← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | QSFP |
B | SFP |
C | GBIC |
D | BiDi |
Question 2 |
A | Netstat |
B | Top |
C | Netmon |
D | Syslog |
Question 3 |
A | -n |
B | -a |
C | -t |
D | -i |
Question 4 |
A | Travel to the branch office |
B | Walk a user through troubleshooting the connection |
C | Use a modem to console into the router |
D | Hire a third-party contractor to go on-site |
Question 5 |
A | RADSL |
B | VDSL |
C | HDSL |
D | IDSL |
Question 6 |
A | Infrared |
B | Fiber optic |
C | Electrical |
D | Microwave |
Question 7 |
A | Verify the firmware file hash |
B | Disable unused switchports |
C | Change the default credentials |
D | Apply patches and updates |
Question 8 |
A | ping |
B | ifconfig |
C | netstat |
D | tracert |
E | ipconfig |
Question 9 |
A | Asset management files |
B | Logical network diagram |
C | Physical network diagram |
D | Circuit diagrams |
E | Wiring schematic |
Question 10 |
A | Ping time |
B | Distance |
C | Bandwidth |
D | Hop count |
E | Speed |
Question 11 |
A | Hosted |
B | IaaS |
C | SaaS |
D | VPN |
E | PaaS |
Question 12 |
A | Nslookup |
B | Tracert |
C | Route |
D | Ping |
E | Netstat |
Question 13 |
A | Coaxial |
B | Unshielded twisted pair |
C | Single-mode fiber optic |
D | Multimode fiber optic |
E | Shielded twisted pair |
Question 14 |
A | 12 inches |
B | 24 inches |
C | 16 inches |
D | 19 inches |
Question 15 |
A | netstat |
B | ping |
C | traceroute |
D | ifconfig |
Question 16 |
A | TKIP-RC4 |
B | LDAP |
C | RADIUS |
D | NAC |
Question 17 |
A | ping 192.168.1.1 -l 2048 -t 6 |
B | ping 192.168.1.1 -n 2048 |
C | ping 192.168.1.1 -l 2048 -n 6 |
D | ping 192.168.1.1 -l 2048 -t |
E | ping 192.168.1.1 -t |
Number of messages: -n parameter = 6
Question 18 |
A | A hub |
B | A router |
C | A switch |
D | A gateway |
Question 19 |
A | cpustat |
B | monitor |
C | top |
D | ping |
E | netstat |
Question 20 |
A | Layer 2 |
B | Layer 6 |
C | Layer 1 |
D | Layer 7 |
E | Layer 4 |
F | Layer 5 |
G | Layer 3 |
Question 21 |
A | SAN |
B | Jumbo frames |
C | NAS |
D | FTP |
E | Fiber channel |
Question 22 |
A | RAID 5 |
B | RAID 0 |
C | RAID 10 |
D | RAID 1 |
Question 23 |
A | Set up an SSH session to the desktop. |
B | Reference the ARP table in the router. |
C | Configure port security on the switch. |
D | Perform a DNS lookup on the server. |
Question 24 |
A | Use port mirroring |
B | Periodically view the server logs |
C | Configure port aggregation |
D | Install an inline tap |
E | Use SQL injectors |
Question 25 |
A | LLDP |
B | SIP |
C | LACP |
D | BGP |
Question 26 |
A | A private IP pointing to the web proxy |
B | A private IP pointing to the web front end |
C | A virtual IP pointing to the active DB |
D | A static IP pointing to the passive DB |
Question 27 |
A | Open circuits |
B | Split pairs |
C | Transposed wires |
D | Short circuits |
Question 28 |
A | The ticket granting key |
B | The secure key |
C | The private key |
D | The public key |
E | The session key |
Question 29 |
A | Default gateway |
B | MAC address |
C | IP address |
D | Subnet mask |
Question 30 |
A | Ad hoc |
B | Star |
C | Mesh |
D | Bus |
E | Ring |
Question 31 |
A | RTO |
B | MIB |
C | BCP |
D | RPO |
E | RAID |
Question 32 |
A | RADIUS |
B | EAP-TLS |
C | Kerberos |
D | WPA2 |
Question 33 |
A | Mesh |
B | Point-to-point |
C | Ring or circular |
D | Star |
E | Bus |
Question 34 |
A | 110 block |
B | 66 block |
C | Patch panel |
D | CMTS |
E | Fiber distribution panel |
Question 35 |
A | Process management |
B | Project management |
C | Standard operating procedure |
D | Change management |
Question 36 |
A | A privilege escalation script |
B | An open mail relay server |
C | An SNMPv1 private community |
D | A router with default credentials |
Question 37 |
A | Transport |
B | Presentation |
C | Data link |
D | Network |
E | Session |
F | Application |
G | Physical |
Question 38 |
A | SYN, SYN/ACK, ACK |
B | SYN/ACK, SYN/ACK |
C | SYN, ACK, SYN, ACK |
D | SYN, SYN, ACK, ACK |
Question 39 |
A | vulnerability scanning |
B | penetration testing |
C | session hijacking |
D | social engineering |
E | friendly DoS |
Question 40 |
A | Asset tracking |
B | Data security |
C | Port security |
D | Physical security |
Question 41 |
A | traceroute |
B | dig |
C | ifconfig |
D | netstat |
E | route |
Question 42 |
A | Kerberos |
B | RC4 |
C | 802.1X |
D | TKIP |
E | AES |
Question 43 |
A | iSCSI |
B | FCoE |
C | FTP |
D | NAS |
E | SAN |
Question 44 |
A | Configure geofencing |
B | Move from WPA2 to WEP |
C | Have the ISP double the bandwidth |
D | Enable WPA and change the SSID |
Question 45 |
A | Enterrpise APs |
B | Fiber-optic cabling |
C | Twisted pair cabling |
D | Coaxial cabling |
Question 46 |
A | QoS |
B | NAT |
C | DMZ |
D | RIP |
E | DDoS |
Question 47 |
A | Application |
B | Transport |
C | Session |
D | Data Link |
E | Network |
Question 48 |
A | DHCP exclusion |
B | DHCP option |
C | DHCP relay |
D | DHCP reservation |
E | DHCP restriction |
Question 49 |
A | UDP |
B | HTTP |
C | TCP |
D | IP |
Question 50 |
A | Hand geometry |
B | Single sign-on (SSO) |
C | Biometrics |
D | Tamper detection |
E | Pattern recognition |
Question 51 |
A | 1024 to 49151 |
B | 1023 through 65534 |
C | 49152 through 65535 |
D | 1 through 1024 |
Question 52 |
A | Network management |
B | Distributed server system |
C | Fault tolerance |
D | Remote connection |
E | Site-to-site VPN |
Question 53 |
A | 0 |
B | 3 |
C | 2 |
D | 4 |
E | 1 |
Question 54 |
A | Evil twin |
B | Wardriving |
C | Logic bomb |
D | Social engineering |
Question 55 |
A | Layer 2 |
B | Layer 4 |
C | Layer 1 |
D | Layer 3 |
Question 56 |
A | CIFS |
B | iSCSI |
C | Fibre Channel |
D | InfiniBand |
Question 57 |
A | 80 |
B | 443 |
C | 110 |
D | 990 |
E | 25 |
Question 58 |
A | MDF |
B | IDF |
C | TDM |
D | VRF |
Question 59 |
A | Password protection |
B | Name resolution |
C | Network switching |
D | IP address resolution |
Question 60 |
A | LC to ST |
B | LC to SC |
C | SC to ST |
D | SC to SC |
E | ST to ST |
Question 61 |
A | Logical diagram |
B | Building blueprints |
C | Network map |
D | Rack diagram |
E | Wiring schematic |
Question 62 |
A | Accounting |
B | Authentication |
C | Authorization |
D | Administration |
Question 63 |
A | RAID 1 |
B | SNMP |
C | Clustering |
D | UPS |
Question 64 |
A | route |
B | ping |
C | pathping |
D | netstat |
Question 65 |
A | Change default admin password |
B | Perform backups |
C | Enable port mirroring |
D | Implement spanning tree |
E | Patch and update |
F | Perform VLAN hopping |
Question 66 |
A | Protocol analyzer |
B | NAT |
C | Layer 7 firewall |
D | Layer 3 switch |
E | Web proxy |
Question 67 |
A | Permit 192.168.1.143 port143 |
B | Permit 192.168.1.143 port 80 |
C | Permit 192.168.1.143 port 110 |
D | Permit 192.168.1.143 port 587 |
E | Permit 192.168.1.143 port 443 |
F | Permit 192.168.1.143 port 25 |
Question 68 |
A | Enrollment |
B | Certification |
C | Authentication |
D | Encryption |
E | Authorization |
Question 69 |
A | Router |
B | Bridge |
C | Gateway |
D | Switch |
Question 70 |
A | Damaged or malfunctioning fiber port |
B | Corrupted config files or operating system |
C | Double NAT issue |
D | Damaged or malfunctioning LAN port |
E | VLAN mismatch |
Question 71 |
A | WEP |
B | 802.1X |
C | WPA |
D | WPA2 |
Question 72 |
A | Inconsistent data accessability |
B | Increased malware exposure |
C | Incompatibility with the current network |
D | Decreased performance of the internal network |
E | Loss of full control over data resources |
Question 73 |
A | 1 unit |
B | 3 unit |
C | 4 unit |
D | 2 unit |
Question 74 |
A | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
B | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
C | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
D | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
Question 75 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
C | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
D | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
Question 76 |
A | Crosstalk |
B | Latency |
C | EMI |
D | Signal attenuation |
Question 77 |
A | Proxy server |
B | Enterprise firewall |
C | IDS |
D | Wireless controller |
E | Load balancer |
Question 78 |
A | Channel overlap |
B | Wrong passphrase |
C | Overcapacity |
D | Cross talk |
Question 79 |
A | Add additional printers across both NATs. |
B | Remove the firewall between the Internet/modem and the router. |
C | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
D | Add a firewall between the domain controller and the router. |
Question 80 |
A | Port security |
B | WPA2 |
C | Captive portal |
D | Access control lists |
Question 81 |
A | Port security |
B | NAC |
C | WAP |
D | Captive portal |
E | MAC filtering |
Question 82 |
A | Peer-peer |
B | Point-to-multipoint |
C | Bus |
D | Mesh |
E | Ring |
F | Point-to-point |
Question 83 |
A | Host-to-site |
B | Branch-to-server |
C | Host-to-host |
D | Extranet |
E | Site-to-site |
Question 84 |
A | Session |
B | Physical |
C | Transport |
D | Application |
E | Data Link |
F | Presentation |
G | Network |
Question 85 |
A | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
B | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
C | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
D | Set the firewall to operate in transparent mode |
Question 86 |
A | Class B |
B | Class D |
C | Class A |
D | Class C |
E | None of the classes |
Question 87 |
A | Power distribution unit |
B | Power-over-Ethernet switch |
C | Powerline extender |
D | Ethernet power controller |
E | Ethernet-over-power adapter |
Question 88 |
A | A network-wide problem |
B | A system-wide problem |
C | A user application problem |
D | A shared resource problem |
E | A wide area newtwork problem |
Question 89 |
A | RAID 1 |
B | RAID 10 |
C | RAID 0 |
D | RAID 5 |
Question 90 |
A | 10.0.0.0 to 10.0.255.255 |
B | 224.0.0.0 to 224.0.255.255 |
C | 192.168.0.0 to 192.168.0.255 |
D | 169.254.0.0 to 169.254.255.255 |
Question 91 |
A | tcpdump |
B | ipconfig |
C | netstat |
D | traceroute |
E | iptables |
Question 92 |
A | device hardening |
B | hardware security |
C | asset tracking |
D | biometrics |
E | tamper detection |
Question 93 |
A | 1999 |
B | 1024 |
C | 80 |
D | 50134 |
E | 23 |
F | 995 |
Question 94 |
A | 5060 , 3389 |
B | 143 , 993 |
C | 5060 , 5061 |
D | 161 , 162 |
E | 80 , 443 |
Question 95 |
A | Pattern recognition |
B | Geofencing |
C | Biometrics |
D | Tamper detection |
E | Face geometry |
Question 96 |
A | Configure advance intrusion detection and firewall rules on the main datacenter. |
B | Perform frequent IT audits. |
C | Physical inspection of each site/workstation. |
D | Perform frequent security and vulnerability updates. |
E | Install and maintain advanced enterprise firewall applications. |
Question 97 |
A | 17 |
B | 8 |
C | 16 |
D | 15 |
Question 98 |
A | Bridges |
B | Routers |
C | Hubs |
D | Firewalls |
Question 99 |
A | TACACS+ |
B | Single sign-on |
C | Local authentication |
D | LDAP |
Question 100 |
A | Cold sites |
B | Backups |
C | Failover |
D | Snapshots |
Question 101 |
A | Power redundancy |
B | Airflow and cooling |
C | UPS capability |
D | Circuit labeling |
Question 102 |
A | PRI |
B | E1/E3 |
C | DSL |
D | BRI |
Question 103 |
A | Authentication |
B | Accounting |
C | Authorization |
D | TGS |
E | Auditing |
Question 104 |
A | XSS |
B | Packet sniffing |
C | Directory traversal |
D | Wardriving |
E | SQL injection |
Question 105 |
A | SCP |
B | SIP |
C | ARP |
D | FTP |
Question 106 |
A | 2 |
B | 7 |
C | 0 |
D | 4 |
E | 6 |
Question 107 |
A | ARP |
B | PAT |
C | SNAT |
D | NAT |
E | STP |
Question 108 |
A | Transport |
B | Physical |
C | Session |
D | Network |
E | Application |
F | Data Link |
G | Presentation |
Question 109 |
A | Session hijacking |
B | Data usage limits |
C | Blocking |
D | Throttling |
E | Bandwidth quotas |
Question 110 |
A | IGMP |
B | UDP |
C | ICMP |
D | TCP |
Question 111 |
A | Wireless controller |
B | Wireless endpoint |
C | Network firewall |
D | Demarcation point |
E | Demarcation point |
Question 112 |
A | RDP |
B | IDF |
C | PBX |
D | MDF |
E | MTBF |
Question 113 |
A | E-1 |
B | T-1 |
C | T-3 |
D | OC-1 |
Question 114 |
A | Performance Monitor |
B | Event Viewer |
C | Network Monitor |
D | ntop |
E | Syslog |
Question 115 |
A | MS-CHAPv2 |
B | EAP |
C | PAP |
D | WEP |
E | CHAP |
Question 116 |
A | Cable tester |
B | Tone generator |
C | Multimeter |
D | Loopback adapter |
Question 117 |
A | SSL |
B | QoS |
C | CARP |
D | VoIP |
E | IPv6 |
Question 118 |
A | SSL portal |
B | SSL tunnel |
C | SSL client |
D | SSL gateway |
Question 119 |
A | Public |
B | Preshared |
C | Private |
D | Secured |
E | Privileged |
Question 120 |
A | Session |
B | Data link |
C | Network |
D | Physical |
E | Application |
F | Transport |
G | Presentation |
Question 121 |
A | IPsec |
B | PPTP |
C | FTPS |
D | L2TP |
Question 122 |
A | RG-8 |
B | RG-58 |
C | RJ-11 |
D | RJ-45 |
Question 123 |
A | Video surveillance |
B | Biometrics |
C | Smartcards |
D | Motion detection |
Question 124 |
A | Control the attenuation of the non-voice traffic across the network links |
B | Control the latency of traffic across the network links |
C | Control the jitter of the affected traffic across the network links |
D | Control the EMI of the multimedia traffic across the network links |
Question 125 |
A | Fibre Channel |
B | iSCSI |
C | InfinitiBand |
D | NAS |
Question 126 |
A | arp -s |
B | arp -a |
C | arp -c * |
D | arp -d * |
Question 127 |
A | Evil twin |
B | Logic bomb |
C | Social engineering |
D | Wardriving |
Question 128 |
A | ICMP |
B | TCP |
C | UDP |
D | IP |
E | Ethernet |
Question 129 |
A | SSH |
B | SSL |
C | Telnet |
D | IPSec |
Question 130 |
A | Combined mode |
B | Redundant mode |
C | Individual mode |
D | High-efficiency mode |
E | Hot backup mode |
Question 131 |
A | WinMS |
B | Window |
C | MMS |
D | MSS |
Question 132 |
A | A gateway |
B | A router |
C | A hub |
D | A switch |
Question 133 |
A | A consent to monitoring policy covering company audits of the personal phone |
B | An AUP covering how a personal phone may be used for work matters |
C | An NDA ensuring work data stored on the personal phone remains confidential |
D | Real-time remote monitoring of the phone’s activity and usage |
Question 134 |
A | Application |
B | Setup |
C | System |
D | Security |
Question 135 |
A | MD |
B | CNAME |
C | MX |
D | PTR |
E | A |
Question 136 |
A | 10GBase-ER |
B | 10GBase-LX4 |
C | 10GBase-CX4 |
D | 10GBase-SR |
E | 10GBase-LR |
Question 137 |
A | Binary |
B | Hex |
C | Octal |
D | CIDR |
Question 138 |
A | Tamper detection |
B | Asset tracking |
C | Geofencing |
D | Social engineering |
E | Biometric |
Question 139 |
A | Physical network diagram |
B | Logical network diagram |
C | Wiring schematic |
D | Circuit diagrams |
E | Asset management files |
Question 140 |
A | Security |
B | System |
C | Application |
D | Setup |
Question 141 |
A | Feature change |
B | Vulnerability patch |
C | Driver update |
D | Operating system update |
E | BOIS firmware patch |
Question 142 |
A | Hub |
B | Router |
C | Switch |
D | Bridge |
Question 143 |
A | Authorization |
B | Authentication |
C | Accounting |
D | Auditing |
Question 144 |
A | VIP |
B | PAT |
C | SIP |
D | NAT |
Question 145 |
A | Application |
B | Physical |
C | Transport |
D | Network |
E | Presentation |
F | Session |
G | Data link |
Question 146 |
A | Voice over IP |
B | Quality of service |
C | Round-robin DNS |
D | CARP |
Question 147 |
A | DB9 |
B | RJ45 |
C | USB 2.0 |
D | RC5 |
E | USB 3.0 |
Question 148 |
A | Layer 3 repeater |
B | Ethernet hub |
C | Layer 2 router |
D | Multiport bridge |
Question 149 |
A | Encapsulate the storage traffic in a GRE tunnel |
B | Turn off MDIX settings on the NAS and server switchports |
C | Enable jumbo frames on the NAS and server |
D | Utilize UDP to eliminate packet overhead |
Question 150 |
A | 169.254.54.5 |
B | 192.168.1.1 |
C | 192.168.0.1 |
D | 175.255.255.255 |
E | 175.168.0.255 |
Question 151 |
A | Web application firewall |
B | VPN concentrator |
C | IPS |
D | VLAN restrictions |
E | Content filter |
Question 152 |
A | FTP |
B | HTTP |
C | SMTP |
D | HTML |
E | SSL |
Question 153 |
A | DNS round robin |
B | NIC teaming |
C | Muti-ISP connections |
D | Server clustering |
E | RAID 1 |
Question 154 |
A | Redundant circuits |
B | Power redundancy |
C | Uninterruptible Power Supply (UPS) |
D | Power looping |
E | Dual power supplies |
Question 155 |
A | RJ11 |
B | ST |
C | LC |
D | RJ45 |
E | MTRJ |
F | F-type |
Question 156 |
A | TKIP |
B | Kerberos |
C | LDAP |
D | 802.1X |
E | Radius |
Question 157 |
A | URG |
B | SYN |
C | FIN |
D | END |
E | PSH |
Question 158 |
A | IDS |
B | NAS |
C | NGFW |
D | RADIUS |
Question 159 |
A | Something you have |
B | Something you do |
C | Something you know |
D | Somewhere you are |
Question 160 |
A | Jumbo frame |
B | DOCSIS |
C | Double NAT |
D | Bridge mode |
E | ADSL |
Question 161 |
A | SaaS |
B | Hybrid |
C | PaaS |
D | Public |
E | IaaS |
F | Private |
Question 162 |
A | tcpdump |
B | netstat |
C | dig |
D | nmap |
Question 163 |
A | 192.168.0.55 |
B | 10.1.0.255 |
C | 192.168.0.1 |
D | 10.1.1.255 |
E | 192.168.1.109 |
Question 164 |
A | DHCP server issue |
B | DNS server issue |
C | VLAN mismatch |
D | Duplex/speed mismatch |
E | Spanning tree blocked ports |
Question 165 |
A | 802.1x |
B | NAT |
C | NAC |
D | ACL |
E | Sticky MAC |
Question 166 |
A | Honey pot |
B | VLAN mismatch |
C | Evil twin |
D | Rogue DHCP server |
E | Packet intrusion |
Question 167 |
A | Verify file type |
B | Verify file date |
C | Verify file hash |
D | Verify file version |
E | Verify file size |
Question 168 |
A | There is less local congestion on the wireless network |
B | The wireless access points were misconfigured |
C | The testing server for the wired network was farther away |
D | The firewall is configured to throttle traffic to specific websites |
Question 169 |
A | 143 |
B | 25 |
C | 989 |
D | 80 |
E | 110 |
Question 170 |
A | HTTPS server |
B | Secure server |
C | Encryption key |
D | Authentication server |
E | VPN gateway |
Question 171 |
A | Inches |
B | Millimeters |
C | Centimeters |
D | Number of screw holes |
E | Units |
Question 172 |
A | Destination switch |
B | Store-and-forward |
C | Source route |
D | Cut-through |
Question 173 |
A | Client terminal |
B | KDC |
C | Application server |
D | RDP |
Question 174 |
A | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
B | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
C | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
D | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
E | Install an IDS to monitor all traffic to and from the kiosks. |
Question 175 |
A | nmap |
B | tcpdump |
C | iptables |
D | dig |
Question 176 |
A | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
B | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
C | It is impossible to have a collision domain in a wireless network infrastructure. |
D | Both broadcast and collision domains occur at layer 2. |
E | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
Question 177 |
A | Phishing |
B | Session hijacking |
C | Ransomware |
D | Spoofing |
E | DDoS |
Question 178 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | netstat –a SANUJA.COM |
B | iptables –f SANUJA.COM |
C | dig –t ANY SANUJA.COM |
D | NMAP –t SANUJA.COM |
Question 179 |
A | MX |
B | NS |
C | A |
D | TXT |
E | AAAA |
Question 180 |
A | 8P8C |
B | F-type |
C | BNC |
D | MTRJ |
E | RJ45 |
Question 181 |
A | BYOD |
B | NDA |
C | IRP |
D | SLA |
Question 182 |
A | Domain controller |
B | Wireless access point |
C | Biometric systems |
D | RADIUS server |
E | Smartcards |
Question 183 |
A | ISDN |
B | Dial-up modem |
C | DSL |
D | Cable broadband |
Question 184 |
A | Smart jack |
B | AAA server |
C | Media converter |
D | SIP trunk |
E | SONET |
Question 185 |
A | arp -t |
B | arp -a |
C | arp -d |
D | arp -s |
E | arp -c |
Question 186 |
A | Logical network diagram |
B | Asset management files |
C | Physical network diagram |
D | MSConfig file |
E | Wiring schematic |
Question 187 |
A | Temperature changes are causing attenuation in copper cabling |
B | EMI from the lights is interfering with the network cables |
C | Network wiring is run perpendicular to electrical conduit |
D | Light sensors are interfering with the network |
Question 188 |
A | http://sanuja.com:123456 |
B | http://sanuja.com/123456 |
C | None of the answers are correct because you cannot assign random port numbers. |
D | https://sanuja.com:123456 |
E | https://sanuja.com/123456 |
Question 189 |
A | IP |
B | IMAP |
C | ICMP |
D | IGMP |
Question 190 |
A | F-type |
B | MTRJ |
C | ST |
D | RJ11 |
E | RJ45 |
Question 191 |
A | A |
B | NS |
C | MX |
D | AAAA |
E | TXT |
Question 192 |
A | 192.168.0.55 |
B | 192.168.1.1 |
C | 255 255 255.0 |
D | 255 255 255.0 |
E | 192.168.1.0 |
Question 193 |
A | VoIP gateway |
B | VPN concentrator |
C | UTM appliance |
D | Proxy server |
Question 194 |
A | There is a frequency mismatch |
B | The password needs to be re-entered |
C | The channel has changed |
D | There is insufficient antenna power |
E | There is a security type mismatch. |
Question 195 |
A | WPA2 |
B | WPA |
C | PEAP |
D | WEP |
Question 196 |
A | CCMP-AES |
B | WEP |
C | PSK |
D | EAP-PEAP |
Question 197 |
A | LDAP |
B | SMTP |
C | POP |
D | IMAP |
Question 198 |
A | Do nothing and keep the spare nearby for an emergency. |
B | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
C | Keep purchasing new spare equipment. |
D | Update the firmware and drivers on spare network equipment regularly. |
E | Store all spare equipment in a sepearete office building for extra protection. |
Question 199 |
A | War driving |
B | Port scanning |
C | Bluejacking |
D | Brute-force |
E | Port sweeping |
Question 200 |
A | Transparent |
B | Multiport |
C | Store and forward |
D | Source route |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.