A network administrator is responding to a help desk ticket, which states an unknown wireless access point is broadcasting in a specific area. Upon investigation, the administrator finds that a user brought a wireless access point from home and plugged it into the corporate network. This resulted in an attacker using the unsecured wireless LAN to gain access to the network. Which of the following should the network administrator have done to BEST prevent this problem?
A. Changed the default credentials on the network switches
B. Installed a Layer 7 firewall
C. Implemented port security
D. Disabled unnecessary services on the network switches
A company hires some temporary workers. On day one, the temporary employees report they are unable to connect to the network. A network technician uses a packet analysis tool and finds that many clients are continuously sending out requests for an IP address, but many of them are not receiving a response. Which of the following could be the cause of this issue?
A. Exhausted DHCP scope
B. Untrusted SSL certificates
C. Duplicate MAC addresses
D. Incorrect firewall settings
A SAN serves out storage to a company's virtual environment and provides low-level disk access. The company wants to use its existing IP network and equipment to access the virtual disks. Which of the following network connection types would BEST accomplish this task?
A. InfiniBand
B. iSCSI
C. Fibre Channel
D. CIFS
When using a network monitoring system, a network technician notices that a switch returns many object identifiers that do not have descriptions. Which of the following should be imported into the monitoring system to describe these object identifiers?
A. SNMPv3
B. SIEM
C. MIB
D. SYSLOG
A network technician notices that switches of the same model have different commands and security features while administering them. Which of the following hardening techniques should the technician perform on a regular schedule to ensure all switches have the same features and security functionality?
A. Change the default credentials.
B. Verify the firmware file hash.
C. Disable unused switchports.
D. Apply patches and updates.
A network administrator has deployed a secure wireless network that authenticates using Active Directory network credentials so individual users are uniquely identified when connected to the WLAN. Which of the following wireless technologies has the administrator configured?
A. WEP
B. EAP-PEAP
C. PSK
D. CCMP-AES
The process of searching for open or weakly secured wireless networks in a geographic area is known as:
A. phishing.
B. social engineering.
C. war driving.
D. an evil twin.
A request is made to open an additional port on a firewall. The request is approved, and the port is opened. Which of the following BEST describes this process?
A. Standard operating procedure
B. Process management
C. Project management
D. Change management
Which of the following types of attacks is characterized by encrypting data and locking out a user from access to certain data within a workstation?
A. Ransomware
B. Phishing
C. DDoS
D. Social engineering
E. Spoofing
A network engineer at a large company is restricting Internet browsing on the corporate WAN to only business-related external websites. Which of the following is the BEST solution to achieve this goal while avoiding the need to configure this restriction on each PC?
A. Web application firewall
B. Content filter
C. IPS
D. VPN concentrator
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-007 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.