Zach, a technician, wants to test a laptop's NIC for functionality but has no other networking equipment to attach it to. Which of the following would allow him to test basic functionality of the NIC?
A. Loopback plug
B. Protocol analyzer
C. Smart jack
D. Coupler
A new user is reporting connectivity issues. Zach, the network technician, notices that there is no link light on the user's NIC. Which of the following would be used to verify the wiring back to the patch panel?
A. Butt set
B. Cable certifier
C. Toner probe
D. Snips
A network technician configures a firewall to block only certain IP addresses from accessing the Internet. All users are reporting that they are unable to access the Internet.
Which of the following is the MOST likely reason?
A. Incorrectly configured ACL
B. Implicit allow statement
C. SMTP requests are being denied
D. All protocols are being allowed in
A technician wants to connect a new wireless router to a main network switch. Which of the following cable types would MOST likely be used to establish this connection?
A. Telephone
B. Parallel
C. Serial
D. CAT6
A technician needs to test the length of a newly installed cable run because it is believed that it exceeds the maximum specification length. Which of the following tools should be used?
A. Cable certifier
B. Toner probe
C. Cable tester
D. Protocol analyzer
Which of the following layers of the OSI model is between the Data Link and Transport layers?
A. Application
B. Session
C. Network
D. Physical
A company is having a new T1 line installed. Which of the following will the connection MOST likely terminate to?
A. Core switch
B. MDF
C. Ethernet router
D. IDF
A network technician performs several switch commands to enable various advanced features on the switch in the accounting department. During the configuration changes, several users from this department report connectivity issues. Which of the following logs would the network technician need to analyze to troubleshoot the connectivity issues?
A. Router logs
B. History logs
C. Startup/bootup config logs
D. Event Viewer logs
Which of the following security threats relies primarily on user deception and misinformation?
A. Rogue access points
B. DoS attacks
C. Man-in-the-middle attacks
D. Phishing
At which of the following layers of the OSI model do packets exist?
A. Network
B. Session
C. Data link
D. Transport
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-007 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.