← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | IaaS |
B | SaaS |
C | Public |
D | PaaS |
E | Private |
F | Hybrid |
Question 2 |
A | top |
B | netstat |
C | monitor |
D | cpustat |
E | ping |
Question 3 |
A | IDSL |
B | HDSL |
C | RADSL |
D | VDSL |
Question 4 |
A | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
B | Both broadcast and collision domains occur at layer 2. |
C | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
D | It is impossible to have a collision domain in a wireless network infrastructure. |
E | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
Question 5 |
A | Remove the firewall between the Internet/modem and the router. |
B | Add additional printers across both NATs. |
C | Add a firewall between the domain controller and the router. |
D | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
Question 6 |
A | Hot backup mode |
B | Combined mode |
C | High-efficiency mode |
D | Redundant mode |
E | Individual mode |
Question 7 |
A | SQL injection |
B | Directory traversal |
C | XSS |
D | Wardriving |
E | Packet sniffing |
Question 8 |
A | Cold sites |
B | Backups |
C | Failover |
D | Snapshots |
Question 9 |
A | Social engineering |
B | Wardriving |
C | Logic bomb |
D | Evil twin |
Question 10 |
A | 10.0.0.0 to 10.0.255.255 |
B | 224.0.0.0 to 224.0.255.255 |
C | 192.168.0.0 to 192.168.0.255 |
D | 169.254.0.0 to 169.254.255.255 |
Question 11 |
A | Twisted pair cabling |
B | Coaxial cabling |
C | Enterrpise APs |
D | Fiber-optic cabling |
Question 12 |
A | traceroute |
B | ifconfig |
C | ping |
D | netstat |
Question 13 |
A | 80 |
B | 23 |
C | 1999 |
D | 995 |
E | 50134 |
F | 1024 |
Question 14 |
A | Authentication |
B | Accounting |
C | Administration |
D | Authorization |
Question 15 |
A | Gateway |
B | Router |
C | Bridge |
D | Switch |
Question 16 |
A | Standard operating procedure |
B | Process management |
C | Project management |
D | Change management |
Question 17 |
A | netstat |
B | dig |
C | tcpdump |
D | nmap |
Question 18 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | dig –t ANY SANUJA.COM |
B | iptables –f SANUJA.COM |
C | NMAP –t SANUJA.COM |
D | netstat –a SANUJA.COM |
Question 19 |
A | 7 |
B | 6 |
C | 2 |
D | 0 |
E | 4 |
Question 20 |
A | Domain controller |
B | RADIUS server |
C | Wireless access point |
D | Biometric systems |
E | Smartcards |
Question 21 |
A | LDAP |
B | RADIUS |
C | TKIP-RC4 |
D | NAC |
Question 22 |
A | Layer 5 |
B | Layer 4 |
C | Layer 2 |
D | Layer 7 |
E | Layer 3 |
F | Layer 1 |
G | Layer 6 |
Question 23 |
A | A privilege escalation script |
B | A router with default credentials |
C | An open mail relay server |
D | An SNMPv1 private community |
Question 24 |
A | Accounting |
B | TGS |
C | Authentication |
D | Authorization |
E | Auditing |
Question 25 |
A | ping 192.168.1.1 -n 2048 |
B | ping 192.168.1.1 -l 2048 -n 6 |
C | ping 192.168.1.1 -l 2048 -t |
D | ping 192.168.1.1 -t |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 26 |
A | Application |
B | Transport |
C | Session |
D | Data link |
E | Physical |
F | Network |
G | Presentation |
Question 27 |
A | A consent to monitoring policy covering company audits of the personal phone |
B | An AUP covering how a personal phone may be used for work matters |
C | An NDA ensuring work data stored on the personal phone remains confidential |
D | Real-time remote monitoring of the phone’s activity and usage |
Question 28 |
A | FTPS |
B | IPsec |
C | PPTP |
D | L2TP |
Question 29 |
A | IP |
B | UDP |
C | HTTP |
D | TCP |
Question 30 |
A | MDF |
B | TDM |
C | IDF |
D | VRF |
Question 31 |
A | Clustering |
B | SNMP |
C | UPS |
D | RAID 1 |
Question 32 |
A | Power redundancy |
B | UPS capability |
C | Airflow and cooling |
D | Circuit labeling |
Question 33 |
A | Decreased performance of the internal network |
B | Incompatibility with the current network |
C | Inconsistent data accessability |
D | Increased malware exposure |
E | Loss of full control over data resources |
Question 34 |
A | Physical |
B | Session |
C | Application |
D | Data Link |
E | Presentation |
F | Transport |
G | Network |
Question 35 |
A | Verify file size |
B | Verify file hash |
C | Verify file type |
D | Verify file date |
E | Verify file version |
Question 36 |
A | 10GBase-ER |
B | 10GBase-LR |
C | 10GBase-CX4 |
D | 10GBase-SR |
E | 10GBase-LX4 |
Question 37 |
A | MX |
B | TXT |
C | A |
D | AAAA |
E | NS |
Question 38 |
A | Telnet |
B | IPSec |
C | SSH |
D | SSL |
Question 39 |
A | SYN/ACK, SYN/ACK |
B | SYN, SYN/ACK, ACK |
C | SYN, ACK, SYN, ACK |
D | SYN, SYN, ACK, ACK |
Question 40 |
A | 2 |
B | 0 |
C | 4 |
D | 1 |
E | 3 |
Question 41 |
A | VPN concentrator |
B | UTM appliance |
C | Proxy server |
D | VoIP gateway |
Question 42 |
A | END |
B | SYN |
C | FIN |
D | URG |
E | PSH |
Question 43 |
A | GBIC |
B | SFP |
C | QSFP |
D | BiDi |
Question 44 |
A | Application server |
B | RDP |
C | Client terminal |
D | KDC |
Question 45 |
A | Multiport bridge |
B | Ethernet hub |
C | Layer 3 repeater |
D | Layer 2 router |
Question 46 |
A | 49152 through 65535 |
B | 1024 to 49151 |
C | 1 through 1024 |
D | 1023 through 65534 |
Question 47 |
A | RPO |
B | RAID |
C | BCP |
D | MIB |
E | RTO |
Question 48 |
A | WPA2 |
B | Port security |
C | Access control lists |
D | Captive portal |
Question 49 |
A | A router |
B | A hub |
C | A switch |
D | A gateway |
Question 50 |
A | RAID 10 |
B | RAID 1 |
C | RAID 5 |
D | RAID 0 |
Question 51 |
A | Session |
B | Network |
C | Data link |
D | Application |
E | Presentation |
F | Transport |
G | Physical |
Question 52 |
A | Multiport |
B | Store and forward |
C | Source route |
D | Transparent |
Question 53 |
A | Cross talk |
B | Overcapacity |
C | Channel overlap |
D | Wrong passphrase |
Question 54 |
A | arp -c * |
B | arp -s |
C | arp -a |
D | arp -d * |
Question 55 |
A | F-type |
B | BNC |
C | MTRJ |
D | 8P8C |
E | RJ45 |
Question 56 |
A | Jumbo frame |
B | DOCSIS |
C | Bridge mode |
D | Double NAT |
E | ADSL |
Question 57 |
A | CHAP |
B | EAP |
C | WEP |
D | PAP |
E | MS-CHAPv2 |
Question 58 |
A | NDA |
B | IRP |
C | BYOD |
D | SLA |
Question 59 |
A | FTP |
B | SIP |
C | SCP |
D | ARP |
Question 60 |
A | Subnet mask |
B | IP address |
C | Default gateway |
D | MAC address |
Question 61 |
A | EAP-TLS |
B | WPA2 |
C | Kerberos |
D | RADIUS |
Question 62 |
A | 16 |
B | 8 |
C | 17 |
D | 15 |
Question 63 |
A | Netstat |
B | Netmon |
C | Top |
D | Syslog |
Question 64 |
A | Shielded twisted pair |
B | Unshielded twisted pair |
C | Coaxial |
D | Multimode fiber optic |
E | Single-mode fiber optic |
Question 65 |
A | Layer 7 firewall |
B | Web proxy |
C | Layer 3 switch |
D | Protocol analyzer |
E | NAT |
Question 66 |
A | 192.168.1.0 |
B | 255 255 255.0 |
C | 192.168.1.1 |
D | 192.168.0.55 |
E | 255 255 255.0 |
Question 67 |
A | Power distribution unit |
B | Power-over-Ethernet switch |
C | Powerline extender |
D | Ethernet power controller |
E | Ethernet-over-power adapter |
Question 68 |
A | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
B | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
C | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
D | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
Question 69 |
A | RJ11 |
B | LC |
C | ST |
D | MTRJ |
E | RJ45 |
F | F-type |
Question 70 |
A | Throttling |
B | Data usage limits |
C | Blocking |
D | Bandwidth quotas |
E | Session hijacking |
Question 71 |
A | Evil twin |
B | VLAN mismatch |
C | Packet intrusion |
D | Honey pot |
E | Rogue DHCP server |
Question 72 |
A | Install an inline tap |
B | Configure port aggregation |
C | Periodically view the server logs |
D | Use SQL injectors |
E | Use port mirroring |
Question 73 |
A | iSCSI |
B | InfiniBand |
C | CIFS |
D | Fibre Channel |
Question 74 |
A | Cut-through |
B | Source route |
C | Destination switch |
D | Store-and-forward |
Question 75 |
A | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
B | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
C | Set the firewall to operate in transparent mode |
D | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
Question 76 |
A | DHCP relay |
B | DHCP restriction |
C | DHCP option |
D | DHCP reservation |
E | DHCP exclusion |
Question 77 |
A | arp -a |
B | arp -t |
C | arp -d |
D | arp -c |
E | arp -s |
Question 78 |
A | LDAP |
B | Local authentication |
C | TACACS+ |
D | Single sign-on |
Question 79 |
A | Proxy server |
B | Wireless controller |
C | Enterprise firewall |
D | Load balancer |
E | IDS |
Question 80 |
A | Octal |
B | Hex |
C | CIDR |
D | Binary |
Question 81 |
A | Vulnerability patch |
B | BOIS firmware patch |
C | Driver update |
D | Feature change |
E | Operating system update |
Question 82 |
A | Point-to-multipoint |
B | Point-to-point |
C | Peer-peer |
D | Bus |
E | Ring |
F | Mesh |
Question 83 |
A | Cable broadband |
B | DSL |
C | Dial-up modem |
D | ISDN |
Question 84 |
A | Private |
B | Preshared |
C | Secured |
D | Privileged |
E | Public |
Question 85 |
A | Enable jumbo frames on the NAS and server |
B | Utilize UDP to eliminate packet overhead |
C | Turn off MDIX settings on the NAS and server switchports |
D | Encapsulate the storage traffic in a GRE tunnel |
Question 86 |
A | netstat |
B | ping |
C | route |
D | pathping |
Question 87 |
A | Uninterruptible Power Supply (UPS) |
B | Dual power supplies |
C | Power looping |
D | Power redundancy |
E | Redundant circuits |
Question 88 |
A | dig |
B | traceroute |
C | netstat |
D | route |
E | ifconfig |
Question 89 |
A | Distributed server system |
B | Remote connection |
C | Network management |
D | Site-to-site VPN |
E | Fault tolerance |
Question 90 |
A | Geofencing |
B | Biometric |
C | Asset tracking |
D | Social engineering |
E | Tamper detection |
Question 91 |
A | Network Monitor |
B | Event Viewer |
C | Performance Monitor |
D | ntop |
E | Syslog |
Question 92 |
A | Implement spanning tree |
B | Change default admin password |
C | Enable port mirroring |
D | Perform backups |
E | Patch and update |
F | Perform VLAN hopping |
Question 93 |
A | NAS |
B | IDS |
C | RADIUS |
D | NGFW |
Question 94 |
A | Wiring schematic |
B | Physical network diagram |
C | Asset management files |
D | Logical network diagram |
E | MSConfig file |
Question 95 |
A | dig |
B | iptables |
C | tcpdump |
D | nmap |
Question 96 |
A | RG-8 |
B | RJ-11 |
C | RJ-45 |
D | RG-58 |
Question 97 |
A | A static IP pointing to the passive DB |
B | A private IP pointing to the web front end |
C | A virtual IP pointing to the active DB |
D | A private IP pointing to the web proxy |
Question 98 |
A | Control the EMI of the multimedia traffic across the network links |
B | Control the jitter of the affected traffic across the network links |
C | Control the attenuation of the non-voice traffic across the network links |
D | Control the latency of traffic across the network links |
Question 99 |
A | 802.1X |
B | LDAP |
C | Radius |
D | Kerberos |
E | TKIP |
Question 100 |
A | ipconfig |
B | tcpdump |
C | iptables |
D | netstat |
E | traceroute |
Question 101 |
A | 110 block |
B | 66 block |
C | Patch panel |
D | Fiber distribution panel |
E | CMTS |
Question 102 |
A | Double NAT issue |
B | VLAN mismatch |
C | Damaged or malfunctioning fiber port |
D | Damaged or malfunctioning LAN port |
E | Corrupted config files or operating system |
Question 103 |
A | Port security |
B | Data security |
C | Physical security |
D | Asset tracking |
Question 104 |
A | Building blueprints |
B | Wiring schematic |
C | Network map |
D | Rack diagram |
E | Logical diagram |
Question 105 |
A | 25 |
B | 443 |
C | 990 |
D | 80 |
E | 110 |
Question 106 |
A | Authorization |
B | Authentication |
C | Enrollment |
D | Certification |
E | Encryption |
Question 107 |
A | IP |
B | ICMP |
C | UDP |
D | TCP |
E | Ethernet |
Question 108 |
A | 10.1.1.255 |
B | 192.168.0.55 |
C | 192.168.1.109 |
D | 192.168.0.1 |
E | 10.1.0.255 |
Question 109 |
A | Distance |
B | Bandwidth |
C | Ping time |
D | Speed |
E | Hop count |
Question 110 |
A | Captive portal |
B | WAP |
C | NAC |
D | MAC filtering |
E | Port security |
Question 111 |
A | 5060 , 5061 |
B | 161 , 162 |
C | 5060 , 3389 |
D | 80 , 443 |
E | 143 , 993 |
Question 112 |
A | Disable unused switchports |
B | Apply patches and updates |
C | Change the default credentials |
D | Verify the firmware file hash |
Question 113 |
A | WPA2 |
B | WEP |
C | 802.1X |
D | WPA |
Question 114 |
A | HTML |
B | FTP |
C | HTTP |
D | SSL |
E | SMTP |
Question 115 |
A | Secure server |
B | HTTPS server |
C | VPN gateway |
D | Encryption key |
E | Authentication server |
Question 116 |
A | Quality of service |
B | CARP |
C | Round-robin DNS |
D | Voice over IP |
Question 117 |
A | Pattern recognition |
B | Tamper detection |
C | Face geometry |
D | Geofencing |
E | Biometrics |
Question 118 |
A | Setup |
B | Application |
C | Security |
D | System |
Question 119 |
A | PAT |
B | SIP |
C | NAT |
D | VIP |
Question 120 |
A | 143 |
B | 25 |
C | 110 |
D | 989 |
E | 80 |
Question 121 |
A | Spoofing |
B | DDoS |
C | Session hijacking |
D | Ransomware |
E | Phishing |
Question 122 |
A | Millimeters |
B | Inches |
C | Centimeters |
D | Number of screw holes |
E | Units |
Question 123 |
A | There is a frequency mismatch |
B | There is a security type mismatch. |
C | The channel has changed |
D | There is insufficient antenna power |
E | The password needs to be re-entered |
Question 124 |
A | Circuit diagrams |
B | Asset management files |
C | Logical network diagram |
D | Wiring schematic |
E | Physical network diagram |
Question 125 |
A | RJ45 |
B | F-type |
C | ST |
D | MTRJ |
E | RJ11 |
Question 126 |
A | BRI |
B | DSL |
C | E1/E3 |
D | PRI |
Question 127 |
A | Open circuits |
B | Transposed wires |
C | Short circuits |
D | Split pairs |
Question 128 |
A | Permit 192.168.1.143 port 80 |
B | Permit 192.168.1.143 port 443 |
C | Permit 192.168.1.143 port 25 |
D | Permit 192.168.1.143 port 110 |
E | Permit 192.168.1.143 port143 |
F | Permit 192.168.1.143 port 587 |
Question 129 |
A | RAID 1 |
B | RAID 0 |
C | RAID 5 |
D | RAID 10 |
Question 130 |
A | 802.1x |
B | Sticky MAC |
C | NAC |
D | NAT |
E | ACL |
Question 131 |
A | RAID 1 |
B | Server clustering |
C | NIC teaming |
D | DNS round robin |
E | Muti-ISP connections |
Question 132 |
A | Auditing |
B | Authentication |
C | Accounting |
D | Authorization |
Question 133 |
A | Fibre Channel |
B | iSCSI |
C | NAS |
D | InfinitiBand |
Question 134 |
A | Wiring schematic |
B | Circuit diagrams |
C | Asset management files |
D | Physical network diagram |
E | Logical network diagram |
Question 135 |
A | The public key |
B | The ticket granting key |
C | The private key |
D | The session key |
E | The secure key |
Question 136 |
A | WinMS |
B | MSS |
C | Window |
D | MMS |
Question 137 |
A | Network wiring is run perpendicular to electrical conduit |
B | Temperature changes are causing attenuation in copper cabling |
C | EMI from the lights is interfering with the network cables |
D | Light sensors are interfering with the network |
Question 138 |
A | PaaS |
B | SaaS |
C | VPN |
D | IaaS |
E | Hosted |
Question 139 |
A | Smartcards |
B | Video surveillance |
C | Biometrics |
D | Motion detection |
Question 140 |
A | IP |
B | IMAP |
C | ICMP |
D | IGMP |
Question 141 |
A | NAT |
B | DMZ |
C | DDoS |
D | QoS |
E | RIP |
Question 142 |
A | Tone generator |
B | Cable tester |
C | Loopback adapter |
D | Multimeter |
Question 143 |
A | Keep purchasing new spare equipment. |
B | Store all spare equipment in a sepearete office building for extra protection. |
C | Update the firmware and drivers on spare network equipment regularly. |
D | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
E | Do nothing and keep the spare nearby for an emergency. |
Question 144 |
A | E-1 |
B | OC-1 |
C | T-3 |
D | T-1 |
Question 145 |
A | RC4 |
B | Kerberos |
C | AES |
D | TKIP |
E | 802.1X |
Question 146 |
A | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
B | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
C | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
D | Install an IDS to monitor all traffic to and from the kiosks. |
E | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
Question 147 |
A | Configure advance intrusion detection and firewall rules on the main datacenter. |
B | Install and maintain advanced enterprise firewall applications. |
C | Physical inspection of each site/workstation. |
D | Perform frequent security and vulnerability updates. |
E | Perform frequent IT audits. |
Question 148 |
A | Somewhere you are |
B | Something you do |
C | Something you know |
D | Something you have |
Question 149 |
A | Media converter |
B | SONET |
C | SIP trunk |
D | Smart jack |
E | AAA server |
Question 150 |
A | CARP |
B | QoS |
C | VoIP |
D | IPv6 |
E | SSL |
Question 151 |
A | FCoE |
B | iSCSI |
C | SAN |
D | NAS |
E | FTP |
Question 152 |
A | Network |
B | Application |
C | Transport |
D | Data Link |
E | Session |
Question 153 |
A | Network firewall |
B | Wireless endpoint |
C | Demarcation point |
D | Wireless controller |
E | Demarcation point |
Question 154 |
A | Ring |
B | Bus |
C | Mesh |
D | Star |
E | Ad hoc |
Question 155 |
A | IGMP |
B | UDP |
C | TCP |
D | ICMP |
Question 156 |
A | http://sanuja.com:123456 |
B | http://sanuja.com/123456 |
C | https://sanuja.com/123456 |
D | https://sanuja.com:123456 |
E | None of the answers are correct because you cannot assign random port numbers. |
Question 157 |
A | Hub |
B | Switch |
C | Bridge |
D | Router |
Question 158 |
A | Class C |
B | Class B |
C | None of the classes |
D | Class A |
E | Class D |
Question 159 |
A | Presentation |
B | Session |
C | Transport |
D | Network |
E | Data link |
F | Physical |
G | Application |
Question 160 |
A | The testing server for the wired network was farther away |
B | The wireless access points were misconfigured |
C | There is less local congestion on the wireless network |
D | The firewall is configured to throttle traffic to specific websites |
Question 161 |
A | Tracert |
B | Route |
C | Ping |
D | Netstat |
E | Nslookup |
Question 162 |
A | Reference the ARP table in the router. |
B | Configure port security on the switch. |
C | Set up an SSH session to the desktop. |
D | Perform a DNS lookup on the server. |
Question 163 |
A | Port scanning |
B | Port sweeping |
C | Brute-force |
D | War driving |
E | Bluejacking |
Question 164 |
A | Signal attenuation |
B | Latency |
C | Crosstalk |
D | EMI |
Question 165 |
A | VLAN restrictions |
B | IPS |
C | VPN concentrator |
D | Content filter |
E | Web application firewall |
Question 166 |
A | Layer 4 |
B | Layer 3 |
C | Layer 1 |
D | Layer 2 |
Question 167 |
A | Branch-to-server |
B | Extranet |
C | Host-to-site |
D | Host-to-host |
E | Site-to-site |
Question 168 |
A | BGP |
B | LLDP |
C | LACP |
D | SIP |
Question 169 |
A | 1 unit |
B | 4 unit |
C | 3 unit |
D | 2 unit |
Question 170 |
A | DB9 |
B | USB 2.0 |
C | USB 3.0 |
D | RC5 |
E | RJ45 |
Question 171 |
A | System |
B | Security |
C | Application |
D | Setup |
Question 172 |
A | Mesh |
B | Star |
C | Ring or circular |
D | Point-to-point |
E | Bus |
Question 173 |
A | PAT |
B | SNAT |
C | STP |
D | NAT |
E | ARP |
Question 174 |
A | 16 inches |
B | 24 inches |
C | 19 inches |
D | 12 inches |
Question 175 |
A | Session |
B | Physical |
C | Application |
D | Network |
E | Data Link |
F | Transport |
G | Presentation |
Question 176 |
A | Walk a user through troubleshooting the connection |
B | Use a modem to console into the router |
C | Hire a third-party contractor to go on-site |
D | Travel to the branch office |
Question 177 |
A | ifconfig |
B | netstat |
C | tracert |
D | ping |
E | ipconfig |
Question 178 |
A | A router |
B | A switch |
C | A hub |
D | A gateway |
Question 179 |
A | session hijacking |
B | friendly DoS |
C | social engineering |
D | vulnerability scanning |
E | penetration testing |
Question 180 |
A | Evil twin |
B | Logic bomb |
C | Wardriving |
D | Social engineering |
Question 181 |
A | PEAP |
B | WPA |
C | WEP |
D | WPA2 |
Question 182 |
A | MX |
B | TXT |
C | A |
D | NS |
E | AAAA |
Question 183 |
A | A shared resource problem |
B | A network-wide problem |
C | A user application problem |
D | A wide area newtwork problem |
E | A system-wide problem |
Question 184 |
A | Hubs |
B | Bridges |
C | Firewalls |
D | Routers |
Question 185 |
A | IMAP |
B | LDAP |
C | POP |
D | SMTP |
Question 186 |
A | -t |
B | -n |
C | -i |
D | -a |
Question 187 |
A | Jumbo frames |
B | FTP |
C | NAS |
D | SAN |
E | Fiber channel |
Question 188 |
A | IP address resolution |
B | Password protection |
C | Name resolution |
D | Network switching |
Question 189 |
A | WEP |
B | CCMP-AES |
C | EAP-PEAP |
D | PSK |
Question 190 |
A | tamper detection |
B | hardware security |
C | device hardening |
D | biometrics |
E | asset tracking |
Question 191 |
A | Move from WPA2 to WEP |
B | Enable WPA and change the SSID |
C | Have the ISP double the bandwidth |
D | Configure geofencing |
Question 192 |
A | LC to SC |
B | SC to SC |
C | ST to ST |
D | LC to ST |
E | SC to ST |
Question 193 |
A | 192.168.0.1 |
B | 169.254.54.5 |
C | 192.168.1.1 |
D | 175.255.255.255 |
E | 175.168.0.255 |
Question 194 |
A | MD |
B | A |
C | PTR |
D | CNAME |
E | MX |
Question 195 |
A | Fiber optic |
B | Microwave |
C | Electrical |
D | Infrared |
Question 196 |
A | IDF |
B | MTBF |
C | MDF |
D | RDP |
E | PBX |
Question 197 |
A | Tamper detection |
B | Pattern recognition |
C | Biometrics |
D | Hand geometry |
E | Single sign-on (SSO) |
Question 198 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
C | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
D | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
Question 199 |
A | Duplex/speed mismatch |
B | DHCP server issue |
C | Spanning tree blocked ports |
D | VLAN mismatch |
E | DNS server issue |
Question 200 |
A | SSL gateway |
B | SSL client |
C | SSL portal |
D | SSL tunnel |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.