← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Transport |
B | Network |
C | Application |
D | Data Link |
E | Session |
Question 2 |
A | 995 |
B | 80 |
C | 1024 |
D | 23 |
E | 50134 |
F | 1999 |
Question 3 |
A | Domain controller |
B | RADIUS server |
C | Biometric systems |
D | Smartcards |
E | Wireless access point |
Question 4 |
A | DDoS |
B | Phishing |
C | Spoofing |
D | Session hijacking |
E | Ransomware |
Question 5 |
A | Session |
B | Data link |
C | Network |
D | Physical |
E | Presentation |
F | Application |
G | Transport |
Question 6 |
A | SMTP |
B | HTTP |
C | FTP |
D | SSL |
E | HTML |
Question 7 |
A | asset tracking |
B | tamper detection |
C | biometrics |
D | hardware security |
E | device hardening |
Question 8 |
A | Cold sites |
B | Backups |
C | Failover |
D | Snapshots |
Question 9 |
A | Presentation |
B | Data link |
C | Application |
D | Transport |
E | Network |
F | Physical |
G | Session |
Question 10 |
A | Transparent |
B | Store and forward |
C | Multiport |
D | Source route |
Question 11 |
A | Shielded twisted pair |
B | Coaxial |
C | Single-mode fiber optic |
D | Unshielded twisted pair |
E | Multimode fiber optic |
Question 12 |
A | RAID |
B | RTO |
C | BCP |
D | MIB |
E | RPO |
Question 13 |
A | Overcapacity |
B | Channel overlap |
C | Cross talk |
D | Wrong passphrase |
Question 14 |
A | Top |
B | Netstat |
C | Syslog |
D | Netmon |
Question 15 |
A | Fiber-optic cabling |
B | Enterrpise APs |
C | Twisted pair cabling |
D | Coaxial cabling |
Question 16 |
A | Face geometry |
B | Geofencing |
C | Tamper detection |
D | Biometrics |
E | Pattern recognition |
Question 17 |
A | Use a modem to console into the router |
B | Travel to the branch office |
C | Walk a user through troubleshooting the connection |
D | Hire a third-party contractor to go on-site |
Question 18 |
A | 10GBase-ER |
B | 10GBase-LX4 |
C | 10GBase-SR |
D | 10GBase-CX4 |
E | 10GBase-LR |
Question 19 |
A | 10.0.0.0 to 10.0.255.255 |
B | 224.0.0.0 to 224.0.255.255 |
C | 192.168.0.0 to 192.168.0.255 |
D | 169.254.0.0 to 169.254.255.255 |
Question 20 |
A | ping |
B | cpustat |
C | monitor |
D | netstat |
E | top |
Question 21 |
A | A router with default credentials |
B | An open mail relay server |
C | An SNMPv1 private community |
D | A privilege escalation script |
Question 22 |
A | Layer 3 switch |
B | NAT |
C | Web proxy |
D | Protocol analyzer |
E | Layer 7 firewall |
Question 23 |
A | Host-to-site |
B | Extranet |
C | Host-to-host |
D | Site-to-site |
E | Branch-to-server |
Question 24 |
A | WPA2 |
B | WPA |
C | PEAP |
D | WEP |
Question 25 |
A | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
B | Both broadcast and collision domains occur at layer 2. |
C | It is impossible to have a collision domain in a wireless network infrastructure. |
D | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
E | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
Question 26 |
A | PRI |
B | DSL |
C | BRI |
D | E1/E3 |
Question 27 |
A | Process management |
B | Project management |
C | Change management |
D | Standard operating procedure |
Question 28 |
A | Telnet |
B | IPSec |
C | SSL |
D | SSH |
Question 29 |
A | 192.168.1.0 |
B | 255 255 255.0 |
C | 192.168.0.55 |
D | 255 255 255.0 |
E | 192.168.1.1 |
Question 30 |
A | dig |
B | iptables |
C | nmap |
D | tcpdump |
Question 31 |
A | FTPS |
B | PPTP |
C | L2TP |
D | IPsec |
Question 32 |
A | Ring |
B | Star |
C | Bus |
D | Mesh |
E | Ad hoc |
Question 33 |
A | Video surveillance |
B | Motion detection |
C | Biometrics |
D | Smartcards |
Question 34 |
A | ST |
B | RJ45 |
C | MTRJ |
D | F-type |
E | RJ11 |
Question 35 |
A | TKIP |
B | AES |
C | 802.1X |
D | RC4 |
E | Kerberos |
Question 36 |
A | session hijacking |
B | vulnerability scanning |
C | social engineering |
D | friendly DoS |
E | penetration testing |
Question 37 |
A | VLAN mismatch |
B | DHCP server issue |
C | Spanning tree blocked ports |
D | Duplex/speed mismatch |
E | DNS server issue |
Question 38 |
A | Distance |
B | Ping time |
C | Speed |
D | Hop count |
E | Bandwidth |
Question 39 |
A | SNMP |
B | RAID 1 |
C | UPS |
D | Clustering |
Question 40 |
A | 2 |
B | 7 |
C | 6 |
D | 4 |
E | 0 |
Question 41 |
A | Transport |
B | Network |
C | Session |
D | Data Link |
E | Physical |
F | Application |
G | Presentation |
Question 42 |
A | SSL |
B | CARP |
C | VoIP |
D | QoS |
E | IPv6 |
Question 43 |
A | Something you know |
B | Something you do |
C | Somewhere you are |
D | Something you have |
Question 44 |
A | 19 inches |
B | 16 inches |
C | 12 inches |
D | 24 inches |
Question 45 |
A | RDP |
B | MTBF |
C | IDF |
D | MDF |
E | PBX |
Question 46 |
A | Control the attenuation of the non-voice traffic across the network links |
B | Control the EMI of the multimedia traffic across the network links |
C | Control the jitter of the affected traffic across the network links |
D | Control the latency of traffic across the network links |
Question 47 |
A | Authentication |
B | Administration |
C | Accounting |
D | Authorization |
Question 48 |
A | Double NAT issue |
B | Damaged or malfunctioning LAN port |
C | Damaged or malfunctioning fiber port |
D | Corrupted config files or operating system |
E | VLAN mismatch |
Question 49 |
A | Public |
B | PaaS |
C | Private |
D | Hybrid |
E | SaaS |
F | IaaS |
Question 50 |
A | USB 2.0 |
B | RJ45 |
C | DB9 |
D | RC5 |
E | USB 3.0 |
Question 51 |
A | Setup |
B | Security |
C | System |
D | Application |
Question 52 |
A | Social engineering |
B | Logic bomb |
C | Evil twin |
D | Wardriving |
Question 53 |
A | Privileged |
B | Public |
C | Preshared |
D | Private |
E | Secured |
Question 54 |
A | A network-wide problem |
B | A user application problem |
C | A system-wide problem |
D | A shared resource problem |
E | A wide area newtwork problem |
Question 55 |
A | A hub |
B | A switch |
C | A gateway |
D | A router |
Question 56 |
A | 8P8C |
B | BNC |
C | MTRJ |
D | F-type |
E | RJ45 |
Question 57 |
A | Ethernet power controller |
B | Power-over-Ethernet switch |
C | Ethernet-over-power adapter |
D | Power distribution unit |
E | Powerline extender |
Question 58 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | dig –t ANY SANUJA.COM |
B | iptables –f SANUJA.COM |
C | netstat –a SANUJA.COM |
D | NMAP –t SANUJA.COM |
Question 59 |
A | 1 unit |
B | 4 unit |
C | 2 unit |
D | 3 unit |
Question 60 |
A | 443 |
B | 25 |
C | 110 |
D | 80 |
E | 990 |
Question 61 |
A | Split pairs |
B | Open circuits |
C | Short circuits |
D | Transposed wires |
Question 62 |
A | Feature change |
B | BOIS firmware patch |
C | Operating system update |
D | Driver update |
E | Vulnerability patch |
Question 63 |
A | Client terminal |
B | Application server |
C | KDC |
D | RDP |
Question 64 |
A | Logical network diagram |
B | Physical network diagram |
C | Wiring schematic |
D | Circuit diagrams |
E | Asset management files |
Question 65 |
A | ICMP |
B | UDP |
C | IGMP |
D | TCP |
Question 66 |
A | Logical diagram |
B | Wiring schematic |
C | Rack diagram |
D | Building blueprints |
E | Network map |
Question 67 |
A | Distributed server system |
B | Network management |
C | Remote connection |
D | Site-to-site VPN |
E | Fault tolerance |
Question 68 |
A | ping 192.168.1.1 -l 2048 -n 6 |
B | ping 192.168.1.1 -t |
C | ping 192.168.1.1 -l 2048 -t |
D | ping 192.168.1.1 -n 2048 |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 69 |
A | Airflow and cooling |
B | UPS capability |
C | Power redundancy |
D | Circuit labeling |
Question 70 |
A | Single sign-on (SSO) |
B | Tamper detection |
C | Pattern recognition |
D | Biometrics |
E | Hand geometry |
Question 71 |
A | DMZ |
B | RIP |
C | QoS |
D | NAT |
E | DDoS |
Question 72 |
A | -a |
B | -i |
C | -n |
D | -t |
Question 73 |
A | Security |
B | System |
C | Setup |
D | Application |
Question 74 |
A | Dial-up modem |
B | ISDN |
C | Cable broadband |
D | DSL |
Question 75 |
A | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
B | Install an IDS to monitor all traffic to and from the kiosks. |
C | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
D | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
E | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
Question 76 |
A | MAC address |
B | Default gateway |
C | IP address |
D | Subnet mask |
Question 77 |
A | Millimeters |
B | Inches |
C | Number of screw holes |
D | Units |
E | Centimeters |
Question 78 |
A | LDAP |
B | TACACS+ |
C | Local authentication |
D | Single sign-on |
Question 79 |
A | Store-and-forward |
B | Cut-through |
C | Source route |
D | Destination switch |
Question 80 |
A | Layer 1 |
B | Layer 7 |
C | Layer 3 |
D | Layer 6 |
E | Layer 5 |
F | Layer 2 |
G | Layer 4 |
Question 81 |
A | LDAP |
B | TKIP-RC4 |
C | RADIUS |
D | NAC |
Question 82 |
A | Accounting |
B | Auditing |
C | Authentication |
D | Authorization |
Question 83 |
A | Bridges |
B | Routers |
C | Firewalls |
D | Hubs |
Question 84 |
A | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
B | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
C | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
D | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
Question 85 |
A | 10.1.1.255 |
B | 10.1.0.255 |
C | 192.168.0.55 |
D | 192.168.1.109 |
E | 192.168.0.1 |
Question 86 |
A | TXT |
B | MX |
C | A |
D | NS |
E | AAAA |
Question 87 |
A | A switch |
B | A gateway |
C | A router |
D | A hub |
Question 88 |
A | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
B | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
C | Set the firewall to operate in transparent mode |
D | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
Question 89 |
A | CHAP |
B | EAP |
C | WEP |
D | PAP |
E | MS-CHAPv2 |
Question 90 |
A | Redundant mode |
B | Hot backup mode |
C | Combined mode |
D | Individual mode |
E | High-efficiency mode |
Question 91 |
A | Configure port aggregation |
B | Install an inline tap |
C | Use SQL injectors |
D | Periodically view the server logs |
E | Use port mirroring |
Question 92 |
A | NAS |
B | FTP |
C | iSCSI |
D | FCoE |
E | SAN |
Question 93 |
A | Utilize UDP to eliminate packet overhead |
B | Turn off MDIX settings on the NAS and server switchports |
C | Encapsulate the storage traffic in a GRE tunnel |
D | Enable jumbo frames on the NAS and server |
Question 94 |
A | 3 |
B | 1 |
C | 2 |
D | 4 |
E | 0 |
Question 95 |
A | MD |
B | MX |
C | A |
D | PTR |
E | CNAME |
Question 96 |
A | arp -a |
B | arp -t |
C | arp -s |
D | arp -c |
E | arp -d |
Question 97 |
A | Star |
B | Ring or circular |
C | Mesh |
D | Bus |
E | Point-to-point |
Question 98 |
A | Rogue DHCP server |
B | VLAN mismatch |
C | Honey pot |
D | Packet intrusion |
E | Evil twin |
Question 99 |
A | Netstat |
B | Tracert |
C | Nslookup |
D | Route |
E | Ping |
Question 100 |
A | SNAT |
B | STP |
C | PAT |
D | NAT |
E | ARP |
Question 101 |
A | Geofencing |
B | Asset tracking |
C | Biometric |
D | Tamper detection |
E | Social engineering |
Question 102 |
A | Point-to-point |
B | Peer-peer |
C | Point-to-multipoint |
D | Mesh |
E | Ring |
F | Bus |
Question 103 |
A | A virtual IP pointing to the active DB |
B | A static IP pointing to the passive DB |
C | A private IP pointing to the web proxy |
D | A private IP pointing to the web front end |
Question 104 |
A | Presentation |
B | Application |
C | Data Link |
D | Network |
E | Session |
F | Transport |
G | Physical |
Question 105 |
A | Evil twin |
B | Logic bomb |
C | Social engineering |
D | Wardriving |
Question 106 |
A | The password needs to be re-entered |
B | There is insufficient antenna power |
C | There is a security type mismatch. |
D | There is a frequency mismatch |
E | The channel has changed |
Question 107 |
A | EMI |
B | Signal attenuation |
C | Crosstalk |
D | Latency |
Question 108 |
A | ICMP |
B | IP |
C | IGMP |
D | IMAP |
Question 109 |
A | Enable port mirroring |
B | Perform backups |
C | Perform VLAN hopping |
D | Implement spanning tree |
E | Change default admin password |
F | Patch and update |
Question 110 |
A | Add a firewall between the domain controller and the router. |
B | Remove the firewall between the Internet/modem and the router. |
C | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
D | Add additional printers across both NATs. |
Question 111 |
A | Certification |
B | Authorization |
C | Encryption |
D | Enrollment |
E | Authentication |
Question 112 |
A | None of the classes |
B | Class B |
C | Class C |
D | Class D |
E | Class A |
Question 113 |
A | WEP |
B | 802.1X |
C | WPA |
D | WPA2 |
Question 114 |
A | IP |
B | HTTP |
C | TCP |
D | UDP |
Question 115 |
A | Server clustering |
B | Muti-ISP connections |
C | RAID 1 |
D | NIC teaming |
E | DNS round robin |
Question 116 |
A | Enterprise firewall |
B | Wireless controller |
C | Proxy server |
D | IDS |
E | Load balancer |
Question 117 |
A | Light sensors are interfering with the network |
B | EMI from the lights is interfering with the network cables |
C | Temperature changes are causing attenuation in copper cabling |
D | Network wiring is run perpendicular to electrical conduit |
Question 118 |
A | Layer 2 router |
B | Multiport bridge |
C | Ethernet hub |
D | Layer 3 repeater |
Question 119 |
A | SIP |
B | BGP |
C | LACP |
D | LLDP |
Question 120 |
A | Dual power supplies |
B | Redundant circuits |
C | Uninterruptible Power Supply (UPS) |
D | Power redundancy |
E | Power looping |
Question 121 |
A | Verify file size |
B | Verify file hash |
C | Verify file date |
D | Verify file type |
E | Verify file version |
Question 122 |
A | VDSL |
B | HDSL |
C | RADSL |
D | IDSL |
Question 123 |
A | SSL portal |
B | SSL client |
C | SSL tunnel |
D | SSL gateway |
Question 124 |
A | Event Viewer |
B | Syslog |
C | Performance Monitor |
D | ntop |
E | Network Monitor |
Question 125 |
A | ifconfig |
B | tracert |
C | netstat |
D | ping |
E | ipconfig |
Question 126 |
A | Session hijacking |
B | Throttling |
C | Blocking |
D | Data usage limits |
E | Bandwidth quotas |
Question 127 |
A | 49152 through 65535 |
B | 1024 to 49151 |
C | 1 through 1024 |
D | 1023 through 65534 |
Question 128 |
A | dig |
B | ifconfig |
C | traceroute |
D | route |
E | netstat |
Question 129 |
A | NAS |
B | RADIUS |
C | NGFW |
D | IDS |
Question 130 |
A | There is less local congestion on the wireless network |
B | The wireless access points were misconfigured |
C | The firewall is configured to throttle traffic to specific websites |
D | The testing server for the wired network was farther away |
Question 131 |
A | ARP |
B | SIP |
C | FTP |
D | SCP |
Question 132 |
A | 143 |
B | 80 |
C | 25 |
D | 989 |
E | 110 |
Question 133 |
A | IP |
B | Ethernet |
C | ICMP |
D | UDP |
E | TCP |
Question 134 |
A | Configure port security on the switch. |
B | Reference the ARP table in the router. |
C | Set up an SSH session to the desktop. |
D | Perform a DNS lookup on the server. |
Question 135 |
A | Data security |
B | Asset tracking |
C | Physical security |
D | Port security |
Question 136 |
A | Demarcation point |
B | Wireless controller |
C | Network firewall |
D | Demarcation point |
E | Wireless endpoint |
Question 137 |
A | BYOD |
B | IRP |
C | NDA |
D | SLA |
Question 138 |
A | MX |
B | A |
C | NS |
D | TXT |
E | AAAA |
Question 139 |
A | Port security |
B | WAP |
C | NAC |
D | Captive portal |
E | MAC filtering |
Question 140 |
A | VLAN restrictions |
B | Content filter |
C | Web application firewall |
D | IPS |
E | VPN concentrator |
Question 141 |
A | The private key |
B | The ticket granting key |
C | The secure key |
D | The session key |
E | The public key |
Question 142 |
A | Real-time remote monitoring of the phone’s activity and usage |
B | An NDA ensuring work data stored on the personal phone remains confidential |
C | An AUP covering how a personal phone may be used for work matters |
D | A consent to monitoring policy covering company audits of the personal phone |
Question 143 |
A | RAID 5 |
B | RAID 1 |
C | RAID 10 |
D | RAID 0 |
Question 144 |
A | tcpdump |
B | ipconfig |
C | netstat |
D | iptables |
E | traceroute |
Question 145 |
A | ifconfig |
B | netstat |
C | ping |
D | traceroute |
Question 146 |
A | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
B | Store all spare equipment in a sepearete office building for extra protection. |
C | Do nothing and keep the spare nearby for an emergency. |
D | Keep purchasing new spare equipment. |
E | Update the firmware and drivers on spare network equipment regularly. |
Question 147 |
A | 192.168.0.1 |
B | 192.168.1.1 |
C | 169.254.54.5 |
D | 175.168.0.255 |
E | 175.255.255.255 |
Question 148 |
A | POP |
B | LDAP |
C | SMTP |
D | IMAP |
Question 149 |
A | HTTPS server |
B | Encryption key |
C | VPN gateway |
D | Secure server |
E | Authentication server |
Question 150 |
A | XSS |
B | SQL injection |
C | Packet sniffing |
D | Directory traversal |
E | Wardriving |
Question 151 |
A | ST |
B | RJ45 |
C | RJ11 |
D | F-type |
E | LC |
F | MTRJ |
Question 152 |
A | CCMP-AES |
B | PSK |
C | WEP |
D | EAP-PEAP |
Question 153 |
A | DHCP exclusion |
B | DHCP restriction |
C | DHCP reservation |
D | DHCP option |
E | DHCP relay |
Question 154 |
A | Hosted |
B | VPN |
C | SaaS |
D | PaaS |
E | IaaS |
Question 155 |
A | Accounting |
B | Auditing |
C | Authorization |
D | TGS |
E | Authentication |
Question 156 |
A | Window |
B | WinMS |
C | MSS |
D | MMS |
Question 157 |
A | Smart jack |
B | AAA server |
C | SIP trunk |
D | SONET |
E | Media converter |
Question 158 |
A | Physical inspection of each site/workstation. |
B | Perform frequent security and vulnerability updates. |
C | Configure advance intrusion detection and firewall rules on the main datacenter. |
D | Install and maintain advanced enterprise firewall applications. |
E | Perform frequent IT audits. |
Question 159 |
A | arp -d * |
B | arp -c * |
C | arp -a |
D | arp -s |
Question 160 |
A | Fiber distribution panel |
B | 66 block |
C | 110 block |
D | Patch panel |
E | CMTS |
Question 161 |
A | pathping |
B | route |
C | netstat |
D | ping |
Question 162 |
A | GBIC |
B | QSFP |
C | BiDi |
D | SFP |
Question 163 |
A | Octal |
B | Binary |
C | CIDR |
D | Hex |
Question 164 |
A | SC to SC |
B | ST to ST |
C | LC to SC |
D | SC to ST |
E | LC to ST |
Question 165 |
A | Name resolution |
B | IP address resolution |
C | Network switching |
D | Password protection |
Question 166 |
A | Router |
B | Hub |
C | Switch |
D | Bridge |
Question 167 |
A | Increased malware exposure |
B | Decreased performance of the internal network |
C | Incompatibility with the current network |
D | Inconsistent data accessability |
E | Loss of full control over data resources |
Question 168 |
A | Round-robin DNS |
B | Quality of service |
C | Voice over IP |
D | CARP |
Question 169 |
A | RG-8 |
B | RJ-45 |
C | RJ-11 |
D | RG-58 |
Question 170 |
A | PSH |
B | END |
C | FIN |
D | SYN |
E | URG |
Question 171 |
A | Permit 192.168.1.143 port 25 |
B | Permit 192.168.1.143 port 80 |
C | Permit 192.168.1.143 port 587 |
D | Permit 192.168.1.143 port143 |
E | Permit 192.168.1.143 port 443 |
F | Permit 192.168.1.143 port 110 |
Question 172 |
A | SYN, SYN/ACK, ACK |
B | SYN, ACK, SYN, ACK |
C | SYN, SYN, ACK, ACK |
D | SYN/ACK, SYN/ACK |
Question 173 |
A | Application |
B | Data link |
C | Presentation |
D | Transport |
E | Session |
F | Physical |
G | Network |
Question 174 |
A | Disable unused switchports |
B | Change the default credentials |
C | Verify the firmware file hash |
D | Apply patches and updates |
Question 175 |
A | 8 |
B | 17 |
C | 16 |
D | 15 |
Question 176 |
A | UTM appliance |
B | VPN concentrator |
C | Proxy server |
D | VoIP gateway |
Question 177 |
A | Bridge mode |
B | Double NAT |
C | DOCSIS |
D | Jumbo frame |
E | ADSL |
Question 178 |
A | MDF |
B | VRF |
C | TDM |
D | IDF |
Question 179 |
A | Fiber optic |
B | Microwave |
C | Infrared |
D | Electrical |
Question 180 |
A | Brute-force |
B | Port sweeping |
C | War driving |
D | Bluejacking |
E | Port scanning |
Question 181 |
A | RAID 10 |
B | RAID 0 |
C | RAID 5 |
D | RAID 1 |
Question 182 |
A | Sticky MAC |
B | NAT |
C | 802.1x |
D | ACL |
E | NAC |
Question 183 |
A | Move from WPA2 to WEP |
B | Configure geofencing |
C | Enable WPA and change the SSID |
D | Have the ISP double the bandwidth |
Question 184 |
A | Physical network diagram |
B | Asset management files |
C | Wiring schematic |
D | Logical network diagram |
E | MSConfig file |
Question 185 |
A | Layer 3 |
B | Layer 2 |
C | Layer 1 |
D | Layer 4 |
Question 186 |
A | 143 , 993 |
B | 5060 , 5061 |
C | 80 , 443 |
D | 5060 , 3389 |
E | 161 , 162 |
Question 187 |
A | None of the answers are correct because you cannot assign random port numbers. |
B | https://sanuja.com/123456 |
C | http://sanuja.com/123456 |
D | https://sanuja.com:123456 |
E | http://sanuja.com:123456 |
Question 188 |
A | Port security |
B | Captive portal |
C | Access control lists |
D | WPA2 |
Question 189 |
A | Loopback adapter |
B | Multimeter |
C | Tone generator |
D | Cable tester |
Question 190 |
A | LDAP |
B | TKIP |
C | Radius |
D | 802.1X |
E | Kerberos |
Question 191 |
A | nmap |
B | tcpdump |
C | netstat |
D | dig |
Question 192 |
A | OC-1 |
B | T-3 |
C | E-1 |
D | T-1 |
Question 193 |
A | NAT |
B | VIP |
C | SIP |
D | PAT |
Question 194 |
A | Fibre Channel |
B | InfiniBand |
C | iSCSI |
D | CIFS |
Question 195 |
A | Wiring schematic |
B | Asset management files |
C | Logical network diagram |
D | Circuit diagrams |
E | Physical network diagram |
Question 196 |
A | Kerberos |
B | EAP-TLS |
C | RADIUS |
D | WPA2 |
Question 197 |
A | Bridge |
B | Switch |
C | Router |
D | Gateway |
Question 198 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
B | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
C | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
D | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
Question 199 |
A | SAN |
B | Jumbo frames |
C | NAS |
D | FTP |
E | Fiber channel |
Question 200 |
A | NAS |
B | Fibre Channel |
C | iSCSI |
D | InfinitiBand |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.