← Exams and Quizzes | Professional Exams →
Notice
If you get a question wrong, you can still click on the other answers. This will open up hints and explanations (if available), which will provide additional information. Exam should be 1 minute per question and please time accordingly.It is not required to have CompTIA A+ certification prior to obtaining CompTIA Network+ certification. It is recommended to have CompTIA A+ certification or the knowledge of the subject matter that is covered under A+ certification exam before taking Network+ certification exam. It is also recommended, but not required, that you have about 12 months of IT networking work experience.
Go to: Set II | Set III
CompTIA Network+ N10-007 - Set I
Congratulations - you have completed CompTIA Network+ N10-007 - Set I.
You scored %%SCORE%% out of %%TOTAL%%. With incorrect multiple attempts, your score is %%PERCENTAGE%%. Your performance has been rated as %%RATING%%
Question 1 |
A | Nslookup |
B | Tracert |
C | Route |
D | Netstat |
E | Ping |
Question 2 |
A | DHCP relay |
B | DHCP option |
C | DHCP exclusion |
D | DHCP reservation |
E | DHCP restriction |
Question 3 |
A | Evil twin |
B | Social engineering |
C | Logic bomb |
D | Wardriving |
Question 4 |
A | PAT |
B | ARP |
C | STP |
D | SNAT |
E | NAT |
Question 5 |
A | Netmon |
B | Syslog |
C | Netstat |
D | Top |
Question 6 |
A | 10GBase-CX4 |
B | 10GBase-ER |
C | 10GBase-LX4 |
D | 10GBase-SR |
E | 10GBase-LR |
Question 7 |
A | VIP |
B | SIP |
C | NAT |
D | PAT |
Question 8 |
A | Crosstalk |
B | Latency |
C | Signal attenuation |
D | EMI |
Question 9 |
A | Jumbo frame |
B | Bridge mode |
C | ADSL |
D | DOCSIS |
E | Double NAT |
Question 10 |
A | LC to SC |
B | SC to ST |
C | ST to ST |
D | LC to ST |
E | SC to SC |
Question 11 |
A | SYN, SYN/ACK, ACK |
B | SYN, SYN, ACK, ACK |
C | SYN, ACK, SYN, ACK |
D | SYN/ACK, SYN/ACK |
Question 12 |
A | Authorization |
B | Accounting |
C | Authentication |
D | Administration |
Question 13 |
A | Social engineering |
B | Wardriving |
C | Evil twin |
D | Logic bomb |
Question 14 |
A | Pattern recognition |
B | Hand geometry |
C | Biometrics |
D | Single sign-on (SSO) |
E | Tamper detection |
Question 15 |
A | Kerberos |
B | EAP-TLS |
C | RADIUS |
D | WPA2 |
Question 16 |
A | A gateway |
B | A hub |
C | A switch |
D | A router |
Question 17 |
A | Presentation |
B | Network |
C | Transport |
D | Physical |
E | Data Link |
F | Application |
G | Session |
Question 18 |
A | TKIP |
B | Kerberos |
C | LDAP |
D | 802.1X |
E | Radius |
Question 19 |
A | 4 unit |
B | 2 unit |
C | 3 unit |
D | 1 unit |
Question 20 |
A | VoIP gateway |
B | VPN concentrator |
C | Proxy server |
D | UTM appliance |
Question 21 |
A | Physical |
B | Transport |
C | Session |
D | Presentation |
E | Data Link |
F | Network |
G | Application |
Question 22 |
A | Encapsulate the storage traffic in a GRE tunnel |
B | Utilize UDP to eliminate packet overhead |
C | Enable jumbo frames on the NAS and server |
D | Turn off MDIX settings on the NAS and server switchports |
Question 23 |
A | SSL portal |
B | SSL tunnel |
C | SSL gateway |
D | SSL client |
Question 24 |
A | IMAP |
B | POP |
C | LDAP |
D | SMTP |
Question 25 |
A | TXT |
B | MX |
C | NS |
D | AAAA |
E | A |
Question 26 |
A | Syslog |
B | Network Monitor |
C | Event Viewer |
D | ntop |
E | Performance Monitor |
Question 27 |
A | Captive portal |
B | NAC |
C | Port security |
D | WAP |
E | MAC filtering |
Question 28 |
A | Network |
B | Session |
C | Data Link |
D | Application |
E | Transport |
Question 29 |
A | 1024 |
B | 995 |
C | 50134 |
D | 23 |
E | 80 |
F | 1999 |
Question 30 |
A | ST |
B | MTRJ |
C | RJ45 |
D | F-type |
E | RJ11 |
Question 31 |
A | The secure key |
B | The public key |
C | The ticket granting key |
D | The private key |
E | The session key |
Question 32 |
A | Private |
B | Public |
C | SaaS |
D | PaaS |
E | Hybrid |
F | IaaS |
Question 33 |
A | Star |
B | Bus |
C | Mesh |
D | Ring |
E | Ad hoc |
Question 34 |
A | CMTS |
B | 110 block |
C | 66 block |
D | Patch panel |
E | Fiber distribution panel |
Question 35 |
A | Do nothing and keep the spare nearby for an emergency. |
B | Store all spare equipment in a sepearete office building for extra protection. |
C | Instead of replacing current units during failures, use parts from the spare units to fix the current unit. |
D | Update the firmware and drivers on spare network equipment regularly. |
E | Keep purchasing new spare equipment. |
Question 36 |
A | 10.1.1.255 |
B | 192.168.0.55 |
C | 192.168.0.1 |
D | 192.168.1.109 |
E | 10.1.0.255 |
Question 37 |
A | None of the classes |
B | Class D |
C | Class C |
D | Class A |
E | Class B |
Question 38 |
A | Configure port aggregation |
B | Install an inline tap |
C | Use port mirroring |
D | Use SQL injectors |
E | Periodically view the server logs |
Question 39 |
A | A hub |
B | A router |
C | A gateway |
D | A switch |
Question 40 |
A | The channel has changed |
B | There is a frequency mismatch |
C | There is a security type mismatch. |
D | The password needs to be re-entered |
E | There is insufficient antenna power |
Question 41 |
A | PRI |
B | BRI |
C | E1/E3 |
D | DSL |
Question 42 |
A | Network |
B | Application |
C | Presentation |
D | Session |
E | Physical |
F | Transport |
G | Data link |
Question 43 |
A | WinMS |
B | Window |
C | MMS |
D | MSS |
Question 44 |
A | Authentication server |
B | Secure server |
C | VPN gateway |
D | Encryption key |
E | HTTPS server |
Question 45 |
A | 15 |
B | 16 |
C | 8 |
D | 17 |
Question 46 |
A | Asset management files |
B | Wiring schematic |
C | Logical network diagram |
D | Physical network diagram |
E | Circuit diagrams |
Question 47 |
A | NIC teaming |
B | Muti-ISP connections |
C | RAID 1 |
D | Server clustering |
E | DNS round robin |
Question 48 |
A | Asset tracking |
B | Geofencing |
C | Social engineering |
D | Biometric |
E | Tamper detection |
Question 49 |
A | A private IP pointing to the web proxy |
B | A virtual IP pointing to the active DB |
C | A private IP pointing to the web front end |
D | A static IP pointing to the passive DB |
Question 50 |
A | RDP |
B | KDC |
C | Application server |
D | Client terminal |
Question 51 |
A | PSK |
B | WEP |
C | CCMP-AES |
D | EAP-PEAP |
Question 52 |
A | ping 192.168.1.1 -n 2048 |
B | ping 192.168.1.1 -l 2048 -n 6 |
C | ping 192.168.1.1 -l 2048 -t 6 |
D | ping 192.168.1.1 -l 2048 -t |
E | ping 192.168.1.1 -t |
Number of messages: -n parameter = 6
Question 53 |
A | Store and forward |
B | Transparent |
C | Multiport |
D | Source route |
Question 54 |
A | Accounting |
B | Authentication |
C | Auditing |
D | Authorization |
Question 55 |
SANUJA.COM 430 IN mx mx1.SANUJA.COM
SANUJA.COM 5 IN mx mx2.SANUJA.COM
SANUJA.COM 430 IN mx mx10.SANUJA.COM
SANUJA.COM 521 IN NS ns1.SANUJA.COM
SANUJA.COM 521 IN NS ns2.SANUJA.COM
SANUJA.COM 521 IN NS ns3.SANUJA.COM
SANUJA.COM 521 IN NS ns4.SANUJA.COM
A | NMAP –t SANUJA.COM |
B | netstat –a SANUJA.COM |
C | dig –t ANY SANUJA.COM |
D | iptables –f SANUJA.COM |
Question 56 |
A | T-3 |
B | E-1 |
C | OC-1 |
D | T-1 |
Question 57 |
A | Wardriving |
B | XSS |
C | SQL injection |
D | Packet sniffing |
E | Directory traversal |
Question 58 |
A | Subnet mask |
B | IP address |
C | Default gateway |
D | MAC address |
Question 59 |
A | Add a firewall between the domain controller and the router. |
B | Remove the firewall between the Internet/modem and the router. |
C | Remove one of the routers and if requires use VLANs to create separate subnets with specific firewall rules. |
D | Add additional printers across both NATs. |
Question 60 |
A | Evil twin |
B | VLAN mismatch |
C | Packet intrusion |
D | Honey pot |
E | Rogue DHCP server |
Question 61 |
A | BGP |
B | LLDP |
C | SIP |
D | LACP |
Question 62 |
A | Wiring schematic |
B | Building blueprints |
C | Logical diagram |
D | Rack diagram |
E | Network map |
Question 63 |
A | 802.1X |
B | WPA2 |
C | WPA |
D | WEP |
Question 64 |
A | arp -a |
B | arp -t |
C | arp -d |
D | arp -s |
E | arp -c |
Question 65 |
A | RADIUS server |
B | Biometric systems |
C | Smartcards |
D | Domain controller |
E | Wireless access point |
Question 66 |
A | ifconfig |
B | traceroute |
C | netstat |
D | ping |
Question 67 |
A | IPv6 |
B | CARP |
C | VoIP |
D | SSL |
E | QoS |
Question 68 |
A | Open circuits |
B | Split pairs |
C | Transposed wires |
D | Short circuits |
Question 69 |
A | Destination switch |
B | Store-and-forward |
C | Cut-through |
D | Source route |
Question 70 |
A | Unshielded twisted pair |
B | Shielded twisted pair |
C | Coaxial |
D | Single-mode fiber optic |
E | Multimode fiber optic |
Question 71 |
A | IP address resolution |
B | Password protection |
C | Network switching |
D | Name resolution |
Question 72 |
A | Permit 192.168.1.143 port 110 |
B | Permit 192.168.1.143 port 80 |
C | Permit 192.168.1.143 port 443 |
D | Permit 192.168.1.143 port143 |
E | Permit 192.168.1.143 port 587 |
F | Permit 192.168.1.143 port 25 |
Question 73 |
A | 6 |
B | 7 |
C | 0 |
D | 2 |
E | 4 |
Question 74 |
A | Physical inspection of each site/workstation. |
B | Perform frequent IT audits. |
C | Perform frequent security and vulnerability updates. |
D | Configure advance intrusion detection and firewall rules on the main datacenter. |
E | Install and maintain advanced enterprise firewall applications. |
Question 75 |
A | Wrong passphrase |
B | Channel overlap |
C | Cross talk |
D | Overcapacity |
Question 76 |
A | Redundant mode |
B | Individual mode |
C | Hot backup mode |
D | Combined mode |
E | High-efficiency mode |
Question 77 |
A | An open mail relay server |
B | An SNMPv1 private community |
C | A privilege escalation script |
D | A router with default credentials |
Question 78 |
A | RDP |
B | MTBF |
C | MDF |
D | IDF |
E | PBX |
Question 79 |
A | Asset tracking |
B | Data security |
C | Port security |
D | Physical security |
Question 80 |
A | Layer 3 repeater |
B | Ethernet hub |
C | Layer 2 router |
D | Multiport bridge |
Question 81 |
A | VPN concentrator |
B | IPS |
C | Web application firewall |
D | Content filter |
E | VLAN restrictions |
Question 82 |
A | Demarcation point |
B | Demarcation point |
C | Wireless endpoint |
D | Wireless controller |
E | Network firewall |
Question 83 |
A | Enterprise firewall |
B | Load balancer |
C | Proxy server |
D | IDS |
E | Wireless controller |
Question 84 |
A | Motion detection |
B | Video surveillance |
C | Biometrics |
D | Smartcards |
Question 85 |
A | Throttling |
B | Bandwidth quotas |
C | Blocking |
D | Session hijacking |
E | Data usage limits |
Question 86 |
A | System |
B | Setup |
C | Application |
D | Security |
Question 87 |
A | Change the default credentials |
B | Apply patches and updates |
C | Verify the firmware file hash |
D | Disable unused switchports |
Question 88 |
A | IP |
B | IMAP |
C | ICMP |
D | IGMP |
Question 89 |
A | Router |
B | Switch |
C | Gateway |
D | Bridge |
Question 90 |
A | SMTP |
B | HTTP |
C | SSL |
D | HTML |
E | FTP |
Question 91 |
A | Network |
B | Data link |
C | Session |
D | Presentation |
E | Transport |
F | Application |
G | Physical |
Question 92 |
A | Kerberos |
B | AES |
C | TKIP |
D | RC4 |
E | 802.1X |
Question 93 |
A | WPA2 |
B | Captive portal |
C | Port security |
D | Access control lists |
Question 94 |
A | Use a modem to console into the router |
B | Hire a third-party contractor to go on-site |
C | Travel to the branch office |
D | Walk a user through troubleshooting the connection |
Question 95 |
A | Hex |
B | CIDR |
C | Octal |
D | Binary |
Question 96 |
A | Driver update |
B | Feature change |
C | Vulnerability patch |
D | Operating system update |
E | BOIS firmware patch |
Question 97 |
A | Power-over-Ethernet switch |
B | Ethernet-over-power adapter |
C | Powerline extender |
D | Power distribution unit |
E | Ethernet power controller |
Question 98 |
A | SYN |
B | FIN |
C | URG |
D | PSH |
E | END |
Question 99 |
A | RJ45 |
B | ST |
C | F-type |
D | MTRJ |
E | RJ11 |
F | LC |
Question 100 |
A | SONET |
B | AAA server |
C | Smart jack |
D | Media converter |
E | SIP trunk |
Question 101 |
A | 1 through 1024 |
B | 49152 through 65535 |
C | 1024 to 49151 |
D | 1023 through 65534 |
Question 102 |
A | Application |
B | Setup |
C | Security |
D | System |
Question 103 |
A | RADIUS |
B | NAC |
C | LDAP |
D | TKIP-RC4 |
Question 104 |
A | Hubs |
B | Bridges |
C | Routers |
D | Firewalls |
Question 105 |
A | top |
B | monitor |
C | netstat |
D | ping |
E | cpustat |
Question 106 |
A | Single sign-on |
B | LDAP |
C | TACACS+ |
D | Local authentication |
Question 107 |
A | Fiber channel |
B | Jumbo frames |
C | SAN |
D | NAS |
E | FTP |
Question 108 |
A | CARP |
B | Voice over IP |
C | Round-robin DNS |
D | Quality of service |
Question 109 |
A | Protocol analyzer |
B | Layer 3 switch |
C | Layer 7 firewall |
D | Web proxy |
E | NAT |
Question 110 |
A | Create a new network segment with ACLs, limiting kiosks’ traffic with the internal network. |
B | Create a secondary NAT and connect the kiosks on it hence limit kiosks' ability to access the main network. |
C | Install an IDS to monitor all traffic to and from the kiosks. |
D | Enable switchport security on the ports to which the kiosks are connected to prevent network-level attacks. |
E | Install honeypots on the network to detect and analyze potential kiosk attacks before they occur. |
Question 111 |
A | ping |
B | ifconfig |
C | tracert |
D | ipconfig |
E | netstat |
Question 112 |
A | Power redundancy |
B | Dual power supplies |
C | Redundant circuits |
D | Power looping |
E | Uninterruptible Power Supply (UPS) |
Question 113 |
A | DMZ |
B | NAT |
C | RIP |
D | QoS |
E | DDoS |
Question 114 |
A | MIB |
B | BCP |
C | RTO |
D | RAID |
E | RPO |
Question 115 |
A | iSCSI |
B | CIFS |
C | Fibre Channel |
D | InfiniBand |
Question 116 |
A | Layer 2 |
B | Layer 4 |
C | Layer 1 |
D | Layer 3 |
Question 117 |
A | WEP |
B | PAP |
C | MS-CHAPv2 |
D | EAP |
E | CHAP |
Question 118 |
A | Backups |
B | Cold sites |
C | Snapshots |
D | Failover |
Question 119 |
A | Set the firewall to operate in transparent mode |
B | Allow the firewall to accept inbound traffic to ports 21, 53, 69, and 123 |
C | Allow the firewall to accept inbound traffic to ports 80,110,143, and 443 |
D | Allow the firewall to accept inbound traffic to ports 25, 67,179, and 3389 |
Question 120 |
A | Light sensors are interfering with the network |
B | Temperature changes are causing attenuation in copper cabling |
C | Network wiring is run perpendicular to electrical conduit |
D | EMI from the lights is interfering with the network cables |
Question 121 |
A | Fibre Channel |
B | NAS |
C | iSCSI |
D | InfinitiBand |
Question 122 |
A | NAT |
B | ACL |
C | Sticky MAC |
D | NAC |
E | 802.1x |
Question 123 |
A | NDA |
B | SLA |
C | BYOD |
D | IRP |
Question 124 |
A | TCP |
B | IGMP |
C | ICMP |
D | UDP |
Question 125 |
A | A user application problem |
B | A system-wide problem |
C | A wide area newtwork problem |
D | A shared resource problem |
E | A network-wide problem |
Question 126 |
A | WPA |
B | WEP |
C | WPA2 |
D | PEAP |
Question 127 |
A | DB9 |
B | USB 3.0 |
C | USB 2.0 |
D | RC5 |
E | RJ45 |
Question 128 |
A | Verify file type |
B | Verify file date |
C | Verify file version |
D | Verify file size |
E | Verify file hash |
Question 129 |
A | Standard operating procedure |
B | Process management |
C | Change management |
D | Project management |
Question 130 |
A | 10.0.0.0 to 10.0.255.255 |
B | 224.0.0.0 to 224.0.255.255 |
C | 169.254.0.0 to 169.254.255.255 |
D | 192.168.0.0 to 192.168.0.255 |
Question 131 |
A | Enterrpise APs |
B | Coaxial cabling |
C | Fiber-optic cabling |
D | Twisted pair cabling |
Question 132 |
A | session hijacking |
B | vulnerability scanning |
C | social engineering |
D | penetration testing |
E | friendly DoS |
Question 133 |
A | SFP |
B | BiDi |
C | GBIC |
D | QSFP |
Question 134 |
A | Bluejacking |
B | War driving |
C | Brute-force |
D | Port scanning |
E | Port sweeping |
Question 135 |
A | IP |
B | HTTP |
C | TCP |
D | UDP |
Question 136 |
A | Enable WPA and change the SSID |
B | Move from WPA2 to WEP |
C | Have the ISP double the bandwidth |
D | Configure geofencing |
Question 137 |
A | arp -d * |
B | arp -c * |
C | arp -a |
D | arp -s |
Question 138 |
A | Session hijacking |
B | Phishing |
C | Ransomware |
D | DDoS |
E | Spoofing |
Question 139 |
A | tcpdump |
B | traceroute |
C | iptables |
D | ipconfig |
E | netstat |
Question 140 |
A | VRF |
B | MDF |
C | IDF |
D | TDM |
Question 141 |
A | route |
B | ping |
C | netstat |
D | pathping |
Question 142 |
A | netstat |
B | dig |
C | tcpdump |
D | nmap |
Question 143 |
A | Change default admin password |
B | Perform backups |
C | Implement spanning tree |
D | Enable port mirroring |
E | Perform VLAN hopping |
F | Patch and update |
Question 144 |
A | 80 |
B | 443 |
C | 25 |
D | 990 |
E | 110 |
Question 145 |
A | Star |
B | Mesh |
C | Ring or circular |
D | Point-to-point |
E | Bus |
Question 146 |
A | Preshared |
B | Public |
C | Secured |
D | Private |
E | Privileged |
Question 147 |
A | 25 |
B | 110 |
C | 80 |
D | 143 |
E | 989 |
Question 148 |
A | SSL |
B | Telnet |
C | IPSec |
D | SSH |
Question 149 |
A | There is less local congestion on the wireless network |
B | The wireless access points were misconfigured |
C | The firewall is configured to throttle traffic to specific websites |
D | The testing server for the wired network was farther away |
Question 150 |
A | RJ45 |
B | 8P8C |
C | F-type |
D | BNC |
E | MTRJ |
Question 151 |
A | Number of screw holes |
B | Millimeters |
C | Centimeters |
D | Units |
E | Inches |
Question 152 |
A | Fault tolerance |
B | Site-to-site VPN |
C | Remote connection |
D | Network management |
E | Distributed server system |
Question 153 |
A | Auditing |
B | Authentication |
C | Accounting |
D | Authorization |
E | TGS |
Question 154 |
A | Point-to-point |
B | Mesh |
C | Bus |
D | Peer-peer |
E | Point-to-multipoint |
F | Ring |
Question 155 |
A | RG-8 |
B | RG-58 |
C | RJ-11 |
D | RJ-45 |
Question 156 |
A | Layer 7 |
B | Layer 6 |
C | Layer 5 |
D | Layer 3 |
E | Layer 2 |
F | Layer 4 |
G | Layer 1 |
Question 157 |
A | IP |
B | Ethernet |
C | TCP |
D | ICMP |
E | UDP |
Question 158 |
A | IDSL |
B | HDSL |
C | VDSL |
D | RADSL |
Question 159 |
A | 0 |
B | 4 |
C | 1 |
D | 2 |
E | 3 |
Question 160 |
A | Bridge |
B | Hub |
C | Router |
D | Switch |
Question 161 |
A | 19 inches |
B | 24 inches |
C | 12 inches |
D | 16 inches |
Question 162 |
A | It is impossible to have a collision domain in a wired (LAN) network infrastructure. |
B | Broadcast domains occur in layer 1 while collision domains occur in layer 2. |
C | Both broadcast and collision domains occur at layer 2. |
D | It is impossible to have a collision domain in a wireless network infrastructure. |
E | Collision domains occur in layer 1 while broadcast domains occur in layer 2. |
Question 163 |
A | 192.168.1.1 |
B | 255 255 255.0 |
C | 192.168.1.0 |
D | 255 255 255.0 |
E | 192.168.0.55 |
Question 164 |
A | Encryption |
B | Enrollment |
C | Certification |
D | Authorization |
E | Authentication |
Question 165 |
A | Power redundancy |
B | Airflow and cooling |
C | Circuit labeling |
D | UPS capability |
Question 166 |
A | VLAN mismatch |
B | Duplex/speed mismatch |
C | DHCP server issue |
D | DNS server issue |
E | Spanning tree blocked ports |
Question 167 |
A | VLAN hopping is the act of exploiting poor VLAN tagging. Session hijacking is a web-based attack aimed at privilege escalation. |
B | VLAN hopping involves overriding a user network connection to execute malicious commands. Session hijacking involves compromising a host to elevate privileges. |
C | VLAN hopping is a brute force attack executed to gain additional access. Session hijacking involves physically disrupting a network connection. |
D | VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commands. |
Question 168 |
A | RAID 10 |
B | RAID 5 |
C | RAID 1 |
D | RAID 0 |
Question 169 |
A | Logical network diagram |
B | MSConfig file |
C | Physical network diagram |
D | Wiring schematic |
E | Asset management files |
Question 170 |
A | MX |
B | NS |
C | TXT |
D | AAAA |
E | A |
Question 171 |
A | Network |
B | Application |
C | Presentation |
D | Data link |
E | Transport |
F | Session |
G | Physical |
Question 172 |
A | FTP |
B | SIP |
C | ARP |
D | SCP |
Question 173 |
A | IaaS |
B | VPN |
C | PaaS |
D | SaaS |
E | Hosted |
Question 174 |
A | netstat |
B | dig |
C | route |
D | ifconfig |
E | traceroute |
Question 175 |
A | NAS |
B | FTP |
C | iSCSI |
D | SAN |
E | FCoE |
Question 176 |
A | 5060 , 5061 |
B | 143 , 993 |
C | 5060 , 3389 |
D | 161 , 162 |
E | 80 , 443 |
Question 177 |
A | PTR |
B | MX |
C | A |
D | MD |
E | CNAME |
Question 178 |
A | L2TP |
B | IPsec |
C | FTPS |
D | PPTP |
Question 179 |
A | None of the answers are correct because you cannot assign random port numbers. |
B | https://sanuja.com/123456 |
C | https://sanuja.com:123456 |
D | http://sanuja.com/123456 |
E | http://sanuja.com:123456 |
Question 180 |
A | Pattern recognition |
B | Face geometry |
C | Tamper detection |
D | Biometrics |
E | Geofencing |
Question 181 |
A | DSL |
B | Dial-up modem |
C | ISDN |
D | Cable broadband |
Question 182 |
A | UPS |
B | SNMP |
C | RAID 1 |
D | Clustering |
Question 183 |
A | Loopback adapter |
B | Tone generator |
C | Cable tester |
D | Multimeter |
Question 184 |
Image Credit: https://www.tequipment.net/ FlukeNetworks52801009.html
A | When you place the tool at one end of a wire, it generates a tone that can be detected at the other end. |
B | To attach a bulk cable end to an RJ45 connector, you use the tool to squeeze the connector closed, forcing the wire ends to contact the connector’s pins. |
C | By connecting the clips to pins in a punchdown block, you can access telephone circuits in order to test them or place telephone calls. |
D | By touching the end of the tool to a copper cable, you can detect and measure the electrical current flowing through it. |
Question 185 |
A | Set up an SSH session to the desktop. |
B | Perform a DNS lookup on the server. |
C | Configure port security on the switch. |
D | Reference the ARP table in the router. |
Question 186 |
A | Something you know |
B | Something you do |
C | Something you have |
D | Somewhere you are |
Question 187 |
A | NGFW |
B | NAS |
C | RADIUS |
D | IDS |
Question 188 |
A | An NDA ensuring work data stored on the personal phone remains confidential |
B | A consent to monitoring policy covering company audits of the personal phone |
C | Real-time remote monitoring of the phone’s activity and usage |
D | An AUP covering how a personal phone may be used for work matters |
Question 189 |
A | 175.168.0.255 |
B | 169.254.54.5 |
C | 175.255.255.255 |
D | 192.168.1.1 |
E | 192.168.0.1 |
Question 190 |
A | Circuit diagrams |
B | Asset management files |
C | Wiring schematic |
D | Logical network diagram |
E | Physical network diagram |
Question 191 |
A | Double NAT issue |
B | VLAN mismatch |
C | Damaged or malfunctioning fiber port |
D | Corrupted config files or operating system |
E | Damaged or malfunctioning LAN port |
Question 192 |
A | RAID 10 |
B | RAID 1 |
C | RAID 0 |
D | RAID 5 |
Question 193 |
A | biometrics |
B | hardware security |
C | tamper detection |
D | asset tracking |
E | device hardening |
Question 194 |
A | -a |
B | -t |
C | -n |
D | -i |
Question 195 |
A | Electrical |
B | Infrared |
C | Microwave |
D | Fiber optic |
Question 196 |
A | Host-to-host |
B | Host-to-site |
C | Branch-to-server |
D | Extranet |
E | Site-to-site |
Question 197 |
A | Incompatibility with the current network |
B | Loss of full control over data resources |
C | Inconsistent data accessability |
D | Increased malware exposure |
E | Decreased performance of the internal network |
Question 198 |
A | nmap |
B | iptables |
C | dig |
D | tcpdump |
Question 199 |
A | Control the jitter of the affected traffic across the network links |
B | Control the attenuation of the non-voice traffic across the network links |
C | Control the EMI of the multimedia traffic across the network links |
D | Control the latency of traffic across the network links |
Question 200 |
A | Speed |
B | Distance |
C | Hop count |
D | Bandwidth |
E | Ping time |
← |
List |
→ |
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 |
31 | 32 | 33 | 34 | 35 |
36 | 37 | 38 | 39 | 40 |
41 | 42 | 43 | 44 | 45 |
46 | 47 | 48 | 49 | 50 |
51 | 52 | 53 | 54 | 55 |
56 | 57 | 58 | 59 | 60 |
61 | 62 | 63 | 64 | 65 |
66 | 67 | 68 | 69 | 70 |
71 | 72 | 73 | 74 | 75 |
76 | 77 | 78 | 79 | 80 |
81 | 82 | 83 | 84 | 85 |
86 | 87 | 88 | 89 | 90 |
91 | 92 | 93 | 94 | 95 |
96 | 97 | 98 | 99 | 100 |
101 | 102 | 103 | 104 | 105 |
106 | 107 | 108 | 109 | 110 |
111 | 112 | 113 | 114 | 115 |
116 | 117 | 118 | 119 | 120 |
121 | 122 | 123 | 124 | 125 |
126 | 127 | 128 | 129 | 130 |
131 | 132 | 133 | 134 | 135 |
136 | 137 | 138 | 139 | 140 |
141 | 142 | 143 | 144 | 145 |
146 | 147 | 148 | 149 | 150 |
151 | 152 | 153 | 154 | 155 |
156 | 157 | 158 | 159 | 160 |
161 | 162 | 163 | 164 | 165 |
166 | 167 | 168 | 169 | 170 |
171 | 172 | 173 | 174 | 175 |
176 | 177 | 178 | 179 | 180 |
181 | 182 | 183 | 184 | 185 |
186 | 187 | 188 | 189 | 190 |
191 | 192 | 193 | 194 | 195 |
196 | 197 | 198 | 199 | 200 |
End |
Based on general knowledge and CompTIA guidelines published in 2020.
FAQ | Report an Error
Study outline at: CompTIA Exams Guide
Disclaimer: While every reasonable effort is made to ensure that the information provided is accurate, no guarantees for the currency or accuracy of information are made. It takes several proof readings and rewrites to bring the quiz to an exceptional level. If you find an error, please contact me as soon as possible. Please indicate the question ID-Number or description because server may randomize the questions and answers.