← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Hybrid |
B | Private |
C | PaaS |
D | Public |
E | SaaS |
F | IaaS |
Question 2 |
A | Kerberos |
B | RC4 |
C | AES |
D | 802.1X |
E | TKIP |
Question 3 |
A | RAID |
B | RPO |
C | RTO |
D | BCP |
E | MIB |
Question 4 |
A | Light sensors are interfering with the network |
B | Network wiring is run perpendicular to electrical conduit |
C | Temperature changes are causing attenuation in copper cabling |
D | EMI from the lights is interfering with the network cables |
Question 5 |
A | 2 |
B | 0 |
C | 4 |
D | 3 |
E | 1 |
Question 6 |
A | Driver update |
B | Operating system update |
C | BOIS firmware patch |
D | Vulnerability patch |
E | Feature change |
Question 7 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
B | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
C | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
D | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
Question 8 |
A | DHCP restriction |
B | DHCP relay |
C | DHCP exclusion |
D | DHCP reservation |
E | DHCP option |
Question 9 |
A | WPA2 |
B | WEP |
C | 802.1X |
D | WPA |
Question 10 |
A | Inches |
B | Units |
C | Centimeters |
D | Number of screw holes |
E | Millimeters |
Question 11 |
A | Verify file date |
B | Verify file size |
C | Verify file type |
D | Verify file version |
E | Verify file hash |
Question 12 |
A | Walk a user through troubleshooting the connection |
B | Use a modem to console into the router |
C | Travel to the branch office |
D | Hire a third-party contractor to go on-site |
Question 13 |
A | TXT |
B | MX |
C | A |
D | AAAA |
E | NS |
Question 14 |
A | Airflow and cooling |
B | Power redundancy |
C | UPS capability |
D | Circuit labeling |
Question 15 |
A | Voice over IP |
B | Quality of service |
C | CARP |
D | Round-robin DNS |
Question 16 |
A | Setup |
B | Application |
C | System |
D | Security |
Question 17 |
A | Layer 3 |
B | Layer 4 |
C | Layer 2 |
D | Layer 1 |
Question 18 |
A | Short circuits |
B | Open circuits |
C | Split pairs |
D | Transposed wires |
Question 19 |
A | Store all spare equipment in a sepearete office building for extra protection. |
B | Update the firmware and drivers on spare network equipment regularly. |
C | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
D | Do nothing and keep the spare nearby for an emergency. |
E | Keep purchasing new spare equipment. |
Question 20 |
A | Host-to-host |
B | Host-to-site |
C | Site-to-site |
D | Extranet |
E | Branch-to-server |
Question 21 |

A | 192.168.1.109 |
B | 192.168.0.55 |
C | 10.1.1.255 |
D | 192.168.0.1 |
E | 10.1.0.255 |
Question 22 |
A | IP |
B | IGMP |
C | ICMP |
D | IMAP |
Question 23 |
A | Single-mode fiber optic |
B | Coaxial |
C | Multimode fiber optic |
D | Unshielded twisted pair |
E | Shielded twisted pair |
Question 24 |
A | Hop count |
B | Distance |
C | Bandwidth |
D | Speed |
E | Ping time |
Question 25 |
A | T-1 |
B | OC-1 |
C | E-1 |
D | T-3 |
Question 26 |
A | Fiber optic |
B | Microwave |
C | Infrared |
D | Electrical |
Question 27 |
A | Both broadcast and collision domains occur at layer 2. |
B | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
C | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
D | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
E | It is impossible to have a collision domain in a wireless network infrastructure. |
Question 28 |
A | Logical network diagram |
B | Wiring schematic |
C | Physical network diagram |
D | Circuit diagrams |
E | Asset management files |
Question 29 |
A | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
B | Set the firewall to operate in transparent mode |
C | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
D | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
Question 30 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | NMAP –t SANUJA.COM |
B | dig –t ANY SANUJA.COM |
C | iptables –f SANUJA.COM |
D | netstat –a SANUJA.COM |
Question 31 |
A | arp -a |
B | arp -c |
C | arp -s |
D | arp -d |
E | arp -t |
Question 32 |
A | Multiport bridge |
B | Ethernet hub |
C | Layer 3 repeater |
D | Layer 2 router |
Question 33 |
A | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
B | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
C | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
D | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
Question 34 |
A | Data security |
B | Port security |
C | Physical security |
D | Asset tracking |
Question 35 |
A | Bridge |
B | Switch |
C | Gateway |
D | Router |
Question 36 |
A | 23 |
B | 50134 |
C | 1999 |
D | 995 |
E | 80 |
F | 1024 |
Question 37 |
A | IPSec |
B | SSH |
C | SSL |
D | Telnet |
Question 38 |
A | Pattern recognition |
B | Tamper detection |
C | Biometrics |
D | Face geometry |
E | Geofencing |
Question 39 |
A | Bus |
B | Ad hoc |
C | Mesh |
D | Ring |
E | Star |
Question 40 |
A | traceroute |
B | iptables |
C | tcpdump |
D | netstat |
E | ipconfig |
Question 41 |
A | 192.168.0.55 |
B | 192.168.1.0 |
C | 255 255 255.0 |
D | 192.168.1.1 |
E | 255 255 255.0 |
Question 42 |
A | 143 , 993 |
B | 5060 , 5061 |
C | 80 , 443 |
D | 5060 , 3389 |
E | 161 , 162 |
Question 43 |
A | pathping |
B | route |
C | netstat |
D | ping |
Question 44 |
A | 110 |
B | 25 |
C | 80 |
D | 989 |
E | 143 |
Question 45 |
A | VIP |
B | PAT |
C | SIP |
D | NAT |
Question 46 |
A | Bridge |
B | Switch |
C | Hub |
D | Router |
Question 47 |
A | SYN, SYN/ACK, ACK |
B | SYN/ACK, SYN/ACK |
C | SYN, SYN, ACK, ACK |
D | SYN, ACK, SYN, ACK |
Question 48 |
A | SFP |
B | BiDi |
C | QSFP |
D | GBIC |
Question 49 |
A | Source route |
B | Store-and-forward |
C | Cut-through |
D | Destination switch |
Question 50 |
A | Redundant circuits |
B | Dual power supplies |
C | Power redundancy |
D | Power looping |
E | Uninterruptible Power Supply (UPS) |
Question 51 |
A | Network |
B | Application |
C | Physical |
D | Transport |
E | Session |
F | Presentation |
G | Data link |
Question 52 |
A | Something you have |
B | Something you know |
C | Something you do |
D | Somewhere you are |
Question 53 |
A | A private IP pointing to the web front end |
B | A private IP pointing to the web proxy |
C | A virtual IP pointing to the active DB |
D | A static IP pointing to the passive DB |
Question 54 |
A | Network Monitor |
B | Performance Monitor |
C | ntop |
D | Syslog |
E | Event Viewer |
Question 55 |
A | SAN |
B | NAS |
C | FCoE |
D | FTP |
E | iSCSI |
Question 56 |
A | Netmon |
B | Syslog |
C | Netstat |
D | Top |
Question 57 |
A | Multiport |
B | Source route |
C | Store and forward |
D | Transparent |
Question 58 |
A | Authentication |
B | Enrollment |
C | Encryption |
D | Certification |
E | Authorization |
Question 59 |
A | There is a security type mismatch. |
B | There is insufficient antenna power |
C | The password needs to be re-entered |
D | The channel has changed |
E | There is a frequency mismatch |
Question 60 |
A | Network management |
B | Fault tolerance |
C | Remote connection |
D | Site-to-site VPN |
E | Distributed server system |
Question 61 |
A | ifconfig |
B | netstat |
C | traceroute |
D | ping |
Question 62 |
A | CIFS |
B | InfiniBand |
C | iSCSI |
D | Fibre Channel |
Question 63 |
A | RADIUS |
B | LDAP |
C | NAC |
D | TKIP-RC4 |
Question 64 |
A | Hosted |
B | SaaS |
C | VPN |
D | IaaS |
E | PaaS |
Question 65 |
A | SSL tunnel |
B | SSL gateway |
C | SSL portal |
D | SSL client |
Question 66 |
A | PSH |
B | URG |
C | SYN |
D | END |
E | FIN |
Question 67 |
A | A hub |
B | A router |
C | A switch |
D | A gateway |
Question 68 |
A | hardware security |
B | tamper detection |
C | biometrics |
D | device hardening |
E | asset tracking |
Question 69 |
A | AAAA |
B | A |
C | MX |
D | TXT |
E | NS |
Question 70 |
A | Permit 192.168.1.143 port 587 |
B | Permit 192.168.1.143 port 443 |
C | Permit 192.168.1.143 port 25 |
D | Permit 192.168.1.143 port 110 |
E | Permit 192.168.1.143 port 80 |
F | Permit 192.168.1.143 port143 |
Question 71 |
A | Transport |
B | Session |
C | Application |
D | Data Link |
E | Network |
Question 72 |
A | A privilege escalation script |
B | An SNMPv1 private community |
C | A router with default credentials |
D | An open mail relay server |
Question 73 |
A | Wireless controller |
B | Demarcation point |
C | Network firewall |
D | Demarcation point |
E | Wireless endpoint |
Question 74 |
A | DB9 |
B | RJ45 |
C | USB 3.0 |
D | RC5 |
E | USB 2.0 |
Question 75 |
A | Ring |
B | Point-to-multipoint |
C | Mesh |
D | Peer-peer |
E | Point-to-point |
F | Bus |
Question 76 |
A | Netstat |
B | Route |
C | Nslookup |
D | Ping |
E | Tracert |
Question 77 |
A | Perform a DNS lookup on the server. |
B | Configure port security on the switch. |
C | Set up an SSH session to the desktop. |
D | Reference the ARP table in the router. |
Question 78 |
A | MAC filtering |
B | WAP |
C | Port security |
D | Captive portal |
E | NAC |
Question 79 |
A | Perform frequent security and vulnerability updates. |
B | Configure advance intrusion detection and firewall rules on the main datacenter. |
C | Perform frequent IT audits. |
D | Install and maintain advanced enterprise firewall applications. |
E | Physical inspection of each site/workstation. |
Question 80 |
A | Web proxy |
B | NAT |
C | Layer 3 switch |
D | Layer 7 firewall |
E | Protocol analyzer |
Question 81 |
A | Snapshots |
B | Failover |
C | Backups |
D | Cold sites |
Question 82 |
A | Social engineering |
B | Wardriving |
C | Evil twin |
D | Logic bomb |
Question 83 |
A | Bridges |
B | Hubs |
C | Firewalls |
D | Routers |
Question 84 |
A | MTBF |
B | IDF |
C | MDF |
D | RDP |
E | PBX |
Question 85 |
A | VRF |
B | MDF |
C | TDM |
D | IDF |
Question 86 |
A | Physical |
B | Application |
C | Session |
D | Network |
E | Presentation |
F | Transport |
G | Data link |
Question 87 |
A | Session hijacking |
B | Data usage limits |
C | Bandwidth quotas |
D | Throttling |
E | Blocking |
Question 88 |
A | 6 |
B | 2 |
C | 7 |
D | 4 |
E | 0 |
Question 89 |
A | Control the jitter of the affected traffic across the network links |
B | Control the EMI of the multimedia traffic across the network links |
C | Control the attenuation of the non-voice traffic across the network links |
D | Control the latency of traffic across the network links |
Question 90 |
A | RJ45 |
B | BNC |
C | F-type |
D | 8P8C |
E | MTRJ |
Question 91 |
A | NAS |
B | Fiber channel |
C | SAN |
D | FTP |
E | Jumbo frames |
Question 92 |
A | PPTP |
B | FTPS |
C | L2TP |
D | IPsec |
Question 93 |
A | Authentication |
B | Accounting |
C | Authorization |
D | Auditing |
Question 94 |
A | IPS |
B | VLAN restrictions |
C | Web application firewall |
D | Content filter |
E | VPN concentrator |
Question 95 |
A | HTML |
B | SMTP |
C | HTTP |
D | FTP |
E | SSL |
Question 96 |
A | 192.168.0.0 to 192.168.0.255 |
B | 224.0.0.0 to 224.0.255.255 |
C | 169.254.0.0 to 169.254.255.255 |
D | 10.0.0.0 to 10.0.255.255 |
Question 97 |
A | Project management |
B | Process management |
C | Change management |
D | Standard operating procedure |
Question 98 |
A | Smartcards |
B | RADIUS server |
C | Domain controller |
D | Wireless access point |
E | Biometric systems |
Question 99 |
A | WPA2 |
B | WEP |
C | PEAP |
D | WPA |
Question 100 |
A | Transport |
B | Network |
C | Presentation |
D | Data link |
E | Session |
F | Physical |
G | Application |
Question 101 |
A | Server clustering |
B | NIC teaming |
C | DNS round robin |
D | RAID 1 |
E | Muti-ISP connections |
Question 102 |
A | Point-to-point |
B | Bus |
C | Star |
D | Mesh |
E | Ring or circular |
Question 103 |
A | Single sign-on |
B | Local authentication |
C | TACACS+ |
D | LDAP |
Question 104 |
A | 3 unit |
B | 1 unit |
C | 4 unit |
D | 2 unit |
Question 105 |
A | ARP |
B | FTP |
C | SIP |
D | SCP |
Question 106 |
A | http://sanuja.com/123456 |
B | http://sanuja.com:123456 |
C | None of the answers are correct because you cannot assign random port numbers. |
D | https://sanuja.com/123456 |
E | https://sanuja.com:123456 |
Question 107 |
A | social engineering |
B | session hijacking |
C | friendly DoS |
D | vulnerability scanning |
E | penetration testing |
Question 108 |
A | EAP-TLS |
B | WPA2 |
C | Kerberos |
D | RADIUS |
Question 109 |
A | cpustat |
B | netstat |
C | top |
D | monitor |
E | ping |
Question 110 |
A | Spoofing |
B | DDoS |
C | Phishing |
D | Ransomware |
E | Session hijacking |
Question 111 |
A | SMTP |
B | LDAP |
C | IMAP |
D | POP |
Question 112 |
A | Spanning tree blocked ports |
B | Duplex/speed mismatch |
C | VLAN mismatch |
D | DNS server issue |
E | DHCP server issue |
Question 113 |
A | RAID 0 |
B | RAID 1 |
C | RAID 10 |
D | RAID 5 |
Question 114 |
A | PAP |
B | CHAP |
C | EAP |
D | WEP |
E | MS-CHAPv2 |
Question 115 |
A | Wiring schematic |
B | Asset management files |
C | Physical network diagram |
D | MSConfig file |
E | Logical network diagram |
Question 116 |
A | Logical network diagram |
B | Wiring schematic |
C | Circuit diagrams |
D | Physical network diagram |
E | Asset management files |
Question 117 |
A | Cable tester |
B | Multimeter |
C | Tone generator |
D | Loopback adapter |
Question 118 |
A | 1024 to 49151 |
B | 1023 through 65534 |
C | 1 through 1024 |
D | 49152 through 65535 |
Question 119 |
A | Pattern recognition |
B | Tamper detection |
C | Hand geometry |
D | Biometrics |
E | Single sign-on (SSO) |
Question 120 |
A | 80 |
B | 443 |
C | 110 |
D | 25 |
E | 990 |
Question 121 |
A | Kerberos |
B | 802.1X |
C | LDAP |
D | Radius |
E | TKIP |
Question 122 |
A | Verify the firmware file hash |
B | Change the default credentials |
C | Apply patches and updates |
D | Disable unused switchports |
Question 123 |
A | Authentication |
B | Authorization |
C | Accounting |
D | Administration |
Question 124 |
A | -a |
B | -t |
C | -i |
D | -n |
Question 125 |
A | ifconfig |
B | ipconfig |
C | tracert |
D | ping |
E | netstat |
Question 126 |
A | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
B | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
C | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
D | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
E | Install an IDS to monitor all traffic to and from the kiosks. |
Question 127 |
A | PTR |
B | A |
C | CNAME |
D | MD |
E | MX |
Question 128 |
A | Use SQL injectors |
B | Periodically view the server logs |
C | Configure port aggregation |
D | Use port mirroring |
E | Install an inline tap |
Question 129 |
A | Enable WPA and change the SSID |
B | Have the ISP double the bandwidth |
C | Move from WPA2 to WEP |
D | Configure geofencing |
Question 130 |
A | TCP |
B | ICMP |
C | IGMP |
D | UDP |
Question 131 |
A | Perform backups |
B | Perform VLAN hopping |
C | Enable port mirroring |
D | Change default admin password |
E | Implement spanning tree |
F | Patch and update |
Question 132 |
A | A switch |
B | A router |
C | A hub |
D | A gateway |
Question 133 |
A | XSS |
B | Wardriving |
C | SQL injection |
D | Packet sniffing |
E | Directory traversal |
Question 134 |
A | RG-8 |
B | RJ-11 |
C | RG-58 |
D | RJ-45 |
Question 135 |
A | IP address |
B | MAC address |
C | Default gateway |
D | Subnet mask |
Question 136 |
A | Combined mode |
B | Hot backup mode |
C | High-efficiency mode |
D | Redundant mode |
E | Individual mode |
Question 137 |
A | arp -d * |
B | arp -c * |
C | arp -s |
D | arp -a |
Question 138 |
A | iptables |
B | tcpdump |
C | dig |
D | nmap |
Question 139 |
A | Biometrics |
B | Smartcards |
C | Video surveillance |
D | Motion detection |
Question 140 |
A | traceroute |
B | route |
C | ifconfig |
D | dig |
E | netstat |
Question 141 |
A | 10GBase-LR |
B | 10GBase-CX4 |
C | 10GBase-SR |
D | 10GBase-ER |
E | 10GBase-LX4 |
Question 142 |
A | ST |
B | MTRJ |
C | F-type |
D | RJ11 |
E | RJ45 |
Question 143 |
A | QoS |
B | DDoS |
C | RIP |
D | DMZ |
E | NAT |
Question 144 |
A | Double NAT |
B | Jumbo frame |
C | DOCSIS |
D | ADSL |
E | Bridge mode |
Question 145 |
A | 12 inches |
B | 24 inches |
C | 19 inches |
D | 16 inches |
Question 146 |
A | Data Link |
B | Physical |
C | Network |
D | Presentation |
E | Application |
F | Session |
G | Transport |
Question 147 |
A | Ethernet |
B | IP |
C | TCP |
D | UDP |
E | ICMP |
Question 148 |
A | VDSL |
B | IDSL |
C | RADSL |
D | HDSL |
Question 149 |
A | Loss of full control over data resources |
B | Inconsistent data accessability |
C | Decreased performance of the internal network |
D | Incompatibility with the current network |
E | Increased malware exposure |
Question 150 |
A | NAS |
B | NGFW |
C | RADIUS |
D | IDS |
Question 151 |
A | PAT |
B | STP |
C | NAT |
D | ARP |
E | SNAT |
Question 152 |
A | Cross talk |
B | Channel overlap |
C | Overcapacity |
D | Wrong passphrase |
Question 153 |
A | NAS |
B | InfinitiBand |
C | Fibre Channel |
D | iSCSI |
Question 154 |
A | MSS |
B | WinMS |
C | MMS |
D | Window |
Question 155 |
A | Fiber-optic cabling |
B | Enterrpise APs |
C | Coaxial cabling |
D | Twisted pair cabling |
Question 156 |
A | RAID 1 |
B | RAID 0 |
C | RAID 10 |
D | RAID 5 |
Question 157 |
A | Wardriving |
B | Logic bomb |
C | Social engineering |
D | Evil twin |
Question 158 |
A | F-type |
B | RJ45 |
C | LC |
D | MTRJ |
E | ST |
F | RJ11 |
Question 159 |
A | LACP |
B | LLDP |
C | BGP |
D | SIP |
Question 160 |
A | 16 |
B | 15 |
C | 17 |
D | 8 |
Question 161 |
A | War driving |
B | Bluejacking |
C | Brute-force |
D | Port scanning |
E | Port sweeping |
Question 162 |
A | CARP |
B | VoIP |
C | IPv6 |
D | SSL |
E | QoS |
Question 163 |
A | SC to ST |
B | SC to SC |
C | LC to ST |
D | LC to SC |
E | ST to ST |
Question 164 |
A | Fiber distribution panel |
B | 110 block |
C | Patch panel |
D | 66 block |
E | CMTS |
Question 165 |
A | Clustering |
B | SNMP |
C | RAID 1 |
D | UPS |
Question 166 |
A | Packet intrusion |
B | Honey pot |
C | Rogue DHCP server |
D | Evil twin |
E | VLAN mismatch |
Question 167 |
A | KDC |
B | Client terminal |
C | RDP |
D | Application server |
Question 168 |
A | Captive portal |
B | Access control lists |
C | Port security |
D | WPA2 |
Question 169 |
A | Octal |
B | Hex |
C | Binary |
D | CIDR |
Question 170 |
A | The wireless access points were misconfigured |
B | The testing server for the wired network was farther away |
C | The firewall is configured to throttle traffic to specific websites |
D | There is less local congestion on the wireless network |
Question 171 |
A | Ethernet power controller |
B | Powerline extender |
C | Power distribution unit |
D | Power-over-Ethernet switch |
E | Ethernet-over-power adapter |
Question 172 |
A | SIP trunk |
B | Media converter |
C | Smart jack |
D | AAA server |
E | SONET |
Question 173 |
A | Network switching |
B | IP address resolution |
C | Name resolution |
D | Password protection |
Question 174 |
A | Damaged or malfunctioning fiber port |
B | Corrupted config files or operating system |
C | Double NAT issue |
D | VLAN mismatch |
E | Damaged or malfunctioning LAN port |
Question 175 |
A | EMI |
B | Signal attenuation |
C | Crosstalk |
D | Latency |
Question 176 |
A | SLA |
B | IRP |
C | NDA |
D | BYOD |
Question 177 |
A | Class C |
B | Class D |
C | Class A |
D | None of the classes |
E | Class B |
Question 178 |
A | 169.254.54.5 |
B | 175.168.0.255 |
C | 192.168.1.1 |
D | 175.255.255.255 |
E | 192.168.0.1 |
Question 179 |
A | HTTP |
B | IP |
C | TCP |
D | UDP |
Question 180 |
A | HTTPS server |
B | Secure server |
C | VPN gateway |
D | Encryption key |
E | Authentication server |
Question 181 |
A | Tamper detection |
B | Social engineering |
C | Asset tracking |
D | Biometric |
E | Geofencing |
Question 182 |
A | ping 192.168.1.1 -n 2048 |
B | ping 192.168.1.1 -l 2048 -n 6 |
C | ping 192.168.1.1 -t |
D | ping 192.168.1.1 -l 2048 -t |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 183 |

A | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
B | Add additional printers across both NATs. |
C | Remove the firewall between the Internet/modem and the router. |
D | Add a firewall between the domain controller and the router. |
Question 184 |
A | EAP-PEAP |
B | CCMP-AES |
C | WEP |
D | PSK |
Question 185 |
A | Proxy server |
B | Load balancer |
C | Wireless controller |
D | IDS |
E | Enterprise firewall |
Question 186 |
A | Privileged |
B | Private |
C | Preshared |
D | Public |
E | Secured |
Question 187 |
A | A user application problem |
B | A system-wide problem |
C | A wide area newtwork problem |
D | A shared resource problem |
E | A network-wide problem |
Question 188 |
A | Rack diagram |
B | Network map |
C | Building blueprints |
D | Logical diagram |
E | Wiring schematic |
Question 189 |
A | Utilize UDP to eliminate packet overhead |
B | Encapsulate the storage traffic in a GRE tunnel |
C | Enable jumbo frames on the NAS and server |
D | Turn off MDIX settings on the NAS and server switchports |
Question 190 |
A | PRI |
B | BRI |
C | DSL |
D | E1/E3 |
Question 191 |
A | Sticky MAC |
B | NAC |
C | ACL |
D | 802.1x |
E | NAT |
Question 192 |
A | Real-time remote monitoring of the phone’s activity and usage |
B | An NDA ensuring work data stored on the personal phone remains confidential |
C | A consent to monitoring policy covering company audits of the personal phone |
D | An AUP covering how a personal phone may be used for work matters |
Question 193 |
A | Session |
B | Data Link |
C | Physical |
D | Application |
E | Transport |
F | Network |
G | Presentation |
Question 194 |
A | Authorization |
B | Accounting |
C | TGS |
D | Auditing |
E | Authentication |
Question 195 |
A | DSL |
B | ISDN |
C | Dial-up modem |
D | Cable broadband |
Question 196 |
A | System |
B | Setup |
C | Security |
D | Application |
Question 197 |
A | Proxy server |
B | UTM appliance |
C | VoIP gateway |
D | VPN concentrator |
Question 198 |
A | netstat |
B | tcpdump |
C | dig |
D | nmap |
Question 199 |
A | The ticket granting key |
B | The public key |
C | The secure key |
D | The session key |
E | The private key |
Question 200 |
A | Layer 5 |
B | Layer 4 |
C | Layer 6 |
D | Layer 3 |
E | Layer 7 |
F | Layer 2 |
G | Layer 1 |
← |
List |
→ |
| 1 | 2 | 3 | 4 | 5 |
| 6 | 7 | 8 | 9 | 10 |
| 11 | 12 | 13 | 14 | 15 |
| 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 |
| 26 | 27 | 28 | 29 | 30 |
| 31 | 32 | 33 | 34 | 35 |
| 36 | 37 | 38 | 39 | 40 |
| 41 | 42 | 43 | 44 | 45 |
| 46 | 47 | 48 | 49 | 50 |
| 51 | 52 | 53 | 54 | 55 |
| 56 | 57 | 58 | 59 | 60 |
| 61 | 62 | 63 | 64 | 65 |
| 66 | 67 | 68 | 69 | 70 |
| 71 | 72 | 73 | 74 | 75 |
| 76 | 77 | 78 | 79 | 80 |
| 81 | 82 | 83 | 84 | 85 |
| 86 | 87 | 88 | 89 | 90 |
| 91 | 92 | 93 | 94 | 95 |
| 96 | 97 | 98 | 99 | 100 |
| 101 | 102 | 103 | 104 | 105 |
| 106 | 107 | 108 | 109 | 110 |
| 111 | 112 | 113 | 114 | 115 |
| 116 | 117 | 118 | 119 | 120 |
| 121 | 122 | 123 | 124 | 125 |
| 126 | 127 | 128 | 129 | 130 |
| 131 | 132 | 133 | 134 | 135 |
| 136 | 137 | 138 | 139 | 140 |
| 141 | 142 | 143 | 144 | 145 |
| 146 | 147 | 148 | 149 | 150 |
| 151 | 152 | 153 | 154 | 155 |
| 156 | 157 | 158 | 159 | 160 |
| 161 | 162 | 163 | 164 | 165 |
| 166 | 167 | 168 | 169 | 170 |
| 171 | 172 | 173 | 174 | 175 |
| 176 | 177 | 178 | 179 | 180 |
| 181 | 182 | 183 | 184 | 185 |
| 186 | 187 | 188 | 189 | 190 |
| 191 | 192 | 193 | 194 | 195 |
| 196 | 197 | 198 | 199 | 200 |
| End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.





