CompTIA N10-007 Network+ Take Ten Challenge #2Step 1 of 1010%2-1: A security administrator is creating a series of rules and regulations for employee Internet use. Which of the following would be the best way to notify employees of these rules? BYOD AUP NDA EULA MOTD 2-2: A company has discovered that an internal database of customer information has been published to the Internet. The security team has determined that the database was copied to a USB drive and released by a disgruntled employee. Which of the following would best describe this attack type? Social engineering Logic bomb Insider threat Man in the middle Rogue access point 2-3: A network administrator has been asked to troubleshoot an issue with a remote web server that hosts the domain www.example.com. Which of these tools should the administrator use to identify the IP address associated with this web site? ipconfig tcpdump dig netstat route 2-4: During the initialization process, a desktop VoIP phone uses TFTP to receive a configuration file. What port should be configured in the firewall to allow this traffic to pass? udp/69 tcp/20 and tcp/21 tcp/5060 tcp/22 udp/161 2-5: Which of the following would commonly be labeled on a CSU/DSU? Application type IP utilization Version number Speed and duplex Circuit ID 2-6: A system administrator needs to harden the security of a file server. Which of the following would best meet this requirement? Upgrade the BIOS Reinstall the operating system from the original media Replace the internal drives with USB-connected storage Disable System Restore Enable SNMP monitoring 2-7: A computer in the accounting department is automatically assigning itself an IP address associated with the marketing department. Which of the following would be the most likely reason for this issue? Incorrect wire map STP is enabled Incorrect VLAN assignment Speed/duplex mismatch Routing loop 2-8: A company is building out a new floor of a building and is running network cables from each desk to the IDF. How should these wires terminate in the IDF? Into a concentrator RJ45 wall jack 66 block 110 block Directly into the switch 2-9: A server administrator would like to configure multiple network connections on a server to provide aggregate bandwidth and redundant paths. Which of these technologies would be the best choice? NIC teaming Active-standby Load balancing RAID Clustering 2-10: A security administrator would like to prevent someone from unplugging a desktop computer from their desk and connecting a different computer. Which of these features can be configured on the switch to prevent this from occurring? VLANs ACLs SSID broadcast suppression Port security Captive portal