Download CompTIA Network+.N10-007.PracticeTest.2018-10-09.78q.tqb

Vendor: CompTIA
Exam Code: N10-007
Exam Name: CompTIA Network+
Date: Oct 09, 2018
File Size: 340 KB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
A technician attempts to replace a switch with a new one of similar model from the same vendor. When the technician moves the fiber and SFP plug, the switch does not completely boot up. Considering that the config files are the same, which of the following is the MOST likely cause of the failure?
  1. Damaged fiber
  2. Corrupted operating system
  3. VLAN mismatch
  4. Bad port
Correct answer: B
Question 2
A company has hundreds of nodes on a single subnet and has decided to implement VLANs. Which of the following BEST describes the benefit of this approach?
  1. It segments broadcast domains in the network infrastructure
  2. It provides a faster port to all servers
  3. It provides multiple collision domains on one switchport
  4. It provides multiple broadcast domains within a single collision domain
Correct answer: A
Question 3
A company has completed construction of a new datacenter, and the IT staff is now planning to relocate all server and network equipment from the old site to the new site. 
Which of the following should the IT staff reference to determine the location of the equipment being moved?
  1. Rack diagrams
  2. Network topology
  3. Standard operating procedures
  4. Wiring documentation
Correct answer: A
Question 4
Which of the following would allow a device to maintain the same IP address lease based on the physical address of the network card?
  1. MAC address reservation
  2. Static IP address
  3. IP address exclusion
  4. Custom DNS server entry
Correct answer: A
Question 5
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?
  1. Access control lists
  2. Captive portal
  3. WPA2
  4. Port security
Correct answer: D
Question 6
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests. 
Which of the following represents the MOST secure method to configure guest access to the wireless network?
  1. Guests should log into a separate wireless network using a captive portal
  2. Guests should log into the current wireless network using credentials obtained upon entering the facility
  3. The existing wireless network should be configured to allow guest access
  4. An additional wireless network should be configured to allow guest access
Correct answer: A
Question 7
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. 
Which of the following should the network team implement to fulfil the request?
  1. Proxy server
  2. UTM appliance
  3. Content filter
  4. Load balancer
Correct answer: D
Question 8
A network technician is deploying mobile phones for a company’s sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
  1. GSM
  2. TDM
  3. CDMA
  4. PSTN
  5. MIMO
Correct answer: A
Question 9
A network administrator configures a router with the following IP address information:
Gigabit Ethernet 1 Interface: 10.10.0.1/24
Serial 0 Interface: 10.10.0.253/30
Clients are connected to a switch on the gigabit Ethernet interface; the ISP is connected to the Serial 0 interface. When the router configuration is complete and client devices are reconfigured, all clients report that they are unable to connect to the Internet. Which of the following is the MOST likely reason?
  1. The router was configured with an incorrect IP address
  2. The router was configured with an incorrect default gateway
  3. The router was configured with an incorrect subnet mask
  4. The router was configured with an incorrect loopback address
Correct answer: C
Question 10
A penetration tester has been tasked with reconnaissance to determine which ports are open on the network. Which of the following tasks should be done FIRST? (Choose two.)
  1. Network scan
  2. Banner grab
  3. Tracert
  4. DHCP server check
  5. Brute-force attack
Correct answer: AC
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!