credentials.
Verify the firmware file hash.
Disable unused switchports.
Apply patches and updates.
Network Security
A PC cannot reach a server in the same VLAN with IP address 10.10.5.0. The PC has the following information:
IP address: 10.10.0.255
Net mask: 255.255.252.0
Gateway: 10.10.1.1
Which of the following is the reason for this issue?
IP address: 10.10.0.255
Net mask: 255.255.252.0
Gateway: 10.10.1.1
Which of the following is the reason for this issue?
The server IP address ends in a network address.
The gateway address is incorrect.
The server address is not in the same subnet as the PC address.
The IP address is configured to be the broadcast address.
Network Operations
Network Security
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?
It segments broadcast domains in the network infrastructure
It provides a faster port to all servers
It provides multiple collision domains on one switchport
It provides multiple broadcast domains within a single collision domain
Network Operations
Network Security
A network technician is utilizing DHCP. The technician has set a six-day lease time for all hosts. After which of the following time intervals should the hosts attempt to FIRST renew their address?
Two days
Three days
Six days
Seven days
Network Operations
Network Troubleshooting and Tools
Employees at a company report that they are unable to access the Internet. A network technician notices the workstations are receiving IP addresses that do not follow the IP addressing scheme of the corporate network. Upon further inspection, the technician finds an employee has plugged a rogue wireless router into the corporate network. Which of the following settings would have prevented this situation?
DHCP snooping
DHCP relay
DHCP leasing
DHCP options
Network Security
A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company s firewall. Which of the following should the technician use to troubleshoot?
WiFi analyzer
Bandwidth speed tester
Dig
Packet sniffer
Network Security
A network manager is reviewing recent changes after learning the network health metrics are no longer being protected. The manager discovers the ACL has been updated to the following:
Which of the following lines in the ACL points to the issue?
Which of the following lines in the ACL points to the issue?
Line 1
Line 2
Line 3
Line 4
Line 5
Network Security
A network technician has provisioned a new Linux instance in a public cloud provider s IaaS environment. The technician did not install a graphical user interface. The technician wants to connect to the server s public IP address securely to start a console session. Which of the following remote access methods should the technician use?
SSH
Telnet
VNC
RDP
Network Security
Comments