Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

N10-007Free trialFree trial

By comptia
Aug, 2025

Verified

25Q per page

Question 26

A small town is attempting to attract tourists who visit larger nearby cities. A network engineer is asked to implement a network encompassing the five-block town center and nearby businesses. The inclusion of smartphones and portable devices is crucial to the plan. Which of the following is the network engineer being asked to implement?

  • A: LAN
  • B: PAN
  • C: MAN
  • D: WAN

Question 27

An employee wishes to use a personal cell phone for work-related purposes, including storage of sensitive company data, during long business trips. Which of the following is needed to protect BOTH the employee and the company?

  • A: An NDA ensuring work data stored on the personal phone remains confidential
  • B: An AUP covering how a personal phone may be used for work matters
  • C: A consent to monitoring policy covering company audits of the personal phone
  • D: Real-time remote monitoring of the phone's activity and usage

Question 28

Which of the following protocols can be both connection-oriented and connectionless?

  • A: 20 FTP
  • B: 53 DNS
  • C: 67 DHCP
  • D: 80 HTTP

Question 29

Which of the following BEST describes the differences between VLAN hopping and session hijacking?

  • A: VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user's web connection to execute commands
  • B: VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection
  • C: VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges
  • D: VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation

Question 30

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network. As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network. When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation. Which of the following attacks has the analyst successfully performed in this scenario?

  • A: Bluesnarfing
  • B: Session hijacking
  • C: MAC spoofing
  • D: VLAN hopping
  • E: Man-in-the-middle

Question 31

A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company's firewall to allow customers to retrieve a large file. Which of the following should the administrator perform BEFORE making the needed changes? (Choose two.)

  • A: Document the reason for the request
  • B: Scan the file for malware to protect the sales department's computers
  • C: Follow the company's approval process for the implementation
  • D: Install a TFTP server for the customers to use for the transfer
  • E: Create a honeypot to store the file on for the customers to use
  • F: Write the SLA for the sales department authorizing the change

Question 32

A user reports that a laptop cannot connect to the Internet despite the fact the wireless Internet was functioning on it yesterday. The user did not modify the laptop in any way, and the wireless Internet is functional on other users' laptops. Which of the following issues should be reviewed to help the user to connect to the wireless network?

  • A: Wireless switch toggled off
  • B: WAP settings
  • C: WLAN IP address out of scope
  • D: Wireless controller misconfiguration

Question 33

A network administrator wants to increase the confidentiality of the system by hardening the authentication process. Currently, the users log in using usernames and passwords to access the system. Which of the following will increase the authentication factor to three?

  • A: Adding a fingerprint reader to each workstation and providing a RSA authentication token
  • B: Adding a fingerprint reader and retina scanner
  • C: Using a smart card and RSA token
  • D: Enforcing a stronger password policy and using a hand geometry scan

Question 34

A network technician is building a network for a small office. The office currently has cable TV and now requires access to the Internet without adding any cabling other than what is already in place. Which of the following solutions should the technician install to meet these requirements?

  • A: DOCSIS modem
  • B: Wireless router
  • C: DSL modem
  • D: Access point

Question 35

The server team has just installed an application across three different servers. They are asking that all requests to the application are spread evenly across the three servers. Which of the following should the network team implement to fulfil the request?

  • A: Proxy server
  • B: UTM appliance
  • C: Content filter
  • D: Load balancer

Question 36

Which of the following VPN protocols establishes a secure session that can be initiated using a browser?

  • A: IPSec
  • B: SSL VPN
  • C: PTP
  • D: PPTP

Question 37

A technician is setting up a public guest network for visitors to access the Internet that must be separate from the corporate network. Which of the following are the
BEST steps for the technician to take with minimum overhead configuration? (Choose two.)

  • A: Enable SSID broadcasting to identify the guest network
  • B: Configure visitor devices to use static IP addresses
  • C: Enable two-factor authentication on visitor devices
  • D: Configure the access point to use WPA2-AES encryption
  • E: Ensure the access point is not running in mixed mode

Question 38

A network technician is installing a new network switch is looking for an appropriate fiber optic patch cable. The fiber optic patch panel uses a twist-style connector. The switch uses a SFP module. Which of the following connector types should the fiber patch cable have?

  • A: LC
  • B: ST
  • C: SC
  • D: MTRJ
  • E: MTP

Question 39

Which of the following WAN technologies utilizes the concept of virtual circuits and point-multipoint connections?

  • A: ISDN
  • B: MPLS
  • C: PRI
  • D: Broadband cable
  • E: Frame relay

Question 40

A network administrator wishes to ensure there are no unnecessary open communication paths into a server. Using a port scanner, the administrator finds that ports are reported as closed. Which of the following BEST explains this response?

  • A: The ports belong to an active system and are denying requests
  • B: The ports are associated with deprecated services
  • C: The ports do not belong to a live system
  • D: The ports replied with a SYN/ACK response

Question 41

Users are reporting issues with slow connection speeds and a loss of connectivity on the newly installed wireless network. The issues are intermittent but seem to occur most often around midday. Which of the following is the MOST likely cause?

  • A: There is interference from small appliances
  • B: The signal coverage area is too small
  • C: Not enough DHCP addresses have been allotted
  • D: The DNS cache on the users' computers has become corrupt

Question 42

A user reports difficulties connecting a PC to a wired network. The PC connects to an IP phone, which is working correctly. A network technician can verify that other devices successfully connect to the phone. At which of the following layers of the OSI model is the problem MOST likely located?

  • A: Network
  • B: Physical
  • C: Transport
  • D: Application

Question 43

Which of the following physical security controls is MOST likely to be susceptible to a false positive?

  • A: Identification card
  • B: Biometric device
  • C: Proximity reader
  • D: Video camera

Question 44

A network technician is deploying mobile phones for a company's sales staff. Salespeople frequently travel nationally and internationally to meet with clients, and often have to roam or switch cellular providers. Which of the following standards is the BEST option to fit the requirements?

  • A: GSM
  • B: TDM
  • C: CDMA
  • D: PSTN
  • E: MIMO

Question 45

An assistant systems analyst reports the following findings of an investigation of slow Internet connections in a remote office to the senior systems analyst:

Image 1

Which of the following devices is causing the issue?

  • A: Router
  • B: Firewall
  • C: Switch 1
  • D: Switch 2

Question 46

A small business developed an in-house application that is very sensitive to network latency when a communicating between servers. Due to a lack of funds, the business had to build its own network for workstations and servers. Now a network administrator must redesign the network due to performance issues with the application. Which of the following would be the MOST cost effective for the administrator to recommend?

  • A: Create Ethernet VLANs
  • B: Disable autonegotiation on the servers
  • C: Install 10Gb Ethernet NICs in the servers
  • D: Install Fibre Channel for the server network

Question 47

A network technician is configuring a firewall access list to secure incoming connections to an email server. The internal address of this email server is
192.168.1.143. The firewall should allow external email servers to send email to the email server. The email server also supports client access via a web browser.
Only secure protocols should be used, and only the necessary ports should be open. Which of the following ACL rules should be configured in the firewall's WAN port? (Choose two.)

  • A: Permit 192.168.1.143.25
  • B: Permit 192.168.1.143.80
  • C: Permit 192.168.1.143.110
  • D: Permit 192.168.1.143.143
  • E: Permit 192.168.1.143.443
  • F: Permit 192.168.1.143.587

Question 48

A network administrator is testing connectivity at a new corporate site. The site has a wireless guest as well as a wired employee network. After verifying connectivity, the administrator checks link speeds by using a speed testing website. The speed testing website shows lower download and upload speeds for the wired network than the wireless network. Which of the following is the MOST likely explanation?

  • A: There is less local congestion on the wireless network
  • B: The testing server for the wired network was farther away
  • C: The firewall is configured to throttle traffic to specific websites
  • D: The wireless access points were misconfigured

Question 49

A technician replaces a failed router with a spare that has been in inventory for some time. After attempting to enable HTTPS on the spare router, the technician discovers the feature is unavailable. The support office was able to connect to the previous router. Which of the following actions should the technician perform to enable HTTPS access for the support team?

  • A: Reboot the router
  • B: Enable HTTP on the router
  • C: Update the firmware of the spare router
  • D: Perform a factory reset on the router

Question 50

A technician is trying to configure a previously owned WAP. The technician successfully logs into the administrative console and attempts to input the IP address on the WAP. However, the WAP is not accepting the command. Which of the following is causing the problem?

  • A: The WAP antenna is damaged
  • B: The WAP transmitter light is dim
  • C: The terminal emulation software is misconfigured
  • D: The LWAPP image is installed on the WAP
Page 2 of 28 • Questions 26-50 of 700

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!