CompTIA N10-007 Exam Practice Questions (P. 2)
- Full Access (933 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?
send
light_mode
delete
Question #12
A network engineer is configuring wireless access for guests at an organization. Access to other areas in the organization should not be accessible to guests.
Which of the following represents the MOST secure method to configure guest access to the wireless network?
Which of the following represents the MOST secure method to configure guest access to the wireless network?
- AGuests should log into a separate wireless network using a captive portal
- BGuests should log into the current wireless network using credentials obtained upon entering the facility
- CThe existing wireless network should be configured to allow guest access
- DAn additional wireless network should be configured to allow guest access
Correct Answer:
A
A
send
light_mode
delete
Question #13
The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?
send
light_mode
delete
Question #14
A network technician is deploying mobile phones for a company's sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?
send
light_mode
delete
Question #15
A network administrator has been given a network of 172.16.85.0/21 and wants to know the usable range of IP addresses on that subnet. Which of the following indicates the correct IP address range?
- A172.16.80.0-172.16.85.254
- B172.16.80.0-172.16.88.255
- C172.16.80.1-172.16.87.254
- D172.16.80.1-172.16.85.255
Correct Answer:
C
C
send
light_mode
delete
Question #16
A network technician is troubleshooting wireless network issues in a crowded office complex and suspects there is interference from nearby wireless networks.
Which of the following should the technician perform to discover possible interference?
Which of the following should the technician perform to discover possible interference?
- ASite survey
- BVulnerability scanning
- CWardriving
- DChecking logical diagram
- EBandwidth test
Correct Answer:
A
A
send
light_mode
delete
Question #17
A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take
NEXT?
NEXT?
- ATest the possible solution
- BQuestion the users
- CDetermine what has changed
- DDocument the theory
Correct Answer:
A
A
send
light_mode
delete
Question #18
A network technician has discovered a rogue access point placed under an empty cubicle desk. Which of the following should the technician perform to ensure another cannot be placed on the network?
- ADisable unused ports on switchesMost Voted
- BEnable DHCP guard to detect rogue servers
- CConfigure WPA2 on all access points
- DUse TACACS+ authentication
Correct Answer:
B
B
send
light_mode
delete
Question #19
Which of the following provides the ability to deploy consistent access point configurations from a central location?
- AWireless controller
- BAAA server
- CWiFi-protected setup
- DProxy server
- EVPN concentrator
Correct Answer:
A
A
send
light_mode
delete
Question #20
A network technician is configuring a wireless network at a branch office. Users at this office work with large files and must be able to access their files on the server quickly. Which of the following 802.11 standards provides the MOST bandwidth?
send
light_mode
delete
All Pages