Exam Logo

Comptia (N10-007) Exam Questions And Answers page 92

A SAN serves out storage to a company s virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?
Networking Concepts Network Operations
Which of the following physical security devices is used to detect unauthorized server room access?
Network Security
A network technician has been asked to provide daily reports on network saturation. Which of the following would BEST reflect these statistics?
Network Operations Network Troubleshooting and Tools
A network administrator has discovered a low-end managed switch connected to the company s LAN. While reading about the device s specifications on the manufacturer s website, the administrator discovers the switch does not support a command-line interface for administration. Which of the following remote access methods should the administrator use to log in to the switch?
Network Operations
A network engineer has been assigned a support ticket for a PC that will not connect to the network in a new area of the building. The engineer knows the PC should be assigned to the PC VLAN (VLAN 1101) and should have an IP in the 172.16.250.0/22 range. While talking with the hardware team, the engineer is told this is the first PC to be installed in this area. The engineer then logs into the edge switch the PC is connected to and looks at the configuration. Given the output below:


Which of the following BEST explains the reason why the PC cannot connect?
Networking Concepts Network Operations
A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedures for removing sensitive information and configurations from surplus equipment?
Network Security
A network administrator is reviewing the following output from a switch:


Which of the following attacks has occurred on the switch?
Network Security
When connecting to a network device through a remote connection for configuration purposes, which of the following protocols is MOST secure?
Network Security
A network technician is running copper cable from a core switch to a network closet that is approximately 574ft (175m) away. Which of the following should the technician use to accomplish this?
Networking Concepts Network Operations
A technician is replacing a failed SOHO router for a customer who has an existing switch, cable modem, and static IP address. The user has a web server that faces the Internet so users can visit and leave comments. Which of the following BEST describes the correct configuration for this customer s requirements?
Network Operations Network Management