N10-007 無料問題集「CompTIA Network+ Certification」

A network administrator needs to extend an organization's network to a nearby building that has unused SMF already installed. The network administrator has decided to create a switch-to-switch uplink. Which of the following standards would be the BEST to use?

A network technician discovers there is no connectivity on a T1 line even though the cable connection appears to be in place. The router shows there is no active connection on the port. The issue is occurring between the demarcation point and the router port. The router cable tests fine and is terminated at the demarcation panel. Which of the following tools should be used to fix the issue?

A network technician has multimode fiber optic cable available in an existing IDF. Which of the following Ethernet standards should the technician use to connect the network switch to the existing fiber?

A network technician is observing the behavior of an unmanaged switch when a new device is added to the network and transmits dat a. Which of the following BEST describes how the switch processes this information?

A network administrator reviews the following command output while troubleshooting a system that is unable to connect to the www.comptia.com website:

Which of the following is the reason the system cannot connect?

A new DSL circuit was installed to replace the cable service and is not functioning. A network administrator needs to create a cable to connect the circuit. Which of the following connector types should the network administrator use on the cable?

A network engineer has connected the storefront with the maintenance shed on the other side of a golf course using 802.11 wireless bridges and omnidirectional antennas. However, the signal strength is too weak. Which of the following is the MOST efficient and cost-effective solution to solve the issue?

A technician needs to back up network devices to a central location quickly to prepare for a natural disaster. Which of the following should the technician use?

To increase security and usability of the wireless network, a back-end RADIUS server is used to authenticate users. Which of the following encryptions methods should be used to accomplish this?

A security manager asks the network administrator to block VoIP protocols using the default ports on the corporate firewall. Which of the following ports should be blocked to prevent this type of traffic from going outside the company's network? (Choose three.)

正解:C、D、E 解答を投票する
Ann. a user, reports that her desktop phone is not working on one cable. However, that cable provides connectivity to her laptop. A technician determines PoE is not provided to the end device. Which of the following is MOST likely the cause?

Which of the following is an IPv6 transition mechanism in which network devices utilize IPv4 and IPv6 at the same time?

A security manager asks a technician to install a network device that will provide information about attacks against the network but will not stop them. Which of the following devices is MOST suited for this task?

A network technician has been deployed to a remote office where WiFi functionality was lost after some recent remodeling. Upon arrival the technician finds the sole access point In the office is powered on via a Cat6 port, which is PoE+ enabled. All necessary SSIDs are broadcasting property However after connecting, authentication falls. Rebooting the WAP does not remediate the situation, nor does replacing the paten cable between the switch and the patch panel. Which of the following is MOST likely the root cause of this issue?

A network technician is assisting a SOHO environment with wireless connection issues. The business uses 802.11n and WPA2 encryption. The on-premises equipment is located toward the back of the building and includes a router, firewall, and WAP. The users at the front of the building are experiencing very slow response times due to distance limitations. Which of the following should be done to remediate the slow speeds of the users?

A development team has been testing a web server on a virtual server to create a web application. Once satisfied, the development team clones the entire virtual server into production. The development team needs to use HTTP, HTTPS, and SSH to connect to the new server. Which of the following should the network administrator do to help secure this new production VM? (Choose two.)

正解:B、C 解答を投票する

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡