CompTIA N10-007 CompTIA Network+ N10-007 Online Training
CompTIA N10-007 Online Training
The questions for N10-007 were last updated at Nov 23,2024.
- Exam Code: N10-007
- Exam Name: CompTIA Network+ N10-007
- Certification Provider: CompTIA
- Latest update: Nov 23,2024
A technician is sent to troubleshoot a faulty network connection. The technician tests the cable, and data passes through successfully. No changes were made in the environment, however, when a network device is connected to the switch using the cable, the switchport will not light up .
Which of the following should the technician attempt NEXT?
- A . Modify the speed and duplex
- B . Plug in to another port
- C . Replace the NIC
- D . Change the switch
Which of the following technologies is used to attach multiple guest operating systems to a single physical network port?
- A . Virtual switch
- B . FCoE
- C . VPC
- D . vSAN
- E . Fibre Channel
A technician has received a report that details the need for a patch and a complete list of the affected systems .
Which of the following activities MOST likely generated the report?
- A . Port enumeration
- B . Baseline review
- C . Vulnerability scanning
- D . Packet analysis
After several changes to the network, a technician needs to ensure a client is checking for
new hostname and IP pairings .
Which of the following commands should the technician use to force new lookups?
- A . ipconfig /flushdns
- B . ipconfig /release
- C . ipconfig /renew
- D . ipconfig /all
A zero-day vulnerability is discovered that affects a specific network device. This vulnerability only affects services on port 21. This network device is restricted to use only secure protocols and services .
Which of the following explains why this device is secure?
- A . Because secure protocols would reject malicious packets
- B . Because SCP is not a secure service
- C . Because FTP is not a secure service
- D . Because a secure firewall will protect the device
Which of the following OSI layers do TCP and UDP operate within?
- A . Data link
- B . Network
- C . Session
- D . Transport
- E . Presentation
- F . Application
A network technician needs to monitor the traffic going to a mission-critical server in the datacenter .
Which of the following is the BEST method to perform this?
- A . Use port mirroring
- B . Install an inline tap
- C . Periodically view the server logs
- D . Configure port aggregation
Which of the following policies would be the MOST useful for defining the proper procedures when an employee is terminated abruptly?
- A . Offboarding
- B . Remote access
- C . AUP
- D . Incident response
- E . DLP
A technician is moving a company to a cloud email service. Several external recipients are reporting that email sent from the company is going to their junk folders because the sender’s identity cannot be verified .
Which of the following DNS record types should the technician modify to minimize this problem?
- A . CNAME
- B . PTR
- C . TXT
- D . SRV
Users report that the network is slow. Upon investigation, the technician notices all users are on one large subnet .
Which of the following devices should be used to break up broadcast domains?
- A . Layer 2 switch
- B . Layer 3 switch
- C . Signal repeater
- D . Bridge
- E . Domain server