A workstation on the network is configured as follows. A user reports that they are unable to print to a device located on a different subnet. Which of the following is the MOST likely problem? IP address: 172.16.204.12 Subnet Mask:
255.255.0.0 Default Gateway: 172.15.204.254 DNS address: 172.16.204.1 Broadcast address: 172.16.255.255
A. DNS address
B. Subnet mask
C. Default gateway
D. Broadcast address
E. IP address
Which of the following routing protocols relies on hop count as its ONLY metric?
A. BGP
B. EIGRP
C. OSPF
D. RIP
Which of the following is indicative of an FTP bounce?
A. Arbitrary IP address
B. Reverse DNS lookups
C. Same Port Number
D. File Transfer Success
The software that allows a machine to run multiple operating systems at once is called the:
A. Server manager
B. Hypervisor
C. Boot loader
D. Partition manager
Which of the following allows a technician to gather information about the operating system?
A. Domain services
B. Fingerprinting
C. Countermeasures
D. Reconnaissance
A technician wants to install a WAP in the center of a room that provides service in a radius surrounding a radio. Which of the following antenna types should the AP utilize?
A. Omni
B. Directional
C. Yagi
D. Parabolic
A network field technician is installing and configuring a secure wireless network. The technician performs a site survey. Which of the following documents would MOST likely be created as a result of the site survey?
A. Physical diagram
B. Heat map
C. Asset list
D. Device map
Which of the following technologies is required to allow all ports of a single private IP to be publically accessible via a single public IP?
A. NAT
B. RIP
C. PAT
D. ACL
A website administrator is concerned the company's static website could be defaced by hacktivists or used as a pivot point to attack internal systems. Which of the following should a network security administrator recommend to assist with detecting these activities?
A. Implement file integrity monitoring.
B. Change the default credentials.
C. Use SSL encryption.
D. Update the web-server software.
Which of the following is the MOST appropriate use case for the deployment of a clientless VPN?
A. Secure web access to internal corporate resources.
B. Upgrade security via the use of an NFV technology.
C. Grant out-of-band access for partners accessing corporate resources.
D. Increase VPN availability by using a SDWAN technology.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-007 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.