CompTIA Network+ N10-007 Exam #2
Quiz Summary
0 of 90 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 90 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 90
1. Question
Examine the drag and drop – what definition belongs with Switch?
CorrectIncorrect -
Question 2 of 90
2. Question
You have an end user that occasionally works from home and needs your help in deciding which
wireless standard he should configure on his home wireless router. Besides working from home, the
user also has several video and audio streaming devices that consume a large amount of bandwidth,
some of which are located quite a distance from the router. Which of the following wireless standards
would best suit the user’s needs?CorrectIncorrect -
Question 3 of 90
3. Question
You are needing to set a requirement that administrators follow certain procedures regarding their
activities on your network. Which of the following document types would you be creating?CorrectIncorrect -
Question 4 of 90
4. Question
You are in the process of configuring a new network wide VLAN. You have completed the
configuration on one of your network switches and would like to avoid manually repeating the same
configuration on the remainder of switches. Which of the following should you do?CorrectIncorrect -
Question 5 of 90
5. Question
Your customer has requested that you install and configure a wireless network in their corporate
office. You plan to place the WAP in the center of the office to ensure maximum coverage. Which of the
following antenna types would be the best choice for this scenario?CorrectIncorrect -
Question 6 of 90
6. Question
You have several different VM’s running on a single hypervisor and you would like to configure each
VM to use its own VLAN. Which of the following virtual devices would configure the VLAN’s on?CorrectIncorrect -
Question 7 of 90
7. Question
You are setting up a VPN to secure and encrypt all traffic in and out of your network. Which of the
following VPN protocols is an open standard to help secure the connection?CorrectIncorrect -
Question 8 of 90
8. Question
Which of the following is a layer 2 protocol designed to avoid loops in your topology?
CorrectIncorrect -
Question 9 of 90
9. Question
You are in the process of upgrading your network switches to allow for 10Gbps of throughput. In
order to reduce the expense of the upgrade, you would like to continue to use the existing CAT6a
cabling. Which of the following Ethernet standards should you use?CorrectIncorrect -
Question 10 of 90
10. Question
You plan to delegate certain Windows server administrative tasks to another team member. You
want to give this team member the rights to backup and restore all files on the server, regardless of who
owns the files or what permissions have been assigned to them. You would also like him to be able to
shut down the server, but you do not want to give him permission to perform any other administrative
tasks on the server. Which of the following Windows built-in user groups would you add the team
member to?CorrectIncorrect -
Question 11 of 90
11. Question
You have been tasked with migrating your company’s traditional phone system to VoIP. The VoIP
phones need to download their configuration from a TFTP server every time they boot up. Which of the
following ports must be opened on the firewall in order to make sure that the VoIP phones will be able
to communicate with the TFTP server?CorrectIncorrect -
Question 12 of 90
12. Question
Which of the following is the default subnet mask when using an IP address of 216.12.67.9?
CorrectIncorrect -
Question 13 of 90
13. Question
Which of the following protocols utilizes pre-shared keys for authentication and encryption and could be used in WPA2 Enterprise?
CorrectIncorrect -
Question 14 of 90
14. Question
You have a server with the hostname Production1 running an application that generates a payload of
5000b and sends it to another server named Production2. When the application running on Production2
receives the payload, what will be the size of the payload?CorrectIncorrect -
Question 15 of 90
15. Question
What layer 2 security mechanism can lock down access to a port based on MAC address?
CorrectIncorrect -
Question 16 of 90
16. Question
An end user’s computer has been assigned a binary IP address of
11000000.01100000.00000001.00000011. Which of the following class designations is this IP address a
member of?CorrectIncorrect -
Question 17 of 90
17. Question
You discover that your network is experiencing a network attack that is sending pings to a significant
number of computers using a spoofed source address and forcing all of those systems to reply to that
address. The large amount of data being created by the attack has virtually shut down the system with
the spoofed address. Which of the following attack types is most likely the culprit?CorrectIncorrect -
Question 18 of 90
18. Question
How many bits of data storage are in 512 bytes?
CorrectIncorrect -
Question 19 of 90
19. Question
Which of the following examples is a protocol used in VoIP telephony?
CorrectIncorrect -
Question 20 of 90
20. Question
Which of the following IEEE standards is associated with trunking?
CorrectIncorrect -
Question 21 of 90
21. Question
Which layer of the OSI model manages dialog between computers?
CorrectIncorrect -
Question 22 of 90
22. Question
You have just built a new file server and need to choose which type of backup strategy to use. You would like to implement a backup strategy that uses a full backup as the starting point, but then only backs up the files that have changed since the last backup. You also want to make sure that you are able to perform a restore from backup in the shortest time possible. Which type of backup would you use in combination with your full backup to accomplish these goals?
CorrectIncorrect -
Question 23 of 90
23. Question
You would like to implement a centralized network monitoring solution that monitors computer performance statistics and event/error messages. Which of the following monitoring types uses a two-tiered approach that utilizes a management information base (MIB) located on the managed device?
CorrectIncorrect -
Question 24 of 90
24. Question
Which of the following is a valid 48-bit MAC address?
CorrectIncorrect -
Question 25 of 90
25. Question
You have several fiber-optic cables running through your ceiling from your server room to your switching closet and you suspect that one of them is broken. Which of the following tools can you use to test the cable run?
CorrectIncorrect -
Question 26 of 90
26. Question
SIP is the protocol used for VoIP connections. Which of the following TCP ports does SIP use?
CorrectIncorrect -
Question 27 of 90
27. Question
A home user has a combined voice-data circuit provided by their telephone provider. After running an Internet speed test, you discover that he is getting download speeds as high as 9 Mbps and upload speeds around 1 Mbps. Which of the following services is most likely being used?
CorrectIncorrect -
Question 28 of 90
28. Question
Your company is bidding on a government contract and one of the stipulations is that you implement a two-factor authentication scheme for all employee’s working on the contract. Which of the following should you implement? (Choose two possible solutions.)
CorrectIncorrect -
Question 29 of 90
29. Question
What VLAN does not possess a tag across a trunk link?
CorrectIncorrect -
Question 30 of 90
30. Question
After testing each pin using a cable tester, you receive the following output:
Based on this output, which of the following cable types are you testing?
CorrectIncorrect -
Question 31 of 90
31. Question
Your company is bidding on a new government contract that entails working with very sensitive data. As a stipulation of the contract, your company must hire an independent firm to identify any potential weaknesses in your organization’s internal and external network infrastructure. This independent contractor will attempt various attacks to accomplish this goal. The service that this independent contractor will be providing is an example of which of the following?
CorrectIncorrect -
Question 32 of 90
32. Question
You have just assigned USER1 Read permission to the Accounting folder. USER1 is a member of the Accounting group which has the Modify permission for the same folder. What is USER1’s effective permission to the folder?
CorrectIncorrect -
Question 33 of 90
33. Question
Which of the following application-level runs on port 25?
CorrectIncorrect -
Question 34 of 90
34. Question
Which of the following technologies is used to give internet access to multiple computers on a network while only using one public IP address?
CorrectIncorrect -
Question 35 of 90
35. Question
What is a special purpose network designed for the efficient storage and transfer of data?
CorrectIncorrect -
Question 36 of 90
36. Question
Which of the following cable types is immune to crosstalk and outside electrical noise?
CorrectIncorrect -
Question 37 of 90
37. Question
You have been tasked with setting up a new network for a small remote office. This office will not have an onsite IT technician and therefore you will need to install a topology that includes redundancy. Which of the following network topologies would best suit this scenario?
CorrectIncorrect -
Question 38 of 90
38. Question
Which of the following security protocols employs Encapsulation Security Protocols (ESP) to encrypt traffic and the Authentication Header (AH) for message integrity and authentication?
CorrectIncorrect -
Question 39 of 90
39. Question
Which of the following commands was used to generate the output in the exhibit above from the command prompt on a Windows computer?
CorrectIncorrect -
Question 40 of 90
40. Question
Your network has two network segments separated by a router named Network 1 and Network 2. You have a DHCP server configured on Network 1, but want clients on Network 2 to be able receive their IP configurations from the DHCP server on Network 1. Which of the following would you need to configure on Network 2 in order to make this exchange possible?
CorrectIncorrect -
Question 41 of 90
41. Question
Your network infrastructure consists of all Cisco switches. You would like to enable network traffic to travel across various switches on different VLAN’s. Which of the following features would you need to configure on these switches?
CorrectIncorrect -
Question 42 of 90
42. Question
You are experiencing time synchronization issues on your Windows server. Where would you go to troubleshoot this issue by viewing system logs?
CorrectIncorrect -
Question 43 of 90
43. Question
Which of the following Linux commands would you use to test DNS?
CorrectIncorrect -
Question 44 of 90
44. Question
Which of the following is an example of an IPv6 IP address?
CorrectIncorrect -
Question 45 of 90
45. Question
You want to make sure that a certain device on your network receives the same IP address from DHCP each time its lease is renewed. What should you do to ensure that your DHCP server does not assign this IP address to another device on your network?
CorrectIncorrect -
Question 46 of 90
46. Question
What device is position A in the diagram shown?
CorrectIncorrect -
Question 47 of 90
47. Question
Your company is experiencing response times of up 48 hours from your IT vendor when business-critical systems go down. Which of the following should you request from your vendor in order to reduce downtime?
CorrectIncorrect -
Question 48 of 90
48. Question
Which firewall port needs to be opened in order to allow SNMP traffic through?
CorrectIncorrect -
Question 49 of 90
49. Question
Which of the following authentication protocols is considered to be very insecure because it transmits usernames and passwords over a network in clear-text?
CorrectIncorrect -
Question 50 of 90
50. Question
Your company is experiencing very high traffic on one specific service that it hosts and performance is being affected. Which of the following technologies will allow you to divide the traffic between multiple servers?
CorrectIncorrect -
Question 51 of 90
51. Question
Which of the following is the term for when the routes on each router are shared with each of the other routers on the network and merged into each router’s routing table?
CorrectIncorrect -
Question 52 of 90
52. Question
Which of the following is the IEEE standard associated with the STP protocol?
CorrectIncorrect -
Question 53 of 90
53. Question
Which of the following features prevents router from sending packets back in the direction that they were received from and therefore helps to prevent loops on the network?
CorrectIncorrect -
Question 54 of 90
54. Question
Which of the following IP addresses are invalid? (Choose all that apply.)
CorrectIncorrect -
Question 55 of 90
55. Question
Which of the following DNS record types resolves hostnames into IPv6 addresses?
CorrectIncorrect -
Question 56 of 90
56. Question
Which of the following commands is used to display the routing table on a Cisco router?
CorrectIncorrect -
Question 57 of 90
57. Question
One of your end users connects to an open wireless network at a local coffee shop and sends out a couple of emails from his corporate email account. When the user returns to the office, he starts getting calls from several people on his email contact list saying that they have been receiving unusual email that appears to have been sent from his email address. Which of the following protocols would allow a hacker using a network sniffer to compromise the user’s email credentials?
CorrectIncorrect -
Question 58 of 90
58. Question
After taking over the administration of an existing network, you discover that there appears to be active services running on the network that are no longer in use. Which of the following tools would you use to identify these active services in order to disable them?
CorrectIncorrect -
Question 59 of 90
59. Question
Your company is hosting a large sales conference where many customers and vendors will need to access your network using their own laptops. As a security precaution, you want to make sure that the laptops are updated with the latest patches and virus definitions. Which of the following technologies will allow you to assess the state of the laptops and then either allow or disallow the connection based on the state of the system?
CorrectIncorrect -
Question 60 of 90
60. Question
You have been tasked with installing several wireless access points in the ceiling at various locations throughout a large office building. Your company has approved Ethernet cable runs to each of the locations, but would like to forego the expense of installing power outlets for each access point. To accomplish this goal, you have decided to use access points that receive their power through the Ethernet cabling. What will you need to do next to complete this solution?
CorrectIncorrect -
Question 61 of 90
61. Question
What command was used to generate the following output?
CorrectIncorrect -
Question 62 of 90
62. Question
What is a layer 2 broadcast domain in a switched network?
CorrectIncorrect -
Question 63 of 90
63. Question
What is the maximum data size in bytes that can be contained in a jumbo frame?
CorrectIncorrect -
Question 64 of 90
64. Question
Which of the following is the correct binary version of the IPv4 address 192.168.1.1?
CorrectIncorrect -
Question 65 of 90
65. Question
Which of the following protocols are considered distance vector routing protocols?
CorrectIncorrect -
Question 66 of 90
66. Question
Which of the following can be connected using a CSU/DSU device?
CorrectIncorrect -
Question 67 of 90
67. Question
You have just configured a WLAN for a very large warehouse that spans across multiple wireless access points and you have named the wireless network WH1. In this scenario, what would be the proper acronym for the wireless network name you have chosen?
CorrectIncorrect -
Question 68 of 90
68. Question
Which of the following IEEE standards defines Ethernet?
CorrectIncorrect -
Question 69 of 90
69. Question
Which of the following media converter types would you use to a new multimode connection to an existing CAT 6 infrastructure?
CorrectIncorrect -
Question 70 of 90
70. Question
Which layer of the OSI model handles logical addressing and routing?
CorrectIncorrect -
Question 71 of 90
71. Question
Which of the following is an example of a Network layer address?
CorrectIncorrect -
Question 72 of 90
72. Question
What is the first thing you should do as soon as you realize that your web server has been compromised by hackers?
CorrectIncorrect -
Question 73 of 90
73. Question
You have been tasked with the job of documenting your domain structure and the objects it contains. The document that you need to create is part of which of the following network documentation processes?
CorrectIncorrect -
Question 74 of 90
74. Question
After installing a new wireless network, the customer has requested a report of the actual usable bandwidth between an access point and a wireless devices connected to the network. Which of the following should you record for the report?
CorrectIncorrect -
Question 75 of 90
75. Question
Your enterprise network uses a wireless controller-based system. Which of the following protocols will you need to configure to take advantage of the built-in rouge access point detection?
CorrectIncorrect -
Question 76 of 90
76. Question
What component goes with the layer of Network?
CorrectIncorrect -
Question 77 of 90
77. Question
You need to crimp a crossover cable in order to connect two computers for diagnostic purposes. To accomplish this you will need to identify the order of the color wires used in the 568B standard and the 568A standard. Using the following diagram, which colors go in position 8 of the 568A standard?
CorrectIncorrect -
Question 78 of 90
78. Question
What class of address is 185.12.34.12?
CorrectIncorrect -
Question 79 of 90
79. Question
What does the command ifconfig do in a Linux OS?
CorrectIncorrect -
Question 80 of 90
80. Question
What DNS record is used with an email server?
CorrectIncorrect -
Question 81 of 90
81. Question
Your telephone provider has contacted you and asked for your assistance troubleshooting your T3 connection. The vendor representative has asked you to plug a special device into the CSU/DSU. Which of the following was most likely the device you were asked to use?
CorrectIncorrect -
Question 82 of 90
82. Question
As part of your company’s disaster recovery plan you have been sending copies of your locally hosted virtual server images to a cloud provider in case of a catastrophic system failure, as in the case of a fire. This will give you the ability to quickly restore your systems that can be accessed via VPN using the cloud provider’s infrastructure. Which of the following cloud services are you using?
CorrectIncorrect -
Question 83 of 90
83. Question
Which of the following 10 Gbps standards supports SONET and a maximum distance of 10 km when using single-mode fiber-optic cable?
CorrectIncorrect -
Question 84 of 90
84. Question
Which PPP component is used as the basis to encapsulate its data during transmission?
CorrectIncorrect -
Question 85 of 90
85. Question
Which of the following mechanisms is used by NIDS to detect intrusions?
CorrectIncorrect -
Question 86 of 90
86. Question
Which of the following ports needs to be opened on your firewall in order to allow clients to send requests to your SSL-enabled website?
CorrectIncorrect -
Question 87 of 90
87. Question
You receive a suspicious email that appears to have been sent from your company’s CIO requesting sensitive information. This is an example of which type of attack?
CorrectIncorrect -
Question 88 of 90
88. Question
Which of the following is an example of a link-local unicast IPv6 address?
CorrectIncorrect -
Question 89 of 90
89. Question
What layer of the OSI model features TCP and UDP?
CorrectIncorrect -
Question 90 of 90
90. Question
Which of the following is a technique used by administrators to trick hackers into thinking they have hacked into a production system?
CorrectIncorrect