← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | HDSL |
B | VDSL |
C | IDSL |
D | RADSL |
Question 2 |
A | Window |
B | MSS |
C | MMS |
D | WinMS |
Question 3 |
A | Hex |
B | Octal |
C | CIDR |
D | Binary |
Question 4 |
A | Firewalls |
B | Hubs |
C | Bridges |
D | Routers |
Question 5 |
A | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
B | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
C | It is impossible to have a collision domain in a wireless network infrastructure. |
D | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
E | Both broadcast and collision domains occur at layer 2. |
Question 6 |
A | Password protection |
B | IP address resolution |
C | Name resolution |
D | Network switching |
Question 7 |
A | arp -d |
B | arp -c |
C | arp -t |
D | arp -s |
E | arp -a |
Question 8 |
A | Enable jumbo frames on the NAS and server |
B | Encapsulate the storage traffic in a GRE tunnel |
C | Turn off MDIX settings on the NAS and server switchports |
D | Utilize UDP to eliminate packet overhead |
Question 9 |
A | IDF |
B | RDP |
C | MTBF |
D | PBX |
E | MDF |
Question 10 |
A | Tamper detection |
B | Asset tracking |
C | Biometric |
D | Social engineering |
E | Geofencing |
Question 11 |
A | device hardening |
B | hardware security |
C | biometrics |
D | asset tracking |
E | tamper detection |
Question 12 |
A | CARP |
B | IPv6 |
C | SSL |
D | VoIP |
E | QoS |
Question 13 |
A | Cable tester |
B | Tone generator |
C | Loopback adapter |
D | Multimeter |
Question 14 |
A | FTP |
B | FCoE |
C | SAN |
D | NAS |
E | iSCSI |
Question 15 |
A | 8 |
B | 15 |
C | 17 |
D | 16 |
Question 16 |
A | Gateway |
B | Router |
C | Bridge |
D | Switch |
Question 17 |
A | SNAT |
B | PAT |
C | STP |
D | NAT |
E | ARP |
Question 18 |
A | Wireless controller |
B | Enterprise firewall |
C | IDS |
D | Load balancer |
E | Proxy server |
Question 19 |
A | Keep purchasing new spare equipment. |
B | Store all spare equipment in a sepearete office building for extra protection. |
C | Do nothing and keep the spare nearby for an emergency. |
D | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
E | Update the firmware and drivers on spare network equipment regularly. |
Question 20 |
A | netstat |
B | iptables |
C | ipconfig |
D | tcpdump |
E | traceroute |
Question 21 |
A | Data link |
B | Transport |
C | Network |
D | Physical |
E | Application |
F | Presentation |
G | Session |
Question 22 |
A | Install an IDS to monitor all traffic to and from the kiosks. |
B | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
C | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
D | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
E | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
Question 23 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | NMAP –t SANUJA.COM |
B | dig –t ANY SANUJA.COM |
C | iptables –f SANUJA.COM |
D | netstat –a SANUJA.COM |
Question 24 |
A | VLAN mismatch |
B | Corrupted config files or operating system |
C | Damaged or malfunctioning LAN port |
D | Double NAT issue |
E | Damaged or malfunctioning fiber port |
Question 25 |
A | -n |
B | -a |
C | -i |
D | -t |
Question 26 |
A | An SNMPv1 private community |
B | A privilege escalation script |
C | An open mail relay server |
D | A router with default credentials |
Question 27 |
A | DNS round robin |
B | NIC teaming |
C | Server clustering |
D | RAID 1 |
E | Muti-ISP connections |
Question 28 |
A | Remote connection |
B | Fault tolerance |
C | Distributed server system |
D | Network management |
E | Site-to-site VPN |
Question 29 |
A | Physical inspection of each site/workstation. |
B | Install and maintain advanced enterprise firewall applications. |
C | Perform frequent IT audits. |
D | Perform frequent security and vulnerability updates. |
E | Configure advance intrusion detection and firewall rules on the main datacenter. |
Question 30 |
A | Subnet mask |
B | IP address |
C | MAC address |
D | Default gateway |
Question 31 |
A | Operating system update |
B | Feature change |
C | BOIS firmware patch |
D | Vulnerability patch |
E | Driver update |
Question 32 |
A | IPS |
B | Content filter |
C | VLAN restrictions |
D | VPN concentrator |
E | Web application firewall |
Question 33 |
A | Have the ISP double the bandwidth |
B | Move from WPA2 to WEP |
C | Enable WPA and change the SSID |
D | Configure geofencing |
Question 34 |
A | UTM appliance |
B | Proxy server |
C | VPN concentrator |
D | VoIP gateway |
Question 35 |
A | IGMP |
B | UDP |
C | TCP |
D | ICMP |
Question 36 |
A | DHCP option |
B | DHCP relay |
C | DHCP restriction |
D | DHCP reservation |
E | DHCP exclusion |
Question 37 |
A | RJ-45 |
B | RG-58 |
C | RG-8 |
D | RJ-11 |
Question 38 |
A | L2TP |
B | FTPS |
C | PPTP |
D | IPsec |
Question 39 |
A | Tracert |
B | Ping |
C | Route |
D | Netstat |
E | Nslookup |
Question 40 |
A | 443 |
B | 25 |
C | 80 |
D | 110 |
E | 990 |
Question 41 |
A | Port scanning |
B | War driving |
C | Brute-force |
D | Bluejacking |
E | Port sweeping |
Question 42 |
A | Encryption |
B | Certification |
C | Enrollment |
D | Authentication |
E | Authorization |
Question 43 |
A | Application |
B | Physical |
C | Session |
D | Network |
E | Presentation |
F | Transport |
G | Data Link |
Question 44 |
A | Router |
B | Switch |
C | Bridge |
D | Hub |
Question 45 |
A | Secure server |
B | Encryption key |
C | VPN gateway |
D | HTTPS server |
E | Authentication server |
Question 46 |
A | Administration |
B | Authorization |
C | Authentication |
D | Accounting |
Question 47 |
A | A switch |
B | A hub |
C | A router |
D | A gateway |
Question 48 |
A | RC4 |
B | TKIP |
C | 802.1X |
D | Kerberos |
E | AES |
Question 49 |
A | Power redundancy |
B | Circuit labeling |
C | Airflow and cooling |
D | UPS capability |
Question 50 |
A | ping 192.168.1.1 -l 2048 -t |
B | ping 192.168.1.1 -t |
C | ping 192.168.1.1 -l 2048 -n 6 |
D | ping 192.168.1.1 -n 2048 |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 51 |
A | Point-to-multipoint |
B | Mesh |
C | Peer-peer |
D | Bus |
E | Point-to-point |
F | Ring |
Question 52 |
A | Units |
B | Number of screw holes |
C | Millimeters |
D | Centimeters |
E | Inches |
Question 53 |
A | Physical |
B | Session |
C | Application |
D | Network |
E | Presentation |
F | Data link |
G | Transport |
Question 54 |
A | CARP |
B | Voice over IP |
C | Round-robin DNS |
D | Quality of service |
Question 55 |
A | Auditing |
B | Authorization |
C | Accounting |
D | Authentication |
Question 56 |
A | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
B | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
C | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
D | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
Question 57 |
A | Use port mirroring |
B | Periodically view the server logs |
C | Install an inline tap |
D | Use SQL injectors |
E | Configure port aggregation |
Question 58 |
A | T-3 |
B | OC-1 |
C | E-1 |
D | T-1 |
Question 59 |
A | TCP |
B | UDP |
C | ICMP |
D | Ethernet |
E | IP |
Question 60 |
A | Mesh |
B | Bus |
C | Ring or circular |
D | Star |
E | Point-to-point |
Question 61 |
A | Auditing |
B | Accounting |
C | Authorization |
D | Authentication |
E | TGS |
Question 62 |
A | 802.1X |
B | LDAP |
C | Kerberos |
D | TKIP |
E | Radius |
Question 63 |
A | 1024 to 49151 |
B | 1023 through 65534 |
C | 49152 through 65535 |
D | 1 through 1024 |
Question 64 |
A | Temperature changes are causing attenuation in copper cabling |
B | EMI from the lights is interfering with the network cables |
C | Network wiring is run perpendicular to electrical conduit |
D | Light sensors are interfering with the network |
Question 65 |
A | tcpdump |
B | netstat |
C | dig |
D | nmap |
Question 66 |
A | Wireless endpoint |
B | Network firewall |
C | Demarcation point |
D | Demarcation point |
E | Wireless controller |
Question 67 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
B | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
C | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
D | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
Question 68 |
A | FIN |
B | SYN |
C | URG |
D | PSH |
E | END |
Question 69 |
A | Control the latency of traffic across the network links |
B | Control the attenuation of the non-voice traffic across the network links |
C | Control the jitter of the affected traffic across the network links |
D | Control the EMI of the multimedia traffic across the network links |
Question 70 |
A | LC to ST |
B | SC to ST |
C | ST to ST |
D | LC to SC |
E | SC to SC |
Question 71 |
A | 143 |
B | 80 |
C | 110 |
D | 989 |
E | 25 |
Question 72 |
A | Security |
B | System |
C | Setup |
D | Application |
Question 73 |
A | TDM |
B | IDF |
C | VRF |
D | MDF |
Question 74 |
A | Unshielded twisted pair |
B | Single-mode fiber optic |
C | Shielded twisted pair |
D | Multimode fiber optic |
E | Coaxial |
Question 75 |
A | 10.0.0.0 to 10.0.255.255 |
B | 169.254.0.0 to 169.254.255.255 |
C | 192.168.0.0 to 192.168.0.255 |
D | 224.0.0.0 to 224.0.255.255 |
Question 76 |
A | E1/E3 |
B | PRI |
C | BRI |
D | DSL |
Question 77 |
A | Multiport |
B | Transparent |
C | Source route |
D | Store and forward |
Question 78 |
A | RAID 1 |
B | UPS |
C | SNMP |
D | Clustering |
Question 79 |
A | Verify file version |
B | Verify file hash |
C | Verify file size |
D | Verify file type |
E | Verify file date |
Question 80 |
A | Patch and update |
B | Perform backups |
C | Perform VLAN hopping |
D | Change default admin password |
E | Enable port mirroring |
F | Implement spanning tree |
Question 81 |
A | SaaS |
B | PaaS |
C | IaaS |
D | Private |
E | Hybrid |
F | Public |
Question 82 |
A | Wrong passphrase |
B | Channel overlap |
C | Overcapacity |
D | Cross talk |
Question 83 |
A | BiDi |
B | SFP |
C | QSFP |
D | GBIC |
Question 84 |
A | MTRJ |
B | RJ45 |
C | 8P8C |
D | BNC |
E | F-type |
Question 85 |
A | Layer 7 firewall |
B | Layer 3 switch |
C | Web proxy |
D | NAT |
E | Protocol analyzer |
Question 86 |
A | Ethernet hub |
B | Layer 2 router |
C | Multiport bridge |
D | Layer 3 repeater |
Question 87 |
A | AAAA |
B | MX |
C | NS |
D | A |
E | TXT |
Question 88 |
A | InfinitiBand |
B | Fibre Channel |
C | iSCSI |
D | NAS |
Question 89 |
A | social engineering |
B | penetration testing |
C | friendly DoS |
D | session hijacking |
E | vulnerability scanning |
Question 90 |
A | There is insufficient antenna power |
B | There is a security type mismatch. |
C | The password needs to be re-entered |
D | The channel has changed |
E | There is a frequency mismatch |
Question 91 |
A | Local authentication |
B | TACACS+ |
C | Single sign-on |
D | LDAP |
Question 92 |
A | 2 |
B | 4 |
C | 6 |
D | 0 |
E | 7 |
Question 93 |
A | Smartcards |
B | Biometrics |
C | Motion detection |
D | Video surveillance |
Question 94 |
A | The wireless access points were misconfigured |
B | The firewall is configured to throttle traffic to specific websites |
C | There is less local congestion on the wireless network |
D | The testing server for the wired network was farther away |
Question 95 |
A | Reference the ARP table in the router. |
B | Configure port security on the switch. |
C | Perform a DNS lookup on the server. |
D | Set up an SSH session to the desktop. |
Question 96 |
A | IMAP |
B | ICMP |
C | IGMP |
D | IP |
Question 97 |
A | WPA |
B | 802.1X |
C | WEP |
D | WPA2 |
Question 98 |
A | TKIP-RC4 |
B | NAC |
C | LDAP |
D | RADIUS |
Question 99 |
A | Process management |
B | Project management |
C | Standard operating procedure |
D | Change management |
Question 100 |
A | Backups |
B | Cold sites |
C | Snapshots |
D | Failover |
Question 101 |
A | NAT |
B | ACL |
C | 802.1x |
D | Sticky MAC |
E | NAC |
Question 102 |
A | Wiring schematic |
B | Circuit diagrams |
C | Asset management files |
D | Logical network diagram |
E | Physical network diagram |
Question 103 |
A | IMAP |
B | LDAP |
C | SMTP |
D | POP |
Question 104 |
A | PaaS |
B | IaaS |
C | SaaS |
D | VPN |
E | Hosted |
Question 105 |
A | Layer 6 |
B | Layer 5 |
C | Layer 2 |
D | Layer 3 |
E | Layer 4 |
F | Layer 1 |
G | Layer 7 |
Question 106 |
A | A |
B | MX |
C | AAAA |
D | TXT |
E | NS |
Question 107 |
A | netstat |
B | ifconfig |
C | dig |
D | route |
E | traceroute |
Question 108 |
A | top |
B | ping |
C | netstat |
D | monitor |
E | cpustat |
Question 109 |
A | Spoofing |
B | DDoS |
C | Ransomware |
D | Phishing |
E | Session hijacking |
Question 110 |
A | Short circuits |
B | Open circuits |
C | Transposed wires |
D | Split pairs |
Question 111 |
A | Social engineering |
B | Logic bomb |
C | Evil twin |
D | Wardriving |
Question 112 |
A | RJ45 |
B | RJ11 |
C | MTRJ |
D | F-type |
E | ST |
Question 113 |
A | MSConfig file |
B | Asset management files |
C | Logical network diagram |
D | Physical network diagram |
E | Wiring schematic |
Question 114 |
A | Evil twin |
B | Social engineering |
C | Wardriving |
D | Logic bomb |
Question 115 |
A | Host-to-site |
B | Extranet |
C | Site-to-site |
D | Branch-to-server |
E | Host-to-host |
Question 116 |
A | Asset tracking |
B | Data security |
C | Port security |
D | Physical security |
Question 117 |
A | route |
B | netstat |
C | pathping |
D | ping |
Question 118 |
A | RJ11 |
B | F-type |
C | RJ45 |
D | LC |
E | ST |
F | MTRJ |
Question 119 |
A | 1 unit |
B | 4 unit |
C | 3 unit |
D | 2 unit |
Question 120 |
A | 192.168.1.1 |
B | 175.168.0.255 |
C | 192.168.0.1 |
D | 175.255.255.255 |
E | 169.254.54.5 |
Question 121 |
A | A |
B | PTR |
C | CNAME |
D | MD |
E | MX |
Question 122 |
A | Hire a third-party contractor to go on-site |
B | Use a modem to console into the router |
C | Walk a user through troubleshooting the connection |
D | Travel to the branch office |
Question 123 |
A | Permit 192.168.1.143 port 110 |
B | Permit 192.168.1.143 port 80 |
C | Permit 192.168.1.143 port143 |
D | Permit 192.168.1.143 port 587 |
E | Permit 192.168.1.143 port 443 |
F | Permit 192.168.1.143 port 25 |
Question 124 |
A | BCP |
B | RPO |
C | RTO |
D | RAID |
E | MIB |
Question 125 |
A | tcpdump |
B | iptables |
C | nmap |
D | dig |
Question 126 |
A | Somewhere you are |
B | Something you know |
C | Something you do |
D | Something you have |
Question 127 |
A | Asset management files |
B | Wiring schematic |
C | Physical network diagram |
D | Circuit diagrams |
E | Logical network diagram |
Question 128 |
A | Privileged |
B | Preshared |
C | Public |
D | Private |
E | Secured |
Question 129 |
A | 161 , 162 |
B | 143 , 993 |
C | 5060 , 3389 |
D | 80 , 443 |
E | 5060 , 5061 |
Question 130 |
A | Change the default credentials |
B | Verify the firmware file hash |
C | Disable unused switchports |
D | Apply patches and updates |
Question 131 |
A | Coaxial cabling |
B | Twisted pair cabling |
C | Enterrpise APs |
D | Fiber-optic cabling |
Question 132 |
A | 50134 |
B | 1024 |
C | 80 |
D | 23 |
E | 995 |
F | 1999 |
Question 133 |
A | IDS |
B | NAS |
C | RADIUS |
D | NGFW |
Question 134 |
A | Transport |
B | Application |
C | Presentation |
D | Data link |
E | Network |
F | Session |
G | Physical |
Question 135 |
A | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
B | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
C | Set the firewall to operate in transparent mode |
D | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
Question 136 |
A | arp -c * |
B | arp -s |
C | arp -a |
D | arp -d * |
Question 137 |
A | Security |
B | Setup |
C | System |
D | Application |
Question 138 |
A | Microwave |
B | Fiber optic |
C | Infrared |
D | Electrical |
Question 139 |
A | EMI |
B | Signal attenuation |
C | Latency |
D | Crosstalk |
Question 140 |
A | WPA2 |
B | RADIUS |
C | Kerberos |
D | EAP-TLS |
Question 141 |
A | Tamper detection |
B | Pattern recognition |
C | Biometrics |
D | Geofencing |
E | Face geometry |
Question 142 |
A | IP |
B | UDP |
C | HTTP |
D | TCP |
Question 143 |
A | Decreased performance of the internal network |
B | Loss of full control over data resources |
C | Increased malware exposure |
D | Inconsistent data accessability |
E | Incompatibility with the current network |
Question 144 |
A | 24 inches |
B | 12 inches |
C | 16 inches |
D | 19 inches |
Question 145 |
A | 192.168.0.55 |
B | 255 255 255.0 |
C | 192.168.1.0 |
D | 192.168.1.1 |
E | 255 255 255.0 |
Question 146 |
A | Fiber distribution panel |
B | CMTS |
C | 110 block |
D | Patch panel |
E | 66 block |
Question 147 |
A | Packet intrusion |
B | VLAN mismatch |
C | Honey pot |
D | Evil twin |
E | Rogue DHCP server |
Question 148 |
A | Ping time |
B | Distance |
C | Hop count |
D | Bandwidth |
E | Speed |
Question 149 |
A | Bus |
B | Ring |
C | Ad hoc |
D | Mesh |
E | Star |
Question 150 |
A | An NDA ensuring work data stored on the personal phone remains confidential |
B | A consent to monitoring policy covering company audits of the personal phone |
C | An AUP covering how a personal phone may be used for work matters |
D | Real-time remote monitoring of the phone’s activity and usage |
Question 151 |
A | The public key |
B | The session key |
C | The secure key |
D | The ticket granting key |
E | The private key |
Question 152 |
A | Wiring schematic |
B | Network map |
C | Rack diagram |
D | Building blueprints |
E | Logical diagram |
Question 153 |
A | ntop |
B | Event Viewer |
C | Syslog |
D | Network Monitor |
E | Performance Monitor |
Question 154 |
A | Power looping |
B | Uninterruptible Power Supply (UPS) |
C | Power redundancy |
D | Redundant circuits |
E | Dual power supplies |
Question 155 |
A | Combined mode |
B | Hot backup mode |
C | High-efficiency mode |
D | Individual mode |
E | Redundant mode |
Question 156 |
A | Port security |
B | Captive portal |
C | Access control lists |
D | WPA2 |
Question 157 |
A | None of the answers are correct because you cannot assign random port numbers. |
B | https://sanuja.com/123456 |
C | http://sanuja.com:123456 |
D | http://sanuja.com/123456 |
E | https://sanuja.com:123456 |
Question 158 |
A | netstat |
B | ping |
C | tracert |
D | ipconfig |
E | ifconfig |
Question 159 |
A | Bridge mode |
B | Double NAT |
C | ADSL |
D | DOCSIS |
E | Jumbo frame |
Question 160 |
A | 10GBase-CX4 |
B | 10GBase-SR |
C | 10GBase-LX4 |
D | 10GBase-LR |
E | 10GBase-ER |
Question 161 |
A | Duplex/speed mismatch |
B | DHCP server issue |
C | VLAN mismatch |
D | Spanning tree blocked ports |
E | DNS server issue |
Question 162 |
A | PAT |
B | SIP |
C | VIP |
D | NAT |
Question 163 |
A | WEP |
B | WPA |
C | WPA2 |
D | PEAP |
Question 164 |
A | 1 |
B | 0 |
C | 2 |
D | 4 |
E | 3 |
Question 165 |
A | MAC filtering |
B | WAP |
C | NAC |
D | Captive portal |
E | Port security |
Question 166 |
A | SSL |
B | IPSec |
C | SSH |
D | Telnet |
Question 167 |
A | Smart jack |
B | SONET |
C | AAA server |
D | Media converter |
E | SIP trunk |
Question 168 |
A | Session hijacking |
B | Throttling |
C | Blocking |
D | Data usage limits |
E | Bandwidth quotas |
Question 169 |
A | Jumbo frames |
B | Fiber channel |
C | FTP |
D | NAS |
E | SAN |
Question 170 |
A | A switch |
B | A hub |
C | A gateway |
D | A router |
Question 171 |
A | A user application problem |
B | A wide area newtwork problem |
C | A shared resource problem |
D | A network-wide problem |
E | A system-wide problem |
Question 172 |
A | RAID 10 |
B | RAID 5 |
C | RAID 1 |
D | RAID 0 |
Question 173 |
A | DB9 |
B | USB 2.0 |
C | USB 3.0 |
D | RJ45 |
E | RC5 |
Question 174 |
A | Pattern recognition |
B | Hand geometry |
C | Biometrics |
D | Single sign-on (SSO) |
E | Tamper detection |
Question 175 |
A | RAID 5 |
B | RAID 0 |
C | RAID 10 |
D | RAID 1 |
Question 176 |
A | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
B | Add additional printers across both NATs. |
C | Add a firewall between the domain controller and the router. |
D | Remove the firewall between the Internet/modem and the router. |
Question 177 |
A | Directory traversal |
B | SQL injection |
C | Packet sniffing |
D | XSS |
E | Wardriving |
Question 178 |
A | PSK |
B | EAP-PEAP |
C | CCMP-AES |
D | WEP |
Question 179 |
A | BGP |
B | SIP |
C | LLDP |
D | LACP |
Question 180 |
A | ping |
B | traceroute |
C | ifconfig |
D | netstat |
Question 181 |
A | A virtual IP pointing to the active DB |
B | A static IP pointing to the passive DB |
C | A private IP pointing to the web proxy |
D | A private IP pointing to the web front end |
Question 182 |
A | KDC |
B | Client terminal |
C | Application server |
D | RDP |
Question 183 |
A | Domain controller |
B | Biometric systems |
C | RADIUS server |
D | Smartcards |
E | Wireless access point |
Question 184 |
A | Power-over-Ethernet switch |
B | Powerline extender |
C | Power distribution unit |
D | Ethernet-over-power adapter |
E | Ethernet power controller |
Question 185 |
A | WEP |
B | MS-CHAPv2 |
C | PAP |
D | EAP |
E | CHAP |
Question 186 |
A | 192.168.1.109 |
B | 192.168.0.1 |
C | 10.1.0.255 |
D | 10.1.1.255 |
E | 192.168.0.55 |
Question 187 |
A | Cable broadband |
B | Dial-up modem |
C | ISDN |
D | DSL |
Question 188 |
A | Transport |
B | Network |
C | Application |
D | Session |
E | Data Link |
Question 189 |
A | Class A |
B | None of the classes |
C | Class D |
D | Class B |
E | Class C |
Question 190 |
A | SSL gateway |
B | SSL client |
C | SSL portal |
D | SSL tunnel |
Question 191 |
A | NDA |
B | SLA |
C | BYOD |
D | IRP |
Question 192 |
A | SYN/ACK, SYN/ACK |
B | SYN, SYN/ACK, ACK |
C | SYN, SYN, ACK, ACK |
D | SYN, ACK, SYN, ACK |
Question 193 |
A | RIP |
B | QoS |
C | DMZ |
D | NAT |
E | DDoS |
Question 194 |
A | Presentation |
B | Transport |
C | Physical |
D | Network |
E | Session |
F | Data Link |
G | Application |
Question 195 |
A | InfiniBand |
B | CIFS |
C | Fibre Channel |
D | iSCSI |
Question 196 |
A | Top |
B | Netmon |
C | Netstat |
D | Syslog |
Question 197 |
A | HTML |
B | HTTP |
C | SMTP |
D | FTP |
E | SSL |
Question 198 |
A | Source route |
B | Destination switch |
C | Store-and-forward |
D | Cut-through |
Question 199 |
A | ARP |
B | FTP |
C | SIP |
D | SCP |
Question 200 |
A | Layer 1 |
B | Layer 3 |
C | Layer 2 |
D | Layer 4 |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.