← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | NAC |
B | Sticky MAC |
C | 802.1x |
D | ACL |
E | NAT |
Question 2 |
A | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
B | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
C | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
D | It is impossible to have a collision domain in a wireless network infrastructure. |
E | Both broadcast and collision domains occur at layer 2. |
Question 3 |
A | PSK |
B | CCMP-AES |
C | WEP |
D | EAP-PEAP |
Question 4 |
A | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
B | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
C | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
D | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
Question 5 |
A | Perform frequent security and vulnerability updates. |
B | Perform frequent IT audits. |
C | Install and maintain advanced enterprise firewall applications. |
D | Physical inspection of each site/workstation. |
E | Configure advance intrusion detection and firewall rules on the main datacenter. |
Question 6 |
A | Brute-force |
B | War driving |
C | Port scanning |
D | Port sweeping |
E | Bluejacking |
Question 7 |
A | Feature change |
B | BOIS firmware patch |
C | Driver update |
D | Vulnerability patch |
E | Operating system update |
Question 8 |
A | Switch |
B | Router |
C | Hub |
D | Bridge |
Question 9 |
A | InfiniBand |
B | iSCSI |
C | Fibre Channel |
D | CIFS |
Question 10 |
A | Motion detection |
B | Video surveillance |
C | Biometrics |
D | Smartcards |
Question 11 |
A | Top |
B | Netstat |
C | Syslog |
D | Netmon |
Question 12 |
A | Site-to-site |
B | Branch-to-server |
C | Host-to-host |
D | Extranet |
E | Host-to-site |
Question 13 |
A | netstat |
B | pathping |
C | route |
D | ping |
Question 14 |
A | NAC |
B | WAP |
C | Port security |
D | Captive portal |
E | MAC filtering |
Question 15 |
A | Asset tracking |
B | Tamper detection |
C | Social engineering |
D | Geofencing |
E | Biometric |
Question 16 |
A | Fiber optic |
B | Microwave |
C | Electrical |
D | Infrared |
Question 17 |
A | IaaS |
B | PaaS |
C | Public |
D | Private |
E | SaaS |
F | Hybrid |
Question 18 |
A | Mesh |
B | Bus |
C | Point-to-point |
D | Star |
E | Ring or circular |
Question 19 |
A | SYN, ACK, SYN, ACK |
B | SYN/ACK, SYN/ACK |
C | SYN, SYN, ACK, ACK |
D | SYN, SYN/ACK, ACK |
Question 20 |
A | Tamper detection |
B | Face geometry |
C | Pattern recognition |
D | Biometrics |
E | Geofencing |
Question 21 |
A | ping 192.168.1.1 -l 2048 -n 6 |
B | ping 192.168.1.1 -n 2048 |
C | ping 192.168.1.1 -t |
D | ping 192.168.1.1 -l 2048 -t |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 22 |
A | NAT |
B | VIP |
C | SIP |
D | PAT |
Question 23 |
A | 802.1X |
B | WEP |
C | WPA |
D | WPA2 |
Question 24 |
A | Store and forward |
B | Multiport |
C | Source route |
D | Transparent |
Question 25 |
A | Session |
B | Transport |
C | Presentation |
D | Application |
E | Network |
F | Data link |
G | Physical |
Question 26 |
A | Fiber-optic cabling |
B | Coaxial cabling |
C | Twisted pair cabling |
D | Enterrpise APs |
Question 27 |
A | Logical network diagram |
B | Physical network diagram |
C | Wiring schematic |
D | Asset management files |
E | Circuit diagrams |
Question 28 |
A | F-type |
B | MTRJ |
C | RJ45 |
D | 8P8C |
E | BNC |
Question 29 |
A | RDP |
B | MTBF |
C | PBX |
D | IDF |
E | MDF |
Question 30 |
A | TCP |
B | ICMP |
C | IP |
D | Ethernet |
E | UDP |
Question 31 |
A | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
B | Set the firewall to operate in transparent mode |
C | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
D | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
Question 32 |
A | PAP |
B | MS-CHAPv2 |
C | WEP |
D | EAP |
E | CHAP |
Question 33 |
A | ntop |
B | Network Monitor |
C | Event Viewer |
D | Syslog |
E | Performance Monitor |
Question 34 |
A | A virtual IP pointing to the active DB |
B | A private IP pointing to the web front end |
C | A static IP pointing to the passive DB |
D | A private IP pointing to the web proxy |
Question 35 |
A | NS |
B | TXT |
C | AAAA |
D | A |
E | MX |
Question 36 |
A | Phishing |
B | DDoS |
C | Ransomware |
D | Spoofing |
E | Session hijacking |
Question 37 |
A | The session key |
B | The secure key |
C | The ticket granting key |
D | The public key |
E | The private key |
Question 38 |
A | A network-wide problem |
B | A wide area newtwork problem |
C | A shared resource problem |
D | A user application problem |
E | A system-wide problem |
Question 39 |
A | iptables |
B | ipconfig |
C | traceroute |
D | tcpdump |
E | netstat |
Question 40 |
A | EAP-TLS |
B | WPA2 |
C | RADIUS |
D | Kerberos |
Question 41 |
A | RJ11 |
B | RJ45 |
C | F-type |
D | MTRJ |
E | ST |
Question 42 |
A | Install an IDS to monitor all traffic to and from the kiosks. |
B | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
C | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
D | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
E | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
Question 43 |
A | 4 |
B | 7 |
C | 2 |
D | 6 |
E | 0 |
Question 44 |
A | NDA |
B | BYOD |
C | SLA |
D | IRP |
Question 45 |
A | Session |
B | Data Link |
C | Application |
D | Transport |
E | Network |
Question 46 |
A | SMTP |
B | IMAP |
C | POP |
D | LDAP |
Question 47 |
A | Router |
B | Bridge |
C | Switch |
D | Gateway |
Question 48 |
A | SAN |
B | Fiber channel |
C | NAS |
D | Jumbo frames |
E | FTP |
Question 49 |
A | Perform a DNS lookup on the server. |
B | Configure port security on the switch. |
C | Set up an SSH session to the desktop. |
D | Reference the ARP table in the router. |
Question 50 |

A | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
B | Add additional printers across both NATs. |
C | Add a firewall between the domain controller and the router. |
D | Remove the firewall between the Internet/modem and the router. |
Question 51 |
A | UPS |
B | RAID 1 |
C | Clustering |
D | SNMP |
Question 52 |
A | iSCSI |
B | FTP |
C | SAN |
D | NAS |
E | FCoE |
Question 53 |
A | Configure port aggregation |
B | Use port mirroring |
C | Use SQL injectors |
D | Install an inline tap |
E | Periodically view the server logs |
Question 54 |
A | Smartcards |
B | Wireless access point |
C | RADIUS server |
D | Domain controller |
E | Biometric systems |
Question 55 |
A | UDP |
B | HTTP |
C | IP |
D | TCP |
Question 56 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | netstat –a SANUJA.COM |
B | NMAP –t SANUJA.COM |
C | dig –t ANY SANUJA.COM |
D | iptables –f SANUJA.COM |
Question 57 |
A | 50134 |
B | 1024 |
C | 1999 |
D | 80 |
E | 995 |
F | 23 |
Question 58 |
A | Pattern recognition |
B | Tamper detection |
C | Hand geometry |
D | Single sign-on (SSO) |
E | Biometrics |
Question 59 |
A | SSL portal |
B | SSL gateway |
C | SSL tunnel |
D | SSL client |
Question 60 |
A | USB 3.0 |
B | USB 2.0 |
C | RJ45 |
D | DB9 |
E | RC5 |
Question 61 |
A | Dial-up modem |
B | DSL |
C | ISDN |
D | Cable broadband |
Question 62 |
A | AES |
B | 802.1X |
C | TKIP |
D | RC4 |
E | Kerberos |
Question 63 |
A | Redundant mode |
B | Hot backup mode |
C | Combined mode |
D | Individual mode |
E | High-efficiency mode |
Question 64 |
A | VLAN mismatch |
B | Damaged or malfunctioning fiber port |
C | Double NAT issue |
D | Damaged or malfunctioning LAN port |
E | Corrupted config files or operating system |
Question 65 |
A | netstat |
B | traceroute |
C | dig |
D | ifconfig |
E | route |
Question 66 |
A | Millimeters |
B | Number of screw holes |
C | Inches |
D | Units |
E | Centimeters |
Question 67 |
A | Distributed server system |
B | Remote connection |
C | Site-to-site VPN |
D | Network management |
E | Fault tolerance |
Question 68 |
A | Temperature changes are causing attenuation in copper cabling |
B | Network wiring is run perpendicular to electrical conduit |
C | Light sensors are interfering with the network |
D | EMI from the lights is interfering with the network cables |
Question 69 |
A | Power redundancy |
B | Uninterruptible Power Supply (UPS) |
C | Dual power supplies |
D | Redundant circuits |
E | Power looping |
Question 70 |
A | Captive portal |
B | WPA2 |
C | Port security |
D | Access control lists |
Question 71 |
A | VPN concentrator |
B | Web application firewall |
C | VLAN restrictions |
D | IPS |
E | Content filter |
Question 72 |
A | Certification |
B | Authorization |
C | Authentication |
D | Enrollment |
E | Encryption |
Question 73 |
A | tamper detection |
B | device hardening |
C | asset tracking |
D | hardware security |
E | biometrics |
Question 74 |
A | Transport |
B | Presentation |
C | Physical |
D | Data Link |
E | Application |
F | Session |
G | Network |
Question 75 |
A | Powerline extender |
B | Ethernet power controller |
C | Power distribution unit |
D | Power-over-Ethernet switch |
E | Ethernet-over-power adapter |
Question 76 |
A | Social engineering |
B | Evil twin |
C | Logic bomb |
D | Wardriving |
Question 77 |
A | RTO |
B | MIB |
C | RPO |
D | RAID |
E | BCP |
Question 78 |
A | Change default admin password |
B | Patch and update |
C | Implement spanning tree |
D | Perform backups |
E | Enable port mirroring |
F | Perform VLAN hopping |
Question 79 |
A | Decreased performance of the internal network |
B | Loss of full control over data resources |
C | Incompatibility with the current network |
D | Increased malware exposure |
E | Inconsistent data accessability |
Question 80 |

A | 192.168.1.109 |
B | 192.168.0.55 |
C | 192.168.0.1 |
D | 10.1.1.255 |
E | 10.1.0.255 |
Question 81 |
A | RJ-11 |
B | RG-58 |
C | RJ-45 |
D | RG-8 |
Question 82 |
A | BRI |
B | E1/E3 |
C | DSL |
D | PRI |
Question 83 |
A | KDC |
B | RDP |
C | Application server |
D | Client terminal |
Question 84 |
A | Multimeter |
B | Tone generator |
C | Loopback adapter |
D | Cable tester |
Question 85 |
A | STP |
B | SNAT |
C | ARP |
D | NAT |
E | PAT |
Question 86 |
A | LDAP |
B | TKIP-RC4 |
C | NAC |
D | RADIUS |
Question 87 |
A | The wireless access points were misconfigured |
B | The testing server for the wired network was farther away |
C | The firewall is configured to throttle traffic to specific websites |
D | There is less local congestion on the wireless network |
Question 88 |
A | IaaS |
B | VPN |
C | SaaS |
D | Hosted |
E | PaaS |
Question 89 |
A | Physical security |
B | Port security |
C | Data security |
D | Asset tracking |
Question 90 |
A | MD |
B | CNAME |
C | MX |
D | PTR |
E | A |
Question 91 |
A | ifconfig |
B | netstat |
C | ping |
D | traceroute |
Question 92 |
A | 1 unit |
B | 2 unit |
C | 4 unit |
D | 3 unit |
Question 93 |
A | 25 |
B | 80 |
C | 110 |
D | 143 |
E | 989 |
Question 94 |
A | XSS |
B | SQL injection |
C | Directory traversal |
D | Wardriving |
E | Packet sniffing |
Question 95 |
A | Authorization |
B | Accounting |
C | TGS |
D | Auditing |
E | Authentication |
Question 96 |
A | Layer 6 |
B | Layer 2 |
C | Layer 3 |
D | Layer 7 |
E | Layer 4 |
F | Layer 5 |
G | Layer 1 |
Question 97 |
A | SSL |
B | HTTP |
C | FTP |
D | SMTP |
E | HTML |
Question 98 |
A | VLAN mismatch |
B | Evil twin |
C | Honey pot |
D | Rogue DHCP server |
E | Packet intrusion |
Question 99 |
A | Hex |
B | CIDR |
C | Octal |
D | Binary |
Question 100 |
A | RAID 10 |
B | RAID 1 |
C | RAID 0 |
D | RAID 5 |
Question 101 |
A | DOCSIS |
B | ADSL |
C | Bridge mode |
D | Double NAT |
E | Jumbo frame |
Question 102 |
A | Patch panel |
B | 66 block |
C | Fiber distribution panel |
D | 110 block |
E | CMTS |
Question 103 |
A | Move from WPA2 to WEP |
B | Enable WPA and change the SSID |
C | Have the ISP double the bandwidth |
D | Configure geofencing |
Question 104 |
A | Duplex/speed mismatch |
B | VLAN mismatch |
C | DNS server issue |
D | Spanning tree blocked ports |
E | DHCP server issue |
Question 105 |
A | A router |
B | A gateway |
C | A switch |
D | A hub |
Question 106 |
A | WEP |
B | WPA2 |
C | WPA |
D | PEAP |
Question 107 |
A | Blocking |
B | Throttling |
C | Bandwidth quotas |
D | Data usage limits |
E | Session hijacking |
Question 108 |
A | Authentication server |
B | VPN gateway |
C | Encryption key |
D | HTTPS server |
E | Secure server |
Question 109 |
A | 169.254.54.5 |
B | 175.255.255.255 |
C | 192.168.0.1 |
D | 192.168.1.1 |
E | 175.168.0.255 |
Question 110 |
A | Hop count |
B | Bandwidth |
C | Ping time |
D | Distance |
E | Speed |
Question 111 |
A | Standard operating procedure |
B | Change management |
C | Process management |
D | Project management |
Question 112 |
A | Window |
B | MSS |
C | MMS |
D | WinMS |
Question 113 |
A | RADIUS |
B | NAS |
C | IDS |
D | NGFW |
Question 114 |
A | Enable jumbo frames on the NAS and server |
B | Utilize UDP to eliminate packet overhead |
C | Encapsulate the storage traffic in a GRE tunnel |
D | Turn off MDIX settings on the NAS and server switchports |
Question 115 |
A | Walk a user through troubleshooting the connection |
B | Hire a third-party contractor to go on-site |
C | Travel to the branch office |
D | Use a modem to console into the router |
Question 116 |
A | Cut-through |
B | Source route |
C | Destination switch |
D | Store-and-forward |
Question 117 |
A | Logical network diagram |
B | Physical network diagram |
C | Asset management files |
D | Circuit diagrams |
E | Wiring schematic |
Question 118 |
A | monitor |
B | ping |
C | cpustat |
D | netstat |
E | top |
Question 119 |
A | Application |
B | Session |
C | Network |
D | Physical |
E | Transport |
F | Presentation |
G | Data link |
Question 120 |
A | Preshared |
B | Privileged |
C | Public |
D | Private |
E | Secured |
Question 121 |
A | Transport |
B | Data Link |
C | Physical |
D | Presentation |
E | Session |
F | Application |
G | Network |
Question 122 |
A | Firewalls |
B | Bridges |
C | Routers |
D | Hubs |
Question 123 |
A | Wiring schematic |
B | Building blueprints |
C | Rack diagram |
D | Network map |
E | Logical diagram |
Question 124 |
A | 2 |
B | 3 |
C | 1 |
D | 4 |
E | 0 |
Question 125 |
A | RAID 10 |
B | RAID 1 |
C | RAID 5 |
D | RAID 0 |
Question 126 |
A | Permit 192.168.1.143 port 110 |
B | Permit 192.168.1.143 port143 |
C | Permit 192.168.1.143 port 80 |
D | Permit 192.168.1.143 port 443 |
E | Permit 192.168.1.143 port 587 |
F | Permit 192.168.1.143 port 25 |
Question 127 |
A | DMZ |
B | NAT |
C | QoS |
D | DDoS |
E | RIP |
Question 128 |
A | Latency |
B | Signal attenuation |
C | EMI |
D | Crosstalk |
Question 129 |
A | Class C |
B | Class B |
C | Class D |
D | Class A |
E | None of the classes |
Question 130 |
A | SSL |
B | VoIP |
C | CARP |
D | QoS |
E | IPv6 |
Question 131 |
A | Verify file version |
B | Verify file type |
C | Verify file size |
D | Verify file date |
E | Verify file hash |
Question 132 |
A | Airflow and cooling |
B | Circuit labeling |
C | UPS capability |
D | Power redundancy |
Question 133 |
A | TDM |
B | MDF |
C | IDF |
D | VRF |
Question 134 |
A | 10GBase-CX4 |
B | 10GBase-SR |
C | 10GBase-LX4 |
D | 10GBase-ER |
E | 10GBase-LR |
Question 135 |
A | Wardriving |
B | Social engineering |
C | Logic bomb |
D | Evil twin |
Question 136 |
A | Coaxial |
B | Single-mode fiber optic |
C | Multimode fiber optic |
D | Shielded twisted pair |
E | Unshielded twisted pair |
Question 137 |
A | penetration testing |
B | friendly DoS |
C | session hijacking |
D | vulnerability scanning |
E | social engineering |
Question 138 |
A | IP address resolution |
B | Password protection |
C | Network switching |
D | Name resolution |
Question 139 |
A | Real-time remote monitoring of the phone’s activity and usage |
B | A consent to monitoring policy covering company audits of the personal phone |
C | An NDA ensuring work data stored on the personal phone remains confidential |
D | An AUP covering how a personal phone may be used for work matters |
Question 140 |
A | Demarcation point |
B | Demarcation point |
C | Wireless controller |
D | Wireless endpoint |
E | Network firewall |
Question 141 |
A | NS |
B | TXT |
C | MX |
D | AAAA |
E | A |
Question 142 |
A | Netstat |
B | Ping |
C | Route |
D | Tracert |
E | Nslookup |
Question 143 |
A | Layer 2 |
B | Layer 1 |
C | Layer 3 |
D | Layer 4 |
Question 144 |
A | IDSL |
B | RADSL |
C | HDSL |
D | VDSL |
Question 145 |
A | Somewhere you are |
B | Something you have |
C | Something you do |
D | Something you know |
Question 146 |
A | Failover |
B | Backups |
C | Snapshots |
D | Cold sites |
Question 147 |
A | E-1 |
B | T-3 |
C | T-1 |
D | OC-1 |
Question 148 |
A | SCP |
B | ARP |
C | SIP |
D | FTP |
Question 149 |
A | dig |
B | nmap |
C | netstat |
D | tcpdump |
Question 150 |
A | SIP |
B | LACP |
C | BGP |
D | LLDP |
Question 151 |
A | Overcapacity |
B | Cross talk |
C | Wrong passphrase |
D | Channel overlap |
Question 152 |
A | Open circuits |
B | Split pairs |
C | Transposed wires |
D | Short circuits |
Question 153 |
A | Network |
B | Session |
C | Presentation |
D | Application |
E | Physical |
F | Data link |
G | Transport |
Question 154 |
A | SONET |
B | SIP trunk |
C | Media converter |
D | AAA server |
E | Smart jack |
Question 155 |
A | F-type |
B | MTRJ |
C | ST |
D | LC |
E | RJ11 |
F | RJ45 |
Question 156 |
A | nmap |
B | tcpdump |
C | iptables |
D | dig |
Question 157 |
A | ICMP |
B | IMAP |
C | IP |
D | IGMP |
Question 158 |
A | Point-to-point |
B | Bus |
C | Ring |
D | Point-to-multipoint |
E | Mesh |
F | Peer-peer |
Question 159 |
A | Telnet |
B | SSH |
C | IPSec |
D | SSL |
Question 160 |
A | VPN concentrator |
B | VoIP gateway |
C | UTM appliance |
D | Proxy server |
Question 161 |
A | TACACS+ |
B | Local authentication |
C | Single sign-on |
D | LDAP |
Question 162 |
A | 16 inches |
B | 12 inches |
C | 19 inches |
D | 24 inches |
Question 163 |
A | Control the latency of traffic across the network links |
B | Control the attenuation of the non-voice traffic across the network links |
C | Control the jitter of the affected traffic across the network links |
D | Control the EMI of the multimedia traffic across the network links |
Question 164 |
A | Star |
B | Ring |
C | Mesh |
D | Bus |
E | Ad hoc |
Question 165 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
C | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
D | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
Question 166 |
A | MAC address |
B | Subnet mask |
C | Default gateway |
D | IP address |
Question 167 |
A | NAS |
B | Fibre Channel |
C | iSCSI |
D | InfinitiBand |
Question 168 |
A | Application |
B | System |
C | Setup |
D | Security |
Question 169 |
A | Kerberos |
B | LDAP |
C | TKIP |
D | Radius |
E | 802.1X |
Question 170 |
A | DHCP exclusion |
B | DHCP restriction |
C | DHCP relay |
D | DHCP reservation |
E | DHCP option |
Question 171 |
A | An open mail relay server |
B | A privilege escalation script |
C | A router with default credentials |
D | An SNMPv1 private community |
Question 172 |
A | 161 , 162 |
B | 5060 , 5061 |
C | 143 , 993 |
D | 5060 , 3389 |
E | 80 , 443 |
Question 173 |
A | https://sanuja.com/123456 |
B | None of the answers are correct because you cannot assign random port numbers. |
C | http://sanuja.com/123456 |
D | https://sanuja.com:123456 |
E | http://sanuja.com:123456 |
Question 174 |
A | Enterprise firewall |
B | Load balancer |
C | IDS |
D | Proxy server |
E | Wireless controller |
Question 175 |
A | A switch |
B | A gateway |
C | A router |
D | A hub |
Question 176 |
A | Store all spare equipment in a sepearete office building for extra protection. |
B | Keep purchasing new spare equipment. |
C | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
D | Do nothing and keep the spare nearby for an emergency. |
E | Update the firmware and drivers on spare network equipment regularly. |
Question 177 |
A | L2TP |
B | PPTP |
C | IPsec |
D | FTPS |
Question 178 |
A | Wiring schematic |
B | Asset management files |
C | Logical network diagram |
D | Physical network diagram |
E | MSConfig file |
Question 179 |
A | arp -s |
B | arp -d |
C | arp -c |
D | arp -a |
E | arp -t |
Question 180 |
A | CARP |
B | Round-robin DNS |
C | Voice over IP |
D | Quality of service |
Question 181 |
A | Ethernet hub |
B | Multiport bridge |
C | Layer 2 router |
D | Layer 3 repeater |
Question 182 |
A | UDP |
B | TCP |
C | IGMP |
D | ICMP |
Question 183 |
A | 1023 through 65534 |
B | 1024 to 49151 |
C | 1 through 1024 |
D | 49152 through 65535 |
Question 184 |
A | 8 |
B | 15 |
C | 17 |
D | 16 |
Question 185 |
A | Change the default credentials |
B | Disable unused switchports |
C | Verify the firmware file hash |
D | Apply patches and updates |
Question 186 |
A | Accounting |
B | Authorization |
C | Authentication |
D | Administration |
Question 187 |
A | ping |
B | ifconfig |
C | netstat |
D | ipconfig |
E | tracert |
Question 188 |
A | 192.168.0.55 |
B | 192.168.1.0 |
C | 255 255 255.0 |
D | 255 255 255.0 |
E | 192.168.1.1 |
Question 189 |
A | 169.254.0.0 to 169.254.255.255 |
B | 192.168.0.0 to 192.168.0.255 |
C | 224.0.0.0 to 224.0.255.255 |
D | 10.0.0.0 to 10.0.255.255 |
Question 190 |
A | Auditing |
B | Authorization |
C | Accounting |
D | Authentication |
Question 191 |
A | Protocol analyzer |
B | NAT |
C | Layer 3 switch |
D | Layer 7 firewall |
E | Web proxy |
Question 192 |
A | URG |
B | FIN |
C | PSH |
D | SYN |
E | END |
Question 193 |
A | ST to ST |
B | LC to SC |
C | SC to ST |
D | LC to ST |
E | SC to SC |
Question 194 |
A | There is a frequency mismatch |
B | The password needs to be re-entered |
C | The channel has changed |
D | There is a security type mismatch. |
E | There is insufficient antenna power |
Question 195 |
A | SFP |
B | BiDi |
C | GBIC |
D | QSFP |
Question 196 |
A | Server clustering |
B | Muti-ISP connections |
C | DNS round robin |
D | NIC teaming |
E | RAID 1 |
Question 197 |
A | arp -c * |
B | arp -d * |
C | arp -s |
D | arp -a |
Question 198 |
A | -a |
B | -n |
C | -i |
D | -t |
Question 199 |
A | Security |
B | Setup |
C | Application |
D | System |
Question 200 |
A | 80 |
B | 25 |
C | 443 |
D | 990 |
E | 110 |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| 136 | 137 | 138 | 139 | 140 |
| 141 | 142 | 143 | 144 | 145 |
| 146 | 147 | 148 | 149 | 150 |
| 151 | 152 | 153 | 154 | 155 |
| 156 | 157 | 158 | 159 | 160 |
| 161 | 162 | 163 | 164 | 165 |
| 166 | 167 | 168 | 169 | 170 |
| 171 | 172 | 173 | 174 | 175 |
| 176 | 177 | 178 | 179 | 180 |
| 181 | 182 | 183 | 184 | 185 |
| 186 | 187 | 188 | 189 | 190 |
| 191 | 192 | 193 | 194 | 195 |
| 196 | 197 | 198 | 199 | 200 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.





