Download CompTIA Network+.N10-007.VCEDumps.2019-01-18.148q.tqb

Vendor: CompTIA
Exam Code: N10-007
Exam Name: CompTIA Network+
Date: Jan 18, 2019
File Size: 1 MB

How to open TQB files?

Files with TQB (Taurus Question Bank) extension can be opened by Taurus Exam Studio.

Demo Questions

Question 1
A network technician is creating a new subnet for 488 host machines. The technician is told to use a class B address scheme when making the subnet and is instructed to leave as much room as possible for additional subnets of the same size. Which of the following subnets would fulfill these requirements?
  1. 10.5.4.0/22
  2. 10,233.2.0/23
  3. 172.16.0.0/22
  4. 172.18.0.0/23
  5. 192 168.25.0/24
Correct answer: D
Question 2
Which of the following protocols can be both connection-oriented and connectionless?
  1. 20 FTP
  2. 53 DNS
  3. 67 DHCP
  4. SO HTTP
Correct answer: B
Question 3
An ISP technician gets a call from a business that just changed equipment but can no longer connect to the Internet. The technician checks the ARP table on (he ISP switch, and there is no corresponding MAC address present. Instead, the entry is "Incomplete". Which of the following could cause this condition?
  1. VLAN mismatch
  2. Duplex/ Speed mismatch
  3. Duplicate IP address
  4. TX/RX reverse
Correct answer: B
Question 4
As part of a transition from a static to a dynamic routing protocol on an organization's internal network, the routing protocol must support IPv4 and VLSM. Based on those requirements, which of the following should the network administrator use? (Choose two.)
  1. OSPF
  2. IS IS
  3. RIPv1
  4. BGP
  5. VRRP
Correct answer: AB
Question 5
Which of the following is the number of broadcast domain that are created when using an unmanaged 12-port switch?
  1. 0
  2. 1
  3. 2
  4. 5
  5. 12
Correct answer: B
Question 6
A Chief Information Officer (CIO) wants to move some IT services to a cloud service offering. However, the network administrator still wants to be able to control some parts of the cloud service's networking components. Which of the following should be leveraged to complete this task?
  1. laaS
  2. PaaS
  3. SaaS
  4. DaaS
Correct answer: B
Question 7
After a server outage, a technician discovers that a physically damaged fiber cable appears to be the problem. After replacing the cable, the server will still not connect to the network. Upon inspecting the cable at the server end, the technician discovers light can be seen through one of the two fiber strands. Which of the following should the technician do FIRST to reconnect the server to the network?
  1. Reverse the fiber strands of the cable and reconnect them to the server
  2. Use a TDR to test both strands of a new replacement cable prior to connecting it to the server
  3. Replace the server's single-mode fiber cable with multimode fiber
  4. Move the fiber cable to different port on the switch where both strands function
Correct answer: A
Question 8
A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five- block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?
  1. LAN
  2. PAN
  3. MAN
  4. WAN
Correct answer: C
Question 9
A network technician wants to remotely and securely access the desktop of a Linux workstation. The desktop is running remote control software without encryption. Which of the following should the technician use to secure the connection?
  1. SSH in tunnel mode
  2. RDP set to console connection
  3. EAP-PEAP
  4. SFTP
Correct answer: A
Question 10
A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?
  1. Move the UTM onto the LAN side of the network
  2. Enable TLS inspection on the UTM
  3. Enable stateful inspection on the UTM
  4. Configure the UTM to deny encrypted files from being transferred
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!