N10-007 Dumps

N10-007 Real Exam Dumps Questions and answers 101-110

Get Full Version of the Exam

Question No.101

A technician is diagnosing an issue with a new T1 connection. The router is configured, the cable is connected, but the T1 is down. To verify the configuration of the router, which of the following tools should the technician use?

  1. Loopback adapter

  2. Cable tester

  3. Tone generator

  4. Multimeter

Correct Answer: A

Question No.102

A technician is trying to determine the IP address of a customer#39;s router. The customer hasan IP address of Which of the following is the address of the customer#39;s router?






Correct Answer: C

Question No.103

A network technician is troubleshooting an issue and has established a theory of probable cause. Which of the following steps should the network technician take NEXT?

  1. Test the possible solution

  2. Question the users

  3. Determine what haschanged

  4. Document the theory

Correct Answer: A

Question No.104

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?

  1. Smurf attack

  2. Rogue AP

  3. Compromised system

  4. Unintentional DoS

Correct Answer: C

Question No.105

An end-user device requires a specific IP address every time it connects to the corporate network; however, corporate policy does not allow the use of static IP addresses. Which of the following will allow the request to be fulfilled without breaking the corporate policy?

  1. DHCP relay

  2. DHCP exclusion

  3. DHCP option

  4. DHCP reservation

Correct Answer: D

Question No.106

A technician wants to prevent an unauthorized host from connecting to the network via Ethernet. Which of the following is a Layer 2 access control the technician should implement?

  1. Access control lists

  2. Captive portal

  3. WPA2

  4. Port security

Correct Answer: D

Question No.107

A company finds that many desktops are being reported as missing or lost. Which of the following would BEST assist in recovering these devices?

  1. Asset tracking tags

  2. Motion detectors

  3. Security guards

  4. Computer locks

Correct Answer: D

Question No.108

Which of the following would be the MOST efficient subnet mask for a point-to-point link?









Correct Answer: C

Question No.109

Which of the following methods for network performance optimization is used to distribute traffic among similar devices?

  1. Fault tolerance

  2. QoS

  3. Proxy server

  4. Load balancing

Correct Answer: D

Question No.110

Which of the following is a reason why a business may be hesitant to move sensitive data to a SaaS cloud service?

  1. Decreased performance of internal network

  2. Loss of full control over data resources

  3. Increased malware exposure

  4. Incompatibility with the current network

Correct Answer: B

Get Full Version of N10-007 Dumps

Leave a Reply

Your email address will not be published. Required fields are marked *