CompTIA Network+ N10-007 試験
Question No : 1
A Chief Information Officer (CIO) tasks the network engineer with protecting the network from outside attacks.
Placing which of the following devices on the network perimeter would provide the MOST security for the system?
Question No : 2
A network technician installs a web server on the firewall.
Which of the following methods should the technician implement to allow access to outside users without giving access to the inside network?
Question No : 3
Which of the following BEST explains the purpose of signature management as a mitigation technique?
Question No : 4
Wireless users have been experiencing connectivity problems. Investigation shows neighboring wireless appliances, which are not connected to the network, have been on the same 5GHz frequency to communicate.
Which of the following wireless performance problem concepts defines this issue?
Question No : 5
A technician has installed an older IP camera as a temporary replacement for a recently failed newer one. The technician notices that when the camera’s video stream is off, the ping roundtrip time between the camera and the network DVR is consistently less than 1ms without dropped packets. When the camera video stream is turned on, the ping roundtrip time increases dramatically, and network communication is slow and inconsistent.
Which of the following is MOST likely the issue in this scenario?
Question No : 6
Which of the following would indicate that a circuit speed should be increased?
Question No : 7
A network administrator has created a new VLAN for the server and clients within the accounting department and wants to outline how it integrates with the existing network.
Which of the following should the administrator create?
Question No : 8
Users on a LAN segment are reporting a loss of connectivity to network services. The client PCs have been assigned with 169.254.X.X IP addresses.
Which of the following IP address schemas is being utilized?
Question No : 9
A junior technician is setting up a voice control device so the Chief Executive Officer (CEO) will be able to control various things in the office.
Of which of the following types of IoT technologies is this an example?
Question No : 10
An administrator wants to implement an additional authentication factor to the remote SSH servers.
Which of the following accomplishes this goal with the principle of “something you have”?
Question No : 11
A technician is downloading an ISO from a vendor’s website.
To ensure the integrity of the download, which of the following should be verified?
Question No : 12
Users in a school lab are reporting slow connections to the servers and the Internet. Other users in the school have no issues. The lab has 25 computers and is connected with a single 1Gb Ethernet connection on Cat 5e wiring to an unmanaged switch. There are also three spare Cat 5e cable runs, which are not in use. The school wants to double the connection speed between the lab and the servers without running new cables.
Which of the following would be the BEST solution?
Question No : 13
Which of the following protocols are classified as connectionless? (Choose two.)
Question No : 14
A technician wants to deploy a network that will require wireless client devices to prompt for a username and password before granting access to the wireless network.
Which of the following must be configured to implement this solution?
Question No : 15
A technician is connecting a PC to a switchport. At the wiring closet, the technician is unable to identify which cable goes from patch panel A connected to the switch to patch panel B connected to the PC.
Which of the following tools should the technician use to resolve the issue?