Ann, a network technician, is told to disable unused ports on a switch. Another technician tells her the policy is to move those ports into a non-routed VLAN and leave them enabled. Which of the following documents should Ann use to ensure she is employing the correct method?
A. Inventory management
B. Wiring and port location
C. Configuration baseline
D. Standard operating procedure
A technician is preparing to dispose of old network devices. Which of the following policies and best practices would outline procedues for removing sensitive information and configurations from surplus equipment?
A. System life-cycle procedures
B. Off-boarding procedures
C. Safety procedures
D. Appropriate use policy
Which of the following devices would allow a network administrator to block an application at Layer7 on the network?
A. Firewall
B. NGFW
C. Router
D. Spam filter
A client requests a new dynamic address and receives a response from two DHCP servers. Which of the following addressing information would the client use?
A. The IP addressing information received last
B. The IP addressing information from the highest server MAC address
C. The IP addressing information from the highest server IP address
D. The IP addressing information received first
A small company has decided to use a single virtual appliance to filter spam as well as reverse proxy and filter traffic to its internal web server. Which of the following has the company MOST likely deployed?
A. IPS
B. Firewall
C. SIEM
D. UTM
E. Content filter
A network administrator wants to connect to a remote device via SSH. Which of the following layers of the OSI model is the protocol using?
A. 3
B. 4
C. 5
D. 6
E. 7
A technician has received a report that details the need for a patch and a complete list of the affected systems. Which of the following activities MOST likely generated the report?
A. Port enumeration
B. Baseline review
C. Vulnerability scanning
D. Packet analysis
Which of the following protocols are used to configure an email client to receive email? (Choose two.)
A. IMAP
B. SMTP
C. POP
D. SFTP
E. TFTP
A network extension needs to be run to a location 500ft(152m) from the nearest switch. Which of the following solutions would work BEST? (Choose two.)
A. Cat 6 with a repeater placed in the middle of the run
B. Cat 7
C. Crossover cable
D. Fiber-optic cabling
E. Cat 7 with a patch panel placed in the middle of the run
A network technician is assisting a user who is having problems accessing a particular website. Other users are reporting that the website is accessible outside of the office. The technician suspects the problem is with the company's firewall. Which of the follwing should the technician use to troubleshoot?
A. WiFi analyzer
B. Bandwidth speed tester
C. Dig
D. Packet sniffer
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your N10-007 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.