Download CompTIA Network+ 2018.prep4sure.N10-007.2019-03-20.1e.158q.vcex

Download Dump

File Info

Exam CompTIA Network+ 2018
Number N10-007
File Name CompTIA Network+ 2018.prep4sure.N10-007.2019-03-20.1e.158q.vcex
Size 213 Kb
Posted March 20, 2019
Downloads 246

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

 
 



Demo Questions

Question 1
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?

  • A: Move the UTM onto the LAN side of the network
  • B: Enable TLS inspection on the UTM
  • C: Enable stateful inspection on the UTM
  • D: Configure the UTM to deny encrypted files from being transferred



Question 2
A technician has racked a new access switch and has run multimode fiber to a new location. After installing an extended-range 10Gb SFP in the core switch, the technician installed a 10Gb SFP in the access switch and connected the port to the new extension with a fiber jumper. However, the link does not display, and the technician cannot see light emitting from the core switch. Which of the following solutions is MOST likely to resolve the problem?

  • A: Swap the fiber pairs in one of the SFPs
  • B: Replace the jumpers with single-mode fiber
  • C: Set the correct MTU on the new interface
  • D: Install an optic that matches the fiber type



Question 3
A network technician has implemented ACLs to limit access to cloud-based file storage. Which of the following security mechanisms has the technician enforced?

  • A: DLP
  • B: IDS
  • C: WAF
  • D: WPA
  • E: TPM



Question 4
A firewall administrator is implementing a rule that directs HTTP traffic to an internal server listening on a non-standard socket. 
Which of the following types of rules is the administrator implementing?

  • A: NAT
  • B: PAT
  • C: STP
  • D: SNAT
  • E: ARP



Question 5
A technician is installing a new wireless badging system on a hospital network. The requirements of the badging system are for it to have its own SSID and low power levels. The badging system has to cover 99.9% of the hospital. Which of the following is the BEST action to take to meet the system requirements?

  • A: Install additional WAPs
  • B: Install external antennas
  • C: Move the WAPs closer to the more populated area
  • D: Change the antenna types



Question 6
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?

  • A: It segments broadcast domains in the network infrastructure
  • B: It provides a faster port to all servers
  • C: It provides multiple collision domains on one switchport
  • D: It provides multiple broadcast domains within a single collision domain



Question 7
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?

  • A: MAC address reservation
  • B: Static IP address
  • C: IP address exclusion
  • D: Custom DNS server entry



Question 8
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. 
Which of the following should the network team implement to fulfil the request?

  • A: Proxy server
  • B: UTM appliance
  • C: Content filter
  • D: Load balancer



Question 9
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks. 
Which of the following should the technician perform to discover possible interference?

  • A: Site survey
  • B: Vulnerability scanning
  • C: Wardriving
  • D: Checking logical diagram
  • E: Bandwidth test



Question 10
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?

  • A: Test the possible solution
  • B: Question the users
  • C: Determine what has changed
  • D: Document the theory









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset