← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Kerberos |
B | TKIP |
C | RC4 |
D | AES |
E | 802.1X |
Question 2 |
A | VDSL |
B | IDSL |
C | RADSL |
D | HDSL |
Question 3 |
A | 192.168.0.1 |
B | 192.168.0.55 |
C | 10.1.0.255 |
D | 10.1.1.255 |
E | 192.168.1.109 |
Question 4 |
A | TXT |
B | MX |
C | A |
D | AAAA |
E | NS |
Question 5 |
A | Crosstalk |
B | EMI |
C | Latency |
D | Signal attenuation |
Question 6 |
A | friendly DoS |
B | social engineering |
C | vulnerability scanning |
D | penetration testing |
E | session hijacking |
Question 7 |
A | Authorization |
B | Accounting |
C | TGS |
D | Auditing |
E | Authentication |
Question 8 |
A | SCP |
B | FTP |
C | SIP |
D | ARP |
Question 9 |
A | EAP |
B | MS-CHAPv2 |
C | CHAP |
D | PAP |
E | WEP |
Question 10 |
A | T-1 |
B | OC-1 |
C | E-1 |
D | T-3 |
Question 11 |
A | The channel has changed |
B | There is a security type mismatch. |
C | There is a frequency mismatch |
D | There is insufficient antenna power |
E | The password needs to be re-entered |
Question 12 |
A | Layer 3 |
B | Layer 4 |
C | Layer 1 |
D | Layer 2 |
Question 13 |
A | IMAP |
B | IP |
C | ICMP |
D | IGMP |
Question 14 |
A | DHCP server issue |
B | Spanning tree blocked ports |
C | Duplex/speed mismatch |
D | DNS server issue |
E | VLAN mismatch |
Question 15 |
A | Administration |
B | Authorization |
C | Authentication |
D | Accounting |
Question 16 |
A | ping 192.168.1.1 -l 2048 -t |
B | ping 192.168.1.1 -t |
C | ping 192.168.1.1 -l 2048 -n 6 |
D | ping 192.168.1.1 -n 2048 |
E | ping 192.168.1.1 -l 2048 -t 6 |
Number of messages: -n parameter = 6
Question 17 |
A | TKIP |
B | 802.1X |
C | Radius |
D | LDAP |
E | Kerberos |
Question 18 |
A | Set up an SSH session to the desktop. |
B | Configure port security on the switch. |
C | Reference the ARP table in the router. |
D | Perform a DNS lookup on the server. |
Question 19 |
A | A gateway |
B | A hub |
C | A switch |
D | A router |
Question 20 |
A | A gateway |
B | A switch |
C | A hub |
D | A router |
Question 21 |
A | IP address |
B | MAC address |
C | Subnet mask |
D | Default gateway |
Question 22 |
A | 192.168.1.1 |
B | 255 255 255.0 |
C | 192.168.1.0 |
D | 192.168.0.55 |
E | 255 255 255.0 |
Question 23 |
A | IaaS |
B | Hybrid |
C | PaaS |
D | Public |
E | SaaS |
F | Private |
Question 24 |
A | Proxy server |
B | UTM appliance |
C | VoIP gateway |
D | VPN concentrator |
Question 25 |
A | END |
B | SYN |
C | PSH |
D | FIN |
E | URG |
Question 26 |
A | IP |
B | HTTP |
C | UDP |
D | TCP |
Question 27 |
A | Infrared |
B | Fiber optic |
C | Microwave |
D | Electrical |
Question 28 |
A | ping |
B | route |
C | pathping |
D | netstat |
Question 29 |
A | https://sanuja.com:123456 |
B | http://sanuja.com/123456 |
C | http://sanuja.com:123456 |
D | None of the answers are correct because you cannot assign random port numbers. |
E | https://sanuja.com/123456 |
Question 30 |
A | Twisted pair cabling |
B | Enterrpise APs |
C | Coaxial cabling |
D | Fiber-optic cabling |
Question 31 |
A | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
B | Remove the firewall between the Internet/modem and the router. |
C | Add a firewall between the domain controller and the router. |
D | Add additional printers across both NATs. |
Question 32 |
A | SAN |
B | FCoE |
C | NAS |
D | iSCSI |
E | FTP |
Question 33 |
A | RADIUS |
B | IDS |
C | NGFW |
D | NAS |
Question 34 |
A | Client terminal |
B | KDC |
C | Application server |
D | RDP |
Question 35 |
A | arp -d |
B | arp -a |
C | arp -c |
D | arp -t |
E | arp -s |
Question 36 |
A | Multiport |
B | Source route |
C | Store and forward |
D | Transparent |
Question 37 |
A | Rack diagram |
B | Wiring schematic |
C | Building blueprints |
D | Logical diagram |
E | Network map |
Question 38 |
A | An NDA ensuring work data stored on the personal phone remains confidential |
B | Real-time remote monitoring of the phone’s activity and usage |
C | An AUP covering how a personal phone may be used for work matters |
D | A consent to monitoring policy covering company audits of the personal phone |
Question 39 |
A | 80 , 443 |
B | 143 , 993 |
C | 5060 , 3389 |
D | 5060 , 5061 |
E | 161 , 162 |
Question 40 |
A | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
B | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
C | Set the firewall to operate in transparent mode |
D | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
Question 41 |
A | Power looping |
B | Redundant circuits |
C | Power redundancy |
D | Dual power supplies |
E | Uninterruptible Power Supply (UPS) |
Question 42 |
A | RAID 10 |
B | RAID 0 |
C | RAID 1 |
D | RAID 5 |
Question 43 |
A | Data security |
B | Physical security |
C | Port security |
D | Asset tracking |
Question 44 |
A | IDF |
B | TDM |
C | MDF |
D | VRF |
Question 45 |
A | Peer-peer |
B | Point-to-point |
C | Ring |
D | Point-to-multipoint |
E | Bus |
F | Mesh |
Question 46 |
A | 224.0.0.0 to 224.0.255.255 |
B | 169.254.0.0 to 169.254.255.255 |
C | 192.168.0.0 to 192.168.0.255 |
D | 10.0.0.0 to 10.0.255.255 |
Question 47 |
A | E1/E3 |
B | PRI |
C | DSL |
D | BRI |
Question 48 |
A | Enable WPA and change the SSID |
B | Configure geofencing |
C | Have the ISP double the bandwidth |
D | Move from WPA2 to WEP |
Question 49 |
A | BiDi |
B | QSFP |
C | SFP |
D | GBIC |
Question 50 |
A | 802.1x |
B | Sticky MAC |
C | NAC |
D | ACL |
E | NAT |
Question 51 |
A | Routers |
B | Firewalls |
C | Bridges |
D | Hubs |
Question 52 |
A | MMS |
B | WinMS |
C | MSS |
D | Window |
Question 53 |
A | Redundant mode |
B | Individual mode |
C | Combined mode |
D | Hot backup mode |
E | High-efficiency mode |
Question 54 |
A | SSH |
B | Telnet |
C | SSL |
D | IPSec |
Question 55 |
A | Packet intrusion |
B | Honey pot |
C | Evil twin |
D | Rogue DHCP server |
E | VLAN mismatch |
Question 56 |
A | Network |
B | Session |
C | Presentation |
D | Transport |
E | Data link |
F | Application |
G | Physical |
Question 57 |
A | LLDP |
B | LACP |
C | SIP |
D | BGP |
Question 58 |
A | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
B | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
C | Both broadcast and collision domains occur at layer 2. |
D | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
E | It is impossible to have a collision domain in a wireless network infrastructure. |
Question 59 |
A | IGMP |
B | TCP |
C | ICMP |
D | UDP |
Question 60 |
A | Permit 192.168.1.143 port 587 |
B | Permit 192.168.1.143 port 110 |
C | Permit 192.168.1.143 port143 |
D | Permit 192.168.1.143 port 25 |
E | Permit 192.168.1.143 port 80 |
F | Permit 192.168.1.143 port 443 |
Question 61 |
A | 17 |
B | 8 |
C | 16 |
D | 15 |
Question 62 |
A | Number of screw holes |
B | Inches |
C | Units |
D | Millimeters |
E | Centimeters |
Question 63 |
A | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
B | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
C | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
D | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
E | Install an IDS to monitor all traffic to and from the kiosks. |
Question 64 |
A | WPA2 |
B | EAP-TLS |
C | Kerberos |
D | RADIUS |
Question 65 |
A | Network |
B | Application |
C | Transport |
D | Session |
E | Data Link |
Question 66 |
A | RAID 1 |
B | RAID 10 |
C | RAID 0 |
D | RAID 5 |
Question 67 |
A | Social engineering |
B | Logic bomb |
C | Evil twin |
D | Wardriving |
Question 68 |
A | Tone generator |
B | Loopback adapter |
C | Cable tester |
D | Multimeter |
Question 69 |
A | Switch |
B | Bridge |
C | Router |
D | Hub |
Question 70 |
A | 7 |
B | 2 |
C | 4 |
D | 0 |
E | 6 |
Question 71 |
A | RAID 1 |
B | NIC teaming |
C | DNS round robin |
D | Server clustering |
E | Muti-ISP connections |
Question 72 |
A | Mesh |
B | Ring or circular |
C | Star |
D | Point-to-point |
E | Bus |
Question 73 |
A | SNAT |
B | NAT |
C | STP |
D | PAT |
E | ARP |
Question 74 |
A | WEP |
B | WPA2 |
C | PEAP |
D | WPA |
Question 75 |
A | Power redundancy |
B | Circuit labeling |
C | Airflow and cooling |
D | UPS capability |
Question 76 |
A | Application |
B | System |
C | Setup |
D | Security |
Question 77 |
A | Password protection |
B | Name resolution |
C | IP address resolution |
D | Network switching |
Question 78 |
A | Biometrics |
B | Single sign-on (SSO) |
C | Tamper detection |
D | Hand geometry |
E | Pattern recognition |
Question 79 |
A | Source route |
B | Store-and-forward |
C | Destination switch |
D | Cut-through |
Question 80 |
A | Encapsulate the storage traffic in a GRE tunnel |
B | Utilize UDP to eliminate packet overhead |
C | Enable jumbo frames on the NAS and server |
D | Turn off MDIX settings on the NAS and server switchports |
Question 81 |
A | Netstat |
B | Ping |
C | Nslookup |
D | Tracert |
E | Route |
Question 82 |
A | 3 |
B | 1 |
C | 0 |
D | 2 |
E | 4 |
Question 83 |
A | Jumbo frame |
B | ADSL |
C | Bridge mode |
D | Double NAT |
E | DOCSIS |
Question 84 |
A | Project management |
B | Change management |
C | Process management |
D | Standard operating procedure |
Question 85 |
A | Update the firmware and drivers on spare network equipment regularly. |
B | Keep purchasing new spare equipment. |
C | Store all spare equipment in a sepearete office building for extra protection. |
D | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
E | Do nothing and keep the spare nearby for an emergency. |
Question 86 |
A | Fault tolerance |
B | Network management |
C | Distributed server system |
D | Site-to-site VPN |
E | Remote connection |
Question 87 |
A | VLAN restrictions |
B | VPN concentrator |
C | Content filter |
D | IPS |
E | Web application firewall |
Question 88 |
A | Video surveillance |
B | Biometrics |
C | Smartcards |
D | Motion detection |
Question 89 |
A | Shielded twisted pair |
B | Multimode fiber optic |
C | Single-mode fiber optic |
D | Unshielded twisted pair |
E | Coaxial |
Question 90 |
A | SSL portal |
B | SSL client |
C | SSL tunnel |
D | SSL gateway |
Question 91 |
A | The session key |
B | The private key |
C | The public key |
D | The secure key |
E | The ticket granting key |
Question 92 |
A | Verify file date |
B | Verify file version |
C | Verify file hash |
D | Verify file size |
E | Verify file type |
Question 93 |
A | Security |
B | System |
C | Application |
D | Setup |
Question 94 |
A | Change the default credentials |
B | Verify the firmware file hash |
C | Apply patches and updates |
D | Disable unused switchports |
Question 95 |
A | LDAP |
B | TKIP-RC4 |
C | NAC |
D | RADIUS |
Question 96 |
A | Data Link |
B | Presentation |
C | Application |
D | Session |
E | Transport |
F | Network |
G | Physical |
Question 97 |
A | Bluejacking |
B | Port sweeping |
C | Brute-force |
D | War driving |
E | Port scanning |
Question 98 |
A | Authentication server |
B | Secure server |
C | VPN gateway |
D | HTTPS server |
E | Encryption key |
Question 99 |
A | RJ45 |
B | ST |
C | F-type |
D | RJ11 |
E | MTRJ |
Question 100 |
A | Control the jitter of the affected traffic across the network links |
B | Control the latency of traffic across the network links |
C | Control the EMI of the multimedia traffic across the network links |
D | Control the attenuation of the non-voice traffic across the network links |
Question 101 |
A | iptables |
B | nmap |
C | dig |
D | tcpdump |
Question 102 |
A | ST |
B | LC |
C | F-type |
D | RJ45 |
E | RJ11 |
F | MTRJ |
Question 103 |
A | MSConfig file |
B | Physical network diagram |
C | Asset management files |
D | Wiring schematic |
E | Logical network diagram |
Question 104 |
A | WPA |
B | WPA2 |
C | WEP |
D | 802.1X |
Question 105 |
A | Router |
B | Gateway |
C | Switch |
D | Bridge |
Question 106 |
A | Load balancer |
B | Enterprise firewall |
C | Proxy server |
D | Wireless controller |
E | IDS |
Question 107 |
A | Light sensors are interfering with the network |
B | Temperature changes are causing attenuation in copper cabling |
C | Network wiring is run perpendicular to electrical conduit |
D | EMI from the lights is interfering with the network cables |
Question 108 |
A | MAC filtering |
B | WAP |
C | Captive portal |
D | NAC |
E | Port security |
Question 109 |
A | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
B | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
C | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
D | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
Question 110 |
A | RG-8 |
B | RJ-45 |
C | RJ-11 |
D | RG-58 |
Question 111 |
A | Patch and update |
B | Perform backups |
C | Implement spanning tree |
D | Perform VLAN hopping |
E | Change default admin password |
F | Enable port mirroring |
Question 112 |
A | Presentation |
B | Physical |
C | Network |
D | Application |
E | Transport |
F | Data link |
G | Session |
Question 113 |
A | Power distribution unit |
B | Ethernet-over-power adapter |
C | Power-over-Ethernet switch |
D | Ethernet power controller |
E | Powerline extender |
Question 114 |
A | Driver update |
B | Feature change |
C | Operating system update |
D | BOIS firmware patch |
E | Vulnerability patch |
Question 115 |
A | traceroute |
B | netstat |
C | dig |
D | route |
E | ifconfig |
Question 116 |
A | 1 through 1024 |
B | 1023 through 65534 |
C | 1024 to 49151 |
D | 49152 through 65535 |
Question 117 |
A | 2 unit |
B | 1 unit |
C | 3 unit |
D | 4 unit |
Question 118 |
A | The firewall is configured to throttle traffic to specific websites |
B | The testing server for the wired network was farther away |
C | The wireless access points were misconfigured |
D | There is less local congestion on the wireless network |
Question 119 |
A | arp -s |
B | arp -d * |
C | arp -c * |
D | arp -a |
Question 120 |
A | SC to ST |
B | LC to SC |
C | ST to ST |
D | SC to SC |
E | LC to ST |
Question 121 |
A | tcpdump |
B | netstat |
C | nmap |
D | dig |
Question 122 |
A | Fibre Channel |
B | CIFS |
C | iSCSI |
D | InfiniBand |
Question 123 |
A | LDAP |
B | Single sign-on |
C | Local authentication |
D | TACACS+ |
Question 124 |
A | -n |
B | -a |
C | -i |
D | -t |
Question 125 |
A | Travel to the branch office |
B | Use a modem to console into the router |
C | Walk a user through troubleshooting the connection |
D | Hire a third-party contractor to go on-site |
Question 126 |
A | DMZ |
B | NAT |
C | QoS |
D | RIP |
E | DDoS |
Question 127 |
A | Social engineering |
B | Logic bomb |
C | Evil twin |
D | Wardriving |
Question 128 |
A | A virtual IP pointing to the active DB |
B | A private IP pointing to the web proxy |
C | A static IP pointing to the passive DB |
D | A private IP pointing to the web front end |
Question 129 |
A | USB 3.0 |
B | RC5 |
C | DB9 |
D | RJ45 |
E | USB 2.0 |
Question 130 |
A | 10GBase-ER |
B | 10GBase-LX4 |
C | 10GBase-LR |
D | 10GBase-SR |
E | 10GBase-CX4 |
Question 131 |
A | Access control lists |
B | Port security |
C | WPA2 |
D | Captive portal |
Question 132 |
A | TCP |
B | ICMP |
C | Ethernet |
D | IP |
E | UDP |
Question 133 |
A | Wardriving |
B | SQL injection |
C | XSS |
D | Directory traversal |
E | Packet sniffing |
Question 134 |
A | EAP-PEAP |
B | WEP |
C | CCMP-AES |
D | PSK |
Question 135 |
A | SAN |
B | Jumbo frames |
C | Fiber channel |
D | NAS |
E | FTP |
Question 136 |
A | HTML |
B | SMTP |
C | FTP |
D | SSL |
E | HTTP |
Question 137 |
A | Presentation |
B | Network |
C | Data link |
D | Application |
E | Transport |
F | Physical |
G | Session |
Question 138 |
A | RADIUS server |
B | Domain controller |
C | Wireless access point |
D | Biometric systems |
E | Smartcards |
Question 139 |
A | RDP |
B | MDF |
C | MTBF |
D | PBX |
E | IDF |
Question 140 |
A | ifconfig |
B | netstat |
C | ping |
D | traceroute |
Question 141 |
A | Asset management files |
B | Logical network diagram |
C | Wiring schematic |
D | Circuit diagrams |
E | Physical network diagram |
Question 142 |
A | Data Link |
B | Application |
C | Presentation |
D | Network |
E | Session |
F | Physical |
G | Transport |
Question 143 |
A | Transposed wires |
B | Split pairs |
C | Open circuits |
D | Short circuits |
Question 144 |
A | A |
B | MD |
C | PTR |
D | MX |
E | CNAME |
Question 145 |
A | Cross talk |
B | Wrong passphrase |
C | Overcapacity |
D | Channel overlap |
Question 146 |
A | SYN, SYN, ACK, ACK |
B | SYN, SYN/ACK, ACK |
C | SYN, ACK, SYN, ACK |
D | SYN/ACK, SYN/ACK |
Question 147 |
A | Class C |
B | Class D |
C | Class B |
D | Class A |
E | None of the classes |
Question 148 |
A | Host-to-host |
B | Host-to-site |
C | Branch-to-server |
D | Site-to-site |
E | Extranet |
Question 149 |
A | Ransomware |
B | Session hijacking |
C | DDoS |
D | Phishing |
E | Spoofing |
Question 150 |
A | 12 inches |
B | 16 inches |
C | 24 inches |
D | 19 inches |
Question 151 |
A | hardware security |
B | device hardening |
C | tamper detection |
D | biometrics |
E | asset tracking |
Question 152 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
B | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
C | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
D | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
Question 153 |
A | 23 |
B | 995 |
C | 1024 |
D | 1999 |
E | 80 |
F | 50134 |
Question 154 |
A | Wireless endpoint |
B | Demarcation point |
C | Wireless controller |
D | Network firewall |
E | Demarcation point |
Question 155 |
A | VIP |
B | NAT |
C | PAT |
D | SIP |
Question 156 |
A | Decreased performance of the internal network |
B | Incompatibility with the current network |
C | Inconsistent data accessability |
D | Increased malware exposure |
E | Loss of full control over data resources |
Question 157 |
A | 989 |
B | 110 |
C | 80 |
D | 25 |
E | 143 |
Question 158 |
A | IRP |
B | BYOD |
C | SLA |
D | NDA |
Question 159 |
A | top |
B | netstat |
C | cpustat |
D | ping |
E | monitor |
Question 160 |
A | IPsec |
B | L2TP |
C | PPTP |
D | FTPS |
Question 161 |
A | Clustering |
B | UPS |
C | RAID 1 |
D | SNMP |
Question 162 |
A | Layer 4 |
B | Layer 5 |
C | Layer 2 |
D | Layer 6 |
E | Layer 3 |
F | Layer 7 |
G | Layer 1 |
Question 163 |
A | SIP trunk |
B | SONET |
C | AAA server |
D | Smart jack |
E | Media converter |
Question 164 |
A | Failover |
B | Snapshots |
C | Backups |
D | Cold sites |
Question 165 |
A | Ethernet hub |
B | Layer 2 router |
C | Layer 3 repeater |
D | Multiport bridge |
Question 166 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | NMAP –t SANUJA.COM |
B | iptables –f SANUJA.COM |
C | netstat –a SANUJA.COM |
D | dig –t ANY SANUJA.COM |
Question 167 |
A | VoIP |
B | SSL |
C | QoS |
D | IPv6 |
E | CARP |
Question 168 |
A | 80 |
B | 443 |
C | 990 |
D | 25 |
E | 110 |
Question 169 |
A | NAS |
B | Fibre Channel |
C | iSCSI |
D | InfinitiBand |
Question 170 |
A | DHCP relay |
B | DHCP exclusion |
C | DHCP restriction |
D | DHCP reservation |
E | DHCP option |
Question 171 |
A | Authorization |
B | Authentication |
C | Certification |
D | Enrollment |
E | Encryption |
Question 172 |
A | Bandwidth quotas |
B | Blocking |
C | Data usage limits |
D | Throttling |
E | Session hijacking |
Question 173 |
A | Quality of service |
B | CARP |
C | Round-robin DNS |
D | Voice over IP |
Question 174 |
A | SaaS |
B | VPN |
C | PaaS |
D | Hosted |
E | IaaS |
Question 175 |
A | NAT |
B | Layer 3 switch |
C | Layer 7 firewall |
D | Web proxy |
E | Protocol analyzer |
Question 176 |
A | Bus |
B | Ad hoc |
C | Ring |
D | Mesh |
E | Star |
Question 177 |
A | Something you know |
B | Something you have |
C | Something you do |
D | Somewhere you are |
Question 178 |
A | Secured |
B | Preshared |
C | Privileged |
D | Private |
E | Public |
Question 179 |
A | ping |
B | ifconfig |
C | ipconfig |
D | tracert |
E | netstat |
Question 180 |
A | 66 block |
B | CMTS |
C | Fiber distribution panel |
D | Patch panel |
E | 110 block |
Question 181 |
A | Accounting |
B | Authorization |
C | Authentication |
D | Auditing |
Question 182 |
A | 192.168.1.1 |
B | 192.168.0.1 |
C | 169.254.54.5 |
D | 175.168.0.255 |
E | 175.255.255.255 |
Question 183 |
A | A network-wide problem |
B | A wide area newtwork problem |
C | A system-wide problem |
D | A user application problem |
E | A shared resource problem |
Question 184 |
A | Binary |
B | Hex |
C | CIDR |
D | Octal |
Question 185 |
A | Dial-up modem |
B | ISDN |
C | Cable broadband |
D | DSL |
Question 186 |
A | Top |
B | Netmon |
C | Netstat |
D | Syslog |
Question 187 |
A | Speed |
B | Distance |
C | Ping time |
D | Hop count |
E | Bandwidth |
Question 188 |
A | Performance Monitor |
B | Event Viewer |
C | Network Monitor |
D | Syslog |
E | ntop |
Question 189 |
A | Physical inspection of each site/workstation. |
B | Install and maintain advanced enterprise firewall applications. |
C | Perform frequent IT audits. |
D | Perform frequent security and vulnerability updates. |
E | Configure advance intrusion detection and firewall rules on the main datacenter. |
Question 190 |
A | Face geometry |
B | Biometrics |
C | Pattern recognition |
D | Tamper detection |
E | Geofencing |
Question 191 |
A | Install an inline tap |
B | Use SQL injectors |
C | Configure port aggregation |
D | Use port mirroring |
E | Periodically view the server logs |
Question 192 |
A | traceroute |
B | iptables |
C | netstat |
D | tcpdump |
E | ipconfig |
Question 193 |
A | SMTP |
B | LDAP |
C | IMAP |
D | POP |
Question 194 |
A | NS |
B | TXT |
C | MX |
D | A |
E | AAAA |
Question 195 |
A | F-type |
B | MTRJ |
C | RJ45 |
D | BNC |
E | 8P8C |
Question 196 |
A | Damaged or malfunctioning LAN port |
B | VLAN mismatch |
C | Damaged or malfunctioning fiber port |
D | Double NAT issue |
E | Corrupted config files or operating system |
Question 197 |
A | Physical network diagram |
B | Wiring schematic |
C | Logical network diagram |
D | Asset management files |
E | Circuit diagrams |
Question 198 |
A | RTO |
B | BCP |
C | MIB |
D | RAID |
E | RPO |
Question 199 |
A | A router with default credentials |
B | A privilege escalation script |
C | An SNMPv1 private community |
D | An open mail relay server |
Question 200 |
A | Asset tracking |
B | Tamper detection |
C | Geofencing |
D | Biometric |
E | Social engineering |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.