Certbus > CompTIA > CompTIA Certifications > N10-007 > N10-007 Online Practice Questions and Answers

N10-007 Online Practice Questions and Answers

Questions 4

Which of the following is networking stand-alone hardware that will permit any WiFi-compliant device to connect to a network?

A. Wireless hub

B. Wireless firewall

C. Wireless access point

D. Wireless bridge

Browse 1251 Q&As
Questions 5

A VoIP system will require 23 concurrent voice channels and signaling channel. Which of the following types of service would provides the BEST connectivity to the PSTN?

A. PRI

B. BRI

C. E1/E3

D. DSL

Browse 1251 Q&As
Questions 6

While working on a Linux-based OS, a technician experiences an issue accessing servers and some sites by name. Which of the following command-line tools should the technician use to assist in troubleshooting?

A. dig

B. iptables

C. ifconfig

D. traceroute

Browse 1251 Q&As
Questions 7

Which of the following BEST describes an explogt?

A. A router with default credentials

B. An open mail relay server

C. A SNMPv1 private community

D. A privilege escalation script

Browse 1251 Q&As
Questions 8

A network technician is installing a new fiber-optic connection between two buildings on a campus network. When the network technician connects the fiber at the second location, the interface link light does not light up. Which of the following should the technician do NEXT?

A. Reverse the finer pair

B. Check the duplex on each interface

C. Install a fiber distribution panel

D. Configure a media converter for each switch

Browse 1251 Q&As
Questions 9

A network technician needs to correlate security events to analyze a suspected intrusion. Which of the following should the technician use?

A. SNMP

B. Log review

C. Vulnerability scanning

D. SIEM

Browse 1251 Q&As
Questions 10

The Chief Executive Officer's (CEO's) tablet cannot connect to the wireless network from the corner office. A network technician verified the tablet can connect to the wireless network in other areas of the building. The distance between the office and the 802.11ac WAP is 150ft (46m), and there are a few cubicles in between. Which of the following is the MOST likely cause of the tablet not connecting?

A. Absorption

B. Refilection

C. Distance

D. Refraction

E. Attenuation

Browse 1251 Q&As
Questions 11

A network administrator is purchasing a mobile phone for a manager who is traveling internationally. The phone needs to be able to make and receive calls in multiple countries outside of North America. Which of the following cellular technologies should the administrator look for in the phone?

A. CDMA

B. GSM

C. TDMA

D. CSMA

Browse 1251 Q&As
Questions 12

A network technician needs to configure a device with an embedded OS so it can be connected to a wireless handheld scanner. Which of the following technologies should be configured on the OS to create the wireless connection?

A. Partial mesh

B. Ad hoc

C. Ring

D. Bus

Browse 1251 Q&As
Questions 13

A company wishes to allow employees with company-owned mobile devices to connect automatically to the corporate wireless network upon entering the facility. Which of the following would BEST accomplish this objective?

A. Open wireless

B. Geofencing

C. Pre-shared key

D. MAC filtering

Browse 1251 Q&As
Questions 14

A network technician wants to gain a better understanding of network trends to determine if they are over capacity. Which of the following processes should the technician use?

A. Log review

B. Port scanning

C. Vulnerability scanning

D. Traffic analysis

Browse 1251 Q&As
Questions 15

A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the technician deploy?

A. RDP

B. SSH

C. VNC

D. Telnet

Browse 1251 Q&As
Questions 16

A user believes a work email account has been compromised. A technician discovers that an email seeming to be from the user's bank shares the same origin IP address as the last login to the email account. Which of the following types of attack is described in this scenario?

A. Spam

B. Ransomware

C. Man-in-the-middle

D. Phishing

Browse 1251 Q&As
Questions 17

A zero-day vulnerability is discoverd that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services. Which of the following explains why this device is secure?

A. Because secure protocols would reject malicious packets

B. Because SCP is not a secure service

C. Because FTP is not a secure service

D. Because a secure firewall will protect the device

Browse 1251 Q&As
Questions 18

Which of the following BEST describes the functionality of the root guard feature on a switch?

A. BPDUs entering the root bridge are ignored.

B. The STP root bridge cannot be changed.

C. Broadcast storms entering from a root port are blocked.

D. Loop protection is enabled on the root port of a switch.

Browse 1251 Q&As
Exam Code: N10-007
Exam Name: CompTIA Network+
Last Update: Mar 20, 2025
Questions: 1251 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99