[Free] 2019(Oct) EnsurePass CompTIA N10-007 Dumps with VCE and PDF 131-140

Get Full Version of the Exam
http://www.EnsurePass.com/N10-007.html

Question No.131

A technician is setting up a branch office on a point-to-point connection. Which of the following IP network blocks is the MOST efficient use of IP address space for the router connections between the two sites?

A.

/24

B.

/25

C.

/30

D.

/32

Correct Answer: C

Question No.132

A network technician receives a spool of Cat 6a cable and is asked to build several cables for a new set of Ethernet runs between devices. Which of the following tools are MOST likely needed to complete the task? (Choose three.)

  1. Wire stripper

  2. Cable crimper

  3. RJ-11 connectors

  4. RJ-45 connectors

  5. Multimeter

  6. Punchdown tool

  7. Tone generator

Correct Answer: ABD

Question No.133

A technician is setting up a direct connection between two older PCs so they can communicate but not be on the corporate network. The technician does not have access to a spare switch but does have spare Cat 6 cables, RJ-45 plugs, and a crimping tool. The technician cuts off one end of the cable. Which of the following should the technician do to make a crossover cable before crimping the new plug?

  1. Reverse the wires leading to pins 1 and 2

  2. Reverse the wires leading to pins 1 and 3

  3. Reverse the wires leading to pins 2 and 3

  4. Reverse the wires leading to pins 2 and 4

Correct Answer: B

Question No.134

A network technician is able to connect the switches between two offices, but the offices cannot communicate with each other, as each office uses a different IP addressing scheme. Which of the following devices needs to be installed between the switches to allow communication?

  1. Bridge

  2. Access point

  3. Router

  4. Range extender

Correct Answer: C

Question No.135

A UTM is deployed on the external edge of the main corporate office. The office connects to the WAN port of the edge router. The edge router at the main office connects to the remote offices using GRE IPSec tunnels. A network administrator notices that a worm that was not detected by the UTM has spread from the remote sites into the corporate network. The UTM currently has traffic rules applied that should block the port used by the worm. Which of the following steps would MOST likely correct this issue?

  1. Move the UTM onto the LAN side of the network

  2. Enable TLS inspection on the UTM

  3. Enable stateful inspection on the UTM

  4. Configure the UTM to deny encrypted files from being transferred

Correct Answer: C

Question No.136

To replace a defective UPS, the network administrator must take the switch offline. The administrator wants to be able to perform maintenance UPS in the future without affecting the availability of the attached switch. Which of the following would BEST allow this to happen?

  1. Add a redundant power supply to the switch

  2. Implement stacking on the switches in the rack

  3. Add a second UPS into the rack

  4. Install a power converter for the switch

Correct Answer: A

Question No.137

In which of the following ways does a DDoS attack differ from a spoofing attack?

  1. DDoS attacks target multiple networks

  2. Spoofing attacks originate from a single host

  3. DDoS attacks are launched from multiple hosts

  4. Spoofing attacks require physical presence

Correct Answer: C

Question No.138

Which of the following BEST describes the differences between VLAN hopping and session hijacking?

  1. VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user#39;s web connection to execute commands

  2. VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection

  3. VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges

  4. VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web- based attack aimed at privilege escalation

Correct Answer: A

Question No.139

Which of the following wireless connection types utilize MIMO on non-overlapping channels? (Choose two.)

A. 802.11a B. 802.11ac C. 802.11b D. 802.11g E. 802.11n

Correct Answer: BE

Question No.140

A contractor is setting up and configuring conference rooms for a convention. The contractor sets up each room in the conference center to allow wired Internet access going to individual tables. The contractor measured the distance between the hotel#39;s patch panel to the jack, and the distance is within Cat 5e specifications. The contractor is concerned that the room will be out of specification if cables are run in each room from the wall jacks. Which of the following actions should the contractor take to ensure the cable runs meet specifications and the network functions properly?

  1. Place a switch at the hotel#39;s patch panel for connecting each room#39;s cables

  2. Place a switch on each table to ensure strong connectivity

  3. Place repeaters between the patch panel and the rooms

  4. place a switch at the wall jack and run the cables in the room from there

Correct Answer: A

Get Full Version of the Exam
N10-007 Dumps
N10-007 VCE and PDF

Leave a Comment

Your email address will not be published. Required fields are marked *