N10-007試験無料問題集「CompTIA Network+ Certification 認定」

A network technician is investigating an IP phone that does not register in the VoIP system Although it received an IP address, it did not receive the necessary DHCP options The information that is needed for the registration is distributes by the OHCP scope All other IP phones are working properly. Which of the following does the technician need to verify?

A university has a lecture hall containing 100 students. Currently, the lecture hall has two 802.11ac wireless access points, which can accommodate up to 50 devices each. Several students report they are unable to connect devices to the wireless network. Which of the following is MOST likely the issue?

Which of the following services describes a distribution model in which applications are hosted by a service provider and made available to users?

An employee, who Is using a laptop connected to the wireless network. Is able to connect to the Internet but not to internal company resources. A systems administrator reviews the following information from the laptop:

The administrator was expecting to see a network address within 10.100.0.0/23. which is consistent with the company's wireless network. The network administrator verifies the company's wireless network is configured and working properly. Which of the following is the MOST likely cause of this issue?

A customer wants to install a network that can utilize 802.1X authentication protocols. The customer uses a Windows laptop and does not want to install any additional software; therefore, a technician needs to configure the network to work with what is available natively. Which of the following should the technician configure for the 802.1X network?

A network technician sets up a new schedule on the backup server. Management has informed the technician that a full backup does not need to be completed every day. The technician sets up weekly full backups. Which of the following should the technician configure for the remaining days to MINIMIZE the daily backup size?

A network technician is troubleshooting a connectivity issue and determines the cause is related to the VLAN assignment on one of the access switches in the network. After resolving the issue, the network technician decides to update the documentation to refer to the correct VLAN. Which of the following should the technician update?

A network technician is investigating an issue with a desktop that is not connecting to the network. The desktop was connecting successfully the previous day, and no changes were made to the environment. The technician locates the switchport where the device is connected and observes the LED status light on the switchport is not lit even though the desktop is turned on Other devices that arc plugged into the switch are connecting to the network successfully Which of the following is MOST likely the cause of the desktop not connecting?

A network team has reopened multiple outages caused by unauthorized access to the IDF. Which of the following would BEST prevent this issue from reoccurring?

A network engineer is troubleshooting an issue after installing a new switch in the datacenter. The cables are not labeled, and the engineer has forgotten into which port the switch plugged. Which of the following should the engineer review to find out this information?

Ann, a user, is attempting to charge her phone using the USB port of her computer. She realizes the port has been disabled. Which of the following policies would restrict the use of the USB port?

When configuring a new switch in a packet-switched network, which of the following helps protect against network loops?

A company hires another firm to test the integrity of its information security controls. This is an example of

A technician must install and configure a network device in a building with 20 classrooms. Each room must be on a separate subnet and should not be able to see traffic from other subnets. Which of the following is the MOST cost-effective solution?

Which of the following technologies requires a username and password to authenticate to a backbone network?

Which of the following allows for file-level network storage?

Which of the following technologies is used when multiple Ethernet adapters work to increase speed and fault tolerance?

A network technician is configuring network addresses and port numbers for a router ACL to block a peer-to-peer application. Which of the following is the HIGHEST layer of the OSI model at which this router ACL operates?